Stewart Patrick
- Published in print:
- 2011
- Published Online:
- May 2011
- ISBN:
- 9780199751501
- eISBN:
- 9780199895366
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199751501.001.0001
- Subject:
- Political Science, International Relations and Politics
Conventional wisdom among policymakers in both the US and Europe holds that weak and failing states are the source of the world's most pressing security threats today. The international community's ...
More
Conventional wisdom among policymakers in both the US and Europe holds that weak and failing states are the source of the world's most pressing security threats today. The international community's leadership sees such states as an existential threat as well, evidenced in Kofi Annan's 2004 claim that “our defenses are only as strong as their weakest links.” This is not surprising. The most destructive attack on the US in its history originated in one of the world's poorest countries. Deadly communicable diseases seem to constantly emerge from the world's poorest regions, and transnational crime appears to flourish in weakly governed states. However, as this book shows, our assumptions about the threats posed by failed and failing states are based on anecdotal arguments, not on a systematic empirical analysis that traces the connections between state failure and transnational security threats. This book uses an Index of State Weakness as a basis for its findings. The book provides coverage of five key security threats: terrorism, transnational crime, WMDs, pandemic diseases, and energy insecurity. The basic conclusions may seem surprising. While many threats do emerge in failed states, more often than not those states' manifold weaknesses create misery for only their own citizenry. In other words, the problems that flow from Liberia's failures are more typical than those that spread from Afghanistan. Moreover, many of threats originate farther up the chain, in wealthier and more stable countries like Russia, China, and Venezuela. And generic state weakness is not a good threat predictor. Cultural and regional particularities as well as the degree of global integration all influence the threat level. Just as importantly, our tendency to extrapolate an all-encompassing theory connecting weak states and international security threats from turmoil in the Middle East and Southwest Asia is insufficient. The book argues for complexity and nuance, and will force policymakers to rethink what they assume about state failure and transnational insecurity.Less
Conventional wisdom among policymakers in both the US and Europe holds that weak and failing states are the source of the world's most pressing security threats today. The international community's leadership sees such states as an existential threat as well, evidenced in Kofi Annan's 2004 claim that “our defenses are only as strong as their weakest links.” This is not surprising. The most destructive attack on the US in its history originated in one of the world's poorest countries. Deadly communicable diseases seem to constantly emerge from the world's poorest regions, and transnational crime appears to flourish in weakly governed states. However, as this book shows, our assumptions about the threats posed by failed and failing states are based on anecdotal arguments, not on a systematic empirical analysis that traces the connections between state failure and transnational security threats. This book uses an Index of State Weakness as a basis for its findings. The book provides coverage of five key security threats: terrorism, transnational crime, WMDs, pandemic diseases, and energy insecurity. The basic conclusions may seem surprising. While many threats do emerge in failed states, more often than not those states' manifold weaknesses create misery for only their own citizenry. In other words, the problems that flow from Liberia's failures are more typical than those that spread from Afghanistan. Moreover, many of threats originate farther up the chain, in wealthier and more stable countries like Russia, China, and Venezuela. And generic state weakness is not a good threat predictor. Cultural and regional particularities as well as the degree of global integration all influence the threat level. Just as importantly, our tendency to extrapolate an all-encompassing theory connecting weak states and international security threats from turmoil in the Middle East and Southwest Asia is insufficient. The book argues for complexity and nuance, and will force policymakers to rethink what they assume about state failure and transnational insecurity.
Alexander Orakhelashvili
- Published in print:
- 2008
- Published Online:
- January 2009
- ISBN:
- 9780199546220
- eISBN:
- 9780191720000
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199546220.003.0018
- Subject:
- Law, Public International Law
This chapter focuses on a number of contexts where the policy-abundant indeterminate notions are included in treaties with the effect of impacting the rights and duties of States. These contexts ...
More
This chapter focuses on a number of contexts where the policy-abundant indeterminate notions are included in treaties with the effect of impacting the rights and duties of States. These contexts relate to indeterminate margin of appreciation policy notions under the European Convention on Human Rights and the WTO law, ‘self-judging’ clauses of treaty termination under trade, investment and disarmament treaties, and the concept of the threat to the peace under Article 39 of the UN Charter. The principal findings of the chapter relate to the ways of eliminating subjective judgment in interpretation, and to the criteria of locating the observable elements of indeterminate ‘political’ notions included in treaties. The role of judicial review is also addressed to help interpreting indeterminate notions.Less
This chapter focuses on a number of contexts where the policy-abundant indeterminate notions are included in treaties with the effect of impacting the rights and duties of States. These contexts relate to indeterminate margin of appreciation policy notions under the European Convention on Human Rights and the WTO law, ‘self-judging’ clauses of treaty termination under trade, investment and disarmament treaties, and the concept of the threat to the peace under Article 39 of the UN Charter. The principal findings of the chapter relate to the ways of eliminating subjective judgment in interpretation, and to the criteria of locating the observable elements of indeterminate ‘political’ notions included in treaties. The role of judicial review is also addressed to help interpreting indeterminate notions.
