Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Reference & Interdisciplinary > Interdisciplinary studies > Peace studies > General
This book presents a comprehensive overview of the Nagorno-Karabakh conflict, the long-running dispute between Armenia and Azerbaijan over the Armenian-majority region of Azerbaijan. It outlines the historical development of the dispute, explores the political and social aspects of the conflict, examines the wars over the territory including the war of 2020 which resulted in a significant Azerbaijani victory, and discusses the international dimensions.
Tackling one of the most prevalent myths about insurgencies, this book examines and rebuts the popular belief that Mao Zedong created a fundamentally new form of warfare that transformed the nature of modern insurgency. The labeling of an insurgent enemy as using "Maoist Warfare" has been a common phenomenon since Mao's victory over the Guomindang in 1949, from Malaya and Vietnam during the Cold War to Afghanistan and Syria today. Yet, this practice is heavily flawed. This book argues that Mao did not invent a new breed of insurgency, failed to produce a coherent vision of how insurgencies should be fought, and was not influential in his impact upon subsequent insurgencies. Consequently, Mao's writings cannot be used to generate meaningful insights for understanding those insurgencies that came after him. This means that scholars and policymakers should stop using Mao as a tool for understanding insurgencies and as a straw man against whom to target counterinsurgency strategies.
This book presents a unique, comprehensive yet accessible look at security in Africa. The author provides a comprehensive review of the key security issues in Africa and offers a contemporary investigation into what security in Africa will mean for the future of Security Studies. It focuses on contemporary yet inherent security challenges facing the continent. It engages with International Relation theories, security literature and primary data from Cameroon (related to other African case studies), to situate African Security Studies in International Relations and develop a concept of security for African Security Studies. It will be essential reading for students, analysts and policy makers specializing in International Relations, Sociology, African Studies and Development Studies.
This book presents post-peace agreement violence as a serious, yet predictable and manageable, political phenomenon. Negotiating an end to a civil war is extremely difficult, and many signed peace agreements subsequently unravel, ushering in renewed conflict. In response, important international actors have become increasingly involved in conflict mediation, peacekeeping, and post-conflict reconstruction around the globe. Policymakers and scholars alike have identified spoilers-violent actors who often rise up and attempt to challenge or derail the peace process-as one of the greatest threats to peace. Using a mixed-method approach combining quantitative and qualitative analyses of a newly created, global dataset of spoiling, Reiter demonstrates that this type of violence occurs in predictable circumstances and only represents a threat to peace under specific conditions. The book also shows that spoiling often serves to bring agreement flaws and implementation failures to light and in turn forces actors to recommit to an accord, thereby strengthening peace in the long term.
This innovative, much-needed book shares powerful wisdom and practical strategies to help language teachers, teacher educators and peace educators communicate peace, contribute to peace and weave peacebuilding into classrooms and daily life. The clear, six-part Language of Peace Approach underlies more than 50 creative activities that can promote peacebuilding competence in secondary and post-secondary students, current and prospective educators and community members outside of academia. Chapters span the spectrum from cross-cultural peace education to the positive psychology of peace, from nonverbal peace language to transformative language teaching for peace, and from the needs of language learners to the needs of language educators. The book makes a unique and valuable contribution to the discussion of how we can live together peacefully in a changing world.
External Dimension of the European Union's Critical Infrastructure Protection Programme: From Neighboring Frameworks to Transatlantic Cooperation provides the basis, methodological framework, and first comprehensive analysis of the current state of the external dimension European Programme for Critical Infrastructure Protection. The challenges at the EU level are multidimension insofar as identifying, designating and protecting critical infrastructures with the ultimate goal of harmonizing different national policies of the Member States and creating the identity of the European Union in this arena. Modern society has become so reliant on various sectors of critical infrastructure-energy, telecommunications, transport, finance, ICT, and public services-that any disruption may lead to serious failures that impact individuals, society, and the economy. The importance of critical infrastructures grows with the industrial development of global and national communities; their interdependence and resiliency is increasingly important given security threats including terrorism, natural disaster, climate change and pandemic outbreak In the area of Critical Infrastructure Protection and Resilience, the European Union is constantly committed to setting the objectives for the Member States. At the same time, the European Commission promotes the importance of a common approach to Critical Infrastructure Protection (CIP), and ensure cooperation beyond the borders of the Union, while also cooperating with neighboring countries, including those soon willing to join the European Union. This book has been structured and written to contribute to current critical infrastructures, resilience policy development and discussions about regional and international cooperation. It serves as a reference for those countries willing to initiate cooperation and that therefore demand deeper knowledge on the security cultures and frameworks of their potential partners. Features: Provides an unprecedented analysis of the national frameworks of 14 neighboring countries of the EU, plus the United States and Canada Overcomes the language barriers to provide an overall picture of the state of play of the countries considered Outlines the shaping of national critical infrastructure protection frameworks to understanding the importance of service stability and continuity Presents guidelines to building a comprehensive and flexible normative framework Addresses the strategic and operational importance of international co-operation on critical infrastructure including efforts in CIP education and training Provides insight to institutions and decision-makers on existing policies and ways to improve the European security agenda The book explains and advocates for establishing stronger, more resilient systems to preserve functionalities at the local, national, and international levels. Security, industry, and policy experts-both practitioners and policy decision-makers-looking for answers will find the solutions they seek within this book.
