Securitization as Policy Choice: Macedonian Case

2016 ◽  
Vol 2 (2) ◽  
pp. 98
Author(s):  
Fatmir Xheladini

The global geopolitical transformations that have occurred in last years have raised questions about various nonmilitary concerns as a result of changes in the global order based solely on the premises of the military aspects of security. The evolution and debate on security began to shift from the traditional basis into contemporary segments of the security analysis incorporating approaches into other areas beyond the traditional concepts of security. In variety of debates of the broadening of concept of security, various scholars began to elaborate that security threats may appear in many other areas outside that of military and political sector. In this aspect Copenhagen schools examines aspects of security at micro and macro level and it represents analysis that intertwine with each other and which derive a more broad understanding what actually constitutes security for a country or community. Expanding areas of security analysis refers to the statement that security has to do with survival of a nation or society which also reasonably includes a range of concerns about the conditions of survival. The adoption of this concept expanded in various fields is a result of the need to better understand the logic of what are the related sectors and is a result of understanding what the interaction between the different sectors are. The aim of our paper is through the broadened mechanism of the concept of security to analyze the challenges and opportunities of the Macedonian security policies and how they are interlinked with other sectors. It does so by looking through the causes of tensions between ethnic Macedonian and Albanians in Macedonia, not only among the issues and emergency events that cause them, but also among the structural factors that shape and frame such a misperception.

2016 ◽  
Vol 4 (2) ◽  
pp. 98
Author(s):  
Fatmir Xheladini

The global geopolitical transformations that have occurred in last years have raised questions about various nonmilitary concerns as a result of changes in the global order based solely on the premises of the military aspects of security. The evolution and debate on security began to shift from the traditional basis into contemporary segments of the security analysis incorporating approaches into other areas beyond the traditional concepts of security. In variety of debates of the broadening of concept of security, various scholars began to elaborate that security threats may appear in many other areas outside that of military and political sector. In this aspect Copenhagen schools examines aspects of security at micro and macro level and it represents analysis that intertwine with each other and which derive a more broad understanding what actually constitutes security for a country or community. Expanding areas of security analysis refers to the statement that security has to do with survival of a nation or society which also reasonably includes a range of concerns about the conditions of survival. The adoption of this concept expanded in various fields is a result of the need to better understand the logic of what are the related sectors and is a result of understanding what the interaction between the different sectors are. The aim of our paper is through the broadened mechanism of the concept of security to analyze the challenges and opportunities of the Macedonian security policies and how they are interlinked with other sectors. It does so by looking through the causes of tensions between ethnic Macedonian and Albanians in Macedonia, not only among the issues and emergency events that cause them, but also among the structural factors that shape and frame such a misperception.


2013 ◽  
Vol 25 (3) ◽  
pp. 32-51 ◽  
Author(s):  
Salvatore Aurigemma

To combat potential security threats, organizations rely upon information security policies to guide employee actions. Unfortunately, employee violations of such policies are common and costly enough that users are often considered the weakest link in information security. This paper presents a composite theoretical framework for understanding employee behavioral compliance with organizational information security policies. Building off of the theory of planned behavior, a composite model is presented that incorporates the strengths of previous studies while minimizing theoretical gaps present in other behavioral compliance models. In building the framework, related operational constructs are examined and normalized to allow better comparison of past studies and help focus future research efforts.


2021 ◽  
Vol 21 (4) ◽  
pp. 188-200
Author(s):  
Chiemela Godwin Wambu ◽  
Amaechi Ehimatie

Nigerian military history is an aspect of Nigerian history that reconstructs the philosophies, beliefs, life and times of military personnel in relation to time and place. On the other hand, strategic studies involve a study of the security policies and political conduct of states in their interaction within the international system. Since it is the military institution that implements these security policies, itself central to the objectives of states in international politics, it is logical  to view military history and strategic studies as pivotal to the securitydevelopment of the Nigerian nation as it is for every other nation. Given this understanding, this study attempts to situate Nigerian military history and strategic studies as imperatives for national security development in Nigeria. To achieve its goal, the paper employs mostly secondary and but a few primary sources subjected to content historical analysis from which it was deduced that military history and strategic studies are important for the advancement of security development in Nigeria. Keywords: Military, Strategic Studies, History, Security


