首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 50 毫秒
1.
Since the September 11 tragedy, all aspects of our lives, including our approach to transportation security, have been transformed. In this article, the ways in which transportation has become a global and intermodal enterprise are analyzed with specific attention to the implications of these developments for the security of the system. Such issues as the security of land borders and sea and air entry points as well as the role of containerized freight and aviation are discussed in terms of the situation that existed before September 11 and the changes that have occurred since then. Existing shortcomings and probable future developments are analyzed with particular attention to the potential of energy and other technologies and the role of foreign policy, economic and social development, and conflict resolution.  相似文献   

2.
September 11 was the catalytic event that clearly demonstrated that transportation security was a virtual myth. We had obviously overinvested in efficiency-based mechanisms and procedures while the security and safety standards provided by effectiveness considerations were being increasingly ignored. This article analyzes the increasingly dangerous situation as it unfolded and provides an Emerging Entrepreneurial Management and Public Policy Model designed to provide insights towards rebalancing our transportation security and public policy considerations as we attempt to design, implement, and pay for optimal security systems to deal with the terrorism threats we face in the early twenty-first century. Rebalancing the model and the equations will require increased focus, will, and skills. It will also be a lot more expensive . . . in both the private and the public sectors.  相似文献   

3.
This article examines the relationship between the institutional trustworthiness of security agencies in the context of data‐intensive security practices. It focuses on the public's acceptance of the way digital surveillance technologies feed into large‐scale security data analytics. Using the case of deep packet inspection (DPI), survey data gathered in six European countries (n = 1,202) demonstrates that security agencies' institutional trustworthiness directly and indirectly influences public acceptance of DPI. Against a backdrop of declining public trust in government and a climate of intense international terrorist threat, governments around the world are appealing to citizens to trade privacy for enhanced security. This article supports calls for security agencies and their respective governments to engage with the democratic process to enrich security and privacy at all levels of public security governance and for the common good.  相似文献   

4.
The purpose of this article is to undertake a critical assessment of the governance of Canada's national security apparatus and, more specifically, the growing digitization and data-driven dimensions of such an apparatus. Over the previous decade, since 9/11, the advent of electronic government (e-government) and its emphasis on horizontality and interoperability became intertwined with the security apparatus of the public sector: the recent Snowden affair in the US has once again brought such discussions to the forefront. It is within such a context that the rise of ‘big data’ (or meta-data) as an identifiable term denotes a confluence of forces and contradictory tensions between openness and secrecy for the public sector both operationally and democratically. We examine Canada's Westminster insularity in this regard, how Canadian reforms meant to augment oversight and review capacities of security agencies have been stunted in recent years, and why such stalled actions matter to the privacy and safety of Canadian citizens. Conversely, a case for more openness and governance innovation is put forth premised on two main and inter-related directions: more political oversight and public dialogue on the one hand, and a greater emphasis on privacy as a responsibility on the other hand. Together these directions emphasize a more activist and participative civil culture that is central to ensuring societal resilience in an increasingly virtual and complex security environment.  相似文献   

5.
The rise of China raises questions about international order and whether traditional power structures will be transformed peacefully or confrontationally. Actively engaged in trade and investment activities with its Southeast Asian neighbourhood, China has been exerting political influence on many Southeast Asian states, cleaving regional cohesion and raising levels of tensity in the region. This article presupposes that within so-called non-traditional security (NTS) areas, there is room for China and Southeast Asian countries to circumvent the political tensions, to some extent. It presumes that NTS issues facilitate greater interaction with/on China for Southeast Asian states, including enhanced European Union (EU)-Association of Southeast Asian Nations (ASEAN) engagement on China. Recognising the increasing and rather underexplored importance of the NTS perspective on the official and scholarly levels, this article delves into the rhetoric of NTS from a European perspective with particular view towards the South China Sea issue to demonstrate the use and utility of the NTS concept in the EU-ASEAN context against the backdrop of China's rise.  相似文献   

