Governing Borderless Threats

Non-Traditional Security and the Politics of State Transformation

Author: Shahar Hameiri,Lee Jones

Publisher: Cambridge University Press

ISBN: 1107110882

Category: Business & Economics

Page: 286

View: 3562

'Non-traditional', border-spanning security problems pervade the global agenda. This is the first book that systematically explains how they are managed.
Release

Negotiating Governance on Non-Traditional Security in Southeast Asia and Beyond

Author: Mely Caballero-Anthony

Publisher: Columbia University Press

ISBN: 0231544499

Category: Political Science

Page: N.A

View: 3773

The threats the world currently faces extend beyond traditional problems such as major power competition, interstate conflict, and nuclear proliferation. Non-traditional security challenges such as climate change, migration, and natural disasters surpass states’ capacity to address them. These limitations have led to the proliferation of other actors—regional and international organizations, transnational networks, local and international nongovernmental organizations—that fill the gaps when states’ responses are lacking and provide security in places where there is none. In this book, Mely Caballero-Anthony examines how non-traditional security challenges have changed state behavior and security practices in Southeast Asia and the wider East Asia region. Referencing the wide range of transborder security threats confronting Asia today, she analyzes how non-state actors are taking on the roles of “security governors,” engaging with states, regional organizations, and institutional frameworks to address multifaceted problems. From controlling the spread of pandemics and transboundary pollution, to managing irregular migration and providing relief and assistance during humanitarian crises, Caballero-Anthony explains how and why non-state actors have become crucial across multiple levels—local, national, and regional—and how they are challenging regional norms and reshaping security governance. Combining theoretical discussions on securitization and governance with a detailed and policy-oriented analysis of important recent developments, Negotiating Governance on Non-Traditional Security in Southeast Asia and Beyond points us toward “state-plus” governance, where a multiplicity of actors form the building blocks for multilateral cooperative security processes to meet future global challenges.
Release

Institutionalizing State Responsibility

Global Security and UN Organs

Author: Vincent-Joël Proulx

Publisher: Oxford University Press

ISBN: 019150002X

Category: Law

Page: 440

View: 9507

Since the 9/11 attacks, international organizations have become actively engaged in devising counterterrorism strategies and frameworks. This monograph examines the role UN organs can play in implementing the law of State responsibility in global security contexts, using transnational terrorism as its principal case study. The institutional mechanisms utilized by the UN in implementing State responsibility are assessed in detail, shedding light on how the ICJ, the General Assembly and the Security Council contribute to the implementation of State responsibility in the context of global security. By acknowledging the Security Council's role as a post-9/11 legislator, this book argues that the Council can play an important and sometimes determinant role in implementing a State's legal responsibility for failing to prevent terrorism, both inside and outside the Chapter VII framework. Featuring a discussion of the more controversial consequences flowing from State responsibility, this monograph also explores the prospect of injured States adopting forcible measures against responsible States for their failures to prevent terrorism. The book investigates whether self-defence and other forcible reactions, envisaged both inside and outside the Council, can be reconciled with State responsibility principles.
Release

Security at the Borders

Transnational Practices and Technologies in West Africa

Author: Philippe M. Frowd

Publisher: Cambridge University Press

ISBN: 1108677991

Category: Political Science

Page: N.A

View: 4134

Borders are not just lines in the sand, but increasingly globalised spaces of practice. This is the case in West Africa, where a growing range of local and international officials are brought together by ambitious security projects around common anxieties. These projects include efforts to stop irregular migration by sea through international police cooperation, reinforcing infrastructures at border posts, and the application of new digital identification tools to identify and track increasingly mobile citizens. These interventions are driven by global and local security agendas, by biometric passport rules as much as competition between local security agencies. This book draws on the author's multi-sited ethnography in Mauritania and Senegal, showing how border security practices and technologies operate to build state security capacity, transform how state agencies work, and produce new forms of authority and expertise.
Release