2017 ◽  
Vol 27 (4) ◽  
pp. 447-464 ◽  
Author(s):  
Joni Meenagh

With the rise of neoliberalism, postfeminism and “hookup culture,” young women face both challenges and opportunities when constructing themselves as sexual subjects. This paper explores the experiences of a young woman who sought to have sex with someone new in order to move on from the breakup of a long-term relationship. This case study is part of a larger project which explored how young people (aged 18–25) negotiate their love/sex relationships within the context of new media environments. While this young woman described her experience of having sex with someone new as “empowering,” within a neoliberal, postfeminist context the concept of empowerment may not be a useful theoretical tool for understanding young women’s sexuality. Situating her story within its broader sociocultural context, this paper explores how structural factors shape this young woman’s ability to navigate normative discourses about sexual empowerment and construct herself as a sexual subject.


2011 ◽  
Vol 1 (1) ◽  
pp. 35-40 ◽  
Author(s):  
Matthew Warren ◽  
Shona Leitch

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.


2009 ◽  
Vol 1 (2) ◽  
pp. 135-155 ◽  
Author(s):  
Mely Caballero-Anthony ◽  
Belinda Chng

AbstractThe devastating cyclone that hit Myanmar in May 2008 and the lack of immediate action on the part of the military junta to respond to the humanitarian crises triggered not only international dismay but renewed debates on the utility of the R2P. But given the lack of international consensus on the R2P on the one hand, and the urgency to act to provide humanitarian relief and protection on the other, this paper argues that it is about time that a R2P variant be explored—if indeed the ultimate objective of the R2P is the protection and promotion of human security. This paper therefore examines the idea of a R2P-Plus that is responsive to different kinds of human security threats, such as those caused by intentional state neglect in times of natural disasters, and sensitive to the political context in Asia. The notion of a R2P-Plus is aimed at finding convergence between the advocates of the strict interpretation of the R2P and those who argue for an R2P that is more attuned to the realities of Asia.


2017 ◽  
Vol 10 (2) ◽  
pp. 286-299 ◽  
Author(s):  
Brahim Saidy

Military cooperation is one of the most intriguing dimensions of the Qatari-US relationship. It has progressively evolved, driven by a changing geopolitical landscape and security threats in the Middle East. In fact, it has a significant impact on the overall bilateral relationship, especially economic ties. It rests upon four pillars: a bilateral defence agreement, the use of military facilities, arms sales and military-to-military contacts. This paper analyzes the development of the military relationship that exists between Washington and Doha and offers an assessment of the issues that animate it.


2009 ◽  
Vol 18 (3) ◽  
pp. 363-376 ◽  
Author(s):  
ANDREW A. MICHTA

AbstractNATO enlargement after the cold war contributed to the democratic transformation of post-communist states. It failed, however, to generate a larger consensus on the shared mission and to provide the requisite military capabilities. Today, notwithstanding the rhetoric of unity after the 2008 Bucharest summit, NATO struggles to reconcile the out-of-area experience of the Balkan wars with its post-9/11 tasks and the renewed territorial defense concerns raised by the 2008 Russo-Georgian war. Paradoxically, the more NATO has expanded to foster the military–political security of the new democratic states of eastern and south-eastern Europe, the less it seems capable of dealing with real security threats such as Afghanistan. Facing the possible strategic failure of its ISAF mission, NATO needs to re-evaluate the policy track chosen post-1989.


2012 ◽  
Vol 165 (3) ◽  
pp. 108-120
Author(s):  
Lech CHOJNOWSKI

Security is of political nature; however, it does not stand for the essence of political security. This security category is a result of the application of the sector security analysis methodology. According to the methodology, all security-related issues are divided into sectors where detailed analyses are conducted with the application of specialized research methods, techniques and means. The use of sector methodology is a consequence of widening the meaning of contemporary security that makes it complex and multidimensional. A comprehensive security analysis can be confined to six sectors: political, military, economic, ecological, societal and common security. The contents of the political security sector are varied and hinged upon the level of analysis and the security subject type the analysis is conducted for. Generally, the political security of political units means the state of the certainty of existence, sovereign functioning and development of its political system. It is achieved as a result of lack of political threats or possession of appropriate capability to protect against them.Crucial to understanding political security are political threats, which are occurrences, processes and activities that can harm the existence, sovereign functioning and development of a political unit’s political system, but only those not included in other security sectors.The article provides a general overview of the political security sector and political security, and can be a starting point for further detailed analysis conducted from the perspective of specific subject categories placed on varied levels of analysis.


Sign in / Sign up

Export Citation Format

Share Document