It explores the psychodynamic theory of attachment and how it can be used to offer new ways of thinking when working with mental disorders in offenders. Discusses the development of personality in terms of interpersonal functioning and relationships with others, which is essential to understand both interpersonal violence and abnormal development.
Author: Kay Cornelius
Release Date: 2009-10-01
As Leslie Christopher rises on the corporate ladder with NASA, the threat of danger increases, attracting the attention of two men. Who is to be trusted - the FBI agent or the astronaut? Will setting out to prove her worth against life's challenges only lead Leslie to heartache? Or does her heavenly Father have a surprise for her at the end of the road?
Author: Euan Graham
Publisher: Psychology Press
Release Date: 2006
This is the first major English-language study to explore the broad and longstanding connections between Japan’s national security and the safety of its sea lanes. Tracing issues from pre-and post-1945 eras, the book explores how Japan’s concerns with sea lane protection have developed across such diverse fields as military strategy, diplomacy, trade policy, energy security, and law enforcement. Drawing upon case study material and primary research including interviews with officials and security analysts, the book presents a chronological analysis of Japan’s sea lane security. While Japan’s security policies have recently undergone relatively rapid change, a historical treatment of sea lane security issues reveals long-term continuity in security policymakers’ perceptions and responses regarding Japan's defence and foreign policy. Revealing a neglected but important aspect of Japan’s military and economic security, the book investigates why officials and analysts continue to portray the defence of Japan’s sea lanes as ‘a matter of life and death’.
Author: Philip Jan Schäfer
Publisher: Springer Science & Business Media
Release Date: 2012-10-28
Genre: Technology & Engineering
The work aims at answering the question as to how far discourses on human security are present in Jordan and Israel, if they converge and if political solutions for the issue of water security could be derived. The analysis is based on the assumption that from human security perspective common solutions for urgent problems can be derived more easily than out of a perspective of national security. Yet it is acknowledged that according to a new security perspective different security threats are being identified by relevant actors. An empirical analysis of written statements and utterances of the respective security elites establishes the methodological tool for the identification of human security discourses in Israel and Jordan. Subsequently it is estimated how far water is presented as a matter of national security in Israel and Jordan using the theory of securitization.
Author: Jiyoung Song
Release Date: 2014-08-13
Genre: Political Science
Across East Asia, intra-regional migration is more prevalent than inter-regional movements, and the region’s diverse histories, geopolitics, economic development, ethnic communities, and natural environments make it an excellent case study for examining the relationship between irregular migration and human security. Irregular migration can be broadly defined as people’s mobility that is unauthorised or forced, and this book expands on the existing migration-security nexus by moving away from the traditional state security lens, and instead, shifting the focus to human security. With in-depth empirical country case studies from the region, including China, Japan, North Korea, the Philippines, Burma/Myanmar, Cambodia, Thailand and Singapore, the contributors to this book develop a human security approach to the study of irregular migration. In cases of irregular migration, such as undocumented labour migrants, asylum seekers, internally displaced people, trafficked persons, and smuggled people, human security is the cause and/or effect of migration in both sending and receiving countries. By adopting a human security lens, the chapters provide striking insights into the motivations, vulnerabilities and insecurities of migrants; the risks, dangers and illegality they are exposed to during their journeys; as well as the potential or imagined threats they pose to the new host countries. This multidisciplinary book is based on extensive fieldwork and interviews with migrants, aid workers, NGO activists and immigration officers. As such, it will appeal to students and scholars of Asian politics and security, as well as those with interests in international relations, social policy, law, geography and migration.
Author: Willy Østreng
Publisher: Springer Science & Business Media
Release Date: 2012-12-06
Genre: Technology & Engineering
The basic objective of this report is to place the debate about the future of the Northern Sea Route into the larger picture of Arctic politics and the emerging agenda of the Arctic as a developing region in international society. National security and international environmental cooperation, are the objects of study employed, both separately and in various conceptual combinations, to realize this purpose. To help me in this, I was privileged to draw on the profound expertise of my highly esteemed co-authors, Professor Franklyn Griffiths at the University of Toronto and Senior Researchers at IMEMO in Moscow: Raphael Vartanov, Alexei Roginko and Alexander Kolossov. To their cooperative spirit, friendship and solid contributions to this report, ( am deeply indebted. The report is the result of multiple contributions, both in terms of substance and funding, extending far beyond the inputs of the team of authors. The professional input and thorough work 'behind the scene' done by Liv Astrid Sverdrup, Researcher at FNI at an early stage of the project, has been invaluable. Senior Consultant Kjell Moe at the Norwegian Polar Institute also provided valuable comments and improvements to the biological parts of the Introductory chapter, whilst Senior Consultant Ann Skarstad at FNI, worked wonders with the language for those of us not having English as our mother tongue. Claes Lykke Ragner, Deputy head of the (NSROP secretariat, and Dr.