Societies Under Siege

Exploring How International Economic Sanctions (Do Not) Work

Author: Lee Jones

Publisher: Oxford University Press

ISBN: 0191066257

Category: Political Science

Page: 224

View: 1081

Today, international economic sanctions are imposed in response to virtually every serious international crisis, whether to promote regime change and democratisation, punish armed aggression, or check nuclear proliferation. But how exactly is the economic pain inflicted by sanctions supposed to translate into political gain? What are the mechanisms by which sanctions operate - or fail to operate? This is the first comparative study of this vital question. Drawing on Gramscian state theory, Societies Under Siege provides a novel analytical framework to study how sanctions are mediated through the domestic political economy and state-society relations of target states and filter through into political outcomes - whether those sought by the states imposing sanctions or, as frequently occurs, unintended and even highly perverse consequences. Detailed case studies of sanctions aimed at regime change in three pivotal cases - South Africa, Iraq and Myanmar - are used to explore how different types of sanctions function across time and space. These case studies draw on extensive fieldwork interviews, archival documents and leaked diplomatic cables to provide a unique insight into how undemocratic regimes targeted by sanctions survive or fall.
Release

International Intervention and Local Politics

Fragmented States and the Politics of Scale

Author: Shahar Hameiri,Caroline Hughes,Fabio Scarpello

Publisher: Cambridge University Press

ISBN: 1108416896

Category: Political Science

Page: N.A

View: 2040

This book advances an innovative approach to explain international interventions' uneven outcomes in given contexts, and harnesses this approach to examine three prominent case studies: Aceh, Cambodia and Solomon Islands. It is the first book comprehensively to discuss the rapidly growing literature on how interventions interface with target states and societies.
Release

Future Armies, Future Challenges

Land Warfare in the Information Age

Author: Michael Evans,Alan Ryan,Russell Parkin

Publisher: Allen & Unwin

ISBN: 1741152852

Category: History

Page: 395

View: 2655

The operational, strategic, and ethical conundrums that soldiers, their commanders, and the societies they serve will have to wrestle with in the future are analyzed by the experts, paying close attention to the impact of the information age.
Release

11-Sep-01

War, Terror and Judgement

Author: Bulent Gokay,R.B.J. Walker

Publisher: Routledge

ISBN: 1135758336

Category: History

Page: 216

View: 7680

In a comprehensive study of the world since September 11th, 2001, the contributors to this volume offer a series of perspectives on current security trends. The scholars who participated in this study are from Europe, North America and Asia.
Release

Who Controls the Internet?

Illusions of a Borderless World

Author: Jack Goldsmith,Tim Wu

Publisher: Oxford University Press

ISBN: 9780198034803

Category: Law

Page: 238

View: 8769

Is the Internet erasing national borders? Will the future of the Net be set by Internet engineers, rogue programmers, the United Nations, or powerful countries? Who's really in control of what's happening on the Net? In this provocative new book, Jack Goldsmith and Tim Wu tell the fascinating story of the Internet's challenge to governmental rule in the 1990s, and the ensuing battles with governments around the world. It's a book about the fate of one idea--that the Internet might liberate us forever from government, borders, and even our physical selves. We learn of Google's struggles with the French government and Yahoo's capitulation to the Chinese regime; of how the European Union sets privacy standards on the Net for the entire world; and of eBay's struggles with fraud and how it slowly learned to trust the FBI. In a decade of events the original vision is uprooted, as governments time and time again assert their power to direct the future of the Internet. The destiny of the Internet over the next decades, argue Goldsmith and Wu, will reflect the interests of powerful nations and the conflicts within and between them. While acknowledging the many attractions of the earliest visions of the Internet, the authors describe the new order, and speaking to both its surprising virtues and unavoidable vices. Far from destroying the Internet, the experience of the last decade has lead to a quiet rediscovery of some of the oldest functions and justifications for territorial government. While territorial governments have unavoidable problems, it has proven hard to replace what legitimacy governments have, and harder yet to replace the system of rule of law that controls the unchecked evils of anarchy. While the Net will change some of the ways that territorial states govern, it will not diminish the oldest and most fundamental roles of government and challenges of governance. Well written and filled with fascinating examples, including colorful portraits of many key players in Internet history, this is a work that is bound to stir heated debate in the cyberspace community.
Release