Articles

Rainfall variability, food security and human mobility in the Janjgir-Champa district of Chhattisgarh state, India

The impacts of rainfall variability are threatening food production systems, leading to losses of livelihood and food insecurity. The frequency and intensity of floods and drought are likely to be higher as a result of climate change. This case study presents an empirical account of the impacts of r...

Strategic Cultures and Security Policies in the Asia-Pacific

Reflecting the culturalist turn in security studies, this special issue shows how one of the most powerful tools of security studies illuminates the origins and implications of the region’s difficult issues, from the rise of China and the American pivot, to the shifting calcu lations of other re...

The DRC crisis and the evolving regional security architecture: some questions for peace and security

the democratic republic of congo (drc) has experienced one of the longest security crises in Africa, impacting its neighbours and across central and Southern Africa. the crisis has spotlighted the capacities of regional economic communities (recs) to mediate complex conflicts. this challenge was com...

Cold CASE: a manifesto for Canadian critical security studies

Critical security studies is an established interest that brings together a variety of disciplines and theoretical approaches to bear on the ubiquitous deployment of security discourses and practices in the post-9/11 world. This article maps scholars working in critical security studies in Canad...

Cold CASE: a manifesto for Canadian critical security studies

Critical security studies is an established interest that brings together a variety of disciplines and theoretical approaches to bear on the ubiquitous deployment of security discourses and practices in the post-9/11 world. This article maps scholars working in critical security studies in Canad...

The dual-use security dilemma and the social construction of insecurity

In this article I introduce the concept of the “dual-use security dilemma,” specifically through elaborating on two main aspects that shape this dilemma. First, inspired by traditional security scholarship, I focus on the spiral dynamics of actors responding to the insecurities raised by dual-us...

Touristic security: not a ‘win-win’ global security practice

Touristic security – the practice of securing tourists to sustain tourism – has become a highly pertinent and powerful global security practice. Many organisations, governments, industry stakeholders, consultants, and scholars claim touristic security to be a ‘win-win’ security practice supp...

Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review

ABSTRACT Cloud computing faces more security threats, requiring better security measures. This paper examines the various classification and categorization schemes for cloud computing security issues, including the widely known CIA trinity (confidentiality, integrity, and availability), by consideri...

Under the radar: Ireland, maritime security capacity, and the governance of subsea infrastructure

Subsea infrastructure is typically out of sight, but in recent times, seldom out of mind. The sabotage of the Nord Stream pipelines in October 2022 has magnified the vulnerability and critical importance of subsea infrastructure. It also exposed a lack of understanding on how subsea networks operate...

The Politics of STEMM Collaboration between Australia and China: National Security, Geopolitics, and Academic Freedom

ince the 1990s, there has been a proliferation in science, technology, engineering, maths, and medical (STEMM) collaboration between Australian and Chinese universities and academics, which has produced divisions over the scientific, economic, human rights, and national security implications. Drawin...

Strategic leadership in cyber security, case Finland

yber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on t...

Introduction: The Politics of European Security Policies

This article sketches the theoretical framework that informs the analyses in the Special Issue. Two issues drive the inquiries. First, the bottom-up approach to EU security that tracks contingent security practices and their performers. Various EU actors engage in intense political struggles which b...

Cultural and symbolic capital in the market for security: police-private security relations in Mexico and the United Kingdom

Recent scholarship has observed how private security actors often draw upon the cultural and symbolic capital of the police in their everyday operations. This practice can range from issuing frontline private security officers with police-like uniforms and patrol cars to recruiting former senior pol...

Prototyping Usable Privacy and Security Systems: Insights from Experts

Iterative design, implementation, and evaluation of prototype systems is a common approach in Human-Computer Interaction (HCI) and Usable Privacy and Security (USEC); however, research involving physical prototypes can be particularly challenging. We report on twelve interviews with established and ...

The regulatory security state in Europe

https://doi.org/10.1080/13501763.2023.2172061

Civilian at Sea: Understanding Fisheries’ Entanglement with Maritime Border Security

Fishing in coastal waters can significantly intersect with state efforts to secure maritime borders. Recent cases of illegal fishing, maritime militia operation and piracy, especially in regions such as the South China Sea, have exposed the unpredictable and elusive nature of the ways in which fishe...

Race and Racial Exclusion in Security Studies: A Survey of Scholars

increased attention to racialized knowledge and methodological whiteness has swept the political science discipline, especially international relations. yet an important dimension of race and racism continues to be ignored: the presence and status of scholars of color in the discipline. in contrast ...

increased attention to racialized knowledge and methodological whiteness has swept the political science discipline, especially international relations. yet an important dimension of race and racism continues to be ignored: the presence and status of scho

Cyberspace has completely revolutionised our ways of life, disrupted our economies, and allowed for important progress in our societies. But the advantages of the digital revolution are now threatened by the use of cyberspace for war purposes. This article explores the states’ security dilemma as ...

Child Responsive Conflict Early Warning: Prioritizing Children in Peace and Security

Children affected by armed conflict are disproportionately impacted by humanitarian crises and rising global fragility. Changing conflict dynamics, emerging tactics by armed groups, and evolving radicalized violence are increasing children’s vulnerability, including the threat of being recruited a...

