Vous êtes sur la page 1sur 418

See

discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/229428362

Reconceptualizing Security. Final Deliverable of


Work Package 1.1 (Concepts of Security)

Book January 2013


DOI: 10.13140/2.1.3090.8485

CITATIONS READS

0 207

3 authors:

Stephan De Spiegeleire Tim Sweijs


The Hague Centre for Strategic Studies (HCSS) The Hague Centre for Strategic Studies (HCSS)
146 PUBLICATIONS 86 CITATIONS 31 PUBLICATIONS 11 CITATIONS

SEE PROFILE SEE PROFILE

Eline Chivot
The Hague Centre for Strategic Studies (HCSS)
21 PUBLICATIONS 4 CITATIONS

SEE PROFILE

All content following this page was uploaded by Stephan De Spiegeleire on 29 December 2014.

The user has requested enhancement of the downloaded file.


D1.1 Conceptual foundations of security
Deliverable submitted in June 2012 (M6) in fulfillment of requirements of the FP7 project,
ETTIS European security trends and threats in society

The research leading to these results has received funding from the European Community's Seventh
Framework Programme (FP7/2007-2013) under grant agreement n 285593.

ETTIS Coordinator:
PO Box 9229 Grnland T: +47 22 54 77 00
www.ettisproject.eu
Peace Research Institute Oslo
NO-0134 Oslo, Norway F: +47 22 54 77 01
(PRIO)
Project Acronym ETTIS
Project full title European Security Trends and Threats in Society
Website http://www.ettisproject.eu
http://www.ettis-project.eu
Grant Agreement # 285593
Funding Scheme FP7-SEC-2011-1 (Collaborative Project)
Deliverable: WP1.1
Title: Conceptual foundations of security
Due date: 31.03.2012
Actual submission date: 30.06.2012
Lead contractor for this deliverable: The Hague Centre for Strategic Studies (HCSS)
Tim Sweijs
Contact: timsweijs@hcss.nl
Dissemination Level: PU
Table of Contents
1 Introduction .................................................................................................................................... 4
2 Concepts of Security in Official High-Level Security Documents .................................................. 7
2.1 Introduction ............................................................................................................................. 7
2.2 Method and Sources ............................................................................................................. 11
2.3 Definitions of Security ........................................................................................................... 14
2.4 Dimensions of Security .......................................................................................................... 31
2.5 Sources of Security ................................................................................................................ 63
2.6 Strategies for Security ........................................................................................................... 86
2.7 Conclusion: Convergence and Divergence in a Complex World ......................................... 102
3 Concepts of Security in Academic Disciplines ............................................................................ 111
3.1 Introduction: Beyond Broadening the Concept of Security .............................................. 111
3.2 Methods and Sources .......................................................................................................... 113
3.3 Definitions of Security ......................................................................................................... 118
3.4 Dimensions of Security ........................................................................................................ 124
3.5 Sources of Security & Strategies for Security ...................................................................... 134
3.6 Conclusion: the Unexplored Treasure Trove ....................................................................... 153
4 Overall Conclusion: Bridging the Security Gap .......................................................................... 157
4.1 Towards a New Definition of National Security .................................................................. 158
4.2 Dimensions .......................................................................................................................... 159
4.3 Sources and Strategies ........................................................................................................ 159
4.4 Whats Next ETTIS?.............................................................................................................. 159
5 Bibliography ................................................................................................................................ 161
5.1 National policy documents .................................................................................................. 161
5.2 EU official and policy documents ........................................................................................ 163
5.3 UN documents ..................................................................................................................... 164
5.4 Academic documents .......................................................................................................... 164
5.5 Other publications ............................................................................................................... 173
6 Annexes ....................................................................................................................................... 174
6.1 Annex 1 Meta-Analysis of the Policy Documents ............................................................. 174
6.2 Annex 2 Baskets for Automatic Processing ...................................................................... 183
6.3 Annex 3 Detailed Analysis of the Academic Disciplines ................................................... 193
6.4 Annex 4 Conceptual foundations of security in political sociology and (critical) security
studies ............................................................................................................................................. 320
6.5 Annex 5 Bibliography of Textmined Academic Articles .................................................... 328
1 Introduction
Security is an amorphous concept that is prone to multiple interpretations both across and within
different societies and cultures, domains of human activity, academic disciplines, eras, etc. To some
the term conjures up association with the national security of states principally buttressed by military
might; to others it is inextricably tied up with notions of the safety of individuals grounded in the
fulfilment of basic Maslowian needs. Such crude distinctions often dominate policy, societal and
academic debates, which obscure the diverse array of concepts of security that do exist. In this work
package we attempt to move beyond previous work. We present different conceptualisations of
security as consisting of

a definition (an exact statement or description of the nature, scope, or meaning of


security),
dimensions (aspects or types of security that are included in various debate about security),
sources (the elements from which both security and insecurity originate or can be obtained)
and
strategies (plans of action designed to achieve a long-term or overall aim).1

Conceptualizing security is more than merely a semantic issue that can safely be left to scholars to
quibble about. It has real-life (and often costly) implications for the capability portfolios our
governments and societies pursue in creating security and consequently also for the R&D efforts
they stimulate towards that goal. The way in which we conceptualise security something that, as
we will see, varies from country to country and changes over time determines, for instance,
whether we invest in guns or butter, as the old saying goes. What we view as a dimension and what
as a source of security drastically affects the nature of our calculus. Security can be (and these days
is) perceived to consist of numerous dimensions territorial, physical, economic, ecological, etc.
Likewise, its sources are also variously considered to be as wide ranging in scope, with peace and
prosperity being put by some on the same par as power preponderance, as pillars on which security
rests. The guns-v-butter analogy is therefore not only outdated but it paints a false and distorting
picture. The choices that both national and European Union policymakers face these days, concern
multi-variable trade-offs and may involve, among other things, increasing the height of our dikes,
dealing with more frequent extreme weather events, protecting vital (cyber) infrastructures, bailing
out banks, mass producing vaccines against possible pandemics, and developing ballistic missile
defence shields.

An additional issue in the dynamic, complex and globalised world of today, is whether such issues
should be taken up by public or private actors, or by a mixture of both; at the national, the
international or the transnational level. It seems therefore fundamental that informed policymaking
(including on R&D choices in the security field) should be grounded first and foremost in a
fundamental examination of and a reflection on various concepts of security.

1
Oxford Dictionaries Online, 17 April 2012, http://oxforddictionaries.com/.

4
Many of our national governments as well as the European Union are still making sizeable research
funds available for national security purposes. Whether we are talking about internal or homeland
security or external security (with often national defence as its fulcrum certainly in terms of
applied research priorities), much of that funding is still channelled into various hard- and high-
technological quick fixes for a number of structural and remarkably incalcitrant security challenges.
This is occurring despite significant (and growing) evidence that many of these problems may also
require more structural solutions that transcend our current understanding of what security is and
how it can be sustained or developed.

For this reason we have endeavoured to survey a broad range of official policy documents and
academic articles. We have unearthed a treasure trove of insights coming from the official strategic
security documents of Western and non-Western nations and the EU, as well as from academic
publications in traditional security - and other, non-security disciplines. In this report we will explore
these insights and offer a kaleidoscopic collection of definitions, dimensions and sources as well as
strategies to increase security. The guiding motivation behind this effort was always how science and
research may be able to better contribute an appropriately balanced (and hopefully more effective
and efficient) security research portfolio, which is at the heart of the overall European Trends and
Threats in Society (ETTIS) project.

In line with the objectives of this first work package (WP) of the ETTIS project, in this deliverable we
explicitly set out to:

Enrich the ways of thinking, defining and dealing with security beyond the existing state of
the art;
Distil insights from other fields that may prove new/interesting/useful for traditional
concepts of security;
Provide the input for a delineation of the concepts of security for subsequent work packages
within the context of the overall ETTIS project.

In order to achieve these ambitious objectives we have employed a dual track approach in which we
collected, processed, analysed, and synthesised insights derived from a wide range of policy and
academic documents on concepts of security, relying on both human analysts as well as automated
(text mining) tools.

In the policy domain, we assess the ways in which concepts of security have evolved over the past
two decades in official policy discourses across a set of European and non-European countries and at
the level of the European Union (EU), on the basis of high level official strategic security strategies. In
so doing, we not only provide a broad overview of the evolution in distinctive national and EU
approaches to security, but also tease out a number of interesting findings regarding the dimensions
and sources that have been associated with security over the years. Moreover, going beyond a mere
phenomenon description (what is / what is not considered part of security?), we also assess various
strategies by these countries in the context of dealing with security. Finally, our method enables us
to systematically benchmark these national security discourses on over twenty key characteristics
which we present visually in easily understandable 2-dimensional scales.

5
In the academic domain, we analyse insights from a wide range of academic disciplines, including
those with no direct association with traditional security fields (e.g., health). Our analysis provides a
tour dhorizon of various disciplinary concepts of security and exposes numerous insights regarding
dimensions and sources of security. The method which we have specifically developed to conduct
this cross-disciplinary analysis stands as another deliverable in itself, which can be applied in future
policy analysis exercises.

While these analyses by themselves constitute a contribution to the current state of knowledge,
within the context of the ETTIS project it also provides the critical input for the deliverable 1.2, in
which the breadth and scope of concepts of security employed within subsequent WPs will be
defined.

In this report we will proceed as follows:

In chapter 2 we present the benchmark of the various national and EU official security
discourses in which we elaborate different concepts of security and trace changes over time
through a systematic comparison of definitions, dimensions, sources and strategies;
In chapter 3 we will identify a myriad of novel insights on definitions, dimensions, sources
and strategies from a wide variety of angles across academic disciplines;
In chapter 4, we will bring the two analyses together and present the key takeaways of our
analysis.

A final note of caution: it is in this report emphatically neither our intent to reach a conclusive verdict
as to what security is nor to come up with a concept or limited set of concepts of security. Instead,
we aim to present a substantive (as well as methodological) exploration of various security related
aspects. The diverse and rich outputs of this exploration will in turn serve as critical input to WP1.2 in
which we will delineate the concepts of security to be employed in subsequent work packages of the
overall ETTIS project.

6
2 Concepts of Security in Official High-Level Security
Documents
2.1 Introduction
Ideally, one would expect the R&D efforts of a political entitys be it a country or a union of
countries in the security area to reflect that entitys official views about what security really is, its
definition of its security interests and priorities and its ideas about how best to ensure those. But
how can we ascertain these different official views? And how do we ourselves delineate the
boundaries of what is (or is not) security for the purposes of this work package?

Throughout this entire work package, our main motivation was to avoid imposing any views that any
ETTIS consortium partners may have on this issue on our selection of sources or on our analysis of
these sources. It is widely acknowledged that there is no single definition of security in the
literature2 beyond the very basic fundamental notion that security is about warding off (se) security
threats (cura things we care or worry about)3. It should therefore not come as a surprise that
even within the ETTIS Consortium, we discovered early on that there was much definitional
uncertainty and even disagreement about the concept of security. What exactly do we mean by
national, societal, human; internal vs. external; defence vs. homeland; military vs. civil,
stovepiped vs. comprehensive and what do these different meaning imply for ETTIS research
focus? Partners sometimes use different terms for similar concepts, sometimes also use similar terms
with different meanings, and almost invariably have different security taxonomies in their minds.

The same definitional dissonance also applies to the concept of societal security, which is really at
the heart of the ETTIS project. Since the purpose of this chapter is to analyse how different countries
look at societal security, we had to decide which documents to include or exclude in this analysis.
And here we found two different views about what societal security means which had different
implications for the set of documents to be analysed.

Some partners (see Figure 1Error! Reference source not found.) juxtapose societal security to on
the one hand national security (by which they tend to mean official, governmental) and on
the other hand human security (focusing on the individual level). In their view, societal security
focuses specifically (and exclusively) on the level of society, although they then often still define
those societies in political terms: how to protect not political entity (a country, the EU,) from
harm, but that political entitys society or the different societal groups that encompass it. This view,
however, could then be taken to explicitly exclude traditional national security concerns like
defence or even homeland security from any discussions about societal security. It was unclear
what evidentiary basis could be assembled that would allow us to distil different views about what
societal security, thus defined, means in different societies.

2
See also the discussion on definitions in the chapter in this Work Package on academic views of security.
3
We note that the etymologies of the word security and defence (from de in the sense of away and fendere meaning
to ward off) are remarkably close to each other, even though they have historically diverged in different directions.

7
Figure 1: Societal security as a separate level of analysis

Other consortium partners tend to use societal security as the new overarching and central concept
of security efforts at all levels (Figure 2).

Figure 2: Societal security as an overarching concept

In this view, security is no longer viewed (at least in some parts of the world, and especially in
Western Europe) as primarily a national/territorial concept (national security), but increasingly as
primarily a societal one: what is to be protected is not so much a political entitys territory any more,
but its society as the aggregation of all the individuals (and the different groups of individuals) that
inhabit it. Security is in jeopardy when the fabric of a society starts disintegrating to such an extent
that it can lead to large-scale societal disruption and even violent conflict. Thus, national security
becomes essentially co-terminous with societal security. It is still seen to have an internal (threats
from within that society) and external (threats from outside that society) dimension, although there
is a growing consensus that these two have become so intertwined and that they are hard to
separate. Within the external dimension of societal security (i.e. when societies get disrupted
elsewhere, leading to potential threats also to ones own society as in the case of the nexus
between failed states and global terrorism), this view distinguishes primarily on the basis of the

8
instruments of statecraft that can be applied to such external security problem (i.e. military vs. non-
military). Within the internal dimension of societal security, they tend to differentiate between on
the one hand what are seen as major man-made security issues such as terrorism (including
home-grown) as well as large-scale natural disasters or accidents which (at least in some countries)
are labelled homeland security, and on the other hand all other security issues that may arise
in societies..4. In this view and contrary to the view that sees societal security as a separate level of
analysis an analysis of how countries view societal security thus defined would have to include all
high-level documents in which a political entity defines what it means by its security i.e. including
security, defence, whole-of-government, homeland security and any other high-level policy
documents.

Since this chapter focuses on how countries as well as the EU itself define security, we decided to
essentially opt for the second, overarching definition of societal security and to let the highest-level
security documents from those countries speak for themselves. We emphasise that this does not
necessarily imply that this is the terminological hierarchy that will be used throughout the ETTIS
project. It only means that for this chapter, we thought it would be disingenuous to exclude those
dimensions of security that for better or worse still absorb the bulk of the national security elites
attention (and resources including in R&D). We hasten to add that this choice was also inspired by
pragmatic considerations, since the team could not identify a set of comparable documents that
could be collected and then analysed reflecting the separatist definition of societal security.5

In this chapter the ETTIS team surveys and assesses different conceptualisations of security by
examining official perspectives on concepts of security at both the national and the EU-level. We do
so by taking stock of the highest level security strategy documents across the entire security
spectrum issued by a limited set of countries and the EU itself. These documents include
(comprehensive) security strategies and reviews; security and defence strategies and reviews;
defence strategies and reviews (with a link to national security); homeland security strategies and
reviews; civil security strategies and reviews (if available at the national level); and crisis response
and management strategies and frameworks.

