Security Regimes: Collective Security and Security Communities
In: Oxford Research Encyclopedia of International Studies
"Security Regimes: Collective Security and Security Communities" published on by Oxford University Press.
71364 Ergebnisse
Sortierung:
In: Oxford Research Encyclopedia of International Studies
"Security Regimes: Collective Security and Security Communities" published on by Oxford University Press.
In: Strategic Developments in Eurasia After 11 September
In Kosovo, the concept of human security is invoked in a three-fold manner. First of all, the international community has applied human security for the purpose of maintaining a fragile peace and stability in Kosovo. For the international community, maintaining the fragile peace meant tolerating the establishment and operationalization of Serbian parallel institutions. This leads to the second application of human security: the parallel institutions claim that their existence is necessary to provide human security for the Serbian community in Kosovo. Consequently, this undermines the capacity of Kosovo's public institutions to exercise legal authority in the north of Kosovo and in other territorial enclaves. Parallel to this, Kosovo's institutions have viewed the human security approach as a means to prove the institutional capacity of independent self-government to provide inclusive security, welfare, and integration policies for all people in Kosovo, with a special emphasis on ethnic minorities. Accordingly, human security is used by different actors in Kosovo to pursue different political agendas, which have not resulted in achieving the primary goal of furthering human welfare and fulfilment beyond mere physical security. To the contrary, the (ab)use of human security has created the conditions for fragile governance, protracted ethnic destabilization, and stagnating economic and human development.
BASE
In 1995 Finland joined the European Union (EU). This action culminated several years of a fundamental reorientation of Finnish security policy as Finland moved from the neutrality imposed on it by the Soviet Union to a policy with a priority on European integration through the European Union. Finland, in joining the EU, has retained its independent defense and security posture, even as it seeks to strengthen its standing abroad and gain added leverage, through the EU, for dealing with Russia. Finland's odyssey indicates much about two fundamental issues in European security: coping with Russia's crises, and the interrelationship between the EU and the North Atlantic Treaty Organization as providers of security for small states in Europe. Furthermore, Finland's proximity to Russia and the difficult history of Fenno-Russian relations have imposed on Finnish policymakers the need for penetrating and sober analysis of Finland's and Europe's security situation. Therefore, Finland's evolution from an imposed neutrality to overt participation in European integration merits our careful scrutiny and attention. ; https://press.armywarcollege.edu/monographs/1872/thumbnail.jpg
BASE
In: http://hdl.handle.net/2027/uiug.30112105065772
"Supersedes AFR 130-1, 6 November 1987"--P. [1]. ; "16 December 1991." ; Shipping list no.: 92-112-P. ; "Writer-editor: R.M. Downey"--P. [1]. ; Caption title. ; Mode of access: Internet.
BASE
There are many security risks to the organizations' information assets; nonetheless, among the major threats to achieve a secure information environment are the actions and behavior of the employees when handling information. Insiders, intentionally or unintentionally, can cause serious risks, despite investments usually made on security control measures and other security related products. Insecure human behavior with respect to information security cannot entirely be solved by technical and procedural controls alone. Recently, the development of effective information security culture in organizations is increasingly considered as a way to embed appropriate security practices, and to address the human factor in information security. Past research works on this area indicate that there is a positive relationship between levels of knowledge and how employees behave. The level of knowledge significantly affects information security behavior and should be considered as a critical factor in the effectiveness of information security culture and in any further work that is carried out on information security culture. Therefore, in this paper we have identified the security knowledge required to improve employee behavior in information security culture namely; knowledge of security threat, knowledge of organization information security strategy, knowledge of security technology, knowledge of legislation, regulation and national culture, knowledge of security responsibility and knowledge of security risk. These security knowledge needs to be included as topics in security training and awareness programs conducted by organizations for their employees so that an effective information security culture within the organization can be achieved. Keywords: Information Security, Information Security Culture, Human Behavior and Security knowledge.
BASE
On 17th June 2011, in response to the Arab Spring events in neighbouring countries, King Mohamed VI of Morocco presented in a speech, reform proposals focusing on constitutional changes. Significantly, in his speech the King insisted that appointments in the military 'remain an exclusive, sovereign prerogative of the King, Supreme Commander and Chief-of-Staff of the Royal Armed Forces', while officials in charge of inter alia domestic security agencies will be appointed by him on a proposal of the Head of Government and at the initiative of the ministers concerned. Thus, Morocco's ruler, who has pursued domestic reforms in the past, and has been hailed for his response to the unrest, stopped short of establishing democratic control of the security sector. This lack of willingness to touch upon the role and powers of the security sector is symptomatic of the regimes of countries in North Africa, that have traditionally relied on the security sector, in particular the military, the police and secret and intelligence services, to shore up their authoritarian or semi-authoritarian rule, and that have focused on regime security rather than human security. ; N/A
BASE
In: War, Peace and Security; Contributions to Conflict Management, Peace Economics and Development, S. 53-66
In: Oxford Research Encyclopedia of International Studies
"Security Studies and Security Policy: An American Perspective" published on by Oxford University Press.
Testimony issued by the General Accounting Office with an abstract that begins "GAO testified about how homeland security is vulnerable to identity fraud. Today, counterfeit identification is easily produced and used to create fraudulent identities. Tests GAO has performed over the past 3 years demonstrate that counterfeit identification documents can be used to (1) enter the United States; (2) purchase firearms; (3) gain access to government buildings and other facilities; (4) obtain genuine identification for both fictitious and stolen identities; and (5) obtain social security numbers for fictitious identities."
BASE
In: Oxford Research Encyclopedia of International Studies
"Human Security" published on by Oxford University Press.