Author: Christian Deubner
Publisher: Nomos Verlag
Release Date: 2018-01-29
Genre: Political Science
Vor dem Hintergrund früherer und kommender Herausforderungen vergleicht der Autor den Wert verschiedener Formate für die Sicherheits- und Verteidigungs-Zusammenarbeit der EU Mitgliedstaaten (EU-MS). Dabei erweist sich seit über zwanzig Jahren ihr geringes Interesse an der Nutzung des EU-Rahmens mit der GSVP. Die Zusammenarbeit in der NATO, unilaterales Vorgehen oder ad-hoc Koalitionen und die Teilnahme am UN-Peacekeeping sind und bleiben auch auf mittlere Sicht für die EU-MS nützlicher und wichtiger. Der Autor erklärt das aus den Schwächen der GSVP in Bezug auf ihren Wirkungsbereich, auf ihre Institutionen und ihre Verfahren. Und auch weiterhin fehle ein besonderer gemeinsamer Zweck, der für das Jahr 2017 noch eine große Anstrengung zur Stärkung der GSVP rechtfertigen würde. Neu ist, wie stark seit einigen Jahren Bedrohungen der inneren Sicherheit, radikal-islamistische Terrorangriffe, und die Uneinigkeit der MS über die Migrationspolitik die Neuorientierung der äußeren Sicherheits- und Verteidigungspolitik beeinflussen. Für diesen immer wichtigeren Zusammenhang macht der Autor Vorschläge für einen systematischen Untersuchungsansatz.
Author: Richard Polenberg
Publisher: Cornell University Press
Release Date: 2002
At the end of World War II, J. Robert Oppenheimer was one of America's preeminent physicists. For his work as director of the Manhattan Project, he was awarded the Medal for Merit, the highest honor the U.S. government can bestow on a civilian. Yet, in 1953, Oppenheimer was denied security clearance amidst allegations that he was "more probably than not" an "agent of the Soviet Union." Determined to clear his name, he insisted on a hearing before the Atomic Energy Commission's Personnel Security Board.In the Matter of J. Robert Oppenheimer contains an edited and annotated transcript of the 1954 hearing, as well as the various reports resulting from it. Drawing on recently declassified FBI files, Richard Polenberg's introductory and concluding essays situate the hearing in the Cold War period, and his thoughtful analysis helps explain why the hearing was held, why it turned out as it did, and what that result meant, both for Oppenheimer and for the United States.Among the forty witnesses who testified were many who had played vitally important roles in the making of U.S. nuclear policy: Enrico Fermi, Hans Bethe, Edward Teller, Vannevar Bush, George F. Kennan, and Oppenheimer himself. The hearing provides valuable insights into the development of the atomic bomb and the postwar debate among scientists over the hydrogen bomb, the conflict between the foreign policy and military establishments over national defense, and the controversy over the proper standards to apply in assessing an individual's loyalty. It reveals as well the fears and anxieties that plagued America during the Cold War era.
Author: Air Marshal David Evans
Release Date: 2016-07-27
Genre: Political Science
The author has carried out a searching review of the principles promulgated by the British and American Defence Forces, in order to assess their continuing validity and relevance to warfare in the late 1990s and the 21st century. Recognising that principles will be applied by commanders to meet specific situations in the field he extends this study to embrace leadership and training for leadership and command. In the final chapter he addresses the moral responsibilities of those exercising command of their fellow countrymen and other assigned forces.