While official strategic security documents selected on the basis of these criteria may not reflect the
full spectrum of views voiced in overall official security discourses, they do comprise the final
crystallisation of a variety of national views into the official policy as determined by that political
entitys legitimate leadership. Such high-level documents also provide the high-level guidance to
which actual security policies (and budget allocations) often at lower levels adhere. In most cases,
official strategies appear infrequently and are the pice matresse of any administration. Not only do
these documents epitomise the substantive views of the administration in power; they also tend to
reflect a solid (and generally, but not always, slowly evolving) national notion of security rather than
a swiftly passing fad. Any findings that emerge from an analysis of these high level national security

4
It is interesting to note that in most countries, the lines between these various dimensions of security are often drawn
more intuitively than explicitly. If we were, for instance, to use the criterion of the amount of people within a
country/society who die from certain causes, then traffic accidents or cardiovascular disease would rank significantly higher
in terms of security relevance than many topics that are currently viewed as national security threats.
5
We thank one anonymous reviewer for his/her critical observation.

9
policy documents have therefore greater applied policy relevance. They represent different national
takes on various concepts of security, including definitions, dimensions, sources and strategies.6

In tracing the concepts of security, we have selected besides the EU itself as a political entity a
sample of eight countries (see Table 1 below) both from within and outside the European Union
(hereinafter: EU). The selection took into account the expertise of the ETTIS-consortium partners as
well as the availability of documents. The first selection was based principally on a European
geographical focus. The ETTIS team has sought to ensure a fair representation of EU countries by
geographical distribution (i.e., North, South, West, East), size (both in terms of GDP and population)
as well as power (i.e., military and economic). We therefore included the following countries in our
sample: France, Italy, Sweden, The Netherlands, and The United Kingdom (hereinafter: UK). To these
EU countries, we added Ukraine as a Central or Eastern European nation (and an EU border state).
Ukraine was also expected to provide valuable insights given its pivotal geostrategic position on the
Western-Eastern axis, as well as its previous experience with societal, ecological and health disasters
(i.e., Chernobyl). Finally, we decided to also include Russia and the United States (hereinafter: US) as
a descendant and a current and great power, whose concepts of security will, one way or the other,
enrich our analysis and be of relevance to European security.

France

Italy

Sweden

The Netherlands

The United Kingdom

Ukraine

Russia

United States

European Union
Table 1: Selection of eight countries and the EU

We have selected strategic security policy documents published in the post-Cold War era, from the
early 1990s until the most recent date available. Indeed, the last two decades have been particularly
rich with regard to the transformation of both national and international security concepts as a
consequence of ongoing and ever more rapid changes in the world around us. The list is long and
diverse: the collapse of the Soviet Union followed by the transformation and reconstruction of entire
regions within Europe and the further integration of the EU; the 9/11 terrorist attacks and the
ensuing policy responses that shaped the security environment of the 2000s; the emergence of new
(IC) technologies and the increased interconnection of cultures and identities on the planet; the

6
We restricted our selection criteria purposively to these high level documents, and will therefore not consider presidential
statements, annual budgets, governing coalition agreements etc. etc.. Interesting as these may be, we expected that such
an analysis would require a multi-year research effort, for which the consortium did not have the resources.

10
recognition of climate change and its effects as a global rather than a local problem; and, parallel to
the rise of Asia, the ever closer interdependence of the global economy with both positive and
negative impacts - the latter finding its most striking illustration in the global financial and economic
crisis that started in 2008. Especially over the past few years, the notion that complexity and
uncertainty are core features of the world we are living in, has been slowly gaining ground amongst
policy makers.

Given our decision to only consider high level policy security documents there is a clear bias in our
sources in favour of national and defence perspectives. The European Union itself remains a
relatively new and modest (albeit ascendant) player in the security field, with the Member States still
firmly in the driving seat and very reluctant to delegate competencies in this field to the European
Union. And at the national level, it is only in recent years that the defence-dominance of the security
discourse has started to be counterbalanced by the emergence of broader strategic security
documents that more specifically include internal and civil security aspects.7 This is surprising
because since the early 1970s, liberal theorists came up with the concept of 'societal security', which
aims at a situation where citizens can live together in peace and freedom and where productivity and
prosperity are possible (Waever 1993; Keohaene and Nye 1977). The concept of 'human security',
which has been discussed since the 1990s, represents a further step. This concept focuses on the
human individual as an object of reference (Beitz 1979; Douyle 1983; Pogge 2001). We will return in
our conclusion to this tendency in strategic security planning to focus heavily on defence and hard
security issues (national security planning), leaving a gap (or a gaping hole) for strategic societal
security planning.

2.2 Method and Sources


In this first part, we examine for each of the eight selected countries and for the EU how official
concepts of security, including definitions, dimensions, sources and strategies, have evolved over
time. On the basis of a first analysis of the strategic security documents, we identified a preliminary
set of parameters for each of these four categories (e.g., what are the main aspects that seem to
differ across the political entities) which would allow us to systematically compare or benchmark
the substance of definitions, dimensions, sources and strategies of security.8 In a second iteration we
aggregated and clustered these initial parameters to prevent duplication. These parameters were
defined as continuous scales running from one extreme to another (e.g., low-high), with (0)
representing the lowest and (100) the highest score. While in some cases, this comes at the cost of
simplifying reality, it provides the benefit of rendering national characteristics readily and intuitively
understandable. We then analysed and scored the national security documents across the four
categories, distinguishing between the period until 1999 and the period from 2000 on. The results of
this benchmark will be presented visually, as shown in the example below (Error! Reference source
not found.). A qualitative analysis supporting the scores attributed to each country accompanies
each parameter assessment. Whilst these country scores have been provided by country and security
specialists, they have neither been validated in follow up expert sessions nor checked for inter-coder
reliability. Because of their inherent subjectivity, they should be taken as tentative results and used
as a starting - rather than an end point, to facilitate further strategic discussion.

7
Please refer to the Annexes, which provide an overview and concise analysis of the type of documents we have included in
our analysis.
8
Initially, we also sought to identify sources of insecurity, which provided additional information as to whether
certain dimensions of security were included and emphasised in the national discourses.

11
Figure 3: Example of the manually scored parameter within the category Definitions of Security in the
9
nineties and in the years 2000: Comprehensive security: Narrow versus Broad (10-100).

A total of twenty-two parameters were identified for the purpose of manual scoring, i.e., based on
the analysis of policy documents. In analysing these policy documents we relied on a close reading of
these documents and analytical expert judgment supported by the results of an automated text
mining analysis. The latter were yielded by processing the policy documents by Leximancer, a text
mining analysis software programme.10 These text mining results provided the analysts with a
number of key themes and concepts which particularly stand out in each specific national policy
documents. The text fragments of words that are associated with the term security also assisted the
analysts in identifying the context within which security emerges across the policy documents. The
text mining results included the following:

A so called concept map, that is, a visual representation of the main themes emerging from
each countrys policy documents, and their related concepts;
A document summarising the key themes and concepts in text format;
A concept map, showing how the theme security connects with other themes and concepts;
A document showing which words and names are associated with security (please see
Figure 4 for an example);
A document presenting the text fragments related to security extracted from the countrys
documents (e.g., all the parts of the texts that contain the word security).

9
A narrow definition of security is based on a limited set of policy parameters, for instance, if it is only based on military
dimensions of security. A broad or comprehensive definition of security is based on a broader set of dimensions,
including for instance health security.
10
For more information on the text mining process, please refer to the Methods and Sources section in the chapter
Concepts of Security in Academic Disciplines.

12
Figure 4: United Kingdom, text mined results: associations for the concept security

Figure 4 is an example of the associations in the UK policy documents set for the concept
security. It zooms in from the previous visual on the green theme (security) and also shows the
different associations between the concept security and the other (automatically generated)
concepts: both Names (i.e. named entities such as countries or organisations) and word-like
concepts (such as cyber or economic. If we look at the word-like concepts, for instance, we see
that the top two ones (agencies and national) are of little substantive interest, because they
are found in the compound terms security agencies and national security. But the third
concept, cyber, does indicate that cyber is substantively the most closely associated concept
with the concept security. It also provides two numerical values for that association (which are
normalised and can therefore be compared to the other sets):

the count: how often the concept occurs in the set of texts; and
the likelihood: essentially a measure of how closely the pair of concepts travel together
through the texts.

2.2.1 Structure of this Chapter


This chapter describes the ways in which definitions, dimensions, sources and strategies are
described in high level strategic security documents. It consists of seven sections.

Following the introductory `and the method and sources section, the third section investigates the
definitions of security by taking five different parameters into consideration. The first parameter
determines whether the definition of security is narrow or broad across high-level documents and
over time: the more dimensions security includes, the broader the definition. The second parameter

13
looks into whether the definition of security is hard or soft.11 The third parameter investigates
whether security is a national matter, or is perceived as global and indivisible. A fourth parameter
examines the extent to which security takes into consideration internal and/or external threats. The
fifth parameter considers the degree of emphasis placed on conventional and/or non-conventional
threats.12

Whereas the third section assesses the definition of societal security in general terms, the fourth
section dives into the different dimensions that are perceived to be part of societal security across
political entities and over time. The dimensions investigated are as follows: territorial security,
economic security, technology and information security, physical/health security, environmental
security, social and political stability, international law (or legal dimension). For each dimension, we
assessed the degree of emphasis on that particular dimension in national security policy documents
(i.e., low-high).

The fifth section investigates the nature of different sources of security that have been found across
national and EU policy documents over time. The selected sources of security have been merged into
higher level categories. For instance, national unity may be directly referred to in some documents;
yet other documents may include elements of national unity (e.g., common language, identity,
ideology or culture), thereby placing an indirect emphasis on this source. We have defined six
parameters for the sources of security: globalisation, economic development/growth, population
welfare and well-being, national unity, societal resilience and military power. For each source, we
assessed the degree of emphasis on that particular source in various high-level security policy
documents (i.e., low-high).

The sixth section aims to capture some of the defining characteristics of the strategies employed by
different countries and the EU. First, we examine the extent to which various security strategies are
conceived and formulated on a narrow or a comprehensive basis. Second, we assess whether
ambitions for international co-operation and multilateralism are viewed as an important objective.
The seventh and concluding section provides a synthesis of the main findings.

2.3 Definitions of Security


2.3.1 From narrow to broadened definitions of security
In recent years, and in most strategic security documents, definitions of security have broadened. In
addition to the traditional elements of security (e.g., territorial defence), increasing attention is paid
11
The terms hard and soft security stem from the debate on what security consists of. Within political science, hard
security is linked to the traditional or narrow view on security, which relates back to the realist schools of thought. (Neo-
)Realists (e.g., Morgenthau and Waltz) consider international relations to be fundamentally about power and security in
the relations among states (Terriff, T., Security Studies Today, Cambridge: Polity Press, p. 38). In this definition of security,
power is derived from ones ability to do physical harm to others (e.g., through the use of military force) and states are the
main actors in guaranteeing security (Ibid., p. 39). The idea of soft, or narrow, security was developed in the 1980s, and has
accompanied the progressive integration of a human security discourse into the realist national security discourse (see
McDonald, M., Constructivism, in Paul D. Williams (ed.), Security Studies: An introduction, 2008, New York: Routledge, p.
63). It has promoted a widening of the definition of security as to include economic, environmental and human security
(see for example Ullman, R.H., Redefining Security, International Security, Vol. 8, No. 1, Summer 1983), thereby
conceiving the existence of non-military threats. (see Bilgin, P., Critical Theory, in Paul D. Williams (ed.), Security Studies:
An introduction, 2008, New York: Routledge, pp. 90-92). For more background, see the Annexes for the analysis titled
Conceptual foundations of security in political sociology and critical security studies.
12
Conventional threats include CBRN weapons, the proliferation of WMD. Non-conventional threats include terrorism,
insurgency, subversion, drug trafficking, pandemics, cyber threats, and uncontrolled refugee flows/migration.

14
to novel aspects, including, but not limited to, economic, environmental, health, social and
technological security. This expansion started appearing in some of the national strategic security
documents in our set in the post-Cold War era; however, the further elaboration of a more
comprehensive definition of security has only been recently forthcoming, with a plethora of
additional dimensions entering definitions of national security in the first decade of this century.

It is interesting to touch upon the concept of human security more specifically, as since the
publication of the 1994 UNDPs Human Development Report, it has emerged as a new paradigm that
reflects new concerns of individuals that include economic security, food security, health security and
environmental security. There has been a growing interest in human security, with an attempt to
broaden security thinking from national security and military defence of national borders to a
people-centred approach which has become perceptible in policy documents. A number of sub-
dimensions of human security have been separately researched across the selected documents, e.g.,
economic security, especially because human security as such was more often than not, not explicitly
mentioned.
The French current (Fifth) Republic was established in an era (around the War in Algeria) when
internal and external security were perceived to be intricately interconnected - as also reflected in
the institutional setup of the countrys security sector. Furthermore, Frances special position within
NATO also led to a different and in many respect broader definition of security than in many other
European countries, although external threats (and economic security) still took centre stage for
most of the first decade of the post-Cold War period, as evidenced by the 1994 French White Paper.
The 2008 French White Paper, as one of the first ones in Europe, defines the integration of economic,
social, environmental elements as a basis to ensure security. In 2008, the aim of the French National
Security Strategy is to ward off risks or threats liable to harm the life of the nation.13 This suggests
more emphasis on the political, human and societal dimensions of security. According to the text
mining results, the French 2008 White Paper insists on the importance of a broad-based concept of
security,14 although it does not clearly list the new dimensions as observed, for instance, in the
Dutch policy documents (e.g., environmental). In Italian documents, the security landscape is
perceived as unpredictable and security threats are viewed as multilayered and complex.15 This
requires integration and coordination - not only of the traditional military and defence activities, but
also other initiatives of a political, diplomatic, economic, social, legal and informational nature.16
This attitude is further reinforced by the recognition that greater cooperation is needed among
traditional military organisations, civil authorities, private sector and third sector in order to cope
with civil risks and emergencies that can greatly impact the nation and the ability of Italian citizens to
go about their normal life.17 Due to the transnational and uncertain nature of security threats,
security in Italian views is seen as requiring multi-level actions with a variety of means, above all
more traditional-state centric responses, such as crisis prevention, management, post-conflict
reconstruction, peacekeeping and humanitarian missions.18Recent documents show a widening of
the security agenda with the inclusion of the economic, civil and environmental focus.19 However,

13
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008
14
Ibid.
15
Ministero della Difesa, Strategic Concept, 2005, pp. 25-26
16
Ibid., p. 32
17
Presidenza del Consiglia Dei Ministri, Law on the creation of the Italian National Civil Protection Authority, 1992, pp. 9-15
18
Ibid., p. 16
19
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, p. 48, 100-105

