Security as Politics

Author(s):  
Andrew W. Neal

This book argues that while ‘security’ was once an anti-political ‘exception’ in liberal democracies – a black box of secret intelligence and military decision-making at the dark heart of the state – it has now become normalised in professional political life. This represents a direct challenge to critical security studies and securitisation debates and their core assumption that security is a kind of illiberal and undemocratic ‘anti-politics’. The book investigates security from the perspective of professional political practice - historically, sociologically and theoretically. Using an extended UK case study, including interviews with parliamentarians and former security ministers, it examines security politics from the early 1980s to the present day to show how its meaning and practice have changed over time. It explores the history of legislative/executive relations on security, including the reasons for parliamentary exclusion from security policy making such as executive secrecy and parliamentary deference. The book demonstrates that political activity on security has increased to such an extent that it requires a rethink of the assumed pathological relationship between ‘politics’ and ‘security’. Security has been migrating from the realm of exceptional politics to one of ‘normal politics’.

2004 ◽  
Vol 5 (1) ◽  
pp. 67-87
Author(s):  
Jeong-Yong Kim

This article presents the model of 'business-track diplomacy' to test a state's utilization of economic engagement strategy as security policy. The model provides ways to think around security issues and alternative security options that go beyond the traditional military containment approach to security in international relations. As a case study, the article investigates Hyundai Group's Mountain Kumgang tourism with North Korea. In this case study, it demonstrates that not only the Kim Dae-Jung government's strong policy-making will of business-track diplomacy towards North Korea but also the Hyundai Group's business will and vulnerability of the North Korean economy played important roles in realizing the tour project and thus, enhanced inter-Korean economic cooperation.


2018 ◽  
Vol 60 ◽  
pp. 179-202 ◽  
Author(s):  
Ayşen Üstübici ◽  
Ahmet İçduygu

AbstractThis article traces the recent history of border closures in Turkey and Morocco and their impact on human mobility at the two ends of the Mediterranean. Border closures in the Mediterranean have produced new spaces where borders are often fenced, immigration securitized, and border crossings and those facilitating border crossings criminalized. Here, bordering practices are conceptualized as physical bordering practices, border controls, and legal measures. Turkey and Morocco constitute comparable cases for an analysis of border closures insofar as they utilize similar mechanisms of closure, despite having quite different outcomes in terms of numbers. The article’s findings are based on fieldwork conducted at both locations between 2012 and 2014, as well as on analysis of Frontex Risk Assessment Reports from 2010 to 2016. The first part of the article reflects on the concepts of border closure and securitization, together with their implications, and draws for its argument on critical security studies and critical border studies. The second part of the article is an overview of controls over mobility exercised in the Mediterranean from the 1990s onward. Then, in the third and fourth parts, we turn to the particular cases—respectively, Turkey and Morocco—in order to discuss their processes of border closure and the various implications thereof. Through analysis of the two country cases, we show that border closures are neither linear nor irreversible.


Author(s):  
Johannes Bartuschat ◽  
Elisa Brilli ◽  
Delphine Carron

This volume aims to foster the dialogue between two usually distinct scholarly traditions: on the one hand, the studies revolving around cultural and political activity, as well as the didactic, theological, religious and pastoral initiatives undertaken by the Dominican Order in the urban context; on the other hand, the scholarship on the history of Florence between the thirteenth and fourteenth centuries, seen as a case study representative of the evolutions of late medieval communal institutions in the Italian peninsula. The essays focus on the reciprocal interactions and influences between religious and political cultures, along with those between mendicant and lay contexts.


Author(s):  
Edward Newman

Human security suggests that security policy and security analysis, if they are to be effective and legitimate, must focus on the individual as the referent and primary beneficiary. In broad terms, human security is “freedom from want” and “freedom from fear:” positive and negative rights as they relate to threats to core individual needs. Human security is normative; it argues that there is an ethical responsibility to (re)orient security around the individual in line with internationally recognized standards of human rights and governance. Much human security scholarship is therefore explicitly or implicitly underpinned by a solidarist commitment to moral obligation, and some are cosmopolitan in ethical orientation. However, there is no uncontested definition of, or approach to, human security, though theorists generally start with human security challenges to orthodox neorealist conceptions of international security. Nontraditional and critical security studies (which are distinct from human security scholarship) also challenges the neorealist orthodoxy as a starting point, although generally from a more sophisticated theoretical standpoint than found in the human security literature. Critical security studies can be conceived broadly to embrace a number of different nontraditional approaches which challenge conventional (military, state-centric) approaches to security studies and security policy. Human security has generally not been treated seriously within these academic security studies debates, and it has not contributed much either.


2020 ◽  
Vol 51 ◽  
pp. 61-73
Author(s):  
C.R. Pennell

AbstractArchival material on the Libyan revolution and the civil war that followed is very scarce. This article discusses two born digital collections – the Libya Uprising Archive of tweets collected during the rising against Qaddafi, and the collections of asylum appeal tribunals in several English-speaking liberal democracies. Neither collection has been extensively used. It describes how the collections were formed, and the difficulties of using them and, for each, provides a short case study to illustrate these points. For the Libya Uprising Archive the case study is of tweets put out on the day Qaddafi was killed (20 October 2011), for the asylum tribunals the case study is of evidence provided by claimants about the importance or otherwise of tribalism as a factor that put individuals in danger.