Daniel Stevens and Nick Vaughan-Williams
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780719096068
- eISBN:
- 9781526120953
- Item type:
- chapter
- Publisher:
- Manchester University Press
- DOI:
- 10.7228/manchester/9780719096068.003.0005
- Subject:
- Political Science, Security Studies
Chapter Four examines the consequences of identifying both more or less security threats, and also specific security threats such as from immigration, for political attitudes and behaviours. Using ...
More
Chapter Four examines the consequences of identifying both more or less security threats, and also specific security threats such as from immigration, for political attitudes and behaviours. Using the survey data, it looks at the effects of the breadth of global, national, community and individual threats identified, and then with respect to specific security threats individuals identify from terrorism, immigration, the economy and the environment, on voting behaviour, attitudes towards immigrants and minorities, and policy preferences. Among the findings are that voting is unique in that only global and national considerations appear influential—thus the fact that it is often the focus of studies of, for example, economic threat is misleading. The Chapter also demonstrates and explains differences in the effects of threats such as terrorism and immigration from the economy and the environment.Less
Chapter Four examines the consequences of identifying both more or less security threats, and also specific security threats such as from immigration, for political attitudes and behaviours. Using the survey data, it looks at the effects of the breadth of global, national, community and individual threats identified, and then with respect to specific security threats individuals identify from terrorism, immigration, the economy and the environment, on voting behaviour, attitudes towards immigrants and minorities, and policy preferences. Among the findings are that voting is unique in that only global and national considerations appear influential—thus the fact that it is often the focus of studies of, for example, economic threat is misleading. The Chapter also demonstrates and explains differences in the effects of threats such as terrorism and immigration from the economy and the environment.
Natalie Klein
- Published in print:
- 2011
- Published Online:
- May 2011
- ISBN:
- 9780199566532
- eISBN:
- 9780191725197
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199566532.003.0005
- Subject:
- Law, Public International Law
This chapter begins with an overview of the policy of Maritime Domain Awareness as applied in different states. From this basis, legal rules relating to intelligence gathering in different maritime ...
More
This chapter begins with an overview of the policy of Maritime Domain Awareness as applied in different states. From this basis, legal rules relating to intelligence gathering in different maritime zones are examined in the second part. The third part of the chapter looks at some specific initiatives under international law designed to enhance a state's knowledge about who is operating and what is happening at sea. Seafarers identification and the Long Range Identification and Tracking Regulation of the IMO are considered in this regard. The fourth part considers how information sharing has featured in various law enforcement efforts in response to maritime security threats. These analyses show that while an inclusive interest in improving information collection and sharing has prompted a range of legal initiatives, there is still a greater accommodation of exclusive interests and this emphasis has hampered the full effectiveness of these developments.Less
This chapter begins with an overview of the policy of Maritime Domain Awareness as applied in different states. From this basis, legal rules relating to intelligence gathering in different maritime zones are examined in the second part. The third part of the chapter looks at some specific initiatives under international law designed to enhance a state's knowledge about who is operating and what is happening at sea. Seafarers identification and the Long Range Identification and Tracking Regulation of the IMO are considered in this regard. The fourth part considers how information sharing has featured in various law enforcement efforts in response to maritime security threats. These analyses show that while an inclusive interest in improving information collection and sharing has prompted a range of legal initiatives, there is still a greater accommodation of exclusive interests and this emphasis has hampered the full effectiveness of these developments.
Daniel Stevens and Nick Vaughan-Williams
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780719096068
- eISBN:
- 9781526120953
- Item type:
- chapter
- Publisher:
- Manchester University Press
- DOI:
- 10.7228/manchester/9780719096068.003.0006
- Subject:
- Political Science, Security Studies
Chapter Five takes as its starting point the various ways in which elite responses to security threats such as the National Security Strategy both summarise government perceptions of the most salient ...