6.
Security sector reform (SSR), targeting security forces and their management and oversight institutions, has become a major feature of international peace- and statebuilding activities. The article draws on policy transfer research to assess substantive and procedural changes in how international actors intervene in the security governance of fragile or post-conflict states. By comparing transfer processes in Liberia, Timor-Leste and the Palestinian Territories, the article shows that despite variations across political, economic and strategic factors in each domestic context, external SSR interventions showed distinct similarities. SSR interventions expanded their substantive scope over time; less directly coercive mechanisms of persuasion and socialization increasingly replaced the direct imposition of external models of security governance; and the influence of domestic elite actors on transfer processes increased over the duration of interventions.  相似文献   

7.
This article studies the securitization of transnational crime by the Association of Southeast Asian Nations (ASEAN) since 1996–97. It first introduces transnational crime as a criminal matter before positioning it within the international security debate through an elaboration of the Copenhagen School and its securitization theory. It then examines whether transnational crime has been articulated in security terms in the ASEAN rhetoric. The article demonstrates that the member states have made statements in which they make claims about security in the context of crime. Yet, there is little evidence that this has encouraged regional policy-makers to adopt common security responses. ASEAN has failed to implement joint actions due to domestic circumstances but also because of its own consensus model and resistance to institutional reforms. Finally, the article suggests that the problem of transnational crime could be dealt with more effectively if it was approached primarily as a criminal matter rather than as a security issue.  相似文献   

8.
This article examines air transportation policy and administration at the millennium. It reviews and analyzes major problem areas and focuses on issues that have to be dealt with to streamline the policy and administration in the field as it becomes more integrated in our increasingly intermodal transportation system. The first part of the article sets the stage for the changes experienced after deregulation: It utilizes an analytical model to examine: airports; airline industry management; terrorism and security; and safety, equipment and human resources. The second part of the article focuses more specifically on a policy and administration analysis itself. It demonstrates how we have evolved into a customer model more aligned with the market place, efficiency, and risk taking; while moving away from a safer and less entrepreneurial period identified as the citizen model period. With the canage of models, we find trust diminished. Passengers, customers and citizens, become more disenchanted and cynical, to the point of organizing through elected officials to promote an airline passenger bill of rights and reform the system.  相似文献   

9.
This article describes the activities related to civil society'sengagement with the question of security sector reform (SSR)in Liberia since the signing of the Accra Comprehensive PeaceAccord (CPA) in August 2003, identifies the challenges it facesand draws lessons learned from this engagement; particularlythe need to develop local capacity, networks of support andnational ownership. Consideration is given to the specificsof the rapidly evolving post-conflict context in which suchreforms are taking place and their connection to the field oftransitional justice as a means of addressing a history of humanrights abuses. The discussion also covers the scope of potentialengagement for civil society in the new political landscapein Liberia that has been created by the deployment of one ofthe world's largest peacekeeping forces and the arrest of formerpresident Charles Taylor.  相似文献   

10.
This article explores what factors are important in developing the future leaders of the US intelligence community in the post-9/11 security environment. It surveys traditional leadership theory to assess whether any of its perspectives are applicable to understanding leadership in the intelligence context. It argues, that although some leadership theory may be applicable, the intelligence studies field may be better served by developing its own body of leadership theory. Second, any leadership theory needs to consider together the two synergistic components of intelligence leadership: personal leadership development and the ability to lead organization reform. Furthermore, the role of intelligence governance may be the most critical factor in promoting better leaders of US intelligence agencies and the broader community.  相似文献   

11.
This article considers the post–September 11 challenges faced by the U.S. national security machinery and analyzes the relationship between the new threat environment, the United States's role in the world, and decision–making structure. Homeland security is defined as a subset of national security. The threat of foreign terrorist organizations acting on U.S. soil should be seen in the political context of the pursuit of U.S. national interests in an often anarchic world. Two models for homeland security organizational structures are considered: a departmental model and an interagency model. The interagency model, embodied in the Homeland Security Council, is a better fit given the nature of the threat, the crucial need for coordination, and the realities of governmental decision making. The organizational challenges that may complicate the government's preparations, decisions, and implementation of a major homeland defense mission stem from three rivalries: executive–legislative, cabinet–staff, and Homeland Security Council–National Security Council.  相似文献   