Hybridity and Friction in Organizational Politics: New Perspectives on the African Security Regime Complex

Security governance in Africa constitutes a web of interactions between national, regional, and international organizations. This emerging ‘African security regime complex’ receives growing attention in International Relations debates on international organizations (IOs). Most analysis, how...

The role of security assistance in reconfiguring Tunisia’s transition

In many contexts in the Mediterranean, Security Assistance (SA) is perceived to have contributed to state fracture or prolonged conflict. In Tunisia, in contrast, SA has increased the performance and capacities of the security forces in matters of counterterrorism and migration control. However, in ...

Cyberspace is used, first and foremost, to wage wars: proliferation, security and stability in cyberspace

Cyberspace has completely revolutionised our ways of life, disrupted our economies, and allowed for important progress in our societies. But the advantages of the digital revolution are now threatened by the use of cyberspace for war purposes. This article explores the states’ security dilemma as ...

Peace and the security sector in Sudan, 2002–11

This paper examines how contests over military control were played out during peace negotiations and in the implementation of agreements (including the manipulation or violation of the terms of agreements) in Sudan between 2002 and 2011. The cases examined are the Comprehensive Peace Agreement (CPA)...

Determinants of rural-urban migration and its impact on migrant-sending households’ livelihood security in Gurage zone, Ethiopia

The study identified the variables that affect rural-urban migration and how it impacts the stability of household livelihood. Descriptive statistics, ivprobit regression, and the dose response function were all used to examine the data. Livestock holding, family size, access to information, number ...

Violent Peace: Local Perceptions of Threat and Insecurity in Post-Conflict Colombia

Countries that sign a peace agreement to emerge from protracted violent conflict often begin reconstructing their societies amidst continued high levels of violence. Responding to this situation, national security policies often identify core threats primarily from a state perspective, disregard...

Securing Legitimacy? Perceptions of Security and ISAF’s Legitimacy in Northeast Afghanistan

sing ISAF’s security involvement in Afghanistan as an example, this article asks: Does the perceived provision of goods and services affect the empirical legitimacy attributed to external governance actors in areas of limited statehood? The study applies multilevel analysis to survey data for 2009...

Repercussions of a weak ocean governance and a non-existent maritime security policy: The resurgence of piracy and Armed Robbery in the Gulf of MexicoJournal of International Maritime Safety, Environmental Affairs, and Shipping

This paper examines piracy and armed robbery in the Gulf of Mexico, under the framework of maritime security. The results indicate that piratic attacks are most likely underreported by the Government of Mexico. The research findings documented fourteen attacks on supply vessels and offshore platform...

“Gulf Security is Our Security”: Global Britain and UK Gulf Strategy, 2010-20

“Global Britain” has become the framing concept for post-Brexit foreign policy pursued by successive Conservative prime ministers. Despite exaggerated rhetoric to the contrary, this has not led to a significant shift in Britain’s Gulf strategy, but rather intensified the pursuit of the exi...

sing ISAF’s security involvement in Afghanistan as an example, this article asks: Does the perceived provision of goods and services affect the empirical legitimacy attributed to external governance actors in areas of limited statehood? The study applie

In 2007, the residents of the village of Comrie, Scotland, collectively bought the site of Cultybraggan Camp and nearby hillside land through a ‘community buy-out’ scheme under the Land Reform (Scotland) Act 2003. A Development Trust, made up primarily of voluntary trustees from the village, man...

Occupational security: A holistic values-based framework for supporting occupations and safety

In an ongoing era of global-scale, cascading, and intersecting crises, including climate change impacts, ongoing armed conflicts, and the COVID-19 pandemic, security is becoming increasingly challenging. The escalating dangers and restrictions arising from these events, adversely affecting life itse...

Security Cooperations and Human Rights Violations: The African Israeli Case

This article discusses the role of security connections in Israel– Africa relations and their implications to human rights. Surprisingly, the research on Israel-Africa security connections is quite limited, and the article addresses these gaps, arguing that: (1) Israel uses arms exports to str...

‘Crocodiles in the Corridors’: Security Vetting, Race and Whitehall, 1945–1968

In July 2018, the UK’s Intelligence & Security Committee issued a report into diversity and inclusion across the intelligence and security community. The picture the report painted was far from satisfactory; in short, Britain’s intelligence agencies did not ‘fully reflect the ethnic makeup...

‘Chifley spells security’: Tracing the Origins of Contemporary Australian Security Discourse

Strong claims have been made about the significance of the concept of security in modern governance. The study of security has developed from its post-1945 focus on the state’s role in securing the population from external threat to include broader and critical perspectives, which seek to embed...

The rise of responsible behavior: Western commercial reports on Western cyber threat actors

Commercial threat reporting plays a pivotal role in shaping public perceptions of cyber conflict, providing insights into threats and behavior of key actors. This article examines the evolving practices of Western cybersecurity companies in reporting on Western threat actors, focusing on the emergen...

