Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Drawing on two decades of government efforts to secure the homeland, experts offer crucial strategic lessons and detailed recommendations for homeland security.For Americans, the terrorist attacks of September 11, 2001, crystallized the notion of homeland security. But what does it mean to secure the homeland in the twenty-first century? What lessons can be drawn from the first two decades of US government efforts to do so? In Beyond 9/11, leading academic experts and former senior government officials address the most salient challenges of homeland security today.The contributors discuss counterterrorism, cybersecurity, and critical infrastructure protection; border security and immigration; transportation security; emergency management; combating transnational crime; protecting privacy in a world of increasingly intrusive government scrutiny; and managing the sprawling homeland security bureaucracy. They offer crucial strategic lessons and detailed recommendations on how to improve the U.S. homeland security enterprise.
National security --- Terrorism --- Management. --- Prevention. --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- Government policy --- SOCIAL SCIENCES/Political Science/International Relations & Security
Choose an application
"The existence of a structured enforcement system is an inherent feature of national legal orders and one of the core elements of State sovereignty. The very limited power to issue sanctions has often been deemed a gap in the EC legal order. Over the years, the situation has progressively changed. The Union's institutional setting is growing in complexity and a variety of agencies has been or is expected to be endowed with law enforcement responsibilities. In addition, the so-called competence creep has led the EU to play an increasingly prominent role in several areas of EU law enforcement, including the issuing of sanctions. This book examines these developments, focusing on both the general features of the EU legal order and the analysis of key-substantive areas, such as banking and monetary union, environmental law, and data protection. The work thus presents a general framework for understanding EU sanctioning based on structural features and general legal principles. Part I develops an analytical framework, tracking the most significant evolutive patterns of EU sanctioning powers. Part II adopts a more practical approach focusing on specific issues and policy areas. The book bridges a gap in existing literature and sheds new light on the relationship between the exercise of jus puniendi and the evolution of EU integration"--
Law enforcement --- National security --- Law and legislation --- Lois --- Sécurité nationale --- Application --- Droit --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- Government policy --- Sécurité nationale. --- Pays de l'Union européenne --- Sécurité nationale. --- Pays de l'Union européenne --- Law enforcement. --- Sanctions (Droit) --- Sanctions (Law) --- Sanctions (Law). --- European Union countries.
Choose an application
Arms and Influence explores the complex relationship between technology, policymaking, and international norms. Modern technological innovations such as the atomic bomb, armed unmanned aerial vehicles (UAVs), and advanced reconnaissance satellites have fostered debates about the boundaries of international norms and legitimate standards of behavior. These advances allow governments new opportunities for action around the world and have, in turn, prompted a broader effort to redefine international standards in areas such as self-defense, sovereignty, and preemptive strikes. In this book, Jeffrey S. Lantis develops a new theory of norm change and identifies its stages, including redefinition (involving domestic political deliberations) and constructive norm substitution (in multilateral institutions). He deftly takes some of the most controversial new developments in military technologies and embeds them in international relations theory. The case evidence he presents suggests that periods of change are underway across numerous different issue areas.
National security --- Military weapons --- Technology and international relations. --- International law. --- Law of nations --- Nations, Law of --- Public international law --- Law --- International relations and technology --- Technology and international affairs --- International relations --- Technology --- Armaments --- Combat weapons --- Instruments of war --- Munitions --- Military supplies --- Weapons --- Disarmament --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- Military policy --- Technological innovations --- International cooperation --- Government policy --- United States --- Military policy. --- Foreign relations. --- International lov --- National sikkerhed
Choose an application
In early 2019, the Islamic Republic of Iran marked its fortieth anniversary, despite decades of isolation, political pressure, sanctions and war. Observers of its security policies continue to try and make sense of this unlikely endurance. Some view the regime as a purely rational actor, whose national security decisions and military affairs are shaped by the same considerations as in other states. Others believe that it is ideology driving Tehran's strategy. Either way, virtually everyone agrees that the mullahs' policies are fundamentally different from those pursued by their monarchical predecessors. 'No Conquest, No Defeat' offers a historically grounded overview of Iranian national security issues.