12.
ABSTRACT

One of the important drivers of change within contemporary global civil society is the growing power and influence of private philanthropic foundations (PPFs). To illustrate this argument, this article considers the cases of the Bill and Melinda Gates Foundation (BMGF) and the Open Society Foundations (OSF), the largest and fourth largest PPFs in the world today by wealth or assets, and, especially, their founders. The article considers their influence within global civil society, within the context of international development, and the consequences of their activities for a range of international actors. This is done in the context of debate within the literature on the activities of PPFs, in which the articles sides with advocates of critical scrutiny. In developing its argument, the article draws on a range of sources including the financial statements and audited accounts of PPFs, of other non-governmental organizations and of selected inter-governmental organizations. It is argued that the BMGF and OSF are engines of neoliberalism and potent symbols of a second distinct ‘gilded age’ and that their influence must be restrained through anti-trust measures and through greater taxation and regulation.  相似文献   

13.
This article examines the impact of the 9/11 attacks on railroad security. Railroad security has been traditionally defined as a problem of trespass and liability for deaths, injuries, and property damage sustained or caused by trespassers. It argues that the private freight railroad industry, not government, has largely directed the efforts to prevent terrorism and share information on suspected terrorist threats, through the prompt formation of a loosely coupled network of organizations coordinated by the industry trade association, the American Association of Railroads. The freight railroad network approach is contrasted with the efforts of Amtrak to gain public funds for its security efforts by connecting its survival with homeland security. Kingdon's model of the policy process is used to explain how 9/11 has presented an opportunity for railroads to use policy windows to gain benefits for the industry while at the same time resisting possible reregulation. It contrasts the network approach with the traditional hierarchical-bureaucratic form of organization used in the design of the Department of Homeland Security, and suggests it poses a valuable case study to see how information can be shared between widely divergent types of organizations, and test how best to prevent future terrorist events.  相似文献   

14.
This article examines the pronouncements and positions of the leading political parties on the Human Rights Act and the proposals for a new British Bill of Rights and Responsibilities. It analyses the main arguments made in support of a British Bill of Rights and Responsibilities, which are advanced around five main issues: security, the judges, parliamentary sovereignty, responsibilities and 'British rights'. The article was written before the government published the Green Paper Rights and Responsibilities: developing our constitutional framework in March 2009 and provides a political context with which to analyse it.  相似文献   

15.
Abstract

In recent years, there has been an increasingly vigorous debate by a wide range of participants over the past, present and future of Japanese security and the national defence policy. Ever since the end of the Cold War, international relations theorists have cast their gaze to Japan, and have been given to re-examining ‘comprehensive security’ with a particular eye for the meaning of ‘security’. The 1990s were a particularly interesting time for this scholarly revisionism, while events of September 2001 have cast an entirely different spectre on the nature and expectations of Japanese security, both domestically and internationally. This article is particularly concerned with the developments in the 1990s as scholars sought to reassert the ‘defence’ component of the comprehensive security policy hitherto pursued by Japan. This re-examination has elevated former Japanese Defence Agency (JDA) bureaucrat Kubo Takuya as the key architect in crafting Japan's security policy. Tsuyoshi Kawasaki's contributions to the debate are especially interesting on this point. He rightly challenges the short-comings of the so-called ‘domestic-constructivists’, especially Berger and Katzenstein. However, in attempting to demolish their cases for ‘selective biases’ he then proceeds to selectively argue a similarly biased case in asserting the superiority of yet another derivation of the realist cause – ‘postclassical realism’. His key premises are based on his interpretations of the architect of Japan's National Defence Program Outline, Kubo, and in doing so ‘proves’ the military aspect of Japan's security policy and its ‘inherent superiority’ as an explanatory framework. Equally, one can mount a case for the ‘comprehensive security’ proponents by citing the work and presence of the late Okita Saburo in his contributions to understanding post-war security policy. This article will demonstrate a similar argument to that of Kawasaki's based on an analogous analytical framework which grounds Japanese security consciousness in a deeper historical context. It is part of a larger project which seeks to give empirical substance to constructivist interpretations of Japanese security.  相似文献   