External Dimension of the European Union's Critical Infrastructure Protection Programme: From Neighboring Frameworks to Transatlantic Cooperation provides the basis, methodological framework, and first comprehensive analysis of the current state of the external dimension European Programme for Critical Infrastructure Protection. The challenges at the EU level are multidimension insofar as identifying, designating and protecting critical infrastructures with the ultimate goal of harmonizing different national policies of the Member States and creating the identity of the European Union in this arena. Modern society has become so reliant on various sectors of critical infrastructure-energy, telecommunications, transport, finance, ICT, and public services-that any disruption may lead to serious failures that impact individuals, society, and the economy. The importance of critical infrastructures grows with the industrial development of global and national communities; their interdependence and resiliency is increasingly important given security threats including terrorism, natural disaster, climate change and pandemic outbreak In the area of Critical Infrastructure Protection and Resilience, the European Union is constantly committed to setting the objectives for the Member States. At the same time, the European Commission promotes the importance of a common approach to Critical Infrastructure Protection (CIP), and ensure cooperation beyond the borders of the Union, while also cooperating with neighboring countries, including those soon willing to join the European Union. This book has been structured and written to contribute to current critical infrastructures, resilience policy development and discussions about regional and international cooperation. It serves as a reference for those countries willing to initiate cooperation and that therefore demand deeper knowledge on the security cultures and frameworks of their potential partners. Features: Provides an unprecedented analysis of the national frameworks of 14 neighboring countries of the EU, plus the United States and Canada Overcomes the language barriers to provide an overall picture of the state of play of the countries considered Outlines the shaping of national critical infrastructure protection frameworks to understanding the importance of service stability and continuity Presents guidelines to building a comprehensive and flexible normative framework Addresses the strategic and operational importance of international co-operation on critical infrastructure including efforts in CIP education and training Provides insight to institutions and decision-makers on existing policies and ways to improve the European security agenda The book explains and advocates for establishing stronger, more resilient systems to preserve functionalities at the local, national, and international levels. Security, industry, and policy experts-both practitioners and policy decision-makers-looking for answers will find the solutions they seek within this book.
Fills a conspicuous gap in the literature by providing an authoritative dissection of one of the more prominent features of contemporary terrorism: so-called jihadi snuff videos. Explains how ISIS harnessed social media to manipulate global opinion and communicate a carefully constructed image of the group. Written in a lively and accessible style, it interrogates why some people find terrorist atrocity films both repulsive and irresistible.
Fills a conspicuous gap in the literature by providing an authoritative dissection of one of the more prominent features of contemporary terrorism: so-called jihadi snuff videos. Explains how ISIS harnessed social media to manipulate global opinion and communicate a carefully constructed image of the group. Written in a lively and accessible style, it interrogates why some people find terrorist atrocity films both repulsive and irresistible.
This book stems from a simple 'feminist curiosity' that can be succinctly summed up into a single question: what happens to combatant women after the war? Based on in-depth interviews with 40 research participants, mostly former combatants within the Irish Republican Army (IRA), this book offers a critical exploration of republican women and conflict transition in the North of Ireland. Drawing on the feminist theory of a continuum of violence, this book finds that the dichotomous separation of war and peace within conventional approaches represents a gendered fiction. Despite undertaking wartime roles that were empowering, agentic, and subversive, this book finds that the 'post-conflict moment' as experienced by female combatants represents not peace and security, but a continuity of gender discrimination, violence, injustice, and insecurity. The experiences and perspectives contained in this book challenge the discursive deployment of terms such as post-conflict, peace, and security, and moreover, shed light on the many forms of post-war activism undertaken by combatant women in pursuit of peace, equality, and security. The book represents an important intervention in the field of gender, political violence, and peace, and more specifically, female combatants and conflict transition. It is analytically significant in its exploration of the ways in which gender operates within non-state military movements emerging from conflict, and will be of interest to students and scholars alike.
