scholarly journals Securing Public Places: New Zealand’s Private Security Sector as a National Security Enabler

2019 ◽  
Vol 1 (1) ◽  
pp. 75-92
Author(s):  
Nicholas Dynon

In recent years, national security policy makers globally have grappled with the challenge of addressing the vulnerability of ‘public spaces’ to terror attack. In the wake of the Christchurch mosque attacks, it’s a challenge that has gained sudden urgency in New Zealand. Faced with the numeric impossibility of protecting infinite public spaces within their jurisdictions, several states have enacted strategies to utilise the considerable ‘eyes and ears’ capability of their private security personnel sectors. While the harnessing of numerically superior private security guard forces presents opportunities for a more linked-up approach to protecting the public, there are also significant barriers. Despite their massive growth in recent decades, private security industries the world over struggle with issues – both real and perceived – around pay and conditions, training, standards and professionalism. With the UK and Australia already having taken steps towards public-private security partnerships, to what extent does New Zealand’s private security guarding sector constitute a potential national security force-multiplier?

2013 ◽  
Vol 12 (3) ◽  
pp. 445-473 ◽  
Author(s):  
Malcolm N. MacDonald ◽  
Duncan Hunter ◽  
John P. O'Regan

This paper analyses a corpus of UK policy documents which sets out national security policy as an exemplar of the contemporary discourse of counter-terrorism in Europe, the USA and worldwide. A corpus of 148 documents (c. 2.8 million words) was assembled to reflect the security discourse produced by the UK government before and after the 7/7 attacks on the London Transport system. To enable a chronological comparison, the two sub-corpora were defined: one relating to a discourse of citizenship and community cohesion (2001–2006); and one relating to the ‘Preventing Violent Extremism’ discourse (2007–2011). Wordsmith Tools (Scott 2008) was used to investigate keywords and patterns of collocation. The results present themes emerging from a comparative analysis of the 100 strongest keywords in each sub-corpus; as well as a qualitative analysis of related patterns of the collocation, focusing in particular on features of connotation and semantic prosody.


Author(s):  
Olena Oliinyk

Abstract. The article substantiates the need to complete the formation of an integrated network of pedestrian spaces in the historic center of Kiev. Now the historic center covers three hills - the Upper Town, Pechersk and Kiev-Pechersk Lavra. However, the problem of creating an integrated network of pedestrian connections in the historic center of Kyiv has not yet been solved, and its formation is one of the urgent tasks today. After all, the creation of a holistic system of pedestrian ways in the historic city makes it possible to increase its tourist potential and ensure the preservation and development of historical and cultural heritage. The author proposes a method of spatial analysis to assess the state of public spaces in the city. The author's comparative analysis of two cities in the UK confirmed the importance and cost-effectiveness of pedestrian public spaces. It is noted that the existing transport infrastructure of the city of Kyiv does not provide for the formation of new pedestrian zones. The author analyzes the central squares of Kyiv: Independence Square, Troitska, Tolstoy, European, Sofiyska, Mykhailivska, Lvivska and Peremohy Squares in terms of comfortable pedestrian movement and the availability of public places. It turned out that in terms of transport accessibility, they are convenient, but not suitable for pedestrians; by use - have mainly administrative, political functions; sometimes - cultural; by category of comfort - are inconvenient, there are no sanitary conditions, places for sitting, rest, greens; these are mainly transport interchanges; by category of social function - meeting places, commercial spaces; there are no signs of identity. Means of forming a network of pedestrian public spaces and proposals for the design of individual fragments of the city are proposed. The author determines how transit space and stationary spaces are used, whether it is possible to use them as a citywide public space and connect it to the main axis along Volodymyrska and Khreschatyk.


2021 ◽  
pp. 57-68
Author(s):  
John N. Ellison ◽  
Jeffrey W. Frumkin ◽  
Timothy W. Stanley

Sains Insani ◽  
2018 ◽  
Vol 1 (1) ◽  
pp. 36-43
Author(s):  
Intan Suria Hamzah ◽  
Sity Daud ◽  
Nor Azizan Idris ◽  
Muhammad Shamshinor Abdul Azzis