16.
What are the implications of the war on terrorism for the progress made to date and the likely future of environmental security efforts in the national security state? To put the evolving post–September 11th environmental security challenge facing the U.S. military in perspective, this article begins with a synopsis of the doctrinal, tactical, operational, and regulatory dilemmas faced by the U.S. military in the post–Cold War era. Next, the article reviews how and why the 1990s bequeathed a set of misaligned administrative systems that make existing and future progress in balancing national security with environmental and natural resources protection extremely vulnerable to shifts in the political economy surrounding this issue in the post–September 11th era. The article concludes with a review of how September 11th has affected the patterns of politics surrounding this issue since those tragic events. Despite recent increases in the defense budget, this analysis suggests that conflict over this issue will continue, rendering structural realignment a daunting challenge and further complicating the integration of national security and environmental and natural resources responsibilities in the post–September 11th era.  相似文献   

17.
The debate over military uses of space generally and the weaponization of space in particular is as old as the space age itself. Most recently this debate has been re-invigorated in Canada within the context of Ballistic Missile Defence. This article provides an overview of the legal framework governing the use of force in space, concluding that military activity including, in limited circumstance, the use of force, is not prohibited. The article then addresses the policy debate that arises around issues of weaponization, use of force, and space security. It concludes that while the deployment of certain weapons in space and the employment of force in from and through space might be permitted, a comprehensive analysis of the consequences of such decisions is required to ensure the objective of enhanced security will in fact be achieved.  相似文献   

18.
This article assesses the British experience with intelligence accountability through an analysis of the principal mechanism that exists to provide for it – the parliamentary Intelligence and Security Committee. It discusses the context within which oversight proposals emerged, the debate surrounding the nature of the new oversight body, and assesses the performance of the Committee over the first decade of its existence. It concludes that while the Committee has secured some important advances with regard to the accountability of the intelligence and security services, there are nevertheless significant limitations and weaknesses, many of which were evident in the Committee's 2003 investigation and report into pre-war intelligence on Iraqi WMD. In this context, the debate as to whether the oversight body should have select committee status, discussed at length in the article, remains highly relevant.  相似文献   

19.
Self‐driving cars (also known as driverless cars, autonomous vehicles, and highly automated vehicles [HAVs]) will change the regulatory, political, and ethical frameworks surrounding motor vehicles. At the highest levels of automation, HAVs are operated by independent machine agents, making decisions without the direct intervention of humans. The current transportation system assumes human intervention though, including legal and moral responsibilities of human operators. Has the development of these artificial intelligence (AI) and autonomous system (AS) technologies outpaced the ethical and political conversations? This paper examines discussions of HAVs, driver responsibility, and technology failure to highlight the differences between how the policy‐making institutions in the United States (Congress and the Public Administration) and technology and transportation experts are or are not speaking about responsibility in the context of autonomous systems technologies. We report findings from a big data analysis of corpus‐level documents to find that enthusiasm for HAVs has outpaced other discussions of the technology.  相似文献   

20.
Household food insecurity status in the United States is ascertained by a battery of close‐ended questions. We posit that the monthly nature of benefit receipt from the Supplemental Nutrition Assistance Program (SNAP) creates experiences of food hardship, which become salient in the context of SNAP receipt, and in turn exert influence on the response to food security questions. We test this hypothesis by examining answers to a 30‐day food security module in relation to when SNAP benefits are received. We find that for SNAP households near the end of or at the beginning of the benefit month, the probability of being classified as food insecure increases by 11 percentage points, over a baseline of 42 percent. We also find that the probability of responding affirmatively to any of the first five items in the module increases during this time. We discuss the importance of these findings for the estimation of food security and its implication on program evaluation.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号