More
Chapter Five takes as its starting point the various ways in which elite responses to security threats such as the National Security Strategy both summarise government perceptions of the most salient threats and are also intended to send messages to the public and shape their behaviour. It examines three dimensions of the relationship between elite and non-elite perceptions and experiences of security threat politics: 1) the extent to which the British public is aware of the NSS or of other government messages and efforts to mitigate security concerns; 2) whether such awareness is associated with heightened or reduced levels of threat perception; and 3) what citizens think of such messages. The various stories people tell – of economic insecurities, fear of crime, and Islamophobia – problematise the narrow and homogenising imperatives of the National Security Strategies, and open up alternative narratives about identity, border-production, and multiple overlapping (in)securities. Awareness of any government security programme and of the NSS is low, about 10 per cent of the survey sample for each, with surprisingly little overlap between the two. Awareness of government strategies for security is also associated with perceptions of more threats.Less
Chapter Five takes as its starting point the various ways in which elite responses to security threats such as the National Security Strategy both summarise government perceptions of the most salient threats and are also intended to send messages to the public and shape their behaviour. It examines three dimensions of the relationship between elite and non-elite perceptions and experiences of security threat politics: 1) the extent to which the British public is aware of the NSS or of other government messages and efforts to mitigate security concerns; 2) whether such awareness is associated with heightened or reduced levels of threat perception; and 3) what citizens think of such messages. The various stories people tell – of economic insecurities, fear of crime, and Islamophobia – problematise the narrow and homogenising imperatives of the National Security Strategies, and open up alternative narratives about identity, border-production, and multiple overlapping (in)securities. Awareness of any government security programme and of the NSS is low, about 10 per cent of the survey sample for each, with surprisingly little overlap between the two. Awareness of government strategies for security is also associated with perceptions of more threats.
Daniel Stevens and Nick Vaughan-Williams
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780719096068
- eISBN:
- 9781526120953
- Item type:
- book
- Publisher:
- Manchester University Press
- DOI:
- 10.7228/manchester/9780719096068.001.0001
- Subject:
- Political Science, Security Studies
This book explores citizens’ perceptions and experiences of security threats in contemporary Britain, drawing on perspectives from International Security Studies and Political Psychology. The ...
More
This book explores citizens’ perceptions and experiences of security threats in contemporary Britain, drawing on perspectives from International Security Studies and Political Psychology. The empirical chapters are based on twenty focus groups across six British cities and a large sample survey conducted between April and September 2012. These data are used to investigate the extent to which diverse publics share government framings of certain issues as the most pressing security threats, to assess the origins of perceptions of specific security threats ranging from terrorism to environmental degradation, to investigate what makes some people feel more threatened by these issues than others, to examine the effects of threats on other areas of politics such as harbouring stereotypes of minorities or prioritising public spending on border control over health, and to evaluate the effectiveness of government messages about security threats and attempts to change citizens’ behaviour as part of the risk management cycle. The book demonstrates widespread heterogeneity in perceptions of issues as security threats and in their origins, with implications for the extent to which shared understandings of threats are an attainable goal. The concluding chapter summarises the findings and discusses their implications for government and public opinion in the future. While this study focuses on the British case, its combination of quantitative and qualitative methods seeks to make broader theoretical and methodological contributions to scholarship produced in Political Science, International Relations, Political Psychology, and Security Studies.Less
This book explores citizens’ perceptions and experiences of security threats in contemporary Britain, drawing on perspectives from International Security Studies and Political Psychology. The empirical chapters are based on twenty focus groups across six British cities and a large sample survey conducted between April and September 2012. These data are used to investigate the extent to which diverse publics share government framings of certain issues as the most pressing security threats, to assess the origins of perceptions of specific security threats ranging from terrorism to environmental degradation, to investigate what makes some people feel more threatened by these issues than others, to examine the effects of threats on other areas of politics such as harbouring stereotypes of minorities or prioritising public spending on border control over health, and to evaluate the effectiveness of government messages about security threats and attempts to change citizens’ behaviour as part of the risk management cycle. The book demonstrates widespread heterogeneity in perceptions of issues as security threats and in their origins, with implications for the extent to which shared understandings of threats are an attainable goal. The concluding chapter summarises the findings and discusses their implications for government and public opinion in the future. While this study focuses on the British case, its combination of quantitative and qualitative methods seeks to make broader theoretical and methodological contributions to scholarship produced in Political Science, International Relations, Political Psychology, and Security Studies.
Daniel Stevens and Nick Vaughan-Williams
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780719096068
- eISBN:
- 9781526120953
- Item type:
- chapter
- Publisher:
- Manchester University Press
- DOI:
- 10.7228/manchester/9780719096068.003.0003
- Subject:
- Political Science, Security Studies
Chapter Two outlines the 2012 study ‘Public Perceptions of Threat in Britain’ designed in order to address the gaps in the literature identified in Chapter One, along with the approach to analysis of ...