The Security Dilemma: A Conceptual Analysis

Critically building upon the work of Herbert Butterfield, John Herz, and Robert Jervis, this article advances a more rigorous definition of the security dilemma. It demonstrates critical implications of the rigorously redefined concept. It examines several influential extensions and expansions of th...

The transnationalisation of military leaders in Central and Eastern Europe and EURO-Atlantic integration

The professional transnationalisation of Central and Eastern European (CEE) militaries has been a pivotal factor in their integration into the Euro-Atlantic security community. This article examines the development and political significance of transnational experience among top military lead...

Cyber Security in East Asia: Governing Anarchy

The 13 countries of ASEAN+3 are actively working towards creating a regional community in East Asia. At the same time, the regional countries have increasingly relied on web-based technologies to enable them to more efficiently use their resources. Even as this adoption of technology has assisted...

Making cyber security more resilient: adding social considerations to technological fixes

How can a focus on socio-technical vulnerability and uncertainty make cyber security more resilient? In this article, we provide a conceptual discussion of how to increase cyber resilience. First, we show how cyber security and resilience thinking co-evolved through their connection to critical infr...

Report of Panel on Peace and Security of Northeast Asia (PSNA) 2018

The Panel on Peace and Security of Northeast Asia (PSNA) was established in November 2016 in order to facilitate “political processes, through timely policy recommendations and public engagement, to create a NEA-NWFZ as part of establishing peace and security in the region” (PSNA Mission Sta...

Conflict, gender and ontological security-seeking between Eritrea and Tel Aviv

Department of Anthropology, Brandeis University, The proliferating research in ontological security (OS) studies explores how irregular situations of ‘radical disjuncture’ remove the protective cocoon of routinised trust relations that enables the actors to ‘bracket out’ daily threats a...

Singapore’s relations with the Gulf: from defensive to positive engagement

In the early 2000s, the Middle East was not high on the list of Singapore’s priorities. Of late, however, a more purposeful engagement with the Gulf is evident. This paper adopts an approach grounded in foreign policy analysis to analyze the extent to which Singapore’s engagement with the Gulf i...

“Taming the Storm” of Hybridity: The EU-NATO Relationship on Countering Hybrid Threats – From Functional Overlap to Functional Cooperation

This article investigates why the European Union (EU)-NATO rela tions on countering hybrid threats have been characterised more by cooperation rather than by rivalry. By examining the onset and development of the EU-NATO functional overlap in this policy area, the article explains the factors dr...

The construction of threats by intelligence agencies: analysing the language of official documents in Slovakia

Intelligence agencies play a prominent role in the production of knowledge about national security threats and their evaluation. This function is not just a value-neutral technical activity, but a social and political action. The purpose of this article is to explore the ways in which the Slovak...

Beyond Arms Control: Cooperative Nuclear Weapons Reductions – A New Paradigm to Roll Back Nuclear Weapons and Increase Security and Stability

Arms control treaties have served admirably to control and limit nuclear weapons for several decades. The provisions and limits, however, have proven to be inflexible, often limited in scope to specificsystemsandcountries,anddifficult and time-consuming to negotiate. It is time for the nuclear w...

The ASEAN Regional Forum: from dialogue to practical security cooperation?

This article examines to what extent the Association of Southeast Asian Nations (ASEAN) Regional Forum (ARF) has moved beyond dialogue to practical security co-operation. Focusing on terrorism, maritime security and disaster relief as key areas of ARF activities in the past few years, the paper ...

Exploring the human dimension of nuclear security: the history, theory, and practice of security culture

Over the past two decades, the international community has devoted considerable attention to the human dimension of nuclear security. This trend is part of a more holistic approach to securing nuclear facilities, grounded in the concept of culture, that moves beyond the traditional focus of ph...

Nuclear Threats Under International Law Part I: The Legal Framework

The international legal status of threats to use nuclear weapons is uncertain. In this article, we map existing prohibitions against nuclear threats at international law and seek to explain the scope and remit of such laws. To that end, the article explores unilateral negative security assurance...

Repositioning African states to prudently engage the global (dis)order and advance peace, security and development

Africa is by all accounts one of the richest continents but also displays the worst in human security indexes. During colonisation, the continent was characterised by the lack of peace, insecurity and underdevelopment. Moreover, with the demise of colonialism, Africa became a geo-political stak...

The Dayton Peace Process: A Keyhole into Russian and Chinese Engagement with Liberal Peacebuilding

The paper examines the roles of Russia and China in a long-standing peace process in Bosnia and Herzegovina (BiH) and the broader implications of this for liberal peacebuilding. Using an original dataset of statements from UN Security Council debates (2000–2023), we analyse shifts in their di...

Locating the local police in Iraq’s security arena: community policing, the ‘three Ps’ and trust in Ninawa Province

Post-2003, the Iraqi Police Service (IPS) has undergone a series of over hauls that have prioritised building institutional capacities (‘statebuild ing’) above socio-political cohesion (‘nation-building’). Following the defeat of Islamic State in Iraq and the Levant (ISIL), however, a comm...

Showing 50 from 1505