15
although new sources of insecurity are identified, traditional threats still remain a dominant feature
in the Italian security policy documents. Both the hard and soft dimensions play an important role in
the Italian security policy documents, although the traditional, hard dimension remains dominant.20
More recent documents have broadened the security agenda to include additional aspects of soft
security.21
Sweden, a country with a neutral tradition, holds a broad view on the definition of security based on
a wide spectrum of threat scenarios. The Defence Commission states in the report A More Secure
Neighbourhood - Insecure World (2003): the importance of a holistic approach to a capacity to cope
with the vulnerability of society and manage a broad spectrum of security tasks ranging from crises in
peacetime to full-scale war.22 The Swedish civil security documents also stress a broad range of
security elements, for example environmental problems, social division, spread of transmissible
diseases, information and technology security.23
In Dutch policy documents, strong emphasis is placed on including different dimensions of security.
For instance, the 2007 Dutch National Security Strategy24 defines national security broadly as
anything that could jeopardise the vital interests of the country and/or society to such an extent that
it could lead to societal disruption. Vital interests are defined in 5 categories of security: territorial
security, economic security (undisrupted trade), ecological security (living environment), physical
security (public health) and social and political stability (e.g., respect for core values such as freedom
of expression). The Various threats such as bird flu, climate change and terrorism are strongly
emphasised in the 2007 Dutch National Security Strategy.25 In Dutch views, it is specified that the
term national security encompasses both security and safety. The 2008 Future Policy Survey
(Verkenningen), a bottom-up defence review focusing primarily on defence but conducted by the
Ministry of Defence together with 4 different departments (Foreign Affairs, Interior, Justice and
Finance) also presents an integrated strategy, in which multiple dimensions of security are explored.
The human element has thus been progressively integrated as part of the definition of security in
Dutch policy documents, which define human security as security, stability and prosperity26 as
well as the welfare of individual citizens.
Since 1998, the UK has adopted a broad and comprehensive view of security, both on the threat side
and on the solutions side, cutting across departmental lines and traditional policy boundaries. This
implies no distinction or prioritisation between soft (such as economic, social and civil) and hard
security threats (including military), between domestic and foreign policy, and among public, private
and third sectors.27 In more recent years, the British security agenda has gradually enlarged to
include new emerging threats (such as cyber threats). The UK has experienced a gradual enlargement
of the scope of national security leading to a highly comprehensive security strategy, where greater
importance is given to new attributes, from strictly military, territorial and political to the impact of

20
Ibid., p. 16
21
Ibid., p. 48, 100-105
22
Swedish Ministry of Defence, A More Secure Neighbourhood Insecure World, 2003, p. 19
23
Swedish Ministry of Defence, Cooperation in Crisis for a more Secure Society, 2006, p. 8; Swedish Ministry of Defence,
A strategy for Sweden's security (summary), 2006, p. 3
24
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007, p. 16
25
Ibid., p. 11
26
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
27
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998, p. 5-7; UK Cabinet Office,
The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 8

16
economic growth, illegal immigrants, illicit goods and organised crime health-related risks,
environmental hazards (natural disasters, climate changes), cyber security threats, resources, social
and demographic trends and fast pace in technological developments. In addition the view that
security should also encompass the prevention and management of instances of possible major
accidents, such as natural hazards and malicious attacks that are deemed likely to happen and could
cause significant damage to human welfare in the UK has also emerged as a key feature of British
stand on security.28 However, notwithstanding this enlargement, hard aspects still remain an
important factor within high-level British policy documents..29
In 2003, the member states of the EU adopted the European Security Strategy (ESS) A secure Europe
in a Better World. The strategy outlines how the European security arrangement has changed over
time and identifies common threats to European security and how they should be addressed. It
recognises that in the post-cold war environment internal and external security threats are closely
linked and cannot be addressed in separation from each-other. The key threats that are identified
are: Terrorism, Proliferation of Weapons of Mass Destruction, Regional conflicts, State failure and
organised crime. The ESS further highlights that these threats are often if not interdependent very
closely linked and hence appear as more diverse and less visible than before.30 In this sense the EU
(fairly early on) broadened its views on the external dimension of security. A similar trend can be
discerned in the EU Internal Security Strategy in Action (ISS) which also identifies several critical
challenges to EU security.31 It highlights organised crime, including trafficking in goods and humans,
money laundering, dumping of waste, as an area in which security is threatened. Another urgent
challenge mentioned also in ISS is the threat from terrorism where the communication points out the
Madrid in 2004 and London bombings in 2005 as concrete examples in which this has threatened
citizens in the EU. Cybercrime and attacks against critical infrastructure, including the possibility of
criminal elements taking advantage of modern technologies to harm European cities and population,
are also recognised as growing threats to security in various documents.32 With a common external
border the EU it is also recognised that the EU is vulnerable to smuggling and other cross-border
illegal activity that must be prevented in a coherent manner. In line with the ESS the ISS also identify
an increase of natural and man-made disasters in Europe and in the neighbourhood that needs to be
tackled jointly. The inseparability of internal and external security threats is as in the ESS also brought
up as a critical factor in understanding EU`s security in ISS.33
Both Ukrainian definitions of security described in the 2007 and 2010 outline, in accordance with
the law, the general principles, priority goals, tasks and mechanisms for protecting the vital

28
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012, pp. 1-2
29
UK Homeland Government, Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review, 2010, p.
52; UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, pp. 17, 31
30
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
31
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010
32
Ibid.; European Commission, Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness,
security and resilience, Communication from the Commission to the European Parliament, the Council, the European
Economic and Social Committee and the Committee of the Regions, COM(2009) 149 final, Brussels, March 30, 2009;
European Commission, Towards a general policy on the fight against cybercrime, Communication from the Commission to
the European Parliament, the Council and the Committee of the Regions, COM(2007) 267 final, Brussels, May 22, 2007
33
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010

17
interests of individuals, society, and the state;34 these three entities - individual, society and the
state - also appear in Russian policy documents. In the 2007 and 2010 National Security Strategies,
the human, societal, environmental, demographic, democratic, economic and technological
dimensions of security are mentioned. For instance, according to the 2007 National Security Strategy,
the relative weight of soft-security (political, economic, social, energy, environmental, information,
etc.) components of its maintenance is growing.35 The 2010 document identifies the need for a
particular consolidation of the economic and environmental security.36 The 2007 document defines
security as depending on the creation of safe conditions for human life, in particular in the creation
of environmentally and technically safe conditions for the life of society.37 In addition, the social
dimension of security is emphasised: the rights of Ukraines various territorial communities, societal
segments, and ethnic groups [must be] fully respected.38
The 1997 and 2009 Russian National Security Strategies both aim to ensure and safeguard national
security by protecting the individual,39 society, and the state in all spheres of life: for instance, in
the spheres of economic, foreign, and domestic policy, public security and law and order, defence,
and the information and other spheres.40 In 2009, this can be achieved through the use of various
tools: national security organs, forces, and systems implementing measures of a political, legal,
organisational, economic, military, and other nature.41 The 2009 document appears less military-
oriented and adopts a more balanced approach to the scope of security dimensions. Its main
priorities are national defence, government and public safety.42 In addition, it takes a wide view of
security, with chapters focusing on both national and international security from a military
perspective, as well as from other perspectives: social security, the welfare of citizens, the economy,
science, technology, education, health care, culture, and the environment.
The definition of security as conceptualised in the United States documents is quite broad, although
until recently, it was mostly based on economic security (in particular economic freedom), universal
and normative values. The 1995 National Security Strategy of 1995 elaborated on the purposes of
general welfare, secure the blessing to ourselves and our posterity, as well as to bolster Americas
economic revitalisation, and to promote democracy abroad.43 The policy documents of the 2002
National Security Strategy reflected the post 9/11 change: History will judge harshly those who saw
this coming danger but failed to act.44 The same document stated that the aim of this strategy is to
help make the world not just safer but better. Our goals on the path to progress are clear: political
and economic freedom, peaceful relations with other states, and respect for human dignity.45 The
US definitions prior to the 2004 National Security Strategy mentioned health security, although the
risk areas were mostly developing countries; internally, health mostly referred to reproductive health
or the access to affordable health care services. A similar observation can be made with regard to

34
National Security and Defence Council of Ukraine, National Security Strategy, 2010. A similar statement can be found in
the 2007 National Security Strategy of Ukraine, p. 1.
35
Ukrainian Ministry of Defence, National Security Strategy, 2007
36
National Security and Defence Council of Ukraine, National Security Strategy, 2010
37
Ukrainian Ministry of Defence, National Security Strategy, 2007
38
National Security and Defence Council of Ukraine, National Security Strategy, 2010
39
As underlined in the 2009 National Security Strategy, especially children and adolescents.
40
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
41
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
42
Ibid.
43
The White House, National Security Strategy, 1995
44
The White House, National Security Strategy, 2002
45
Ibid.

18
environmental security, although it remains barely emphasised until the publication of the 2010
National Security Strategy. Across the homeland security documents, security is perceived as based
on the fight against terrorist attacks. In both 2002 and 2007, the definition is as follows: Homeland
security is a concerted national effort to prevent terrorist attacks within the United States, reduce
Americas vulnerability to terrorism, and minimise the damage and recover from attacks that do
occur.46 In 2010, this definition is progressively enlarged to additional issues such as that of privacy
or globalisation: A safe and secure homeland must mean more than preventing terrorist attacks
from being carried out. It must also ensure that the liberties of all Americans are assured, privacy is
protected, and the means by which we interchange with the worldthrough travel, lawful
immigration, trade, commerce, and exchangeare secured (...). Hurricane Katrina, widespread
international cyber attacks, the expansion of transnational criminal activities, and H1N1 influenza are
examples of threats and hazards that are central to homeland security, requiring an equally wide
variety of capabilities to address them.47
We therefore also here see a broadening of the security concept across various official US
documents.

2.3.3.1 Parameter: Narrow versus broad, comprehensive security

We assess the selected countries based on the following scale:

No assessment possible (0) Narrow definition of security (10) Broad, comprehensive


definition of security (100)48
A narrow definition of security is based on a limited set of policy parameters, for instance, if it is
only based on military dimensions of security. A broad or comprehensive definition of security is
based on a broader set of dimensions, including, for instance, environmental or health security.

Country Score 1990s Score 2000s

France 50 90

Italy n/a 70

Sweden 70 90

Netherlands 40 90

United Kingdom 70 90

European Union 60 100

46
The White House, National Strategy for Homeland Security, 2002, p. 2; The White House, National Strategy for Homeland
Security, 2007, p. 3.
47
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010
48
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

19
Ukraine n/a 90

Russia 40 90

United States 60 90

Table 2: Scores per country over time

Figure 5: Narrow versus broad, comprehensive security; cross-country comparison in the nineties and in the
years 2000

2.3.3.2 Parameter: Hard versus Soft security49

We assess the selected countries based on the following scale:


No assessment possible (0) The definition of national security focuses on hard security aspects
(10) The definition of national security focuses on soft security aspects (100); the definition of
national security focuses on both hard and soft security aspects: 50.50

Country Score 1990s Score 2000s

France 40 70

Italy n/a 60

Sweden 60 80

Netherlands 30 80

United Kingdom 50 70

49
The definition of these terms was provided earlier in Section 2.2.1.
50
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

20
European Union 60 90

Ukraine n/a 50

Russia 50 60

United States 60 50

Table 3: Scores per country over time

Figure 6: Hard versus soft security; cross-country comparison in the nineties and in the years 2000

2.3.4 Focus on internal versus external threats


An analysis of the policy documents renders clear that national policy documents have come to
increasingly recognise the connection between internal and external security influences in the first
decade of the years 2000 with, naturally, some degrees of variation amongst the national policy
documents.
Throughout the 1990s, France did not put much emphasis on domestic instabilities. In the 1994
White Paper, the definition of security is mostly focused on external threats, although the results of
the text mining analysis emphasise a link between internal and external (or outside), by selecting
fragments of texts such as internal security and safety outside are more closely related.51 The text
mining software also identified similar ideas in the 2008 White Paper, with additional emphasis. For
example: The traditional distinction between internal and external security is no longer relevant.52
According to Italian policy documents, security requires not only static homeland defence but the
ability to deal with external threats whenever and wherever they occur since these threats have an
impact on national safety.53 The link between internal and external security is recognised, although it
remains mainly limited to an inward perspective. External threats are seen as potentially impacting
national interests and for this reason they need attention. However, they are not perceived as
directly embedded in the nature of Italian security. This can be regarded as a mild form of
internationalism.

51
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994
52
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 55
53
Ministero della Difesa, Strategic Concept, 2005, p. 10

21
On the one hand, Swedish municipalities have key role in emergency management. The
municipalities have to conduct risk and vulnerability analyses prior to and during exceptional
circumstances in peace time.54 The local focus begets a stronger emphasis on internal threats. One
the other hand, there is clear focus on indirect external threats, such as international conflicts, where
Sweden should actively support with peace-promoting and humanitarian operations to enhance
security.
Dutch national policy documents have evolved towards a similar perception that the notions of
external and internal security have been increasingly interconnected. The 2007 National Security
Strategy identifies the need for a coherent, comprehensive approach, as the threats to our security
are changing and becoming ever more intertwined.55 However, this document remained primarily
focused on the internal aspects of Dutch security policy. The 2008 document appears as the first
comprehensive strategy or policy aiming at considering both external and internal aspects of national
security; for instance, domestic political unrest combined to a Russian sense of failure could
affect the NATO members and the EU.56
United Kingdom documents depict the UK as one of the most open societies in Europe and therefore
highly influenced by external trends and developments. In British policy documents, the internal and
external dimensions have been consistently viewed as closely connected and therefore part of a
single concept of national security. However, the ability to influence events abroad (global reach) in
order to protect internal security, has been deemed to become more and more important in more
recent years. This is due to power shifts in the global balance of power, increasing power
competition in world affairs and the recognition that potential causes of hazards and malicious
attacks may be located overseas.57
EU policy documents reflect the increased merging of the internal and external levels of security, as
they are increasingly seen as interconnected and part of a continuum. Threats to internal security, be
it terrorism, drug trafficking or organised crime, are seen as originating from the outside, thus
justifying the EUs engagement with third countries worldwide in order to curb these threats.58 On
the other hand, external policies, and notably military interventions, are increasingly justified with
direct references to internal security, such as the NATO operation in Afghanistan. The Commissions
Strategy on the external dimension of the area of freedom, security and justice underlines that (t)he
projection of the values underpinning the area of freedom, security and justice is essential in order to
safeguard the internal security of the EU.59 Likewise, already the draft Internal Security Strategy of
2010 stresses that: A concept of internal security cannot exist without an external dimension, since
internal security increasingly depends to a large extent on external security.60 Furthermore, by
merging the internal and external security sectors, by letting security agents traditionally associated
with the internal level act externally, and vice versa, there is a willingness to increase the capacity of

54
Swedish Ministry of Defence, Cooperation in Crisis for a more Secure Society, 2006, pp. 10-11
55
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007, p. 9
56
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
57
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 16; UK Cabinet
Office, National Risk Register for Civil Emergencies, 2012, pp. 2-3
58
European Commission, A Strategy on the External Dimension of the Area of Freedom, Security and Justice,
Communication from the Commission, COM(2005) 491 final, Brussels, October 12, 2005
59
Ibid, p. 3.
60
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010, p. 16

22
the EU institutions to be able to respond to the new threats and the multifaceted challenges
related to them and to ensure coherence and complementarity across the different levels of
security.61 However, European external and internal strategies are still formulated in two distinct
documents62 although the cross-references are numerous, to internal security in the external security
documents and vice versa. Finally, the EU is, in both its internal and its external actions, strongly
dependent on the subsidiarity principle, meaning that action including in the security realm
should be taken at the lowest level at which issues can be successfully tackled. The EU emphasises
that many security issues transcend national boundaries and therefore require broader multilateral
efforts. But it also acknowledges that Member States still have a key role to play in securing the
entire area and its citizens. Especially in the ISS, the EU has developed common practices for EU risk
and threat assessment. It also seeks to develop a coherent risk management policy that is intended
to link threat and risk assessment to decision making by 2014.63

As observed in other national security strategies, the Ukrainian strategic thinking is evolving towards
recognising that the distinction between internal and external aspects of security in the modern
world is reduced.64 Ukrainian definitions of security in the 2007 and 2010 national concepts aim to
protect the nation from both external and internal threats. Over time, the perception of external
and internal threats has shifted. In the nineties, threats to Ukraines territorial integrity came from its
newly acquired independence and its lack of international recognition. In recent years, these threats
emanate from internal instabilities as well, with the inefficiency of the state, the corruption of
officials, the sharpening conflicts in the area of political, economic, social relations,65 as well as
health issues. Internal economic and health-related perils (e.g., internal market, health) appear as a
priority, and become more pressing issues than the problem of accession to NATO: as a result,
internal problems must be first tackled by Ukraine itself, as NATO membership is not expected to
bring more political stability or eliminate corruption. However, similarly to Russia, external elements
also lead to increased internal threats: for instance, according to the 2007 National Security Strategy,
the dissolution of social values and national identity is even explained by negative foreign influence
on the countrys information space.
It is worth noting that the 1997 Russian national security concept identified threats mostly
emanating from internal (socioeconomic) instability, rather than external military threats: in 1997,
the internal situation was perceived as more insecure and chaotic. Nevertheless, both the 1997 and
2009 Russian National Security Strategies aim to protect national security from both external and
internal threats (military threats in the 2010 military doctrine66). It is worth noting that external
threat perception traditionally constitutes a crucial element across Russian policy documents and

61
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010
62
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010;
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December 12,
2003
63
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010, p. 14
64
Ukrainian Ministry of Defence, National Security Strategy, 2007
65
National Security and Defence Council of Ukraine, National Security Strategy, 2010
66
The 2010 Military Doctrine defines the military security of Russia as: a state of protection of the vitally important
interests of the individual, society, and the state against external and internal military threats associated with the utilisation
or threat of military force that is characterised by the absence of a military threat or by the ability to counter such a threat
(Russian Security Council, Military Doctrine, 2010).