The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations to protect against these threats. The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare. The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics.
This book examines the United States neoconservative movement, arguing that its support for the 2003 invasion of Iraq was rooted in an intelligence theory shaped by the policy struggles of the Cold War. The origins of neoconservative engagement with intelligence theory are traced to a tradition of labour anti-communism that emerged in the early 20th century and subsequently provided the Central Intelligence Agency with key allies in the state-private networks of the Cold War era. Reflecting on the break-up of Cold War liberalism and the challenge to state-private networks in the 1970s, the book maps the neoconservative response that influenced developments in United States intelligence policy, counterintelligence and covert action. With the labour roots of neoconservatism widely acknowledged but rarely systematically pursued, this new approach deploys the neoconservative literature of intelligence as evidence of a tradition rooted in the labour anti-communist self-image as allies rather than agents of the American state. This book will be of great interest to all students of intelligence studies, Cold War history, United States foreign policy and international relations.
This textbook provides a thorough grounding in the vocabulary, concepts, issues and debates associated with modern land warfare. The second edition has been updated and revised, and includes new chapters on non-western perspectives and hybrid warfare. Drawing on a range of case studies spanning the First World War through to contemporary conflicts in Syria, Ukraine, and Nagorno-Karabakh, the book explores what is unique about the land domain and how this has shaped the theory and practice of military operations conducted upon it. It also looks at land warfare across the spectrum of its conduct, including conventional campaigning, counterinsurgency, and peace support and stabilisation operations. Key themes and debates identified and analysed include: the tensions between change and continuity; the role of technology in land warfare; the relevance of culture and context; the difficulties in translating theory into effective military practice; in-depth discussions on issues of immediate contemporary significance, including hybrid warfare, emerging military technologies, and the military reform processes of the US, Russian, and Chinese land forces. This book will be essential reading for military practitioners and for students of land warfare, military history, war studies and strategic studies.
This book explores the online strategies and presence of Salafi-Jihadi actors in the Nordic as well as the international context. Global Salafi-jihadism has been at the epicentre of international focus during the past decade. This book explores how the Swedish and other Nordic Salafi-jihadist sympathisers have used social digital media to radicalise, recruit, and propagate followers in relation to foreign terrorist fighters (FTFs) and online communities. The chapters in this volume unpack different perspectives of Salafi-jihadi communications strategies, as well as how the international Salafi-jihadi community has constantly reconfigured and adapted to changing security conditions. The case studies of the Nordics constitute a microcosm of wider Salafi-jihadi narratives in relation to the rise and fall of the Islamic State's so-called 'digital caliphate'. This book will be of much interest to students of terrorism studies, counter-extremism and counter-terrorism, social media and security studies.
- fills a gap in the literature on how defence policy is made in contemporary Britain - focuses on the mechanics of policy making, by looking at a wide variety of policy actors, from cabinet ministers to mass media and public opinion - follows the Westminster model, which is the best fit for the centralised nature of defence policy formation - author is an experienced and well-known scholar of British policymaking
- fills a gap in the literature on how defence policy is made in contemporary Britain - focuses on the mechanics of policy making, by looking at a wide variety of policy actors, from cabinet ministers to mass media and public opinion - follows the Westminster model, which is the best fit for the centralised nature of defence policy formation - author is an experienced and well-known scholar of British policymaking
Using the Cyprus conflict as a case study, this book examines how the securitization process in protracted conflict environments changes, as it becomes routinized and potentially even institutionalized. Furthermore, the process is not limited to the mainstream top-down path, as it also follows a horizontal and even bottom-up direction, which inevitably has an impact on the goals and securitization options of both the mainstream securitizing actors and the audience(s). Lastly, on a theoretical level it examines how the multi-directional securitization forces have an impact on the elite and audience-driven desecuritization efforts and ultimately on the prospects for conflict resolution. The book's case study, the Cyprus question, offers an alternative reading of the forces dominating the specific conflict, while concurrently offers a useful framework for the study of similar protracted and deeply securitized conflicts.