More
Chapter Two outlines the 2012 study ‘Public Perceptions of Threat in Britain’ designed in order to address the gaps in the literature identified in Chapter One, along with the approach to analysis of the data. The study combined representative macro-level insights into public opinion with non-representative micro-level thick descriptive accounts of individuals’ everyday stories, experiences, and (de)constructions. The chapter sets out how an initial tranche of ten mini-focus groups, or ‘triads’, of three people, was conducted to explore questions such as how participants conceptualise ‘security’ and ‘security threat’ and whether they agree or disagree with and/or are affected by a range of government messages about security. Observations of the mini-focus groups and analysis of the transcripts were used to reflexively inform the development of an online survey that was administered to 2004 respondents in June 2012. The chapter outlines the questions asked, and why. A second wave of ten mini-focus groups was then conducted in September 2012, which concentrated on more specific areas of concern in the light of the first two stages of research. The last part of the chapter discusses the approach to analysis.Less
Chapter Two outlines the 2012 study ‘Public Perceptions of Threat in Britain’ designed in order to address the gaps in the literature identified in Chapter One, along with the approach to analysis of the data. The study combined representative macro-level insights into public opinion with non-representative micro-level thick descriptive accounts of individuals’ everyday stories, experiences, and (de)constructions. The chapter sets out how an initial tranche of ten mini-focus groups, or ‘triads’, of three people, was conducted to explore questions such as how participants conceptualise ‘security’ and ‘security threat’ and whether they agree or disagree with and/or are affected by a range of government messages about security. Observations of the mini-focus groups and analysis of the transcripts were used to reflexively inform the development of an online survey that was administered to 2004 respondents in June 2012. The chapter outlines the questions asked, and why. A second wave of ten mini-focus groups was then conducted in September 2012, which concentrated on more specific areas of concern in the light of the first two stages of research. The last part of the chapter discusses the approach to analysis.
Jim Walsh
- Published in print:
- 2012
- Published Online:
- June 2013
- ISBN:
- 9780804778275
- eISBN:
- 9780804784917
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804778275.003.0006
- Subject:
- Political Science, Conflict Politics and Policy
This chapter explores the link between security assurances and nuclear decision-making in Iran. The provision of security assurances has fairly played in Iranian affairs, while pride, ...
More
This chapter explores the link between security assurances and nuclear decision-making in Iran. The provision of security assurances has fairly played in Iranian affairs, while pride, anti-imperialism, and domestic discontent have often affected Tehran's behavior, including its nuclear policy. It is also noted that assurances might be more efficient as an instrument for influencing political factors rather than for addressing security threats. The threat environment that confronted the Shah is discussed. The case for assurance appeared to be firmer for the revolutionary period, where the absence of a security assurance is linked with the presence of nuclear activity, but the association is not as robust as it might be. Security assurances have been hardly presented to the Islamic Republic, but it is also not clear how efficient stronger assurances could have been.Less
This chapter explores the link between security assurances and nuclear decision-making in Iran. The provision of security assurances has fairly played in Iranian affairs, while pride, anti-imperialism, and domestic discontent have often affected Tehran's behavior, including its nuclear policy. It is also noted that assurances might be more efficient as an instrument for influencing political factors rather than for addressing security threats. The threat environment that confronted the Shah is discussed. The case for assurance appeared to be firmer for the revolutionary period, where the absence of a security assurance is linked with the presence of nuclear activity, but the association is not as robust as it might be. Security assurances have been hardly presented to the Islamic Republic, but it is also not clear how efficient stronger assurances could have been.
Daivd Shambaugh
- Published in print:
- 2003
- Published Online:
- March 2012
- ISBN:
- 9780520225077
- eISBN:
- 9780520938106
- Item type:
- chapter
- Publisher:
- University of California Press
- DOI:
- 10.1525/california/9780520225077.003.0007
- Subject:
- History, Asian History
This chapter assesses China's national security environment as seen through the eyes of People's Liberation Army (PLA) analysts. While foreign specialists on Chinese security would observe that ...
More
This chapter assesses China's national security environment as seen through the eyes of People's Liberation Army (PLA) analysts. While foreign specialists on Chinese security would observe that China's security has never been better, at least in the fifty years since the Communist Party came to power, PLA analysts do not necessarily see it that way. Evidence suggests that Chinese military analysts believe they live in a dangerous world, with many uncertainties and potential challenges to China's sovereignty and security. The principal threat they identify comes from the United States, while the principal challenge arises from Taiwan. These twin problems are fused together in the PLA mindset, but it is most likely that they would continue to view the United States as a threat to national security irrespective of American support for Taiwan. The chapter details PLA analyses of the nature of the U.S. threat, which is seen as both global in nature and specific to China's peripheral security. It also brings to light previously opaque PLA assessments of the military dimension of the Taiwan problem—assessing Taiwan's defenses and possible strategies for the use of force against the island. The chapter also considers five scenarios in which a war might evolve should conflict erupt. Aside from the United States and Taiwan, PLA analysts also view Japan and India as potential threats to China's security and national interests.Less
This chapter assesses China's national security environment as seen through the eyes of People's Liberation Army (PLA) analysts. While foreign specialists on Chinese security would observe that China's security has never been better, at least in the fifty years since the Communist Party came to power, PLA analysts do not necessarily see it that way. Evidence suggests that Chinese military analysts believe they live in a dangerous world, with many uncertainties and potential challenges to China's sovereignty and security. The principal threat they identify comes from the United States, while the principal challenge arises from Taiwan. These twin problems are fused together in the PLA mindset, but it is most likely that they would continue to view the United States as a threat to national security irrespective of American support for Taiwan. The chapter details PLA analyses of the nature of the U.S. threat, which is seen as both global in nature and specific to China's peripheral security. It also brings to light previously opaque PLA assessments of the military dimension of the Taiwan problem—assessing Taiwan's defenses and possible strategies for the use of force against the island. The chapter also considers five scenarios in which a war might evolve should conflict erupt. Aside from the United States and Taiwan, PLA analysts also view Japan and India as potential threats to China's security and national interests.