National security --- Iran --- Military policy. --- Foreign relations. --- Politics and government. --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- Government policy --- República Islâmica do Irã --- Irã --- Persia --- Northern Tier --- Islamic Republic of Iran --- Jumhūrī-i Islāmī-i Īrān --- I-lang --- Paras-Iran --- Paras --- Persia-Iran --- I.R.A. --- Islamische Republik Iran --- Islamskai︠a︡ Respublika Iran --- I.R.I. --- IRI --- ايران --- جمهورى اسلامى ايران --- Êran --- Komarî Îslamî Êran
Choose an application
"This book seeks to interrogate how contemporary policy issues become 'securitized' and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and de-securitization 'works' within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume - drawn from different disciplinary, ontological, and geographic 'spaces' - orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and de-securitization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms. This volume will be of great interest to scholars of critical security studies, international security, and International Relations"--
Security, International --- National security --- Conflict management --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- Collective security --- International security --- Disarmament --- International organization --- Peace --- Government policy --- Security, International - Case studies --- National security - Case studies --- Conflict management - Case studies --- empirical applications; Climate Change; Conflict Management; Copenhagen School; constructivism; desecuritization; gender-based violence; inter-state conflict; processes; securitization; securitization applications; terrorism
Choose an application
The Handbook of European Security Law and Policy offers a holistic discussion of the contemporary challenges to the security of the European Union and emphasizes the complexity of dealing with these through legislation and policy. Considering security from a human perspective, the book opens with a general introduction to the key issues in European Security Law and Policy before delving into three main areas. Institutions, policies and mechanisms used by Security, Defence Policy and Internal Affairs form the conceptual framework of the book; at the same time, an extensive analysis of the risks and challenges facing the EU, including threats to human rights and sustainability, as well as the European Union's legal and political response to these challenges, is provided. This Handbook is essential reading for scholars and students of European law, security law, EU law and interdisciplinary legal and political studies.
Internal security --- Law enforcement --- National security --- Law and legislation --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- Security, Internal --- Insurgency --- Subversive activities --- Government policy --- #SBIB:327.7H233 --- Europese Unie: externe relaties, buitenlands- en defensiebeleid (ook WEU) --- Environmental law, International. --- Climatic changes --- Non-governmental organizations --- Law and legislation. --- Corporation law --- Climate change mitigation --- Environmental law --- Liability for climatic change damages --- International environmental law --- International law --- Common heritage of mankind (International law)
Choose an application
Few global security issues stimulate more fervent passion than the application of brute force. Despite the fierce debate raging about it in government, society and the Academy, inadequate strategic understanding surrounds the issue, prompting the urgent need for —the first comprehensive systematic global analysis of 21st century state-initiated internal and external applications of brute force. Based on extensive case evidence, Robert Mandel assesses the short-term and long-term, the local and global, the military, political, economic, and social, and the state and human security impacts of brute force. He explicitly isolates the conditions under which brute force works best and worst by highlighting force initiator and force target attributes linked to brute force success and common but low-impact force legitimacy concerns. Mandel comes to two major overarching conclusions. First, that the modern global application of brute force shows a pattern of futility—but one that is more a function of states' misapplication of brute force than of the inherent deficiencies of this instrument itself. Second, that the realm for successful application of state-initiated brute force is shrinking: for while state-initiated brute force can serve as a transitional short-run local military solution, he says, it cannot by itself provide a long-run global strategic solution or serve as a cure for human security problems. Taking the evidence and his conclusions together, Mandel provides policy advice for managing brute force use in the modern world.
Internal security. --- Military policy. --- National security. --- Security, International. --- War. --- Military policy --- War --- National security --- Internal security --- Security, International --- World politics --- Military & Naval Science --- Law, Politics & Government --- Armies --- Colonialism --- Global politics --- International politics --- Political history --- Political science --- World history --- Eastern question --- Geopolitics --- International organization --- International relations --- Collective security --- International security --- Disarmament --- Peace --- Security, Internal --- Insurgency --- Subversive activities --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- Armed conflict (War) --- Conflict, Armed (War) --- Fighting --- Hostilities --- Wars --- Military art and science --- Defense policy --- Military readiness --- Military history --- Sociology, Military --- Government policy --- Political aspects
Choose an application
Written by intelligence scholars and experts, this book chronicles the evolution of the CIA: its remarkable successes, its controversial failures and its clandestine operations. The history of the agency is presented through the prism of its declassified documents, with each being supplemented by insightful contextual analysis.
Espionage, American --- National security --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- International relations --- Military policy --- American espionage --- History. --- Government policy --- United States. --- Agjencia Qendrore e Inteligjencës --- Central Intelligence Agency (U.S.) --- CIA (Central Intelligence Agency) --- CIP (United States. Centrālās izlūkošanas pārvalde) --- Mei-kuo chung yang chʻing pao chü --- National Security Council (U.S.). --- Si Aing Ei --- T︠S︡entralʹnoe razvedyvatelʹnoe upravlenie SShA --- T︠S︡RU SShA --- T︠S︡RU (T︠S︡entralʹnoe razvedyvatelʹnoe upravlenie SShA) --- ЦРУ США --- ЦРУ (Центральное разведывательное управление США) --- Центральное разведывательное управление США --- ארצות הברית. --- 美國. --- National Security Council (U.S.)
Choose an application
'Geopolitics and the Green Revolution' explores why four different countries (USA, India, Britain and Mexico) each sought to develop high-yielding wheat production. National security concerns and management of foreign exchange were prime motivators of the new technologies, a relationship that has not been previously developed in studies of agricultural modernization. Future reform efforts in agriculture will be affected by this history.