23
reflects a traditional approach in the Russian security thinking. Indeed, the military threats from the
West and fears that Russia is surrounded by enemies are particularly emphasised across the
documents. The regional dimension is also present. For instance, the 2009 Russian document
identifies the rise of fundamentalist Islam in Chechnya and around Russia, as well as the expansion of
near-border states at different levels (economic, demographic, cultural, religious), which challenges
the security of Russia at its borders and in terms of regional influence.
The 1995 United States National Security Strategy - recognising that the end of the Cold War had
fundamentally changed Americas security imperatives as the central security challenge of the past
half century, i.e., the threat of communist expansion, was gone - defined the central goals of US
security: to sustain our security with military forces that are ready to fight, to bolster Americas
economic revitalisation, and to promote democracy abroad.67 After 9/11, the 2002 National
Strategy for Homeland Security adds: Americans have enjoyed great security from external threats,
with no hostile powers adjacent to our borders and insulated from attack by two vast oceans. Our
approach to security has had both external and internal dimensions.68 The 2010 Quadrennial
Homeland Security Review identifies a number of threats that are now crossing US borders,
suggesting an additional emphasis on internal threats: Transnational criminal organisations that
have expanded efforts to cross our borders with illicit goods, currency, and trafficked persons
represent a growing threat to the prosperity, security, and quality of life of U.S. citizens at home and
abroad.69 Therefore, although the international focus has not lost importance over time, one could
clearly recognise a shift to a more national focus.

2.3.4.1 Parameter: Focus on internal versus external threats

Based on the above description, this parameter assesses whether the definition of security includes
both internal and external threats, or integrates one type of threat more than the other.
We assess the selected countries based on the following scale:
No assessment possible (0) Focus on internal threats, domestic perils (10) Focus on both
internal and external threats (50) Focus on external threats (100)70

Country Score 1990s Score 2000s

France 60 80

Italy n/a 60

Sweden n/a 100

Netherlands 70 50

67
The White House, National Security Strategy, 1995
68
The White House, National Strategy for Homeland Security, 2002, p. 8.
69
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010
70
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

24
United Kingdom 80 50

European Union 60 50

Ukraine n/a 40

Russia 40 60

United States 80 50

Table 4: Scores per country over time

Figure 7: Internal versus external threats; cross-country comparison in the nineties and in the years 2000

2.3.5 Focus on conventional versus non-conventional threats


Terrorism, drug trafficking, organised crime, and the proliferation of weapons of mass destruction
(hereinafter: WMD) are consistently identified in all policy documents, since the nineties. However,
most of these threats have taken on a new dimension, in particular after 9/11. Over time, most policy
documents place additional emphasis on the rise of transnational threats. Non-traditional security
issues, originally recognised as being connected to traditional security issues, are also seen as
growing challenges.
WMD proliferation is also identified as an important conventional threat to security in all policy
documents since the nineties. The proliferation of WMD and more capable ballistic missiles in high-
risk nations or failed states (e.g., Iran, North Korea, and to a lesser extent, Syria and Libya in Dutch
views) are increasingly concerning for international security.
Terrorism is identified consistently over time in the French, British, Russian, US, and Swedish
documents. However, it is given a new dimension in recent years as it crossed a historical
threshold.71 In addition, an unpredictable terror attack on the national territory is seen as probable
in the documents published in the post 9/11 era. According to the 2008 Dutch Policy Survey,
international terrorism and international crime have become more intertwined.72 The perception
that organised crime and foreign terrorist organisations are on the rise also clearly appears in the
2009 Russian National Security Strategy and most Chinese documents. The long standing experience

71
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 27
72
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008

25
with Northern Ireland terrorism and Al Qaeda attacks on British soil render the UK very sensitive to
terrorist threats. Even if the British documents deem the risk of mass impact terrorist attacks as
being low, terrorism remains one of the highest priority risks and one of main types of civil
emergencies.73
Policy documents74 have recently emphasised the fact that migration, organised crime, drug and
human trafficking can be used to finance terrorist networks and activities, especially in the failed
states of Africa and Central Asia as described in the 2003 Dutch Prinsjesdagbrief. Failing states and
rogue states are identified as a growing issue.75
In most documents, non-state actors as well as civil risks and emergencies emerge as major threats in
recent years76 In Italian views however, the majority of threats to security - even those of
transnational nature- are still viewed as triggered or enabled by states. The only exception is for civil
hazards.
The global radicalisation of violence and the privatisation of armed violence also appear as new
major areas of concern in most selected national documents produced after 9/11, e.g., France or the
Netherlands. A new risk mentioned in the French 2008 White Paper and identified through the text
mining software, is the radicalisation of violence on a global scale, in particular emanating from the
Middle East.77 Radicalisation is also identified as a threat to security in the 2008 Dutch Policy
Survey,78 especially in countries with weak, vulnerable security institutions. Interestingly,
radicalisation and extremism are only occasionally mentioned and identified as enabling factors of
terrorism in the British documents.79 The most common non-conventional, internal threats to
Russian security are also separatism, religious and ethnic extremist minorities and radicalism. The
2010 US National Security Strategy insists on ideology as a danger to national security, as it has
given way to wars over religious, ethnic, and tribal identity.80
The importance of environmental issues appears in the most recent policy documents: they mention
the impact of global climate change, a phenomenon which has gained ground in the years 2000
within other national security strategies as well. Nuclear and radiation security were already
emphasised in the Russian national concepts and unsurprisingly, they are of particular importance to
Ukrainian documents.
Cyber threats are mentioned in most recent policy documents, except in Italian policy documents.
It is interesting to note that documents prepared after 9/11 exhume the expectation of the
unexpected. The 2008 French document foresees the plausibility of scenarios of strategic upsets
and surprises,81 e.g., an attack breaking the nuclear taboo. These surprises also appear in the
2008 Dutch Future Policy Survey, and are named strategic shocks.82

73
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012, p. 6
74
Ministero della Difesa, Strategic Concept, 2005, pp. 23-24
75
Dutch Ministry of Defence, National Defence Doctrine, 2005, p. 30; Dutch Ministry of Defence, Future Policy Survey
(Verkenningen), 2008
76
Presidenza del Consiglia Dei Ministri, Law on the creation of the Italian National Civil Protection Authority, 1992, p. 2
77
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008
78
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
79
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 28
80
United States, National Security Strategy, 2010, p. 1
81
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 56
82
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008

26
Italy appears to have a balanced focus on both conventional and non conventional threats. In recent
documents Italy appears to take a greater attention to non-conventional threats, above all the
economic ones.83
In Sweden, non-conventional threats have often been mentioned in connection with terrorist
attacks. The report Our military defence - commitment and choices notes that we must also have a
capability to prevent and to reduce the effects of an action using NBC weapons. The risk for large-
scale terrorism must be taken into account as part of the asymmetric threats that may be directed
against our country.84 Another example is found in the report A More Secure Neighbourhood -
Insecure World noting that The terrorist act on Bali on 12 October 2002, in which at least 190
people, including six Swedes, tragically died, underlined the recognition that this wider scenario of
threats transcends national borders. Such attacks - and the risk of terrorists using weapons of mass
destruction - demonstrate that the joint efforts to protect democracy and safeguard the openness of
our societies.85
In 2004, the Netherlands paid particular attention to a variety of threats such as the attacks of 11
September 2001 and its aftermath, the war with Iraq, avian influenza and the threat of the SARS
epidemic.86 Yet, it is considered that too much crisis management remains oriented towards the
classical disasters.87
Conventional threats are still deemed important and therefore requiring the United Kingdom to
maintain a minimum of credibility in relation to traditional capabilities.88 However, in more recent
documents non-conventional threats appear to gain a stronger attention. Indeed the combination of
conventional and non-conventional threats, which has occurred in recent years, appears to be the
most dangerous.89
EU policy documents also emphasise the challenges of non-conventional threats, as opposed to
conventional threats. The concept of new threats is used, and they are seen as located abroad,
being dynamic, proliferating if not dealt with soon enough (e.g. terrorist networks, state failure and
organised crime).90 This serves as a justification for early action and an active prioritisation of
preventive measures. While the ESS points out conventional threats such as weapons of mass
destruction and regional conflicts, it also points out non-conventional threats such as state failure,
organised crime, etc.91 This is also treated by the ISS which stipulates a common responsibility for the
four next years to fight and prevent serious and organised crime, terrorism, cybercrime,
management of external borders, and resilience to natural and man-made disasters.92 In 1999, an

83
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, p. 23-25; Foresec
Project (2008), Country Report on Italy, p. 13.
84
Swedish Ministry of Defence, Our Military Defence - Commitment and Choices, Ds 2003:34 (summary), 2003, p. 6
85
Swedish Ministry of Defence, A More Secure Neighbourhood Insecure World, 2003, p. 8
86
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
87
Ibid.
88
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998, p. 5; UK Ministry of
Defence, Delivering Security in a Changing World: Defence White Paper, 2003, p. 9
89
UK Homeland Government, Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review, 2010,
p. 52
90
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003, p. 7
91
Ibid.
92
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010, p. 2

27
important objective was already to combat trafficking in drugs and human beings as well as
terrorism.93 Another element often stressed in EU security policy documents, is the
interdependence between the multiple forms of threats. Thus, the best understanding of the security
picture is perceived to be through having an overall scope, a holistic approach. This has also become
an active policy, stressing how responses to these threats should be formulated. It has indeed been a
recurrent rhetoric in the last two decades to show that these threats cannot be responded to
individually, one by one, and that they have to be seen as part of a greater picture. Indeed, not only
are different threats interdependent among themselves, but threats cross borders, whether we
speak of conflicts and crisis as such, their effects (e.g., migrants and refugees) or transnational
networks of organised crime or other illegal activities. As the Communication from the Commission
on Conflict Prevention (2001) stresses , the dark effects of globalisation cannot be addressed by
individual countries through classic instruments of bilateral diplomacy, there is a need for new forms
of international cooperation to address these. Lastly, the idea of interdependence stresses the need
for more EU in Europe, as it shows that no Member State can face current security challenges alone
and that the only answer is more cooperation and coordination among the EU Member States and
the EU institutions.94
Over time, the United States policy documents have remained quite comprehensive in their
description of threats to national security. This is observed in the 1995 National Security Strategy:
We also face security risks that are not solely military in nature;95 transnational phenomena such
as terrorism, narcotics trafficking, and refugee flows are already attributed major security
implications. The same document identified spreading ethnic conflict and rogue states as posing
a serious danger to regional stability in many corners of the globe. In addition, the 2002 Strategy for
Homeland Security focuses on catastrophic threats, in particular that of terrorist attacks using
chemical, biological, radiological, and nuclear weapons requires new approaches, a focused strategy,
and a new organisation,96 although it also identifies different types of non-conventional threats such
as mass psychological disruption, contamination and significant economic damage.97 However
these are triggered by the aforementioned terrorist attacks; the document addresses terrorism as a
very specific and uniquely challenging threat.98 The 2007 Strategy for Homeland Security adds the
growing importance of single-issue groups that include white supremacist groups, animal rights
extremists, and eco-terrorist groups,99 as well as the growing risk of cyber attacks. The 2010 US
Quadrennial Homeland Security Review enlarges this focus with health risks:100 Pandemics, major
accidents, and natural hazards,101 as well as transnational crime 102

93
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
94
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010
95
United States, National Security Strategy, 1995, p. 8
96
The White House, National Strategy for Homeland Security, 2002, p. 8.
97
Ibid., p. 8.
98
Ibid. p. 5.
99
The White House, National Strategy for Homeland Security, 2007, p. 10.
100
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010.
101
Ibid.
102
Ibid.

28
2.3.5.1 Parameter: Conventional threats versus non-conventional threats

Based on the above description, this parameter assesses whether security, in the views of the
selected countries, includes both conventional and non-conventional threats, or integrates one more
than the other. Conventional threats include the traditional kinetic military weapons, but also CBRN
weapons.
Non-conventional threats include terrorist groups using CBRN weapons, the rise of hostile non-state
actors, insurgency, radicalisation, ethnic conflicts, subversion, drug trafficking, pandemics, cyber
threats, and uncontrolled refugee flows/migration.
We assess the selected countries based on the following scale:
No assessment possible (0) Focus on conventional threats (10) Equal focus on conventional
and non-conventional threats (50) Focus on non-conventional threats (100)103

Country Score 1990s Score 2000s

France 40 70

Italy n/a 70

Sweden n/a 70

Netherlands 40 70

United Kingdom 40 50

European Union 60 50

Ukraine n/a 70

Russia 70 60

United States 40 80

Table 5: Scores per country over time

103
n/a means that no document was published by the country in this period, or that the nature of the selected
document does not enable an assessment.

29
Figure 8: Conventional versus non-conventional threats; cross-country comparison in the nineties and in the
years 2000.

