scholarly journals Repositioning security spaces of exclusion, exception, and integration in China–Southeast Asia borderlands

2021 ◽  
Vol 11 (2) ◽  
pp. 1-25
Author(s):  
Zhiding Hu ◽  
Victor Konrad

English Abstract: Formerly localized, restricted border interaction between China and Southeast Asia has shifted to extensive cross-border engagement along regulated borders with a hierarchy of crossings and expansive borderlands. This expanded security system reveals rescaled and repositioned border security infrastructure and practice into a point and corridor system with vanguard crossings at Hekou, Mohan and Ruili. Fundamental shifts are concurrent focus on primary crossings and spatially extensive borderlands that encompass diminished attention to lesser crossings, beyond the border implementation of security checkpoints, mobile security, and compromise, to enable effective management of expansive borderlands. These borderlands mediate space and enable spatial reapportionment of security to accommodate greatly enhanced cross-border flows of people, goods, and information, thus shaping extensive spaces of exclusion and integration and focused places of exception.Spanish Abstract: La anteriormente restringida interacción fronteriza China–Sudeste Asiático, cambió a un extenso compromiso de fronteras reguladas con una jerarquía de cruces y zonas transfronterizas expansivas. Este sistema ampliado de seguridad, revela la infraestructura y prácticas transfronterizas reescaladas y reubicadas como puntos y sistemas de corredores con cruces de vanguardia en Hekou, Mohan y Ruili. Los cambios se enfocan en los cruces primarios y extensión de fronteras, disminuyendo la atención a los cruces menores —después de la implementación de puntos de control de seguridad—, la seguridad móvil y el compromiso a una gestión fronteriza eficaz. Estas zonas permiten la redistribución espacial de la seguridad acomodando los intensificados flujos transfronterizos de personas, bienes e información, conformando espacios de exclusión e integración, así como lugares de excepción focalizados. French Abstract: L’interaction frontalière entre la Chine et l’Asie du Sud-Est, autrefois localisée et limitée, s’est transformée en un engagement transfrontalier réglementé avec une hiérarchie de passages et des zones frontalières étendues. Ce système de sécurité élargi révèle une infrastructure et une pratique de sécurité frontalière redimensionnées et repositionnées dans un système de points et de corridors avec des passages d’avant-garde à Hekou, Mohan et Ruili. Les changements fondamentaux se concentrent sur les principaux points de passage, les zones frontalières étendues, la mise en œuvre de points de contrôle de sécurité, la sécurité mobile et le compromis, pour permettre une gestion effi cace des zones frontalières étendues. Ces dernières permettre ent la médiation de l’espace et la réaffectation spatiale de la sécurité afin d’accueillir des fl ux transfrontaliers de personnes, de biens et d’informations considérablement accrus, façonnant ainsi de vastes espaces d’exclusion et d’intégration et des lieux d’exception ciblés.

2013 ◽  
Vol 4 (2) ◽  
pp. 21-38 ◽  
Author(s):  
Luis Felipe Luna-Reyes ◽  
Douglas C. Derrick ◽  
Brent Langhals ◽  
Jay F. Nunamaker

A long-standing problem in the US-Mexico bilateral agenda is migration. Although both countries have important agreements to promote economic exchange and trade, the events of 9/11 and other acts of terrorism have increased concerns about border security. Since the US-Mexico border is one of the most important borders in the world in terms of activity, securing it without interfering with the legitimate flow of people and goods, poses an important challenge. The purpose of this paper is to propose conceptual frameworks and models to facilitate collaboration across national borders, by discussing and considering key factors for collaborative US-Mexico Border Security Infrastructure and Systems. Border security technical solutions pose an interesting domain because there are a myriad of concerns (e.g., political, economic, social and cultural) outside the technical implementation that must be deliberated and examined. In this conceptual study, unique aspects of trust, governance, information sharing, culture, and technical infrastructure are identified as the key ingredients in a cross-border collaboration effort. A bi-national organizational network appears to be an effective institutional design to develop a better understanding of the problem, as well as required policies and technologies. This approach is consistent with experiments, research, and conclusions found in the European Union.