International relations. Foreign policy --- World history --- anno 1900-1999 --- Blé --- Blé--Commerce --- Breadstuffs --- Cold War --- Commerce du blé --- Cultivated wheats --- Green Revolution --- Groene Revolutie --- Guerre froide --- Koude oorlog --- National security --- Nationale veiligheid --- Oorlog [Koude ] --- Revolution [Green ] --- Révolution verte --- Security [National ] --- Spring wheat --- Sécurité nationale --- Tarwe --- Tarwehandel --- Triticum --- Triticum aestivum --- Triticum sativum --- Triticum vulgare --- Veiligheid [Nationale ] --- Wheat --- Wheat trade --- Wheats [Cultivated ] --- Cold War. --- Green Revolution. --- National security. --- Wheat. --- Wheat - Breeding. --- Wheat trade. --- Plant Sciences --- Agriculture --- Earth & Environmental Sciences --- Breeding --- Government policy --- Government policy. --- Breeding. --- Wheats, Cultivated --- Wheat industry --- National security policy --- NSP (National security policy) --- Security policy, National --- Revolution, Green --- Grasses --- Grain trade --- Economic policy --- International relations --- Military policy --- Agricultural innovations --- Agriculture and state --- Food supply --- Grain --- World politics --- Breeding, --- Breeding&delete& --- E-books --- Kweken --- Wheat - Breeding - Government policy.
Choose an application
This book examines the challenges foreign fighter returnees from Syria and Iraq pose to Western countries. A number of returnees have demonstrated that they are willing to use violence against their home countries, and some have already staged terrorist attacks on Western soil on apparent orders from ISIS. Through the historical context of previous waves of mobilizations of Islamist foreign fighters, the author tracks the experiences of returnees from previous conflicts and discusses the major security challenges associated with them. The book analyzes the major approaches implemented by Western countries in response to foreign fighter returnees, discusses the prosecution of returnees, and evaluates the corresponding challenges of prison radicalization. Elena Pokalova is Associate Professor of Security Studies at the College of International Security Affairs, National Defense University, USA. Her research areas include terrorism, radicalization, countering violent extremism, ethnic conflict, and the Caucasus.
Terrorists. --- Criminals --- Security, International. --- Peace. --- International relations. --- Middle East—Politics and government. --- Politics and war. --- International Security Studies. --- Conflict Studies. --- International Relations Theory. --- Middle Eastern Politics. --- Military and Defence Studies. --- War --- War and politics --- Coexistence --- Foreign affairs --- Foreign policy --- Foreign relations --- Global governance --- Interdependence of nations --- International affairs --- Peaceful coexistence --- World order --- National security --- Sovereignty --- World politics --- Coexistence, Peaceful --- International relations --- Disarmament --- Peace-building --- Security, International --- Collective security --- International security --- International organization --- Peace --- Political aspects --- Radicalism. --- Terrorism --- Radicalism --- Jihad. --- Holy war (Islam) --- Islamic holy war --- Jahad --- Jehad --- Muslim holy war --- War (Islamic law) --- Extremism, Political --- Ideological extremism --- Political extremism --- Political science --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- National security policy --- NSP (National security policy) --- Security policy, National --- Economic policy --- Military policy --- Islam and terrorism --- Religious aspects --- Islam. --- Prevention. --- Government policy --- Qaida (Organization) --- IS (Organization) --- ISIL (Islamic State of Iraq and the Levant) --- ISIS (Islamic State of Iraq and Syria) --- Daech --- Daeş --- Daesh --- Daʻiş --- Dāʻish --- Daisy --- Dâʼisy al-ʻIrāq wa-asy-Syâm --- Daulah Islamiyah Iraq dan Syam --- Dawlah al-Islāmīyah --- Dawlah al-Islāmiyah fi al-'Irāq wa-al-Shām --- ES --- Estado Islâmico --- Estado Islâmico do Iraque --- Estado Islâmico do Iraque e da Síria --- Estado Islâmico do Iraque e Síria --- IGIL --- IŞİD --- Islamic State --- Islamic State of Iraq and al-Sham --- Islamic State of Iraq and Syria --- Islamic State of Iraq and the Levant --- Islamskoe gosudarstvo Iraka i Levanta --- ИГИЛ --- Исламское государство Ирака и Леванта --- داعش --- دولة الإسلامية --- دولة الإسلامية في العراق والشام --- Qāʻidah (Organization) --- Quaida (Organization) --- Al-Qaida (Organization) --- Qaeda (Organization) --- International Islamic Front for Jihad Against Jews and Crusaders --- Islamic Salvation Foundation --- Group for the Preservation of the Holy Sites --- Islamic Army for the Preservation of Holy Sites --- Islamic Army for the Preservation of the Holy Places --- Al Qaeda (Organization) --- Al Queda (Organization) --- Alʹ-Kaida (Organization) --- Kaida (Organization) --- R̄ekxirawî Elqaʻîde --- Elqaʻîde (Organization) --- تنظيم القاعدة --- قاعدة (منظمة) --- Al-Qaedah (Organization) --- Middle East --- Politics and government. --- דאעש --- État islamique --- National security.
Listing 1 - 10 of 12 | << page >> |
Sort by
|