30
2.4 Dimensions of Security
2.4.2.1 Territorial security
Partially due to the emergence of globalising processes and the end of post-Cold War tensions, there
is a wide perception across Western European nations that their territories are no longer directly
threatened. National security is no longer limited to the protection of the national territory - yet
territorial security remains an element of all national policy documents and is consistently
reaffirmed. In general, territorial security appears to be based on more conceptual notions such as
the independence, freedom and sovereignty of the nation.
In French high-level policy documents, the first purpose remains the defence of the French
population and territory in both 1994 and 2008 policy documents. In addition, the text mining results
reveal that security appears to be connected to French and territory. These elements suggest that
the principle of territoriality in the sense of Westphalian sovereignty has remained present within
the French strategic culture over time. A striking feature in French strategic thinking is the
consistency of its posture with regard to sovereignty: France feels mostly safe and strong when its
sovereignty and independence are guaranteed. For instance, The 2008 White Paper indicates that
the loss of sovereignty seems to explain the fact that some nations are incapable of (...) ensuring the
security of their territory and their population.104 The French documents consistently recall the
traditional areas of national sovereignty as defined by De Gaulle with regard to the countrys
independence.105 These principles are maintained and reaffirmed in 2008, even though France was in
the process of reintegrating the North Atlantic Treaty Organisation (hereinafter: NATO). Freedom of
decision is of foremost importance. France defines its territorial security as depending on its nuclear
deterrent, to which the nation also refers to as a guarantee of sovereignty. As a result, territorial
security and sovereignty are inextricably linked in French views.
The 2005 Italian Strategic Concept underlines a supranational concept of security, which is however
still based on the traditional view of security as ensuring the integrity of the national territory. For
instance, the main objective of security in 2005 is to safeguard the integrity of national territory.106
This national focus is also underlined in the documents dealing with civil security. The emphasis here
is also centred on the protection of national assets, environment and life. No references to external
or interdependent forces are made.107 The risk of losing part of national sovereignty appears to be
balanced by the increased importance of common international rules and the role that Italy plays
within key international organisations, above all the EU.108 This has been consistent in the Italian
approach to security.
The Swedish report Our military defence - commitment and choices (2003) notes that although any
form of direct military attack on Sweden by another state is deemed to be unlikely within at least the
next ten years, it must be possible to respond to, combat and repel infringements of our territory

104
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 37.
105
Principles defined as: (i) complete independence of our nuclear forces ; (ii) French authorities must retain full freedom
of assessment, which implies the absence of automatic military commitment and the maintenance of assets allowing for
strategic autonomy in particular by increasing our intelligence capabilities; and lastly, (iii) permanent freedom of decision,
which means that no French forces will be permanently placed under NATO command in peace time (Prsidence de la
Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 304).
106
Ministero della Difesa, Strategic Concept, 2005, p. 15
107
Presidenza del Consiglia Dei Ministri, Law on the creation of the Italian National Civil Protection Authority, 1992, p. 2
108
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, p. 3, 4

31
and also to protect Swedish ships and aircraft on and above Swedish territory.109 The Swedish
standpoint is that the Swedish territorial integrity can be assorted by international co-operation; the
Government is anxious to intensify co-operation with the Nordic countries. This would strengthen
our ability to promote common interests and contribute to security and stability globally and in
Europe, but also in our immediate region and within our own territorial boundaries.110 The first
listed objective for Swedens total defence is to preserve the countrys peace and independence by
helping to manage and prevent crises in the world around us, followed by asserting Swedens
territorial integrity.111
The main aim of Dutch foreign, security and defence policy is to ensure the independence, integrity,
stability and welfare of the home nation, 112 and to protect society and citizens within Dutch
territory:113 these elements include the dimension of territorial security. In addition, in Dutch
strategic thinking territorial security includes maritime security, e.g., the security of sea lanes.114
Whereas a main objective of the other national strategies (e.g., that of France, or Ukraine) is the
defence of the national population and territory, Dutch documents place additional emphasis on the
defence of Allied (including NATO and EU) territory.115 In 2003, security remains defined and
reflected by an active involvement of the Netherlands in the development of countries outside
Europe - this vision differs from the Westphalian conception of security present in the French
documents. The security of the Dutch is also that of European citizens, justifying the presence of
Dutch armed forces at the international level.
Although protecting British territory is still an objective of security,116 since 1998 any immediate
major traditional threats to British territory has been deemed unlikely and the focus has been on
non-conventional117 and international threats. This stand has remained consistent within the British
policy documents.118 Territorial security is an important dimension, and sovereignty is traditionally
closely connected to it: protecting our () territory () from all major risks that can affect us
directly;119 UK sovereign territory. However, sovereignty as a concept related to British territory is
hardly mentioned in the majority of the documents. What is instead underlined is the potential
impact of sovereignty conflicts on Britain and the need to securing sovereignty on supply and water
routes.120 In more recent years, the need to maintain sovereignty of the armed forces has also been

109
Swedish Ministry of Defence, Our Military Defence - Commitment and Choices, Ds 2003:34 (summary), 2003, p. 6
110
Swedish Ministry of Defence, A Usable and Accessible Defence Force The Policys Orientation, 2009, p. 3
111
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy 20052007 (summary), 2004 ,
p. 10
112
Dutch Ministry of Defence, National Defence Doctrine, 2005, p. 35
113
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007
114
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
115
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007; Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
116
UK Homeland Government, Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review, 2010,
p. 15
117
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012, pp. 6-8
118
Ibid., p. 9
119
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010,
p. 22
120
Ibid., p. 30

32
emphasised.121 This underlines the emergence of a broader and globalised concept of sovereignty
which expands the boundary of sovereignty behind national territory.
The building down of borders inside the EU, and more specifically inside the Schengen area, has had
an important role for the European integration, but also the shaping of how European security is
understood and felt by European citizens and policy makers today. It created a common border of
the Union which both the ISS and the ESS suggests shall be protected in different ways. The ESS
particularly emphasises the importance of a friendly neighbourhood implying that the EU aims to
build a strong relationship with its neighbouring countries and assist them in achieving internal
stability.122 The ESS recognised that instability in the neighbourhood may have a negative effect on
EU`s security in terms of criminal elements, terrorist activists and illegal immigration spilling over into
the member states territories of the EU. The policy spelled out in the ISS focuses more on the
importance of an effective border control. It calls for joint operations between police, custom, border
guards and judicial authorities in combating organised crime, to dismantle criminal networks and in
regulating migration.123 A final point to be raised in this context that while not always stated
explicitly in policy documents the history of European integration itself was (and to a significant
extent remains as is also becoming clear in the recent troubles around the Euro) a security project
that tries to deal with security challenges by finding new ways to transcend traditional (industrial-
age) thinking about borders. In 1999, the issue of borders, thus territorial security, is already
mentioned in relation to the need for a consistent control of external borders to stop illegal
immigration and to combat those who organise it and commit related international crimes.124
Unsurprisingly, cross-border dimensions and issues are also dealt with. In recent years, territorial
security takes on a different meaning. The concept is strongly emphasised in 2008: we must be clear
that respect for the sovereignty, independence and territorial integrity of states and the peaceful
settlement of disputes are not negotiable.125 It is worth noting here that the sovereignty of member
states is acknowledged by the EU, although it is not systematically cited as a dimension of security. At
the same time, it is expanded beyond geographical borders: the necessary mechanisms must be put
in place to maintain high security levels, not only within EU territory, but also as far as possible when
citizens travel to third countries or find themselves in virtual environments such as the Internet.126

Similarly to Russia, Ukraine strongly emphasises over time the protection of its national territory,
borders, sovereignty - in particular with respect to internal affairs. The importance of territorial
security can be explained by the countrys geostrategic position which, although it does constitute a
strength as well, raised fears that Ukraine would become a buffer state. The main goal of Ukraines
security and defence policy is to maintain or to develop favourable conditions for advancing the
freedom, independence and prosperity of the state; protecting our national sovereignty, territorial

121
UK Homeland Government, Securing Britain in an Age of Uncertainty: The Strategic Defence and Security
Review, 2010, p. 30
122
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
123
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010, p. 5
124
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
125
European Council, S407/08 Report on the Implementation of the European Security Strategy: Providing Security in a
Changing World, Brussels, December 11, 2008
126
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010

33
integrity, inviolability of the States borders and preventing interference into internal affairs of
Ukraine.127 The prevention of external interference are therefore major tenants of territorial
security, similarly to Chinese views. Of foremost importance is to maintain an independent,
sovereign, democratic and united Ukraine.128
In Russian views, a constant dimension of security is territorial and refers to border control and
protection: the protection of the state border of the Russian Federation;129 the size of the countrys
territory is of special significance when resolving tasks linked with safeguarding the Russian
Federations national interests and security in the sphere of the defence and protection of its state
border.130 In both 2009 and 1997 Russian national strategies, a major concern is the emergence of
territorial claims on Russia, and national and regional separatism. Near-border conflicts are
reemphasised in 2009.
The United States always had a very strong emphasis on territorial security, both in the narrow and
broad definitions. After 9/11 in particular, there is a perception that American soil is not immune to
evil or cold-blooded enemies capable of mass murder and terror.131
The 2004 National Military Strategy established homeland security as the first priority of the Nation.
The 2010 National Security Strategy underline the efforts to integrate homeland security with
national security.132 Our national security begins at home. What takes place within our borders has
always been the source of our strength, and this is even truer in an age of interconnection.133

2.4.2.1.1 Parameter: Territorial security

Based on the above description, this parameter assesses the extent to which the definition of
security, in the views of the selected countries, puts emphasis on territorial security.
We assess the selected countries based on the following scale:
Limited emphasis on territorial security (10) Strong emphasis on territorial security (100); not
mentioned: (0).134

Country Score 1990s Score 2000s

France 90 60

Italy n/a 70

Sweden n/a 70

127
Ukrainian Ministry of Defence, National Strategic Defence Bulletin until 2015, 2004
128
National Security and Defence Council of Ukraine, National Security Strategy, 2010
129
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
130
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
131
The White House, National Strategy for Homeland Security, 2002, p. 1.
132
United States, National Security Strategy, 2010, p. 2
133
Ibid., p. 9
134
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

34
Netherlands 70 40

United Kingdom 40 40

European Union 60 50

Ukraine n/a 90

Russia 80 90

United States 80 100

Table 6: Scores per country over time

Figure 9: Territorial security; cross-country comparison in the nineties and in the years 2000

2.4.2.2 Parameter: Sovereignty

We assess the selected countries based on the following scale:


Limited emphasis on sovereignty as a dimension of security (10) Strong emphasis on sovereignty
as a dimension of security (100); not mentioned: (0).135

Country Score 1990s Score 2000s

France 100 90

Italy n/a 50

Sweden n/a 0

Netherlands 50 50

135
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

35
United Kingdom 30 50

European Union 0 20

Ukraine n/a 80

Russia 80 90

United States 70 70

Table 7: Scores per country over time

Figure 10: Sovereignty; cross-country comparison in the nineties and in the years 2000

2.4.2.3 Economic security


The economic dimension of security is traditionally, consistently emphasised across all policy
documents. However, the most recent national policy documents tend to focus on the international
nature of economy, in particular following the emergence of globalisation processes and the
outbreak of the global financial and economic crisis. In this context, most nations emphasise a
general degradation of economic security due to the interconnected, systematic and global nature of
economic risks. All selected countries increasingly integrate energy security as a dimension of
economic security.
Economic prosperity is a major dimension of security in the 1994 French White Paper. In this respect,
France reaffirms the French-German partnership as a priority, as French economic prosperity
depends on that of its neighbour, and economic growth is regarded as a chance.136 In the 2008
French White Paper, economic growth of emerging powers is mostly regarded as potentially having
disastrous effects on security.137 These effects which were not emphasised in 1994, namely: global
warming and degradation of the biosphere leading to major natural disasters and catastrophes, as
well as strains on natural resources and strategic raw materials.
The most recent Italian documents stress the greater importance of the global economic challenge.
Economic security, which is strongly related to fiscal stability, emerges as a pre-condition for national

136
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994, p. 11:
Progression de lintgration mondiale favourise par la croissance.
137
Ibid., pp. 24-25.

36
security.138 Economic competition, transnational economic crises and the future development of the
global economy have also been identified as important source of instability.139 The risk of economic
competition has been clearly linked to technology in the Italian documents. Although this threat has
not been individually highlighted, it appears from the document that economic competition is
described as a complex nexus of state power in the international economic system and internal
competitiveness, all driven by technology. In matters of energy security, it is important to note that
Italy is highly dependent on oil and gas, most of which is imported from the Middle East.
The selected Swedish documents convey a limited emphasis on economic security as a dimension of
Swedish national security. It is stressed, for instance, that measures are needed to strengthen the
capability to deal with threats against economic values.140
The Netherlands sees itself as a nation of merchants. As a result, it is not surprising that the
economic dimension is and has always been of primary importance across all Dutch policy
documents. The 1993 Dutch document already suggested that conflicts and tensions potentially
affecting the European security are not only of strictly military nature; they are also economic:
Security risks should be seen as part of a continuum of tensions starting with social and economic
difficulties and culminating in outright warfare.141 In the 2004 document, economic security is
defined as a vital security interest, which consist of, for example, the supply and maintenance of
infrastructure of transportation and telecommunications.142 The protection of the Dutch market
economy are specified in the 2005 definition,143 and the interests of Dutch businesses continue to be
emphasised over time. It should be mentioned that energy security - in particular energy supply
assurance - is also an important concern.144 In addition to energy security and the scarcity of metals
and minerals and the growing imbalance in the distribution of oil and gas reserves, the 2008
Future Policy Survey (Verkenningen) identifies the water as a growing cause for concern as well as
the pressure on strategic materials and resources.
Although some mentioning on the economic risk appeared in past British documents, the concept
was mainly related to external threats such as global poverty and inequalities, or the lack of
economic development and opportunity in the world peripheries.145 In more recent documents this
has taken a different meaning and the attention has moved to domestic economic trends and the
challenges facing advanced economies.146 Specifically, fiscal stability is necessary to ensure effective
foreign policy or strong defence without a sound economy and a sound fiscal position to support
them.147 As emphasised in the 2010 Strategic Defence and Security Review, our national security
depends on our economic security and vice versa. Competition over the access to natural resources
and access is not a new concept in British security, but it has taken on new proportions with the rise
of new global powers that control some of these resources.

138
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, p. 96
139
Ibid., p. 35-48
140
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy 20052007 (summary), 2004,
p. 29
141
Dutch Ministry of Defence, Prinsjesdagbrief, 2003
142
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
143
Dutch Ministry of Defence, National Defence Doctrine, 2005
144
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007
145
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 16-18.
146
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 14-16
147
Ibid.

37
One major reason behind the construction of the EU was of economic nature; it insures the co-
operation between member states in many aspects. Economic security can therefore be defined as a
major dimension of security in the EU perspective over time, e.g., a single market, economic and
monetary union is one of the major ingredients of a shared area of prosperity and peace,148
market economic principles,149 economic instruments serve reconstruction.150 The key EU
documents particularly emphasise the negative effects on the economy that the key security threats
may cause.151 In the ESS, globalisation is mentioned as a development increasing the vulnerability of
the EU in various fields including economic growth and prosperity. It also highlights the challenges
from widespread poverty in large parts of the developing world as a key challenge to be addressed
by the EU.152 Crime including organised crime is mentioned as another issue that may have
tremendous negative impact on the economic security of the EU. In 1999, economic security is
related to crime: the European Council () calls upon Member States to provide full mutual legal
assistance in the investigation and prosecution of serious economic crime.153 This is also mentioned
in the ISS which recognises the threat of organised crime and illegal economic activity may
undermine and threaten European industry.154 The EU hence sets out different measures and action
plans for protecting the economy against illegal activities.155 The protection of critical infrastructure
is indeed a central component of EU economic security which is seen to be threatened by attacks on
cyber infrastructure, water, energy and health facilities, etc. The policy preoccupation with
protecting critical infrastructure is first and foremost related to the threat of terrorist attacks. In
parallel to the objective of increasing the protection of critical infrastructure, there is the aim of
reducing vulnerabilities to attacks of the same infrastructure.156 These efforts are first and foremost
the responsibility of the MS, but the EU efforts are an important complement in a field with common
challenges among the different MS. The Council Directive of December 2008157 aims at identifying
European critical infrastructure in order to assess the need to improve their protection. European
critical infrastructure is first and foremost understood as comprised in the energy and transport
sectors, while the need to evaluate the inclusion of other sectors is underlined, and especially the
information and communication sector. The energy sector can include electricity generation by
nuclear power plants, but this directive excludes the specific nuclear elements, as they are covered
by other relevant nuclear legislation (treaties and Community law). European critical infrastructure is

148
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
149
European Council, S407/08 Report on the Implementation of the European Security Strategy: Providing Security in a
Changing World, Brussels, December 11, 2008
150
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
151
Ibid.; European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS),
Communication from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels,
November 22, 2010
152
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
153
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
154
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010
155
See for example, European Council, 2001/500/JHA Council Framework Decision of 26 June 2001 on money laundering,
the identification, tracing, freezing, seizing and confiscation of instrumentalities and the proceeds of crime, 2001
156
Council of the European Union, Council Directive 2008/114/EC of 8 December 2008 on the identification and designation
of European critical infrastructures and the assessment of the need to improve their protection, OJ L 345/75, December 23,
2008
157
Ibid.

