|
Sort Order |
|
|
|
Items / Page
|
|
|
|
|
|
|
Srl | Item |
1 |
ID:
108058
|
|
|
Publication |
2011.
|
Summary/Abstract |
In March 2009, the Obama administration sent a message to senior Pentagon staff instructing them to refrain from using either of the terms 'Long War' or 'Global War on Terror' and to replace these terms with 'Overseas Contingency Operations'. The change in tone and, potentially, substance, from the Obama White House by ending the 'war on terror' at the rhetorical level suggests a need to shift our academic attention towards developing more appropriate analytical frameworks for examining alternative strategies for countering terrorism. This paper seeks to explore what it terms an emerging risk-based approach being deployed by states. Our framework proposed here deploys the twin concepts of 'risk bureaucracies' and risk regulatory regimes (RRRs) in examining terrorist financing and aviation security regulations.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
091817
|
|
|
Publication |
2009.
|
Summary/Abstract |
The environment is increasingly affected by global climate change. While the causes of climate change are generated across the globe, the impacts of climate change will be highly variable at the local level. An increased scientific understanding of the potential impacts that climate change may have within China has raised new concern among China's leaders. Given that China's domestic realities inform its international policy choices, understanding how climate change may affect its population and natural resources is critical to global climate stabilization efforts. This article examines how the impacts of climate change on China, and China's response, will drive security challenges domestically, as well as in the greater Asian region and around the world. It shows that the impact of climate change on China will be significant and may have sizable adverse economic implications, particularly on vulnerable east coast economic centers. Water scarcity is a problem that already challenges China's leadership and one that will be exacerbated under projected climate impacts. In addition, the country faces the risk of international retaliation should it fail to undertake serious greenhouse gas mitigation actions. Yet China is not without options, and is already well poised to become a leader in the low-carbon technology revolution.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
109238
|
|
|
4 |
ID:
130993
|
|
|
Publication |
2014.
|
Summary/Abstract |
The anticipatory turn in managing security and safety relies not only on innovative technological tools, but also on social practice. New information and communication technology, for instance, facilitates digital security governance1 which entails the collection, processing, storage, and sharing of digital personal data for risk profiling, but little is known about the role of security officials in preemptive security. Although people, or "data subjects," are categorized according to a (predefined) level of potential threat on the basis of digital data, it is often unclear which actor or agency was responsible for this categorization. This is especially unclear when information was shared across the globe between several security agencies and/or private companies. Nonetheless, as the assessment of risk or dangerousness affects someone's real-life opportunities, privacy rights or claims to something or someone are likely to be evoked.
|
|
|
|
|
|
|
|
|
|
5 |
ID:
086785
|
|
|
Publication |
2009.
|
Summary/Abstract |
Ecuador will hold elections on 26 April, not just for the presidency and the legislature but also for provincial and municipal governments. Having overhauled the country's constitution in 2008, President Rafael Correa Delgado hopes to win re-election. With the opposition weak and divided, Correa is likely to achieve this aim, having managed to concentrate power in his hands in ways that no Ecuadorian president has in the past 30 years.
|
|
|
|
|
|
|
|
|
|
6 |
ID:
140000
|
|
|
Summary/Abstract |
Terrorism is a complex issue and various researchers have identified numerous causes and conditions that generate or are capable of generating terrorism. In the last decade, terrorist attacks claimed 36,495 lives and injured 27,985 people in Pakistan as a result of 3,482 bomb blasts and 281 suicide attacks. The aim of this research was to establish the major risk factors generating terrorism, based on the opinions of security officials who dealt directly with the Pakistan security situation. Sixty-five causes identified from the literature and interviews with security officials were modeled and transformed into a questionnaire. A nationwide response from security officials who were directly involved in dealing with apprehended terrorists was obtained. The population was selected proportionately from high, medium, and low security zones of Pakistan. Out of 500 questionnaires sent, 103 valid responses were received. The results helped establish the 13 major risk factors associated with generating terrorism. It was observed that addressing these 13 major risk factors would mostly resolve the other minor risk factors as well. Findings of this research might be beneficial for countries affected by terrorism, and countries with prioritized and rationalized allocation of funds in their budgets for substantially overcoming terrorism.
|
|
|
|
|
|
|
|
|
|
7 |
ID:
109846
|
|
|
8 |
ID:
149750
|
|
|
Summary/Abstract |
Colombian voters have narrowly rejected a peace deal with the insurgent group FARC. Annette Idler surveys the prospects for security in the country's border regions.
|
|
|
|
|
|
|
|
|
|
9 |
ID:
107755
|
|
|
Publication |
Amsterdam, Elsevier, 2011.
|
Description |
xx, 340p.
|
Standard Number |
9781597496155
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
056261 | 005.8/WHE 056261 | Main | On Shelf | General | |
|
|
|
|
10 |
ID:
088106
|
|
|
Publication |
2009.
|
Summary/Abstract |
Three months after seizing power in an anti-establishment coup, Guinea's military junta announced a timetable for turning the country into a democracy.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|