Knowledgebase

Number of results: 301

Human Security and Non-Citizens - Law, Policy and International Affairs

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Cambridge University Press
Abstract: 

The past decades have seen enormous changes in our perceptions of 'security', the causes of insecurity and the measures adopted to address them.

Threats of terrorism and the impacts of globalisation and mass migration have shaped our identities, politics and world views. This volume of essays analyses these shifts in thinking and, in particular, critically engages with the concept of 'human security' from legal, international relations and human rights perspectives. Contributors consider the special circumstances of non-citizens, such as refugees, migrants, and displaced and stateless persons, and assess whether, conceptually and practically, 'human security' helps to address the multiple challenges they face.

Routledge Handbook of Global Health Security

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Routledge
Abstract: 

Over the past decade, the study of global health and its interconnection with security has become a prominent and rapidly growing field of research.

Ongoing debates question whether health and security should be linked; which (if any) health issues should be treated as security threats; what should be done to address health security threats; and the positive and negative consequences of ‘securitizing’ health. In academic and policy terms, the health security field is a timely and dynamic one and this handbook will be the first work comprehensively to address this agenda. Bringing together the leading experts and commentators on health security issues from across the world, the volume comprises original and cutting-edge essays addressing the key issues in the field and also highlighting currently neglected avenues for future research.

Threat Politics: New Perspectives on Security, Risk and Crisis Management

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Routledge
Abstract: 

Aiming to open up a new perspective on the study of threats and risks, this text combines insights from the thematically linked but academically disassociated fields of security studies, risk studi

es and crisis management studies. It provides case studies of key agents, arenas and issues involved in the politics of threats. In addition to the traditional unit of analysis - national governments - this book takes into account non-governmental agents, including public opinion, the media and business.

Poverty and the Critical Security Agenda

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Routledge
Abstract: 

Poverty and the Critical Security Agenda argues that poverty should be a central concern of security studies and critiques existing methodological approaches to poverty and 'well-being'.

Using the Philippines as a case study, this book is critical of approaches to poverty that portray the poor as passive objects as opposed to dynamic actors. With this in mind, the relationship between poverty and democracy, as a means to facilitating human security, is central. Poverty acts as a major behavioural force in international relations, not least for the state, and therefore merits increased visibility within the research agenda. This text is highly relevant for courses on international relations methodology and critical theory, development studies, security studies and international political economy.

Hacking the Human - Social Engineering Techniques and Security Countermeasures

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Routledge
Abstract: 

Information security is about people, yet in most organizations protection remains focused on technical countermeasures.

The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient. Ian Mann turns the black art of social engineering into an information security risk that can be understood, measured and managed effectively. The text highlights the main sources of risk from social engineering and draws on psychological models to explain the basis for human vulnerabilities. Chapters on vulnerability mapping, developing a range of protection systems and awareness training provide a practical and authoritative guide to the risks and countermeasures that are available. There is a singular lack of useful information for security and IT professionals regarding the human vulnerabilities that social engineering attacks tend to exploit. Ian Mann provides a rich mix of examples, applied research and practical solutions that will enable you to assess the level of risk in your organization; measure the strength of your current security and enhance your training and systemic countermeasures accordingly. If you are responsible for physical or information security or the protection of your business and employees from significant risk, then Hacking the Human is a must-read.

EU Security Strategies - Extending the EU System of Security Governance

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Routledge
Abstract: 

This volume offers a coherent analysis of the European Union’s security strategies within a comparative framework. If the EU is to survive and prosper as an effective security actor, it requir

es that greater attention be devoted to taking a cohesive and common position on the relationship between EU foreign policy means and goals. The major claim of this edited collection is that there is a European grand security strategy that disciplines member state security strategies. That grand strategy has two distinct substantive goals: (1) the preservation and expansion of the EU system of security governance; and (2) the implementation of specific strategies to meet internal and external threats and sources of insecurity. The EU has sought to develop a grand security strategy that not only accounts for the proliferation of threats possessing a military or non-military character and differentiates between core and peripheral regions of interest, but also addresses the requirements to bridge the increasingly blurred boundary between internal and external security threats and the necessary reconciliation of the competing security preferences of its member states. The empirical contributions to this volume examine the EU security strategies for specific issue areas and regional threat complexes. These case studies assess whether and how those strategies have consolidated or expanded the EU system of security governance, as well as their successes and limitations in meeting the security threats confronting the EU and its member-states.

Human and National Security - Understanding Transnational Changes

Document type: 
Book
Publisher / Publication: 
Routledge
Abstract: 

Deliberately challenging the traditional, state-centric analysis of security, this book focuses on subnational and transnational forces—religious and ethnic conflict, climate change, pandemic disea

ses, poverty, terrorism, criminal networks and cyber attacks—that threaten human beings and their communities across state borders. Examining threats related to human security in the modern era of globalization, Reveron and Mahoney-Norris argue that human security is national security today, even for great powers.

Critical Approaches to Security - An Introduction to Theories and Methods

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Routledge
Abstract: 

Focusing on critical approaches to security, this new textbook offers readers both an overview of the key theoretical perspectives and a variety of methodological techniques. With a careful ex

plication of core concepts in each chapter and an introduction that traces the development of critical approaches to security, this textbook will encourage all those who engage with it to develop a curiosity about the study and practices of security politics. Challenging the assumptions of conventional theories and approaches, unsettling that which was previously taken for granted – these are among the ways in which such a curiosity works. Through its attention to the fact that, and the ways in which, security matters in global politics, this work will both pioneer new ways of studying security and acknowledge the noteworthy scholarship without which it could not have been thought.

Understanding Ethnic Conflict

Document type: 
Book
Authors / Institution: 
Publisher / Publication: 
Routledge
Abstract: 

Understanding Ethnic Conflict provides all the key concepts needed to understand conflict among ethnic groups.

Including approaches from both comparative politics and international relations, this text offers a model of ethnic conflict's internationalization by showing how domestic and international actors influence a country's ethnic and sectarian divisions. Illustrating this model in five original case studies, the unique combination of theory and application in Understanding Ethnic Conflict facilitates more critical analysis of contemporary ethnic conflicts and the world's response to them.

European Union Internet Organised Crime Threat Assessment (IOCTA) 2017

Document type: 
Report
Authors / Institution: 
Publisher / Publication: 
EUROPOL
Abstract: 

Each year, Europol’s European Cybercrime Centre (EC3) publishes the Internet Organised Crime Threat Assessment (IOCTA), its flagship strategic report on key findings and emerging threats

and developments in cybercrime — threats that impact governments, businesses and citizens in the EU. The IOCTA provides key recommendations to law enforcement, policy makers and regulators to allow them to respond to cybercrime in an effective and concerted manner. The report focuses on the crime areas that fall under EC3’s mandate. These cybercrime priorities, which are determined by the EU Policy Cycle, are currently: Cyber-dependent crime, Online child sexual exploitation and Payment fraud. The most recent IOCTA also looks at an additional crime area, online criminal markets, both on the surface web and Darknet. It also addresses the convergence of cyber and terrorism. Another typical focus of the IOCTA are cross-cutting crime enablers, factors that straddle more than one crime area but are not necessarily inherently criminal themselves. These enablers include phishing/smishing/vishing, business email compromise, bulletproof hosting, anonymisation tools, criminal abuse of cryptocurrencies and money muling.

Pages

Go to top