Jocelyn Jones Evans
- Published in print:
- 2010
- Published Online:
- September 2011
- ISBN:
- 9780813125886
- eISBN:
- 9780813135489
- Item type:
- chapter
- Publisher:
- University Press of Kentucky
- DOI:
- 10.5810/kentucky/9780813125886.003.0007
- Subject:
- Political Science, American Politics
This chapter discusses the major conclusions of the text. By returning to the three lenses offered by Goodsell, it is revealed that the security threats introduced in 2001 led to substantial changes ...
More
This chapter discusses the major conclusions of the text. By returning to the three lenses offered by Goodsell, it is revealed that the security threats introduced in 2001 led to substantial changes in the core structures and operations of Congress. These changes expressed the particular value structure and priorities of the governing majority, impacted the way the Hill conducts its daily operations, and symbolized a marked movement from an open and accessible Capitol Hill atmosphere to a new security-sensitive atmosphere.Less
This chapter discusses the major conclusions of the text. By returning to the three lenses offered by Goodsell, it is revealed that the security threats introduced in 2001 led to substantial changes in the core structures and operations of Congress. These changes expressed the particular value structure and priorities of the governing majority, impacted the way the Hill conducts its daily operations, and symbolized a marked movement from an open and accessible Capitol Hill atmosphere to a new security-sensitive atmosphere.
Franz Neumann
- Published in print:
- 2013
- Published Online:
- October 2017
- ISBN:
- 9780691134130
- eISBN:
- 9781400846467
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691134130.003.0025
- Subject:
- History, Military History
This chapter considers a variety of methods of treating Germany. The main objective of the United Nations in the treatment of Germany is to prevent it from ever again becoming a threat to the ...
More
This chapter considers a variety of methods of treating Germany. The main objective of the United Nations in the treatment of Germany is to prevent it from ever again becoming a threat to the security of the world. The problem of securing this objective could be approached through destruction of Germany's industrial potential, destruction of Germany as a political entity, and removal from German society of the causes of aggression. The chapter shows that the first two solutions should be deferred until it is clear that the third alternative proves unworkable. In order to eliminate the causes of aggressiveness in German society, temporary and long-term disabilities should be imposed upon Germany. The chapter also examines the causes of German aggression, the United States' policy toward Germany, short-term measures during the period of military government, conditional measures during the probationary period, and permanent impositions upon Germany.Less
This chapter considers a variety of methods of treating Germany. The main objective of the United Nations in the treatment of Germany is to prevent it from ever again becoming a threat to the security of the world. The problem of securing this objective could be approached through destruction of Germany's industrial potential, destruction of Germany as a political entity, and removal from German society of the causes of aggression. The chapter shows that the first two solutions should be deferred until it is clear that the third alternative proves unworkable. In order to eliminate the causes of aggressiveness in German society, temporary and long-term disabilities should be imposed upon Germany. The chapter also examines the causes of German aggression, the United States' policy toward Germany, short-term measures during the period of military government, conditional measures during the probationary period, and permanent impositions upon Germany.
Jocelyn Jones Evans
- Published in print:
- 2010
- Published Online:
- September 2011
- ISBN:
- 9780813125886
- eISBN:
- 9780813135489
- Item type:
- chapter
- Publisher:
- University Press of Kentucky
- DOI:
- 10.5810/kentucky/9780813125886.003.0006
- Subject:
- Political Science, American Politics
This chapter discusses and traces the impact of security threats on the project development and management of the Capitol Visitor Center. It was under construction from 2001 to 2008 and was opened to ...