An enduring peace is only possible through a genuine understanding of the past. To understand the Troubles is to set them in the context of the historical root causes of the conflict, in order to grapple with its pain and its horrors; to grieve and then, perhaps, to heal. This is the memoir of Patrick Magee, the man who planted the 1984 Brighton bomb - an attempt by the Provisional IRA to kill the British Prime Minister, Margaret Thatcher, and her cabinet. In an unflinching reckoning with the past, Magee recounts the events of his life. He chronicles the profound experience of meeting Jo Berry - whose father was one of five people killed in the bombing - and the extraordinary work they have done together. A chasm of misunderstanding endures around the Troubles and the history of British rule in Ireland. This memoir builds a bridge to a common understanding. It is written in the belief that anything is possible when there is honesty, inclusion and dialogue.
This book, first published in 1985, analyses the choices made by NATO's northern allies during the 1970s and 80s, as well as the factors that produced these choices. Each country study investigates the historical background of the decision to align, the existence of specific enduring security preferences, and the way in which these have - to the extent they have - been reconciled in policy. The studies then examine defence policy priorities during tranquil periods, detail the factors responsible for promoting change in the way each country has formulated security priorities, and look at the way in which disputes have been played out in domestic political life. Finally, the studies analyse the broad outline of future priorities at the end of the Cold War.
This book, first published in 1980, provides a detailed analysis of the East German army in the last decade of the Cold War. It examines the capabilities of the main force, after the Soviet army, in the Soviet Bloc, and shows how it depended on more things than purely military factors and national policies. It focuses the army as part of a society that had been comprehensively militarized through 'socialist military education', and shows that it was closely tied to the Soviet army, with no military doctrine of its own. In this way, this book provides an analysis of not just East German domestic policies, over which its army held great sway, but also of Soviet Bloc strategic planning for conflict in Western Europe.
This book, first published in 1954, is a key analysis of the guiding policies, basic assumptions, fundamental principles and methods of the Red Army, in many respects the most powerful force in the Cold War. This analysis examines the strategy and tactics, weapons systems, training, discipline and political doctrine of the Red Army, as well as focusing on the political control of the USSR and its satellite states.
This book, first published in 1989, analyses the effect that interdependence has had on the defence industrial base, concentrating upon those defence industries situated at the hi-tech end, and paying particular attention to the procurement decisions that affect the production of sophisticated military aircraft. Interdependence raises questions of importance to international relations, strategic studies and defence economics, and Western industrialised states have an ongoing dilemma over the degree to which they should subject their defence industrial bases to the forces of economic interdependence. Despite worries over strategic vulnerability, most Western states have been showing increased interest in arms collaboration, with the aim of maximizing the amount of weaponry available for defence. As this book shows, such a goal becomes increasingly important s the technological sophistication of weapons grows.
This book, first published in 1983, examines weapons standardisation as one aspect of NATO's efficiency. It analyses the economic arguments for weapons standardisation, the limitations of the analysis and the available evidence. A political economy or public choice approach is used, with its emphasis on policy developments in the political market place of voters, political parties, bureaucracies and interest groups. These agents are central to understanding the function of weapons procurement policy within the Alliance.
This book, first published in 1956, analyses the Red Army's strategic planning for a war involving nuclear weapons - whereby the front line is thinned out to protect it from nuclear attack and replaced by large-scale offensive operations in NATO's rear. This new warfare technique had been successfully practised in WWII by Soviet partisan and guerrilla forces, and this book examines these foundations of Soviet secret services doctrine, and the principles by which they would operate.
This book, first published in 1975, is a comprehensive examination of specialised strategic studies, and deals with the theoretical and policy aspects of the topic. It argues that military power is an intrinsic part of the international system, with strategy being the means by which military power may be used to achieve political objectives. Hence, given the destructiveness of modern weapons it is the prime aim of the strategic doctrines of the major powers not to wage war, but to use their military potential to further their interests by less catastrophic means. However, outside the Cold War superpower confrontation, strategy exhibits many of its traditional aspects. This book analyses both types of strategy variations. |
You may like...
The law of the sea - The African Union…
Prof Patrick Vrancken, Prof Martin Tsamenyi
Paperback
Destination NATO - Defence Reform in…
Rohan Maxwell, John Andreas Olsen
Hardcover
R5,138
Discovery Miles 51 380
Introduction to Container Ship…
Alexander Arnfinn Olsen
Paperback
The Routledge Handbook of Polar Law
Yoshifumi Tanaka, Rachael Johnstone, …
Hardcover
R6,339
Discovery Miles 63 390
Security Studies in a New Era of…
Jonathan D. Caverley, Peter Dombrowski
Hardcover
R3,877
Discovery Miles 38 770
Transboundary Marine Spatial Planning…
Daud Hassan, Tuomas Kuokkanen, …
Paperback
R1,384
Discovery Miles 13 840
|