"Web surfing is a dangerous sport," observes one of the key papers inWeb Security: A Matter of Trust, the Summer 1997 issue of theWorld Wide Web Journal. Indeed it is -- we are always at risk while downloading "cool" new applets, protecting secure information services, and even in trusting that a Web page comes from the stated author. The interviews, specifications, and articles in this issue reframe the debate as a matter oftrustrather thancryptography. Of course, strong security technology is still the foundation (good fences make good neighbors!), but a broad recent survey concerning public Web site vulnerability shows that our fences are in poor shape. The remedy is more careful administration, deployment of new cryptographic protocols, and public key distribution infrastructure. To protect real-world applications such as health care, electronic commerce, and protected "lockboxes" for digital content, however, means understanding tough concepts: Who is authorized to look at this data? Why? And on whose authority? This leads us to questions of trust management, a new approach to automated security decision making. This issue covers W3C's Digital Signature Initiative (DSI), which breaks new ground in this area by binding machine-readable labels to public key signatures. Other topics include medical records privacy issues (Lincoln Stein), signature legality (C. Bradford Biddle), trust in Internet information systems (Rohit Khare), the PGP Web of Trust (Simson Garfinkel), REFEREE: a trust management system for Web applications (presented at WWW6 by Yang-Hua Chu), as well as articles on Java security, the "hacker threat," and much more.
Author: Gordon Friedrichs
Publisher: Anchor Academic Publishing (aap_verlag)
Release Date: 2014-02-01
Genre: Political Science
In 2004 the United Nations Security Council initiated a “Working Group on General Issues of Sanctions” in order to increase the Council’s effectiveness in terms of sanctions implementation. With this reform, the Council reacted to the harsh criticism from the UN against the conventional sanctions practice. It was the Security Council’s latest endeavor to make ratified sanctions more punitive, coercive, and thus effective as far as causing compliance within its judicial framework is concerned. Summarized under the term “smart sanctions”, the Security Council tries to be more accurate in addressing sanctions thereby seeking not only to increase political effectiveness, but also to reduce unintended humanitarian suffering. While conventional sanctions are comprehensive and comprised of a variety of measures, such as trade boycotts and embargoes against the entire country, smart or targeted sanctions (as they are also termed) are selective, targeting only at certain areas or individuals. Consequently, sanctions are the practical expression of the Council’s sovereignty. The Council “lives and breathes” through the ratification of sanctions, so their corroboration and proper enforcement reflect the organization’s vitality. In short, if sanctions fail, the Council fails. So far scholars have accentuated technical questions in their research, such as how to engage in a successful bargaining process and how to imply isolation. They further focused on examining the compliance rate of targeted states. What has been slightly ignored is a potentially poor commitment by states to enforce sanctions in the first place. Quite possibly, the Security Council lacks ratification (what I term input legitimacy) and enforcement (what I term output legitimacy) of smart sanctions. Consequently, the “effectiveness” of smart sanctions does not necessarily have to be linked to the compliance rate of the targeted state. Instead, it might be connected to the commitment shown by the enforcing member states: the level of legitimacy granted to the Council and its tools. Two questions can be raised: How do member states contribute to the ratification and enforcement of smart sanctions? Has the use of smart sanctions increased the effectiveness of the UNSC as a sanctioning body? The concept of input/output legitimacy serves as a model for analyzing the member states’ commitment and will to impose smart sanctions, thus developing an alternative understanding of the term [...]
Contemporary security policy is no longer a matter of protecting borders or fighting an identified foreign enemy. With counterterrorism high on the security agenda, private citizens and companies have all come to be seen as central to the aim of providing security. Situated within the debate on terrorism risk and security, Corporate Risk and National Security Redefined offers a detailed analysis of the role of private companies in American and Danish counter-terrorism policies. The book shows that a ‘responsibilization strategy’ is central to both the American and Danish security policy – a strategy which tends to portray security as a ‘duty’ rather than the ‘right’ that it traditionally has been considered as. The study however finds that such strategies have been received very differently in the business communities of the two countries. The book brings the corporate understandings of the relation between corporate risk and national security to the fore, and let the reader in on a constant conceptual battle and negotiation on the meaning of national security and corporate risk. Corporate Risk and National Security Redefined will be of interest to students and scholars of international relations, critical security, business and terrorism.
Author: Ian Smillie
Publisher: DIANE Publishing
Release Date: 2000
Genre: Diamond industry and trade
How diamonds have been the cause of widespread death, misery, & destruction for almost a decade in the West African country of Sierra Leone. Through the 1990s, Sierra Leone's rebel war became a tragedy of major humanitarian, political & historic proportions, but the story goes back 60 years, to the discovery of the diamonds. The diamond mining sector has become influenced by organized crime & by the smuggling not just of diamonds, but of guns & drugs, & by vast sums of money in search of a laundry. No peace agree. would be sustainable until the problems of mining & selling diamonds had been addressed, both inside Sierra Leone & internationally. Tables.