More
This chapter discusses and traces the impact of security threats on the project development and management of the Capitol Visitor Center. It was under construction from 2001 to 2008 and was opened to the public on December 2, 2008. The chapter examines the evolution of the policy debate that surrounded the Capitol Visitor Center and the subsequent debate over management of the massive project.Less
This chapter discusses and traces the impact of security threats on the project development and management of the Capitol Visitor Center. It was under construction from 2001 to 2008 and was opened to the public on December 2, 2008. The chapter examines the evolution of the policy debate that surrounded the Capitol Visitor Center and the subsequent debate over management of the massive project.
Daniel Stevens and Nick Vaughan-Williams
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780719096068
- eISBN:
- 9781526120953
- Item type:
- chapter
- Publisher:
- Manchester University Press
- DOI:
- 10.7228/manchester/9780719096068.003.0007
- Subject:
- Political Science, Security Studies
The Conclusion sums up the research, explores its implications, and draws lessons for the future for both academic and policy-making communities. The implications of the research are several, ...
More
The Conclusion sums up the research, explores its implications, and draws lessons for the future for both academic and policy-making communities. The implications of the research are several, spanning government and its understandings of how the public views security threats and how the public perceives, experiences, and responds to messages about security threats, academic research in IR and Security Studies and how it conceives of public opinion and the role of the citizen in the risk management cycle; and academic research in Political Psychology and its understandings of the origins and consequences of threat perceptions.Less
The Conclusion sums up the research, explores its implications, and draws lessons for the future for both academic and policy-making communities. The implications of the research are several, spanning government and its understandings of how the public views security threats and how the public perceives, experiences, and responds to messages about security threats, academic research in IR and Security Studies and how it conceives of public opinion and the role of the citizen in the risk management cycle; and academic research in Political Psychology and its understandings of the origins and consequences of threat perceptions.
Tomas Larsson
- Published in print:
- 2012
- Published Online:
- August 2016
- ISBN:
- 9780801450815
- eISBN:
- 9780801464089
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801450815.001.0001
- Subject:
- Anthropology, Asian Cultural Anthropology
Domestic and international development strategies often focus on private ownership as a crucial anchor for long-term investment; the security of property rights provides a foundation for capitalist ...
More
Domestic and international development strategies often focus on private ownership as a crucial anchor for long-term investment; the security of property rights provides a foundation for capitalist expansion. In recent years, Thailand's policies have been hailed as a prime example of how granting formal land rights to poor farmers in low-income countries can result in economic benefits. But the country provides a puzzle: Thailand faced major security threats from colonial powers in the nineteenth century and from communism in the twentieth century, yet only in the latter case did the government respond with pro-development tactics. This book argues that institutional underdevelopment may prove, under certain circumstances, a strategic advantage rather than a weakness, and that external threats play an important role in shaping the development of property regimes. Security concerns often guide economic policy. The domestic legacies, legal and socioeconomic, resulting from state responses to the outside world shape and limit the strategies available to politicians. The book situates the experiences of Thailand in comparative perspective by contrasting them with the trajectory of property rights in Japan, Burma, and the Philippines.Less
Domestic and international development strategies often focus on private ownership as a crucial anchor for long-term investment; the security of property rights provides a foundation for capitalist expansion. In recent years, Thailand's policies have been hailed as a prime example of how granting formal land rights to poor farmers in low-income countries can result in economic benefits. But the country provides a puzzle: Thailand faced major security threats from colonial powers in the nineteenth century and from communism in the twentieth century, yet only in the latter case did the government respond with pro-development tactics. This book argues that institutional underdevelopment may prove, under certain circumstances, a strategic advantage rather than a weakness, and that external threats play an important role in shaping the development of property regimes. Security concerns often guide economic policy. The domestic legacies, legal and socioeconomic, resulting from state responses to the outside world shape and limit the strategies available to politicians. The book situates the experiences of Thailand in comparative perspective by contrasting them with the trajectory of property rights in Japan, Burma, and the Philippines.
Tomas Larsson
- Published in print:
- 2012
- Published Online:
- August 2016
- ISBN:
- 9780801450815
- eISBN:
- 9780801464089
- Item type:
- chapter
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801450815.003.0001
- Subject:
- Anthropology, Asian Cultural Anthropology
This book explores the political and historical origins of formal property rights institutions by focusing on the case of Thailand. It examines the role of “security threats” as a cause of ...