38
thereafter defined as infrastructure of which destruction or disruption would have significant effects
in at least two Member States. Different criteria are singled out to assess the severity of impact of a
disruption or destruction of a given infrastructure, and include in the following order: (potential)
casualties, economic effects, and a public effect, assessed in terms of the impact on public
confidence, physical suffering and disruption of daily life; including loss of essential services.158

Economic prosperity remains an objective of national security in Ukrainian views over time. Both
2007 and 2010 Ukrainian national concepts focus on the economy, yet the 2010 document places
more emphasis on the link between economic development and democracy: it aims at realizing
interests of citizens, society and the state, and to promote Ukraines further consolidation as a
democratic country with a robust and growing market economy that is fully compatible with the
political and economic values and standards of Europe.159 The critical condition of the principal
production facilities also compromises the critical economic development of Ukraine. In addition,
energy security threats are increasing, worsened by Ukraines energy dependence on resources
import, the lack of power-supply sources diversification and the insufficient use of the national
energy potential. Indeed, the Ukrainian economy is based on an export-oriented primary product
model. This renders the country particularly vulnerable to external demand and to the impact of the
global financial crisis. Crime and corruption, including the criminalisation of the economy and
ineffective combat with the contraband, became a threat in the 2007 and 2010 Concepts (similarly
to Russian views). The foreign economic situation has had an excessive impact on national
economic security, and leads to the stagnation of the internal market.160
The economic nexus is strongly embedded in Russian national security; for example: the state of the
national security of the Russian Federation is directly dependent on the countrys economic potential
and efficiency of the system for national security.161 Major sources of insecurity emanate from the
economic sphere. This was already perceptible in the 1997 concept, in a context of national
economic restructuring: the critical state of the economy is the main cause of the emergence of a
threat to the Russian Federations national security.162 In the 2009 policy document, socioeconomic
development becomes as important as military security: imbalanced levels of development of
Russian regions163 constitute a major threat to national security. In addition, the national interests
are threatened by illegal phenomena such as crime and corruption. For instance: organised crime
(...) smuggling, and other illegal activities on a scale threatening the Russian Federations military
security;164 more specifically, the illegal trafficking in narcotic drugs and psychotropic substances,
weapons, ammunition, explosives substances.165 Russian policy documents insist on the variety of
economic threats, which have been taking on a new dimension with the integration of energy
insecurity, concerns over resource shortages, and the global financial crisis: the crises of global and
regional financial and banking systems, increasing competition for scarce raw materials, energy,
water.166 What is more, the aforementioned elements maintain an environment for corruption and

158
Ibid, article 3.
159
National Security and Defence Council of Ukraine, National Security Strategy, 2010
160
Ibid.
161
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
162
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
163
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
164
Russian Ministry of Foreign Affairs, Military Doctrine, 2000
165
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
166
Ibid.

39
criminalisation of the economic and financial relations, as well as illegal migration and the adoption
of discriminatory measures against Russia.167
In the United States high-level security views, there is a strong connection between national security
and economic prosperity. The 2001 Quadrennial Defence Review already mentioned it through an
international perspective: the history of the 20th century has proven time and again that Americas
security is linked directly to that of other nations, and that Americas prosperity depends on the
prosperity of others.168 Security is even defined by economic freedom, as shown in the 2002
Strategy for Homeland Security: Our countrys economy is based on a free market system
predicated on private ownership of property and freedom of contract, with limited government
intervention.169The 2011 National Military Strategy of 2011 further emphasises that our Nations
security and prosperity are inseparable.170 The 2010 Quadrennial Homeland Security Review adds
dimensions to economic security, including the dependence on fossil fuels and the threats of global
climate change.171

2.4.2.3.1 Parameter: Economic security

Based on the above description, this parameter assesses the extent to which the definition of
security, in the views of the selected countries, places an emphasis on economic security.
We assess the selected countries based on the following scale:
Limited emphasis on economic security (10) Strong emphasis on economic security (100); no
mentioned: (0).172

Country Score 1990s Score 2000s

France 80 80

Italy n/a 70

Sweden n/a 20

Netherlands 80 80

United Kingdom 50 100

European Union 80 90

167
Ibid.
168
Department of Defence of the United States of America, Quadrennial Defence Review, 2011, p. 1
169
The White House, National Strategy for Homeland Security, 2002, p. 8.
170
United States, National Military Strategy, 2011, p. 1
171
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010.
172
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

40
Ukraine n/a 90

Russia 90 90

United States 80 100

Table 8: Scores per country over time

Figure 11: Economic security; cross-country comparison in the nineties and in the years 2000

2.4.2.4 Technology and information security


The importance of technology as a dimension of security was widely acknowledged in the nineties.
However, as many other dimensions of security technology development have become even more
central both because of the ever accelerating technological developments in the security field but
also due to the potential dangers it generates: technological breakthroughs becoming accessible to
rogue states and hostile non-state actors. The rise of cyber threats is a particular concern in recent
years.
It should be mentioned here that the preparedness of nations to new technological threats, and the
importance of developing and using new technologies have become important sources of security. In
this respect, it is interesting to underline the contrast between the US on the one hand, and Ukraine
and Russia on the other. While the US has always emphasised their technological power and
capacities, both Ukraine and Russia seem to mostly insist on the risk of lagging behind in case
technology is not sufficiently developed.

In French views, national security has always been based on the pursuit of strategic and
technological autonomy centred on major projects exploiting disruptive technology (nuclear,
aeronautical, missiles).173 In particular, Frances independent nuclear deterrent illustrates the
successful achievement of this objective. The use of new technologies in operations, network
operations, cyber-defence and space must be systematically encouraged.174 Large-scale
technological accidents are mentioned in 2008 for the first time; as a result of the rapid pace of
technological change, France calls for expanded technical means to better ensure the security of the
country.175 In French views, the Internet has become crucial to our security. The Governments

173
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 251
174
Ibid., p. 85
175
Ibid., p. 127

41
technical capabilities in this sphere [should therefore] be strengthened.176 An interesting novelty
that can be found in the 2008 document is that urbanisation is mentioned as a potential factor of
technological risks. Technological breakthroughs are an important area of focus in the 2008 White
Paper, as they enable the emergence of new weapons, cyber-warfare, fabrication of ballistic missiles,
WMD proliferation and new applications from nano- and bio-technologies. In addition, the 2008
White Paper places emphasis on the strategic importance of outer space, as its offensive use
constitutes a major concern in 2008.177
In Italian views, new technologies are deemed to revolutionise forms of political, economic and
military competition, yet they also polarise political and social phenomena such as immigration and
illegal traffic and transnational crime.178 Simultaneously, technology is seen as paramount to
maintain competitiveness in the new emerging international power structure. In addition, the new
possibilities offered by technology are a chance, according to the 2005 Italian document.179
However, digital security does not emerge as a new dimension of security. The cyber threat is hardly
mentioned.
There is a strong emphasis on technology and information security across the Swedish policy
documents , particularly the need of new technology and new types of units to be able to address IT
threats.180
Digital security (digital lack of security181) or security in the virtual world, is identified as a new
dimension of security in both the 2007 Dutch Security Strategy and the 2008 Dutch Policy Survey.
Indeed, modern open societies are exposed to the risk that industrial interests or security interests
are damaged due to sensitive digital information sources and databases.182 According to the 2008
Dutch document, technology is both a source of security and insecurity to national security. In
particular, technological developments are expected to continue and create new opportunities but
also new dependencies and risks such as social dislocation.183
Information security is quite embedded to the British strategic thinking, and has been viewed both as
source of security and insecurity. The pace of scientific and technological innovation has been
identified since 1998 as a source of insecurity and is likely to continue to increase (...). Both state
and non-state actors will have access to a greater range of technology which can be used both to
protect and to attack national security.184 Technological development enables the emergence of
information warfare, pressures on the operational decision support systems, proliferation of
weapons of mass destruction, above all CBRN, new weapons and new applications both in military
and civil contexts.185 At the same time, modern UK national infrastructure, government and
business depends more and more on information and communications technology and particularly
the Internet.186 In recent years the emphasis has also enlarged to include cyber security.187 It has

176
Ibid., p. 127
177
Ibid., p. 135, 171.
178
Ministero della Difesa, Strategic Concept, 2005
179
Ibid.
180
Swedish Ministry of Defence, Our Military Defence - Commitment and Choices, Ds 2003:34 (summary), 2003, p. 4
181
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
182
Ibid.
183
Ibid., p. 24
184
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 16
185
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998, p. 15
186
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 29

42
been increasingly recognised as being of the highest priority for Britain. One reason lies in the full
integration of cyberspace into British economy and security. In addition, access to the Internet is
already viewed by many as the fourth utility, rather than a privilege.
In the EU context, consistent attention has been devoted to cyber security, in particular in the years
2000. European societies are increasingly dependent on electronic networks and information
systems, in and by themselves a form of critical infrastructure, and cyber security addresses the
threats targeting such systems, whether through attacks, viruses, phishing.188 The main tool to
address this at the EU level is through law enforcement cooperation among the Member States. In
addition, the necessary mechanisms must be put in place to maintain high security levels, not only
within EU territory, but also (...) when citizens (...) find themselves in virtual environments such as
the Internet.189 Public-private partnerships, as well as international cooperation are also set out as
central elements in a strategy to counter cybercrimes.190 The proposal for a Directive on attacks
against information systems introduces a novelty in the criminalisation of the use, production and
sale of tools to perpetrate cyber-attacks.191 The planned establishment of a European Cybercrime
Centre, within Europol, shows that information collection, in order to increase knowledge about the
threats, is seen as a strategic focus.192 Lastly, the EU also focuses on securing its own information
systems, where improving the EUs preparedness and resilience are placed as central priorities.193
Indeed, information and surveillance technologies are tools increasingly used by the EU in activities
such as border control (cf. proposed EU legislation on the collection of Passenger Name Records194)
and data storage of personal information, and have raised various concerns about the protection of
privacy and personal data, with notably the eventuality of this information ending up in the wrong
hands. The Internal Security Strategy of the EU stresses that (w)here efficient law enforcement in
the EU is facilitated through information exchange, we must also protect the privacy of individuals
and their fundamental right to protection of personal data.195

Information security is emerging as a major dimension of security in both 2007 and 2010 Ukrainian
national security concepts, and can be found across most Military Doctrines. Low scientific and
technological development leads to an underdeveloped national innovation system; the lack of
innovation translates into scientific brainpower going abroad (the so-called brain drain) and to the

187
Cyber risk is also mentioned in the UK National Risk Register of Civil Emergencies as an important type of malicious
attacks. UK Cabinet Office, National Risk Register for Civil Emergencies, 2012, pp. 51-52
188
European Commission, Home Affairs, Boosting Europes defences against cyber attacks, March 2012,
http://ec.europa.eu/home-affairs/policies/crime/crime_cybercrime_en.htm
189
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
190
European Commission, Towards a general policy on the fight against cybercrime, Communication from the Commission
to the European Parliament, the Council and the Committee of the Regions, COM(2007) 267 final, Brussels, May 22, 2007
191
European Commission, Proposal for a Directive of the European Parliament and of the Council on attacks against
information systems and repealing Council Framework Decision 2005/222/JHA, COM(2010) 517, 2010/0273, Brussels, 2010
192
European Commission, Tackling Crime in Our Digital Age: Establishing a European Cybercrime Centre, Communication
from the Commission to the Council and the European Parliament, COM(2012) 140 final, March 28, 2012
193
European Commission, Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness,
security and resilience, Communication from the Commission to the European Parliament, the Council, the European
Economic and Social Committee and the Committee of the Regions, COM(2009) 149 final, Brussels, March 30, 2009
194
European Commission, Proposal for a Directive of the European Parliament and of the Council on the use of Passenger
Name Record data for the prevention, detection, investigation and prosecution of terrorist offences and serious crime,
COM(2011) 32 final, 2011/0023 (COD), Brussels, 2.2.2011.
195
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS),
Communication from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels,
November 22, 2010, p. 3

43
increased scientific and technological dependence on other states.196 Recently, the most feared
threat with regard to technology, is the absence of incentives for innovation processes and dynamic
development of new technological patterns. Indeed, they result in the low competitiveness of the
national economy, hindering the increase of living standards and provoking increased social tensions
or protest mood spreading.197
In 1997, Russia already emphasises that in current conditions of universal computerisation and the
development of information technology the significance of safeguarding the Russian Federations
national security in the information sphere is growing sharply. This is of particular concern to Russia,
as the country recognises that it is lagging behind in terms of technological development. Science
and technology are mentioned as major guarantees of the Russian national security in 2009, and
must put up with a number of threats, namely: a gap in the transition to the next technological
system, the dependence on imports of scientific equipment, instruments and electronic components,
strategic materials, unauthorised transfer abroad of competitive domestic technologies,
unreasonable unilateral sanctions on scientific and educational organisations.198
Although the United States policy documents prepared in the nineties could already foresee the
importance of technology, the most recent US documents view technological development as a
major element of security with regard to the threats it is generating; for instance, Information
systems contribute to every aspect of homeland security;199 technology will continue to bring with
it new dangers and give rise to illicit trade.200 The idea that technology represents both a threat to
and a source of national security is well emphasised in recent US documents: the very technologies
that empower us to lead and create also empower those who would disrupt and destroy.201 In 2010,
safeguarding and securing cyberspace has become one of the homeland security communitys most
important missions.202
However, investing in technology appears as a promise for more security, more independence, e.g.,
with regard to energy, and is aimed to support the American leadership.203

2.4.2.4.1 Parameter: Technology and information security

Based on the above description, this parameter assesses the extent to which the definition of
security, in the views of the selected countries, places an emphasis on technology or information
security.
We assess the selected countries based on the following scale:
Limited emphasis on technology or information security (10) Strong emphasis on technology or
information security (100); not mentioned: (0).204

196
Ukrainian Ministry of Defence, National Security Strategy, 2007
197
National Security and Defence Council of Ukraine, National Security Strategy, 2010
198
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
199
The White House, National Strategy for Homeland Security, 2002, p. xi.
200
US, National Security Strategy, 2010, p. 13
201
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010.
202
Ibid.
203
Ibid., p. 27
204
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

44
Country Score 1990s Score 2000s

France 80 90

Italy n/a 30

Sweden n/a 90

Netherlands 60 80

United Kingdom 60 100

European Union 10 90

Ukraine n/a 90

Russia 70 90

United States 50 90

Table 9: Scores per country over time

Figure 12: Technology and information security; cross-country comparison in the nineties and in the years
2000

2.4.2.5 Physical/health security


One major novelty that can be observed across all recent policy documents, is the introduction of
health security as a major dimension of national security. This can be explained by the emergence of
new, global heath risks such as pandemics; health security has also progressively integrated food
security. It should be noted that originally, health security mostly referred to the resilience of social
security systems or mental health. For instance, in US views, global health was initially mentioned as
a major issue for the developing world, or referred to affordable health care and reproductive health.
In the most recent American and Western European documents, health security also referred to

45
major health hazards (e.g., pandemics) as domestic perils. . Interestingly, Ukraine and Russia have
mostly emphasised their respective internal health crises.