National security landscape has undergone an inclusive dynamics through the threat of cross-border migration process. This study aims to discuss the migration of the Rohingya’s ethnic to Malaysia. Analysis of non-traditional’s threats in interpreting internal security challenge to Malaysians are the main elements of the discussion in this study. Through a qualitative study and validation of accuracy of procedural information, this study argues that three non-traditional’s threats to human trafficking, local colony formation, and cross the border illegally as the underlying impact of migration among the Rohingya. In addition, the pressure of social responsibility on human factors also contributed constraints of national security policy based on the image of Malaysia. Thus, several proposals were discussed to contribute to policy-makers regarding the cross-border migration in Malaysia.Keywords: Cross-border migration, refugee, Rohingya, threat, human trafficking Abstrak: Lanskap keselamatan negara telah mengalami dinamika yang inklusif melalui ancaman daripada proses migrasi rentas sempadan. Kajian ini bermatlamat membincangkan faktor migrasi etnik Rohingya ke Malaysia. Analisis bentuk ancaman bukan tradisional yang menginterpretasi cabaran keselamatan dalaman terhadap rakyat Malaysia merupakan elemen diskusi utama dalam kajian ini. Melalui rekabentuk kajian kualitatif dengan validasi ketepatan maklumat berprosedur, kajian ini menghujah tiga ancaman bukan tradisional iaitu pemerdagangan manusia, pembentukan koloni setempat dan rentas sempadan secara haram sebagai impak yang mendasari migrasi dalam kalangan etnik Rohingya. Selain itu, tekanan tanggungjawab sosial atas faktor kemanusiaan turut menyumbang kekangan pelaksanaan polisi berasaskan citra keselamatan negara Malaysia. Demikian itu, beberapa cadangan turut dibincangkan bagi memberi sumbangan kepada pembuat dasar berkenaan migrasi rentas sempadan di Malaysia.Kata Kunci: Migrasi rentas sempadan, pelarian, Rohingya, ancaman, pemerdagangan manusia


Author(s):  
Boyane Tshehla

Gauteng has most of the country’s enclosed neighbourhoods. The province is also ahead in its enactment of policy and legislation to regulate the restriction of access to public spaces for safety purposes. The goals of many residents are however likely to conflict with the legal provisions. For example, the legislation and policy provide that private security personnel at booms only monitor and observe activity. They may not search vehicles or people, or require registers to be completed, or request personal information from visitors to the area.


1989 ◽  
Vol 2 (1) ◽  
pp. 11-12
Author(s):  
Glenn Hastedt

Courses on international relations, U.S. foreign policy, Soviet foreign policy, and national security policy spend a great deal of time exploring the question of the Soviet or U.S. strategic threat. For all of its centrality to these courses, students often have, difficulty dealing with the issue in anything other than a gut feeling manner. In part, this is due to the highly technical and complex nature of the subject matter, but it is also due to the passive manner in which students are exposed to the subject. This essay presents one way of actively engaging students in the learning process, forcing them to formulate and defend their own view in the form of an individually or collectively produced intelligence estimate.Understanding why U.S. (Soviet) policy makers see a Soviet (U.S.) threat requires an understanding of the process by which threats are established. The most formal and authoritative U.S. government statements on the dimensions of the Soviet strategic threat are found in national intelligence estimates (NIE's). Typically, the intelligence estimating process is broken down into six functional steps: 1) requirement setting, 2) collection, 3) processing, 4) analysis, 5) reporting, and 6) receipt and evaluation by the consumer (Ransom 1970). NIE's are only one kind of finished intelligence produced by the intelligence community. There is no fixed length or format for an intelligence estimate to follow. The Senator Mike Gravel edition of the Pentagon Papers (1971) presents a number of estimates on Vietnam that can be used by students as models. Ransom (1970) presents a handy checklist of questions that students as consumers can use to evaluate estimates.


2021 ◽  
Author(s):  
Milan Babic ◽  
Adam Dixon

Chinese outwards investment is increasing in its relevance for the global economy; and its effects on host states are increasingly being scrutinized within International Political Economy discussions. While policy-making was ambiguous about the question of hosting Chinese state-led investment in the early 2010s, we can observe a recent surge of protectionist legal measures across Europe. What explains this trend among different European countries? Through the lens of incremental ideational change, we hypothesize that the rise of China as a global investor shifts the perceptions of policy-makers away from being a source of investment towards questions of national security. We argue that this postulated China-effect affects advanced European economies similarly. We provide evidence by studying the shift inperceptions among policy-makers in a coordinated and a liberal market economy, Germany and the UK. By drawing on document analysis and expert interviews, we unpack the policy processes in both countries in the last decade. Despite being two dissimilar cases, both show a similar outcome in increasingly rejecting Chinese state-led investment on the grounds of national security reasons. Our results add important insights to recent discussions on the ‘geopoliticization’ of European trade and investment rules in the face of a rising China.


Sign in / Sign up

Export Citation Format

Share Document