More
This book explores the political and historical origins of formal property rights institutions by focusing on the case of Thailand. It examines the role of “security threats” as a cause of institutional change by conceptualizing them as elements of securitization. It argues that securitization provides a powerful explanation for the trajectory of institutional development in Thailand. More specifically, it explains how the process of securitization led to an intentional underdevelopment of property rights institutions in Thailand in response to the nineteenth-century threat of colonization and how institutional underdevelopment contributed to the dramatic improvement in property rights institutions in the country in response to the twentieth-century threat of communism. Episodes in the Thai case are compared and contrasted with experiences in Japan, Burma, and the Philippines.Less
This book explores the political and historical origins of formal property rights institutions by focusing on the case of Thailand. It examines the role of “security threats” as a cause of institutional change by conceptualizing them as elements of securitization. It argues that securitization provides a powerful explanation for the trajectory of institutional development in Thailand. More specifically, it explains how the process of securitization led to an intentional underdevelopment of property rights institutions in Thailand in response to the nineteenth-century threat of colonization and how institutional underdevelopment contributed to the dramatic improvement in property rights institutions in the country in response to the twentieth-century threat of communism. Episodes in the Thai case are compared and contrasted with experiences in Japan, Burma, and the Philippines.
Amy Freedman
- Published in print:
- 2017
- Published Online:
- January 2018
- ISBN:
- 9781479866304
- eISBN:
- 9781479826308
- Item type:
- chapter
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9781479866304.003.0003
- Subject:
- Political Science, Comparative Politics
This chapter examines three examples of nontraditional security problems and how individual Southeast Asian countries have attempted to address them. The chapter also looks at the role that the ...
More
This chapter examines three examples of nontraditional security problems and how individual Southeast Asian countries have attempted to address them. The chapter also looks at the role that the United States and China are playing in the region, and asks what the prospects might be for greater cooperation in coordinating policies and responses to these common threats so as to better ensure reliable access to food, mitigate the effects of climate change, and protect citizens in the region from deadly pathogens. There have been some regional attempts to create more cooperative frameworks for addressing these needs, but these efforts have not yet played a significant role in reshaping policies. One explanation for why cooperation is weak is that there is a lack of leadership within regional organizations in spurring greater action to tackle these issues. The leadership vacuum stems from countries’ domestic politics. Weak cooperation on these issues signals poor chances for regional coordination on other issues such as uniting against Chinese maritime claims around the nine-dash line, and has bearing on partnerships for the United States should the “pivot” become more than rhetoric.Less
This chapter examines three examples of nontraditional security problems and how individual Southeast Asian countries have attempted to address them. The chapter also looks at the role that the United States and China are playing in the region, and asks what the prospects might be for greater cooperation in coordinating policies and responses to these common threats so as to better ensure reliable access to food, mitigate the effects of climate change, and protect citizens in the region from deadly pathogens. There have been some regional attempts to create more cooperative frameworks for addressing these needs, but these efforts have not yet played a significant role in reshaping policies. One explanation for why cooperation is weak is that there is a lack of leadership within regional organizations in spurring greater action to tackle these issues. The leadership vacuum stems from countries’ domestic politics. Weak cooperation on these issues signals poor chances for regional coordination on other issues such as uniting against Chinese maritime claims around the nine-dash line, and has bearing on partnerships for the United States should the “pivot” become more than rhetoric.
Kevin H. Govern
- Published in print:
- 2012
- Published Online:
- September 2012
- ISBN:
- 9780199646470
- eISBN:
- 9780191738975
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199646470.003.0014
- Subject:
- Law, Public International Law, Philosophy of Law
This chapter takes the killing of Osama bin Laden as a test case for considering the moral and legal status of intentionally killing individuals deemed a threat to national security, under conditions ...
More
This chapter takes the killing of Osama bin Laden as a test case for considering the moral and legal status of intentionally killing individuals deemed a threat to national security, under conditions in which the object of the targeted attack is offered little or no opportunity to surrender to attacking forces. The target in such operations, in short, is treated as though he were a belligerent: a person placed on a kill list may be targeted in a way that would be legitimate if he were an enemy combatant. It is argued that bin Laden was a legitimate military target, and that the decision-makers involved in his killing had thoroughly considered the range of options available to stop bin Laden from further terroristic acts, and were warranted in the decision to lean towards targeted killing in lieu of a capture operation. Thus, those who carried out the killing were within their scope of authority and responsibility for killing rather than for capturing bin Laden.Less
This chapter takes the killing of Osama bin Laden as a test case for considering the moral and legal status of intentionally killing individuals deemed a threat to national security, under conditions in which the object of the targeted attack is offered little or no opportunity to surrender to attacking forces. The target in such operations, in short, is treated as though he were a belligerent: a person placed on a kill list may be targeted in a way that would be legitimate if he were an enemy combatant. It is argued that bin Laden was a legitimate military target, and that the decision-makers involved in his killing had thoroughly considered the range of options available to stop bin Laden from further terroristic acts, and were warranted in the decision to lean towards targeted killing in lieu of a capture operation. Thus, those who carried out the killing were within their scope of authority and responsibility for killing rather than for capturing bin Laden.