2021 ◽  
Vol 3 (3) ◽  
pp. 33-53
Author(s):  
Tristan Griffin

For centuries the Anglo-Scottish borderlands were a region of weak government, endemic violence, border fortresses, and periodic full-scale wars. After the 1603 Union of the Crowns joined Scotland with England and Ireland, James VI & I attempted to pacify the “Middle Shires” of his new realm of “Great Britain.” Despite an apparently successful pacification, using the resources of both the Scottish and English states, the outbreak of the British Civil Wars in 1638 resulted in the region once again becoming militarized. This militarization followed many of the characteristics of the pre-1603 border security system: the renovation of border fortresses, cross-border raids, powerful noble magnates with cross-border political alliances, and the theft or attempted theft of cattle as a means of waging war.


2017 ◽  
pp. 640-658
Author(s):  
Luis Felipe Luna-Reyes ◽  
Douglas C. Derrick ◽  
Brent Langhals ◽  
Jay F. Nunamaker Jr.

A long-standing problem in the US-Mexico bilateral agenda is migration. Although both countries have important agreements to promote economic exchange and trade, the events of 9/11 and other acts of terrorism have increased concerns about border security. Since the US-Mexico border is one of the most important borders in the world in terms of activity, securing it without interfering with the legitimate flow of people and goods, poses an important challenge. The purpose of this paper is to propose conceptual frameworks and models to facilitate collaboration across national borders, by discussing and considering key factors for collaborative US-Mexico Border Security Infrastructure and Systems. Border security technical solutions pose an interesting domain because there are a myriad of concerns (e.g., political, economic, social and cultural) outside the technical implementation that must be deliberated and examined. In this conceptual study, unique aspects of trust, governance, information sharing, culture, and technical infrastructure are identified as the key ingredients in a cross-border collaboration effort. A bi-national organizational network appears to be an effective institutional design to develop a better understanding of the problem, as well as required policies and technologies. This approach is consistent with experiments, research, and conclusions found in the European Union.


2013 ◽  
Vol 411-414 ◽  
pp. 1505-1509
Author(s):  
Long Chen ◽  
Shuan Chen ◽  
Yu Qing He ◽  
Jian Guo Wei ◽  
Jian Wu Dang

In this paper, we proposed a mobile security system based on IP camera network video surveillance by improving the traditional monitoring methods. This system includes three parts: Android mobile client, cloud server, IP camera monitoring terminals. By setting IP cameras at 24 fps but only sending one frame each second, we can infer the situation by analyzing of the single image and reduce the amount of data transmission. User can check the live scenes and send control commands to monitoring terminal or receive the push information from the server to freely give alarm signal to users anytime, anywhere. And users can also select any regions or any specific objects to monitor, the server will real-time monitor each scene according to the specific requirements by using the algorithms of image contrast and depth estimation. The experiment results show that the system can greatly improve the accuracy of the alarm.


Scientax ◽  
2021 ◽  
Vol 3 (1) ◽  
pp. 1-28
Author(s):  
Galih Ardin

Tax on digital economy activities has become a widely discussed issue in the world because of the limitation on the permanent establishment concept in anticipating the digital economy's externalities. The failure of OECD countries to reach digital economic taxation agreements also caused these countries to take unilateral measures in securing their respective interests. Indonesia, as a country with considerable digital economy value in the Southeast Asia region, plans to implement the significant economic presence concept to secure its tax revenue that cannot be captured by PE concept in the digital cross-border transaction. However, the implementation of this new nexus could generate new challenges in the Indonesia taxation system. This study seeks to provide alternatives to the Indonesian government regarding the taxable presence and taxation methods on the digital economy, especially digital advertising, by conducting examination and evaluation through current nexuses, the international proposals, and other countries' experience in addressing tax challenges in the digital advertising.


2014 ◽  
Vol 8 (4) ◽  
pp. 139-150 ◽  
Author(s):  
Kalanyu Zintus-art ◽  
Duk Shin ◽  
Natsue Yoshimura ◽  
Hiroyuki Kambara ◽  
Yasuharu Koike

2007 ◽  
Vol 180 (3) ◽  
pp. 1394-1410 ◽  
Author(s):  
Gökhan Çelik ◽  
İhsan Sabuncuoğlu

Significance One is the Dominican Republic’s controversial plan to build a border ‘wall’, to halt undocumented migration. Another is the Haitian authorities’ recent construction of an irrigation canal just within the Haitian side of the border. Protests and border clashes are likely to intensify over the coming months. Impacts Increased border security will drive up demand for, and the cost of, cross-border smuggling, worsening insecurity. Effective border policing may foster short-term labour shortages in the Dominican Republic. Demands for vaccination evidence before crossing the border will probably prompt a surge in black-market vaccination certificates.


Sign in / Sign up

Export Citation Format

Share Document