Internal and External Dynamics of South Asian Security


Book Description

Papers read at a workshop on Internal and External Dynamics of South Asian Security held on December 8, 1996 in Karachi.




Regions and Powers


Book Description

This book develops the idea that since decolonisation, regional patterns of security have become more prominent in international politics. The authors combine an operational theory of regional security with an empirical application across the whole of the international system. Individual chapters cover Africa, the Balkans, CIS Europe, East Asia, EU Europe, the Middle East, North America, South America, and South Asia. The main focus is on the post-Cold War period, but the history of each regional security complex is traced back to its beginnings. By relating the regional dynamics of security to current debates about the global power structure, the authors unfold a distinctive interpretation of post-Cold War international security, avoiding both the extreme oversimplifications of the unipolar view, and the extreme deterritorialisations of many globalist visions of a new world disorder. Their framework brings out the radical diversity of security dynamics in different parts of the world.




Security and Southeast Asia


Book Description

From internal oppression in Burma to interstate conflict in the South China Sea, the people of Southeast Asia face a range of threats. This book identifies and explains the security challenges -- both traditional and nontraditional -- confronting the region. Collins addresses the full spectrum of security issues, discussing the impact of ethnic tensions and competing political ideologies, the evolving role of ASEAN, and Southeast Asia's interactions with key external actors (China, Japan, and the United States). The final section of the book explores how the region's security issues are reflected in two current cases: the South China Sea dispute and the war on terrorism.




Water Security for India


Book Description




Understanding Security Practices in South Asia


Book Description

This book aims to explore the ways in which non-state actors (NSAs) in South Asia ' media actors, epistemic communities, non-governmental organisations (NGOs), civil society groups and others ' are involved in securitising non-traditional security challenges in the region at the domestic and regional levels.




India and Nuclear Asia


Book Description

India's nuclear profile, doctrine, and practices have evolved rapidly since the country’s nuclear breakout in 1998. However, the outside world's understanding of India's doctrinal debates, forward-looking strategy, and technical developments are still two decades behind the present. India and Nuclear Asia will fill that gap in our knowledge by focusing on the post-1998 evolution of Indian nuclear thought, its arsenal, the triangular rivalry with Pakistan and China, and New Delhi's nonproliferation policy approaches. Yogesh Joshi and Frank O'Donnell show how India's nuclear trajectory has evolved in response to domestic, regional, and global drivers. The authors argue that emerging trends in all three states are elevating risks of regional inadvertent and accidental escalation. These include the forthcoming launch of naval nuclear forces within an environment of contested maritime boundaries; the growing employment of dual-use delivery vehicles; and the emerging preferences of all three states to employ missiles early in a conflict. These dangers are amplified by the near-absence of substantive nuclear dialogue between these states, and the growing ambiguity of regional strategic intentions. Based on primary-source research and interviews, this book will be important reading for scholars and students of nuclear deterrence and India's international relations, as well as for military, defense contractor, and policy audiences both within and outside South Asia.




Thirdworld


Book Description




Insurgency and Counterinsurgency in South Asia


Book Description

In Insurgency and Counterinsurgency in South Asia, ten experts native to South Asia consider the nature of intrastate insurgent movements from a peacebuilding perspective. Case studies on India, Pakistan, Nepal, and Sri Lanka lend new insights into the dynamics of each conflict and how they might be prevented or resolved.




Central Asian Security


Book Description

This volume is the first comprehensive scholarly analysis of the strategic reconfiguration of Central Asia as Russia has become more disengaged from the nations in the region and as these nations have developed new relations to the south, east, and west. The international implications are enormous because of the rich energy sources —oil and natural gas —located in the Caspian Sea area.The authors assess a variety of internal security policy challenges confronting these states —for example, the potential for conflict arising from such factors as a mixed ethnic population, resource scarcity, particularly in relation to water management, and an Islamic revival. They also examine the security policy content of relations between the Central Asian states and regional and international powers —specifically the stakes, interests, and policies of Russia, China, Iran, Turkey, and the United States.These internal challenges and the evolution of relations with external powers may result in new cooperative relationships, but they may also lead to destabilizing rivalry and interstate enmity in Central Asia. It is important to identify new patterns of relevance for future security cooperation in the region, but the potential for a new security system or for new institutions to manage security in the region remains uncertain. These issues are explored by a team of prominent specialists from Western Europe, the United States, Russia and China.




Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications


Book Description

The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.