Security Community

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 138978 Experts worldwide ranked by ideXlab platform

Vincent Pouliot - One of the best experts on this subject based on the ideXlab platform.

  • international Security in practice the politics of nato russia diplomacy
    2010
    Co-Authors: Vincent Pouliot
    Abstract:

    How do once bitter enemies move beyond entrenched rivalry at the diplomatic level? In one of the first attempts to apply practice theory to the study of International Relations, Vincent Pouliot builds on Pierre Bourdieu's sociology to devise a theory of practice of Security communities and applies it to post-Cold War Security relations between NATO and Russia. Based on dozens of interviews and a thorough analysis of recent history, Pouliot demonstrates that diplomacy has become a normal, though not a self-evident, practice between the two former enemies. He argues that this limited pacification is due to the intense symbolic power struggles that have plagued the relationship ever since NATO began its process of enlargement at the geographical and functional levels. So long as Russia and NATO do not cast each other in the roles that they actually play together, Security Community development is bound to remain limited.

  • pacification without collective identification russia and the transatlantic Security Community in the post cold war era
    Journal of Peace Research, 2007
    Co-Authors: Vincent Pouliot
    Abstract:

    Does the emergence of a Security Community require a collective identity? This constitutive relationship has been hypothesized by prominent scholars from Deutsch to Adler & Barnett. Yet the Russian—Atlantic case shows that collective identification is not a necessary condition for a nascent Security Community to emerge. In less than two decades, the relationship between Russia and the transatlantic Community has quickly transformed from a deep-seated rivalry structured by the specter of mutual assured destruction to a partnership in which the possibility of military confrontation has undeniably receded. Although bones of contention and power struggles continue to abound, empirical indicators attest to the emergence of a nascent Russian—Atlantic Security Community. But survey data also show that Russian and Western peoples do not meaningfully identify with one another. While the lack of we-ness certainly helps explain the striking instability of the post-Cold War rapprochement between Russia and the transatlantic Community, it also recalls the need for constructivists to pay attention to other variables than mutual representations in the study of international peace. As a way forward, the article advocates a practice turn in the study of Security communities: peace exists as a social fact when diplomacy becomes the self-evident practice among Security elites to solve interstate disputes.

Wolfgang Wagner - One of the best experts on this subject based on the ideXlab platform.

  • building an internal Security Community the democratic peace and the politics of extradition in western europe
    Journal of Peace Research, 2003
    Co-Authors: Wolfgang Wagner
    Abstract:

    This article extends democratic peace research, which has predominantly focused on the absence of war, to the field of internal Security cooperation. It argues that the mechanisms suggested by democratic peace research (responsiveness of democratic leaders to public demands, democratic norms and culture, and institutional constraints) can also be applied to the field of internal Security cooperation: democratic leaders can be expected to respond to citizens’ demands for enhanced internal Security and to strive towards international cooperation in internal Security. Moreover, democracies tend to form Security communities and to define their Security in common terms, which also encourages mutual assistance on issues of internal Security. At the same time, however, democratic leaders’ ability to engage in international cooperation is circumscribed by domestic institutions that safeguard individual rights. In sum, the mechanisms suggested by democratic peace research can capture both the incentives and difficulties of international cooperation on internal Security among democratic states. The case of extradition politics, which impacts both on the internal Security of states and on standards of individual rights (such as fair trial), serves to illustrate this point: since there is no general obligation for states to extradite fugitives, extradition has traditionally been based on a series of bilateral treaties. Starting in the 1950s, the members of the Council of Europe, all of which are liberal democracies, have negotiated multilateral conventions designed to facilitate extradition among them. The high level of interdependence and trust among the members of the European Union has led to more far-reaching agreements, culminating in a European arrest warrant, which effectively overcomes remaining barriers to extradition. In congruence to the democratic peace perspective, requests from non-democratic states to become part of that regime have been turned down.

  • building an internal Security Community the democratic peace and the politics of extradition
    2003
    Co-Authors: Wolfgang Wagner
    Abstract:

    and institutional constraints) can also be applied to the field of internal Security cooperation: democratic leaders can be expected to respond to citizens' demands for enhanced internal Security and to strive towards international cooperation in internal Security. Moreover, democracies tend to form Security communities and to define their Security in common terms, which also encourages mutual assistance on issues of internal Security. At the same time, however, democratic leaders' ability to engage in international cooperation is circumscribed by domestic institutions that safeguard individual rights.

Emanuel Adler - One of the best experts on this subject based on the ideXlab platform.