Author(s):  
Andrea Capiluppi ◽  
Klaas-Jan Stol ◽  
Cornelia Boldyreff

A promising way to support software reuse is based on Component-Based Software Development (CBSD). Open Source Software (OSS) products are increasingly available that can be freely used in product development. However, OSS communities still face several challenges before taking full advantage of the “reuse mechanism”: many OSS projects duplicate effort, for instance when many projects implement a similar system in the same application domain and in the same topic. One successful counter-example is the FFmpeg multimedia project; several of its components are widely and consistently reused in other OSS projects. Documented is the evolutionary history of the various libraries of components within the FFmpeg project, which presently are reused in more than 140 OSS projects. Most use them as black-box components; although a number of OSS projects keep a localized copy in their repositories, eventually modifying them as needed (white-box reuse). In both cases, the authors argue that FFmpeg is a successful project that provides an excellent exemplar of a reusable library of OSS components.


Author(s):  
David Mutimer

This chapter provides a partial history of the label ‘Critical Security Studies’ and the way it has developed and fragmented since the early 1990s. It considers the primary claims of the major divisions that have emerged within the literatures to which the label has been applied: constructivism, critical theory, and poststructuralism. It looks at the 1994 conference held at York University in Toronto entitled Strategies in Conflict: Critical Approaches to Security Studies, which spawned a book called Critical Security Studies: Concepts and Cases (1997b), and Security: A New Framework for Analysis (1998), which was published to serve as a relatively comprehensive statement of ‘securitization studies’, or the Copenhagen School. The chapter argues that Critical Security Studies needs to foster an ‘ethos of critique’ in either the study or refusal of security. Finally, it examines Ken Booth’s views on poststructuralism as part of a broad Critical Security Studies.


2018 ◽  
Vol 59 ◽  
pp. 7-31 ◽  
Author(s):  
Ayşen Üstübici ◽  
Ahmet İçduygu

AbstractThis article traces the recent history of border closures in Turkey and Morocco and their impact on human mobility at the two ends of the Mediterranean. Border closures in the Mediterranean have produced new spaces where borders are often fenced, immigration securitized, and border crossings and those facilitating border crossings criminalized. Here, bordering practices are conceptualized as physical bordering practices, border controls, and legal measures. Turkey and Morocco constitute comparable cases for an analysis of border closures insofar as they utilize similar mechanisms of closure, despite having quite different outcomes in terms of numbers. The article’s findings are based on fieldwork conducted at both locations between 2012 and 2014, as well as on analysis of Frontex Risk Assessment Reports from 2010 to 2016. The first part of the article reflects on the concepts of border closure and securitization, together with their implications, and draws for its argument on critical security studies and critical border studies. The second part of the article is an overview of controls over mobility exercised in the Mediterranean from the 1990s onward. Then, in the third and fourth parts, we turn to the particular cases—respectively, Turkey and Morocco—in order to discuss their processes of border closure and the various implications thereof. Through analysis of the two country cases, we show that border closures are neither linear nor irreversible.


2021 ◽  
Vol 1 (72) ◽  
pp. 223-235
Author(s):  
Vakhtang MAISAIA

The Black Sea region is increasingly becoming a priority on the international agenda. In fact, a regional approach is emerging as actors understand that common problems need tobe addressed jointly. Nevertheless, cooperation efforts are hampered by a number of factors, such as uneven economic and political development within and among countries, nationalist forces, and longstanding animosities between regional players. In this context, it is imperative to foster sound policies aimed at strengthening dialogue and cooperation so as to contain and ultimately resolve conflicts with peaceful means. However, there is little policy-oriented research on the challenges and opportunities for cooperation in the Black Sea region. The purpose of this paper is to assess the impact of terrorism and its dangers towards the Black Sea region. The work also describes the significance of international terrorism and its general definitions. Besides, the result and findings are based on theoretical studies and assumptions and the result of the analysis of the "Case Study" of the Black Sea region. Case study examines how the Black Sea region influences the spread of terrorism and what threats it poses for this region. Furthermore, the aspects of what makes the region important on international arena are analyzed and the existent and potential security issues are examined, as well as strategicimportance of the region for the EU and NATO is analyzed even from academic framework –“Securitization” theory322. The theory is based on security studies conceptual background and the background spectrum includes: the Copenhagen School and Critical security studies as the type323.Keywords: Black Sea region, Copenhagen School, Critical security studies, Securitization,NATO, EU, Georgia’s national security


Author(s):  
Shadia Abdel Rahman Al - Balawi

Mecca has received the sanctity and place in the hearts of Muslims a lot of different writings that covered various political and cultural aspects of its history through different ages, yet we note through our study that Mecca, despite its great importance, but the sources of Islamic history were keen on The history of Mecca since the time of the Prophet peace be upon him until the middle of the second century AH, on the day of Mecca was the center of political activity and scientific alike, and then began to diminish this concern, especially since the beginning of the third century AH, these sources are no longer provide us only a little Nazer focused primarily On The history of religious Mecca, such as the pilgrimage to people and so on, rarely refer to the aspects of political life, economic and civilization of this country, but this little information with the written historian Makkah Azraqi and Fakhi in the third century, provides the researcher important information about the history of Mecca during the first three centuries, Historians Azraqi in the year 250 AH and Fakhi in the year 280 AH entered the history of Mecca in the almost forgotten, and surrounded by the mystery, which lasted for five centuries, that the rule of God has a historian of its children in the eighth century AH is Taqi al-Din Fassi Fassi felt the vacuum experienced by historians Mecca m A drive on the classification of books bosses (precious decade) and (healing gram), two of the most important books that relied upon in my study of the neighboring Mecca, and given the importance of this layer (Majaoron) in Mecca society and its substantial role in which it has signed an optional on this subject to search.


Sign in / Sign up

Export Citation Format

Share Document