Jens David Ohlin
- Published in print:
- 2012
- Published Online:
- September 2012
- ISBN:
- 9780199646470
- eISBN:
- 9780191738975
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199646470.003.0003
- Subject:
- Law, Public International Law, Philosophy of Law
This chapter investigates the tension between national security and civil liberties through a distinctive conceptual framework: what linking principle can be used to connect the targeted individual ...
More
This chapter investigates the tension between national security and civil liberties through a distinctive conceptual framework: what linking principle can be used to connect the targeted individual with the collective group that represents the security threat? The chapter is organized as follows. Section II explains and defends this methodology by demonstrating that no account of targeted killing — whether sounding in jus in bello or jus ad bellum — can be complete without making explicit reference to a linking principle. Section III then proceeds to catalogue five major linking principles — taken from different domains of law including the use of force, international humanitarian law, and criminal law — that could potentially serve that function: direct participation, co-belligerency, membership, control, and complicity/conspiracy. Section IV concludes with a comparative evaluation of the linking principles that exposes their strengths and weaknesses.Less
This chapter investigates the tension between national security and civil liberties through a distinctive conceptual framework: what linking principle can be used to connect the targeted individual with the collective group that represents the security threat? The chapter is organized as follows. Section II explains and defends this methodology by demonstrating that no account of targeted killing — whether sounding in jus in bello or jus ad bellum — can be complete without making explicit reference to a linking principle. Section III then proceeds to catalogue five major linking principles — taken from different domains of law including the use of force, international humanitarian law, and criminal law — that could potentially serve that function: direct participation, co-belligerency, membership, control, and complicity/conspiracy. Section IV concludes with a comparative evaluation of the linking principles that exposes their strengths and weaknesses.
Andrea M. Matwyshyn
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0012
- Subject:
- Law, Intellectual Property, IT, and Media Law
This concluding chapter reiterates the four major themes of the preceding chapters: (i) a need to focus on the human elements in information security; (ii) a need to recognize the emergent nature of ...
More
This concluding chapter reiterates the four major themes of the preceding chapters: (i) a need to focus on the human elements in information security; (ii) a need to recognize the emergent nature of information security threats; (iii) a need to consider the multiple simultaneous contexts of information risk; and (iv) a need for immediate improvements in corporate self-governance. In the short term, companies must put in place rigorous codes of information security conduct and exercise vigilant enforcement. In the long term, companies must learn to build cultures of information security and develop a sense of collective corporate responsibility for information security, regardless of whether regulation requires them to do so. Meaningful improvements in information security require a commitment to security as an ongoing, collaborative process.Less
This concluding chapter reiterates the four major themes of the preceding chapters: (i) a need to focus on the human elements in information security; (ii) a need to recognize the emergent nature of information security threats; (iii) a need to consider the multiple simultaneous contexts of information risk; and (iv) a need for immediate improvements in corporate self-governance. In the short term, companies must put in place rigorous codes of information security conduct and exercise vigilant enforcement. In the long term, companies must learn to build cultures of information security and develop a sense of collective corporate responsibility for information security, regardless of whether regulation requires them to do so. Meaningful improvements in information security require a commitment to security as an ongoing, collaborative process.
Shylashri Shankar
- Published in print:
- 2009
- Published Online:
- October 2012
- ISBN:
- 9780195693201
- eISBN:
- 9780199081998
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195693201.003.0004
- Subject:
- Law, Human Rights and Immigration
This chapter investigates the conditions under which the four elements of the embedded negotiator approach impact the likelihood of a judgment favourable to the State. These elements include laws, ...
More
This chapter investigates the conditions under which the four elements of the embedded negotiator approach impact the likelihood of a judgment favourable to the State. These elements include laws, political preferences, institutional norms and memories, and public concerns. Court's behavior on cases under PDA, TADA and POTA is analysed. The data presented partially affirm the hypothesis that the apex court would support the state against separatist threats but would not confuse political goals with adherence to a religious faith. The higher likelihood of pro-state rulings does not link with an anti-minority attitude of Supreme Court judges. An Indian Supreme Court judge has a complex and nuanced relationship with the law, institutional memories, politics, and public concerns. It is shown that the more cases a judge hears, the more likely he is to change his mind.Less
This chapter investigates the conditions under which the four elements of the embedded negotiator approach impact the likelihood of a judgment favourable to the State. These elements include laws, political preferences, institutional norms and memories, and public concerns. Court's behavior on cases under PDA, TADA and POTA is analysed. The data presented partially affirm the hypothesis that the apex court would support the state against separatist threats but would not confuse political goals with adherence to a religious faith. The higher likelihood of pro-state rulings does not link with an anti-minority attitude of Supreme Court judges. An Indian Supreme Court judge has a complex and nuanced relationship with the law, institutional memories, politics, and public concerns. It is shown that the more cases a judge hears, the more likely he is to change his mind.