  • when Security Community meets balance of power overlapping regional mechanisms of Security governance
    Review of International Studies, 2009
    Co-Authors: Emanuel Adler, Patricia Greve
    Abstract:

    By now arguments about the varieties of international order abound in International Relations. These disputes include arguments about the Security mechanisms, institutions, and practices that sustain international orders, including balance of power and alliances, hegemony, Security regimes based on regional or global institutions, public, private, and hybrid Security networks, as well as different kinds of Security communities. The way these orders coexist across time and space, however, has not been adequately theorised. In this article we seek to show (A) that, while analytically and normatively distinct, radically different orders, and in particular the Security systems of governance on which they are based (such as balance of power and Security Community), often coexist or overlap in political discourse and practice. (B) We will attempt to demonstrate that the overlap of Security governance systems may have important theoretical and empirical consequences: First, theoretically our argument sees ‘balance of power’ and ‘Security Community’ not only as analytically distinct structures of Security orders, but focuses on them specifically as mechanisms based on a distinct mixture of practices. Second, this move opens up the possibility of a complex (perhaps, as John Ruggie called it, a ‘multiperspectival’) vision of regional Security governance. Third, our argument may be able to inform new empirical research on the overlap of several Security governance systems and the practices on which they are based. Finally, our argument can affect how we think about the boundaries of regions: Beyond the traditional geographical/geopolitical notion of regional boundaries and the social or cognitive notion of boundaries defined with reference to identity, our focus on overlapping mechanisms conceives of a ‘practical’ notion of boundaries according to which regions’ boundaries are determined by the practices that constitute regions.

  • the spread of Security communities communities of practice self restraint and nato s post cold war transformation
    European Journal of International Relations, 2008
    Co-Authors: Emanuel Adler
    Abstract:

    This article invokes a combination of analytical and normative arguments that highlight the leading role of practices in explaining the expansion of Security communities. The analytical argument is that collective mean- ings, on which peaceful change is based, cognitively evolve — i.e. they are established in individuals' expectations and dispositions and they are institutionalized in practice — because of communities of practice. By that we mean like-minded groups of practitioners who are bound, both infor- mally and contextually, by a shared interest in learning and applying a common practice. The normative argument is that Security communities rest in part on the sharing of rational and moral expectations and dispo- sitions of self-restraint. This thesis is illustrated by the example of the suc- cessful expansion of Security-Community identities from a core of North Atlantic Treaty Organization (NATO) states to Central and Eastern European countries during the 1990s, which was facilitated by a 'cooperative-Security' Community of practice that, emerging from the Helsinki Process, endowed NATO with the practices necessary for the spread of self-restraint.

Niklas Bremberg - One of the best experts on this subject based on the ideXlab platform.

  • the european union as Security Community building institution venues networks and co operative Security practices
    Journal of Common Market Studies, 2015
    Co-Authors: Niklas Bremberg
    Abstract:

    How does the European Union promote Security beyond its borders? This article answers this seemingly straightforward question by exploring how the EU works as Security Community-building institution vis-a-vis non-members. Drawing upon practice theory in International Relations, the article unpacks the Security Community concept, focusing especially on the relation between co-operative Security practices and the expansion of Security communities. The article discusses how recent practice-inspired insights can be applied in empirical research to generate novel and interesting results of relevance for EU studies. It does so by recapitulating the main findings from a study on Spanish-Moroccan co-operation on civilian and military crisis management. The findings support the claim that common practice precedes collective identity in processes of Security Community-building in that the EU has helped bring together and perpetuate a Community of Security practitioners in the western Mediterranean that builds upon, as well as transcends, already existing bilateral relations.

Changjoo Moon - One of the best experts on this subject based on the ideXlab platform.

  • visual modeling and formal specification of constraints of rbac using semantic web technology
    Knowledge Based Systems, 2007
    Co-Authors: Juhum Kwon, Changjoo Moon
    Abstract:

    The role-based access control (RBAC) model has garnered great interest in the Security Community due to the flexible and secure nature of its applicability to the complex and sophisticated information system. One import aspect of RBAC is the enforcing of Security policy, called constraint, which controls the behavior of components in RBAC. Much research has been conducted to specify constraints. However, more work is needed on the aspect of sharing information resources for providing better interoperability in the widely dispersed ubiquitous information system environment. This paper provides visual modeling of RBAC policy and specifies constraints of RBAC by employing a semantic web ontology language (OWL) to enhance understanding of constraints for machines and people in a ubiquitous computing environment. Using OWL, constraints were precisely formalized according to the constraint patterns and the effectiveness of OWL specification was demonstrated by showing the reasoning process.