Health-related crises (including pandemics) and food insecurity are included in the French 2008
White Paper, contrary to the 1994 White Paper. These risks are perceived as taking on new
proportions which impact social and economic stability, as they could cause widespread social
disruption and disruptions in trade and business.205 Health threats to national security find their
origin in demographic patterns and the forces of globalisation, cross-border human movements, and
new pathogens.
Health or health-related crises are only briefly mentioned in recent Italian documents and deemed to
be the responsibility of international organisations (e.g., World Bank).206 Even in civil emergencies
related documents health risks or pandemics are not clearly mentioned. Instead the general terms
catastrophic events and other type of extreme events are used.207 Food security is not mentioned in
the Italian documents. The closer concepts to food that has been briefly underlined in more recent
documents are the concept of demographic trends and poverty. Reference is made to the problem of
population ageing in Europe and demographic growth in emerging economies.208
According to the Swedish government bill Cooperation in Crisis for a more Secure Society (2006), the
goal for Swedish security should be to safeguard the life and the health of the population.209 It has
been expressed that measures are needed to strengthen the capability to handle with threats against
the life or health of the population.210
Possible pandemics represent a new threat identified within the most recent Dutch documents.
Public health can also be threatened if there is a major breach of the dikes or an accident in a
chemical factory.211 Physical security is specifically referred to as a vital interest to security; public
safety (also called physical safety) means the protection of persons and things; for example, the
protection of health and the environment.212 Interestingly, the 2004 document quite uniquely
mentions the scarcity of certain vital resources: allocation of scarce expertise and resources in
Europe, as common stocks (vaccines, iodine tablets).213

Heath security has been mentioned in the majority of British documents; in particular, they include
large scale health accidents and pandemics (above all influenza and new emerging infectious
diseases, regarded as the most likely risks in the British context). 214These threats have been
gradually deemed to produce a greater impact on the ability of the British public to go about their
daily lives, as well as on the vitality of British economy.215 Food security has been viewed as an
important consequence of social and demographic global trends. Competition on food resources and

205
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 53
206
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, p. 47
207
Presidenza del Consiglia Dei Ministri, Law on the creation of the Italian National Civil Protection Authority, 1992, p. 2
208
Ibid., p. 39
209
Swedish Ministry of Defence, Cooperation in Crisis for a more Secure Society, 2006, p. 6
210
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy 20052007 (summary), 2004,
p. 29
211
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
212
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
213
Ibid.
214
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012, pp. 11-13
215
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 31; UK
Cabinet Office, National Risk Register for Civil Emergencies, 2012, p. 3

46
their access is not a new concept in the UK security but it has taken on new proportions since the rise
of new global powers that control some of these resources, the impact of climate changes and the
increasing speed of social and demographic global trends.216
Since the years 2000, health has also increasingly come to be seen through the lenses of security in
the context of the EU, affecting not only human security, but also societal security. Coordination
among EU Member States is in this field too seen as of central importance. Approaches to public
health security can include preparedness and control measures, as well as preventive measures. An
EU Council regulation of 2004 established the European Centre for Disease Prevention and
Control.217 Its core mission was then defined to the identification, assessment and communication
about current and emerging threats to human health from communicable diseases. In the event of
the outbreak of an illness or epidemic of unknown origin, its mission should also be to identify the
source of such a disease, being granted the power to act on its own initiative to carry out such a
mission. The regulation shows that there is a notion of a responsibility to communicate and alert
fellow member states of the EU about communicable diseases in order for scientific analysis to be
undertaken and appropriate Community action to be taken. The regulation also underlines the need
for collaboration with third countries as well as with international organisations competent in the
field, especially WHO. Furthermore, surveillance is presented as an effective tool to enable
preparedness and prevention of diseases, through what is referred to as dedicated surveillance
networks, defined as any specific network on diseases or special health issues selected for
epidemiological surveillance between accredited structures and authorities of MS.218 The sense of an
interdependence of threats is reflected in the need for coordinating the early warning and
response system of the centre with other Community alert systems, as for example on animal health,
food and civil protection. Although the means and methods to attack the threats of diseases use
many of the same methods as other security strategies, the nature of the threats in this case has
some specificities, especially regarding the public communication about the threats. Lastly, it should
be noted that health is strongly mentioned in the most recent documents. For instance, the 2008
document mentions threats to public health, particularly pandemics, as further undermin[ing]
development.219 In 2010, one of the objectives outlines is to strengthen the existing structures and
mechanisms in the public health area.220Similarly to other national security strategies, the novelty
with regard to health is that pandemics are mentioned as a security threat in the 2010 Ukrainian
National Strategy, whereas the 2007 National Strategy mostly insists on the populations moral
health and the improvement of the health security system. Traditionally indeed, concerns over
population welfare are prominent: Ukraines population is steadily declining because of poor health,
low life quality, low birth-rate, high death rate, as well as alcoholic intoxication.221 The 2010 National
Strategy identifies for the first time a number of concerns regarding the spread of social diseases, i.e.,
drug addiction, drinking, tuberculosis, HIV/AIDS, and the outbreak of dangerous infectious diseases.
The most recent strategy (2010) further insists on the deficiency of food, drinking water, dangerous

216
Ibid., p. 3, 17
217
European Parliament and the Council of the European Union, Regulation (EC) No 851/2004 of the European Parliament
and the Council of 21 April 2004 establishing a European centre for disease prevention and control, OJ L 142, April 30, 2004
218
Ibid.
219
European Council, S407/08 Report on the Implementation of the European Security Strategy: Providing Security in a
Changing World, Brussels, December 11, 2008
220
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010
221
National Security and Defence Council of Ukraine, National Security Strategy, 2010

47
technogenic accidents, pandemic diseases threatening the population.222 Food security is
mentioned in both Ukrainian National Security Concepts, with much more emphasis than their
Western European counterparts. In the 2010 National Security Strategy for instance, the concern is
to meet the demand of the Ukrainian population in available, quality and safe food.223
The emphasis on health threats seem to be particularly strong in the Russian conception of national
security. The 1997 concept already emphasised the critical state of the systems for health care and
the populations social protection and in the rapid rise in the consumption of alcohol and
narcotics.224 The 2009 document insists on the emergence of large-scale epidemics and pandemics,
HIV infection, tuberculosis, drug addiction and alcoholism.225 In the medium term, one of the main
areas of national security is the guaranteed supply of population with high quality and affordable
medicines,226 as well as food security a new dimension identified in 2009.
In United States documents, food insecurity, and dangers to public health are increasingly
shared.227 In addition, the emergence of new strains of disease may exacerbate future conflicts.228
and nuclear dangers have proliferated.229 Progressively, health threats are identified within the
official policy documents, particularly homeland security strategies, e.g., in 2007: Naturally
occurring infectious diseases pose a significant and ongoing hazard. Increasing human contact with
domesticated and wild animals (from which many human diseases emerge), the growing speed and
volume of global travel and commerce, and a decline in the development of new infectious disease
therapeutics complicate this challenge; we also remain vulnerable to catastrophic domestic
accidents involving industrial hazards and infrastructure failures. These include the thousands of
chemical spills that occur each year with the potential for significant public health and environmental
impacts.230 The identification of health threats is also visible with the use of terms such as
pandemic threats231 or influenza pandemics232 in 2010. It is interesting to note that in 2002, it
was specified that the responsibility of our government extends beyond the physical well-being of
the American people. We must also safeguard our way of life, which involves five key elements:
democracy, liberties, security, economics, and culture.233

2.4.2.5.1 Parameter: Physical/health security

Based on the above description, this parameter assesses the extent to which the definition of
security, in the views of the selected countries, places an emphasis on physical/health security.
We assess the selected countries based on the following scale:

222
Ibid.
223
Ibid.
224
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
225
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
226
Ibid.
227
Department of Defence of the United States of America, Quadrennial Defence Review, 2010
228
Ibid.
229
The White House, National Security Strategy, 2010
230
The White House, National Strategy for Homeland Security, 2007
231
Ibid., p. 6.
232
Ibid., p. 10.
233
The White House, National Strategy for Homeland Security, 2002, p. 8.

48
Limited emphasis on physical/health security (10) Strong emphasis on physical/health security
(100); not mentioned: (0).234

Country Score 1990s Score 2000s

France 50 80

Italy n/a 20

Sweden 10 80

Netherlands 10 85

United Kingdom 50 75

European Union 0 90

Ukraine n/a 90

Russia 80 90

United States 20 60

Table 10: Scores per country over time

Figure 13: Physical/health security; cross-country comparison in the nineties and in the years 2000

2.4.2.6 Environmental security


Environmental security refers to the living environment and natural risks. Similarly to the observation
made for health security, environmental security only recently emerged as a dimension of national
security, in particular through the identification of natural risks and global climate change as major
threats.

234
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

49
Natural risks are included in the 2008 French White Paper, contrary to the 1994 White Paper.
Environmental security takes on a new dimension. Threats to national security emanate from
industrial and natural disasters and global warming becomes a major concern.235
Traditionally, in the Italian documents, environmental factors had been confined to the internal
dimension of security.236 As result, environmental risk was mainly mentioned in civil related
documents and it was hardly dealt with in more general and comprehensive documents on security.
However, the most recent comprehensive Italian documents on security have started identifying
environmental factors as another source of instability.237 This indicates that Italy is endorsing a wider
and inclusive concept of security. This broader agenda is, however, still limited to a few and selected
components of soft security.
The Swedish government bill Cooperation in crisis for a more secure society states that An
important part in efforts to prevent potential causes of vulnerability is played by the measures to
manage environmental problems, such as soil depletion, climate change and water shortages, which
can threaten global, national and human security. Environmental problems of this kind may lead to
conflicts, or contribute to exacerbating other factors, such as poverty, social division and the spread
of transmissible diseases, which may lead to instability.238Although, according to the Defence
Commission in 2003, in the future, security policy should primarily concern itself with threats to
security that can potentially lead to rapid and serious deterioration in the functioning of society. This
does not include long-term changes in trade and the economic situation, which may entail poorer
conditions for life, depletion of natural resources, climate change or societal transformations.
Nonetheless, it is important to see the links between long-term changes and acute situations, e.g.,
between climate change and large-scale floods.239
The 2007 and 2008 Dutch documents emphasise environmental threats such as climate change as
threat multipliers for the security of Europe and the Netherlands. Major flooding or flood
disasters are traditionally emphasised by the Dutch documents, as water is a major threat to the
populations security.240
In the British policy documents, natural hazards are also clearly linked to environmental factors and
climate change; environmental security has been included in the British policy documents since
1998.241 However, in recent documents, environmental risks and climate change have acquired a
growing importance as sources of instability.242 These risks are viewed as risk multipliers,
exacerbating existing tensions around the world and having disproportionate impact on the
developing world.243
The environment has increasingly come to be taken into account as a security issue of in the EU
both as a referent object and as a potential source of insecurity. Environmental degradation is an
important source of conflict, as the EU Commission Communication on Conflict Prevention

235
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008
236
Presidenza del Consiglia Dei Ministri, Law on the creation of the Italian National Civil Protection Authority, 1992, pp. 1-15
237
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, pp. 32, 33, 49
238
Swedish Ministry of Defence, Cooperation in Crisis for a more Secure Society, 2006, p. 8
239
Swedish Ministry of Defence, A More Secure Neighbourhood Insecure World, 2003, p. 17
240
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007; Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
241
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998, p. 262
242
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012, pp. 14-24
243
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 17

50
underlines.244 Indeed, environmental degradation in itself creates various forms of insecurity (e.g. by
creating resource scarcity, in the form of reduced access to arable lands, water, and linked issues of
food security and loss of potential income), which in turn can create the grounds for conflict. Then,
climate change is also a potential source of new insecurities, as it causes a rise in the sea level and
increases risks of extreme weather. The EU Commission states in the above-mentioned
communication that it intends to address issues of natural resources and environmental degradation
through existing bilateral and regional programmes, and that this will also be given priority in post-
conflict efforts. In 2003, the European Security Strategy identified the security implications of climate
change,245 further emphasised in 2008 next to other environmental issues such as natural disasters,
environmental degradation and competition for resources.246 However, it should noted that
although it mentions natural and man-made disasters, the 2010 document does not place any
particular emphasis on a complete range of environmental issues, e.g., climate change.247

An EU Council Regulation of 2007, establishing an Instrument for Nuclear Safety Cooperation, aims at
supporting the promotion of a high level of nuclear safety, radiation protection and the application of
efficient and effective safeguards of nuclear material in third countries, through a financial assistance
mechanism to these third countries248. The Chernobyl accident of 1986 stands as the historical
reminder of the necessity of such security policies, as any accident can quickly have a global impact.
Today, the EU also sees the necessity to cooperate with third countries in this field, as ensuring
nuclear safety in these countries is also a central interest for the EU. Nuclear safety in this context
comprises measures aimed at securing transport, treatment and disposal of spent nuclear fuel and
radioactive waste, but also supporting efforts of dismantling existing installations and the
remediation of former nuclear sites. Some Ukrainian documents tackle the issue of environmental
security yet until recently, only on the surface, or by specifically referring to military elements:
Reliability of function, ecologic and human security of arsenals, bases and depots of weapons,
missiles and ammunition.249 Due to past traumas (e.g., Chernobyl), Ukraine particularly insists on
the link between health and environmental security, e.g., on the danger of technologically polluted
areas,250 and the technogenic, environmental, nuclear and radiation security. For the first time, the
2010 Strategy identifies the excessive anthropogenic stress on the environment and global
climate change as major threats to environmental security.251
The Russian national security can be seen as more oriented towards environmental dimensions than
its Western counterparts. The Russian definition of national security already emphasised
environmental threats quite largely in 1997: Ensuring the Russian Federations national security in
the ecological sphere is becoming a priority avenue in the activity of the state and society.252

244
European Commission, Communication from the Commission on Conflict Prevention, COM(2001)211 final, Brussels, April
11, 2001
245
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
246
European Council, S407/08 Report on the Implementation of the European Security Strategy: Providing Security in a
Changing World, Brussels, December 11, 2008
247
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
248
Council of the European Union, Regulations, Council Regulation (Euratom) No 300/2007 of 19 February 2007 establishing
an Instrument for Nuclear Safety Cooperation, OJ L 81, March 22, 2007
249
Ukrainian Ministry of Defence, White Book 2007: Defence Policy of Ukraine
250
National Security and Defence Council of Ukraine, National Security Strategy, 2010
251
Ibid.
252
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997

