Search results

You are looking at 71 - 80 of 240 items for :

  • "Terrorism" x
  • International Relations x
  • Refine by access: All content x
Clear All
Stephen Emerson and Hussein Solomon

and over reliance on the military tool of international engagement. This is particularly true when it comes to dealing with the terrorism challenge, where the military instrument of power has once again become the centerpiece of American counterterrorism in Africa and provides a false sense of confidence, which is ultimately likely to fail.3 Real change in how the international community thinks about security and engages in Africa, however, is taking place. Not only is there widespread international acceptance of the human security paradigm as the cornerstone for

in African security in the twenty-first century
Mørten Bøås, Bård Drange, Dlawer Ala'Aldeen, Abdoul Wahab Cissé, and Qayoom Suroush

focused on short-term security objectives. This trend is present in all these three cases, but its manifestation is not uniform. It is most present in Mali, where narrow European security concerns with regard to terrorism and migration is a lead narrative for an international operation that in practice is becoming increasingly focused on achieving state stability through conflict management. It is less present in

in The EU and crisis response
Madhuchanda Ghosh

proliferation by North Korea, combating international terrorism and ensuring the freedom of the vital sea lines of communications in the Asia-Pacific . Pointing to the US factor in India–Japan relations, like his predecessor, the Japanese premier Mori, Abe also maintained that the evolving relations among the US, India and Japan are of crucial importance in the context of the emerging regional security environment. 2 Of all the Japanese premiers, Shinz ō Abe has been the most enthusiastic about giving a strategic orientation in the bilateral

in Japan's new security partnerships
Andrew Whiting

), as well as millions of home users. So while these companies do pitch their content to a specific audience (user, business, IT professionals, government), with the exception of very technical, data-heavy reports, they tend not to do so in a manner that closes off the topic to a certain demographic. From the industry’s perspective, all of these threats are of relevance to everybody who relies on computers and the internet; cybersecurity is a collective, all-encompassing problem. Even the presence of terms like ‘cyber-war’, ‘cyber-terrorism’ and ‘cyber

in Constructing cybersecurity
Abstract only
Securing Europe in the twenty-first century
Emil Kirchner and James Sperling

sharing of information or epidemiological surveillance – will hamper the ability of the others to achieve the common goal of combating organised crime, terrorism, or pandemics, natural or otherwise. The strongest pillar technology of publicness defines the policies of compellence: the unwillingness of any state or group of states to participate in a Petersberg intervention, for example, is unimportant so

in EU security governance
Tim Aistrope

2004. Indeed, it was former National Security Advisor Condoleezza Rice (who had initially articulated the new approach to counter-terrorism) who now oversaw its implementation at the State Department as Secretary of State from 2005 to 2009. This public diplomacy campaign centred on three core principles: producing a positive vision of hope; advancing universal human rights

in Conspiracy theory and American foreign policy
Abstract only
Samantha Newbery

The importance of intelligence in counter-insurgency has long been recognised and is not disputed. 1 In Aden, in Northern Ireland, and in Western counter-terrorism and counter-insurgency operations carried out since 9/11, the expected and proclaimed value of interrogation as a source of intelligence has been emphasised by the military, civilian intelligence personnel and policy-makers. These first

in Interrogation, intelligence and security
Carol V. Evans

Secretariat (NSCS) and the Joint Intelligence Committee (JIC) are responsible for coordinating intelligence assessments. The JIC focuses on the immediate/near-term intelligence terrorism assessments, while the NSCS is involved in policy-oriented, predictive estimates relating to national security priorities. The blossoming of India’s intelligence establishment post Kargil and Mumbai has seen India’s intelligence efforts plagued by endemic agency turf wars, duplication of collection and analysis efforts, and lack of

in The future of U.S.–India security cooperation
Mohammed Sharfi

apparent in different regional theatres such as Egypt, Tunisia, Libya, Yemen and Syria. The Quartet grievances with Qatar focused on claims of its support for terrorism, unacceptable close relations with Iran and interference in the sovereign affairs of other countries. However, upon examination, the dispute could be viewed through a prism of regional competition. This regional rivalry involves supporting opposite political sides, with Qatar betting on the rise of Islamist groups in the region. The intra-GCC dispute has a huge political, economic and

in The Gulf States and the Horn of Africa
Tarja Väyrynen

there is a tendency to postulate the compatibility between individuality and sociality. As a result, it is supposed that human nature as such is good. Even the idea of biologically founded needs can include the axiom. The principle characterises in particular the humanist psychology advocated, for example, by Maslow. 61 Burton’s engines of behaviour In Deviance , Terrorism

in Culture and international conflict resolution