51
However, this dimension is more present in 2009: a number of objectives in the 2009 strategy have
indeed become the preservation [and protection] of the environment (...); the elimination of
environmental impacts of economic activities in an increasingly economic activity, and global climate
change.253
In official document of the United States, large scale environmental degradation is consistently
perceived as exacerbated by rapid population growth.254 Environmental degradation255 and the
effects of climate change256 threatens political stability. Although the US mentions environmental
security through these elements, the dimension is less emphasised than in other nations national
security policy documents. Yet in homeland security documents, this dimension has taken on an
increasing importance. For instance, the 2007 Strategy for Homeland Security recognises that the
lives and livelihoods of the American people also are at risk from natural catastrophes (...). As we
waged the War on Terror both at home and abroad, our Nation endured Hurricane Katrina, the most
destructive natural disaster in US history (...). The human suffering and staggering physical
destruction caused by Katrina were a reminder that threats come not only from terrorism, but also
from nature. The 2010 Quadrennial Homeland Security Review adds that climate change will
increase the severity and frequency of weather-related hazards such as extreme storms, high
rainfalls, floods, droughts, and heat waves.257

2.4.2.6.1 Parameter: Environmental security

Based on the above description, this parameter assesses the extent to which the definition of
security, in the views of the selected countries, places an emphasis on environmental security.
We assess the selected countries based on the following scale:
Limited emphasis on environmental security (10) Strong emphasis on environmental security
(100); not mentioned: (0). 258

Country Score 1990s Score 2000s

France 10 100

Italy n/a 60

Sweden n/a 60

Netherlands 10 100

United Kingdom 50 75

253
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
254
The White House, National Security Strategy, 1995
255
Ibid.
256
Department of Defence of the United States of America, Quadrennial Defence Review, 2010
257
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010.
258
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

52
European Union n/a259 85

Ukraine n/a 90

Russia 60 90

United States 30 80

Table 11: Scores per country over time

Figure 14: Environmental security; cross-country comparison in the nineties and in the years 2000

2.4.2.7 Social and political stability


Traditionally, the dimension of social and political stability is defined by the respect of freedom of
expression, universal and/or democratic values. Over time, this stability is increasingly jeopardised by
social division through the fragmentation of identities or the rise of extremism (including religious),
as well as socio-demographic trends.
Both 1994 and 2008 French documents place a large emphasis the defence of the French Republican
values and ideals (democracy, including individual and collective freedoms, respect of human dignity,
solidarity and justice).260 This dimension includes a more global conception of collective values in
2008. The 1994 White Paper put more emphasis on demographic trends as factors of instability, and
focused more on external political stability and European identity. However, over time, the French
perspective seems directed towards emphasizing external instabilities and national cohesion rather
than insisting on the existing internal social and political instabilities or divisions in the French
society.
A consistent and strong emphasis on democracy and human rights has characterised the Italian
attitude towards security. This has been a consistent stand within the Italian security policy
documents. Indeed, the lack of democracy in vital regions is seen as a major source of instability. The
key guiding principle of security lies in the promotion of human rights and democratic values in the
spirit of the UN Charter and within the framework of international organisations. It is interesting to

259
The document published in 1999, i.e., European Parliament, Presidency Conclusions, European Council, Tampere,
October 15-16, 1999, http://www.europarl.europa.eu/summits/tam_en.htm#union, does not mention environmental
security.
260
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994, p. 6

53
note that Italian governments have always stressed the humanitarian scope of the Italian foreign
missions and their emphasis on safeguarding democratic values. In addition, immigration, specifically
clandestine, is of particular concern to Italy. Italy continues to be the initial preferential destination
for those who come from or cross Eastern Europe and the southern shore of the Mediterranean.
Italian citizens perceive clandestine immigration as the most important threat to their own security,
not only in economic terms, but also as regards social and criminality factors.
The Swedish report A More Secure Neighbourhood Insecure World (2003) emphasises that The
ultimate purpose of Swedens security policy is to maintain the peace and independence of our
country. This means that we want to safeguard and protect our citizens and our modern, and open
society, with fundamental values of democracy, legal security and respect for human rights.261
The 2007 Dutch National Security Strategy makes an exact reference to social and political security.
National security is jeopardised when vital interests of the Dutch state and/or society are
threatened to such an extent that one can speak of potential societal disruption.262 Societal
security can here be understood as a major dimension of security in Dutch views. Polarisation (e.g.,
the increasing distance between groups, segregation, negative image building) is also a risk to social
and political stability. The political and social debate about our identity, values and norms, the role
of religion, the freedom of expression and the relationship between the citizen and the elite can
result in more social unrest and even violence. In addition, according to the 2008 Dutch Policy
Survey growing migration pressures, and an ageing workforce are growing causes for concern.263
Social and political stability can be at risk if changes occur in the demographic structure of society
(for example solidarity between generations).264 In addition, in 2004, national law is defined as a
vital interest of security, and is defined as the maintenance of public order, criminal maintenance
of law and the maintenance of democratic law.265A consistent and strong emphasis on democracy
and human rights has characterised British national security. Democratic rules are seen as providing
the legitimate ground for national security. A key set of values includes: human rights, the rule of
law, legitimate and accountable government, justice, freedom, tolerance, and opportunity for all.266
A number of statements point to the importance of such values. For instance: we need security to
protect the freedoms we hold dear;267 targets will build the objectives of political and social
stability and democracy more clearly into EU activities, putting greater emphasis on creating stable
institutions and on the rule of law.268 It is interesting to note that in recent years there also been the
recognition that Britain needs to strike the right balance between security and freedom: security
and freedom should be reinforcing since they are both part of British national interest.269 In addition,
social and demographic trends have been clearly stated as sources of political instability only in
recent British documents. This view has been further reinforced by most recent civil related
documents that mention public disorder as a potential type of malicious attacks, therefore deemed

261
Swedish Ministry of Defence, A More Secure Neighbourhood Insecure World, 2003, p. 17
262
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007, p. 11
263
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
264
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007, p. 16
265
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
266
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 6
267
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, 2010
268
UK Ministry of Defence, European Defence, 2001, p. 11
269
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 23

54
to be a risk potentially triggering civil emergencies.270 The concern here is related to both an ageing
and shrinking population in the Western World as well as population growth worldwide: these trends
are expected to outpace the development of stable governance and infrastructure. This in turn will
cause political exclusion and unemployment, combined with population and resource pressures,
caused in part by urbanisation. These are relatively recent concepts within British security,271 and can
also be noticed within other Western national concepts such as recent US documents: rapid
urbanisation of littoral regions may exacerbate future conflicts.272 In British views, migrations are
also an increasing threat to social stability: the global movement of people also brings challenges for
security: including () managing the effects on infrastructure and social cohesion of large and
relatively rapid inflows of people.273
The EU equally is concerned about the above-mentioned issues such as social unrest, political
exclusion, unemployment and other factors of social and political stability. For instance, the 1999
document mentions that the EU is committed to enhancing non-discrimination in economic, social
and cultural life and develop measures against racism and xenophobia.274 These elements appear
much more in recent documents. As the Internal Security Strategy of 2010 stresses, integration,
social inclusion and the fight against discrimination as key elements for EU internal security; the
Union must create a safe environment in which people in Europe feel protected, where it is
important that everyone can enjoy their daily lives without fear,275 which is also reiterated in the
final version.276 In other words, a state which has managed to eliminate various threats, but whose
citizens are feeling insecure, cannot really be said to have succeeded in its mission. In practice
however, it is often the other way around. Politically, the 2003 ESS places a significant emphasis on
the stability of EU neighbourhoods: neighbours who are engaged in violent conflict, weak
states where organised crime flourishes, dysfunctional societies or exploding population growth on
its borders all pose problems for Europe.277
A number of statements refer to the importance of the life and security of Ukrainian society, for
instance: the Constitution of Ukraine states that man, his life, health, honour, dignity, inviolability,
and security shall be recognised as the greatest social asset.278 Democracy is an important part of
defining security across the Ukrainian military doctrines: as emphasised in the 2004 Defence Bulletin,
the consolidation of regional and global security is based on the protection of common democratic
values.279 In the 2007 Security Strategy prepared after the Orange Revolution universal human
values become the basis for the formulation and implementation of its foreign, internal, and
national security policies. National security must guarantee human and civil rights and

270
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012, pp. 38-39
271
Ibid., p. 31
272
Department of Defence of the United States of America, Quadrennial Defence Review, 2010
273
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008
274
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
275
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010, p. 4
276
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010, p. 2
277
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
278
Ukrainian Ministry of Defence, National Strategic Defence Bulletin until 2015, 2004
279
Ibid.

55
freedoms.280 European democratic values and transparency are also becoming major dimensions of
security, as the improvement of the state bodies system does not give satisfaction with regard to
the clarity of its activities.281 More concretely, the importance of societal security is reflected in the
need to attain high social standards.282 Demographic issues are particularly present in Ukrainian
documents: concerns over disproportions in the migration processes and outflow of skilled workers
are specifically underlined in Ukrainian documents.
As mentioned earlier, in 1997, Russian security lies in ensuring civil peace, national accord (...) unity
of the legal area, stability of state power and its institutions, and law and order.283 In this national
security concept, a major objective was to complete the process of establishing a democratic
society.284 Societal security is at the heart of both the 1997 and 2009 national security concepts . In
particular, the consequences of the critical condition of the economy,285 insufficient health care,
and demographic problems, create a direct threat to national security, as they translate into poverty,
socioeconomic inequalities (e.g., the stratification of society; the social polarisation of Russian
society in 1997;286 the uneven development of regions in 2009287), the escalation of social
tensions, unrest near Russian borders, and the deterioration in inter-ethnic relations. Radicalism and
separatism are major threats to social and political stability in Russian views, as well as in the Chinese
perception of national security.
The 2002 United States National Security Strategy provides a good illustration of the normative
aspects of national security in US views: our first imperative is to clarify what we stand for: the US
must defend liberty and justice because these principles are right and true for all people
everywhere. In US views, democracy, justice and liberty are the ultimate and universal sources
of security. Similar statements on democracy, liberties and even culture can be found in all US
documents over time, for instance: Our way of life is both defined and protected by our democratic
political system (...). [It] is transparent and accessible to the populace. It requires that all actions
adhere to the rule of law (...). Liberty and freedom are fundamental to our way of life (...). The United
States of America is an open, welcoming, pluralistic, diverse society that engages in dialogue rather
than the dogmatic enforcement of any one set of values or ideas. Our culture is also characterised by
compassion and strong civic engagement.288 The 2006 National Security Strategy elaborates on this:
it is the policy to seek and support democratic movements and institutions in every nation and
culture, with the ultimate goal of ending tyranny in our world.289 Moreover, the same document
defines the the non-negotiable demands of human dignity as follows: the rule of law; limits on the
absolute power of the state; free speech; freedom of worship; equal justice; respect for women;
religious and ethnic tolerance; and respect for private property.290 The 2006 National Security
Strategy also introduces the idea that the best way to provide enduring security for the American

280
Ukrainian Ministry of Defence, National Security Strategy, 2007
281
Ibid.
282
Ibid.
283
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
284
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
285
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
286
Ibid.
287
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
288
The White House, National Strategy for Homeland Security, 2002, p. 8
289
The White House, National Security Strategy, 2006
290
Ibid.

56
people is to create a world of democratic, well-governed states that can meet the needs of their
citizens and conduct themselves responsibly in the international system.291
In US views, both environmental insecurity and profound cultural and demographic tensions292
may exacerbate future conflicts and political instability. This issue is typically identified in recent
years. Another example can be found in the Quadrennial Homeland Security Review, 2010 (US):
Persistent problems in immigration policy can consume valuable resources needed to advance other
security objectives, undermine confidence in the rule of law.

2.4.2.7.1 Parameter: Social and Political Stability

Based on the above description, this parameter assesses the extent to which the definition of
security, in the views of the selected countries, places an emphasis on social and political stability.
We assess the selected countries based on the following scale:
Limited emphasis on social and political stability (10) Strong emphasis on social and political
stability (100); not mentioned: (0).293

Country Score 1990s Score 2000s

France 60 80

Italy n/a 90

Sweden n/a 80

Netherlands 20 100

United Kingdom 40 90

European Union 50 90

Ukraine n/a 90

Russia 90 90

United States 50 70

Table 12: Scores per country over time

291
Ibid.
292
Department of Defence of the United States of America, Quadrennial Defence Review, 2010
293
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

57
Figure 15: Social and political stability; cross-country comparison in the nineties and in the years 2000

2.4.2.8 International law


International law dimensions refer to the respect of international law and order, the implementation
of the rule of law, justice, and human rights. International law governs relations between countries
and encompasses several areas, including human rights, disarmament, transnational organised
crime, refugees, migration, statelessness, the treatment of prisoners, the use of force, the conduct of
war, the environment, sustainable development, the oceans, outer space, global communications
and world trade.294 International law also includes different systems of law that imply abiding by UN
Security Council Resolutions, or the protection of human rights or adherence to international
humanitarian law during armed conflicts.295
The selected French documents specify that in most cases, the operations should take place within a
multilateral framework under groups legitimised by international law (i.e., UN, EU, NATO). For
instance: (multilateral) legitimacy [through the involvement of the UN] is key to the success of
collective management of security challenges.296 The French documents nuance the importance of
international law all the same, by specifying that the only eventualities in which a purely national
intervention remains plausible are those requiring the protection of our citizens abroad, the
application of bilateral defence agreements with certain States, and, finally, a possible national
response to one-off actions against our interests.297 The emphasis on universal values and the UN
Charter is also more noticeable in the 2008 French White Paper than in the 1994 French document;
in particular, tolerance between and within nations, and the respect for civilians (UN Charter) are
explicitly referred to as major conditions to insure the security interests of the French nation.298
Across Italian documents, the legal dimension of security emerges as important where the key
guiding principle of security lies in guaranteeing international peace, security, stability and
legitimacy299 as well as the promotion of human rights and democratic values in the spirit of the UN
Charter and within the framework of international organisations. In addition, Italy perceives its
sovereignty as closely related to international law and key international organisations.

294
United Nations, Understanding International Law, Fact Sheet #1, 2011
295
We thank one anonymous reviewer for his/her critical observation.
296
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008
297
Ibid., p. 67
298
Ibid., p. 114
299
Ministero della Difesa, Strategic Concept, 2005, p. 16

58
The selected Swedish documents strongly emphasise both international and European law. The
Riksdag has ratified the Treaty of Lisbon, including Article 47.2 of the Treaty on European Union
(TEU), and the solidarity clause Article 222 in the Treaty on the Functioning of the European Union
(TFEU).300 Another example is from the report A More Secure Neighbourhood Insecure world
(2003), which stresses that it is of great importance that the work against terrorism is conducted in
accordance with international law, upholding respect for human rights and, in the event of an armed
conflict, the laws of war.301
The promotion of international law and order is a core feature of the Dutch definition of security.
The commitment of the Netherlands to the promotion of international law and order is emphasised
in all Dutch documents as a major objective and priority of Dutch defence policy. For example, the
2005 National Defence Doctrine makes explicit reference to the Dutch Constitution and the
promotion of the development of international law (Article 90) as well as the maintenance or
promotion of the international legal order (Article 100). The existence of the international legal order
is defined as one of the vital security interests in 2004, as it protects the interests of the territory of
the Kingdom, through the defence of the NATO territory, the maintenance of international peace and
security in the framework of the European Union and the Charter of the United Nations.302 In
addition, internationally, the Netherlands must primarily apply the laws, rules, agreements and
objectives in a European context.303The Dutch objectives regularly emphasised across policy
documents are that of the promotion of international peace and human rights.304

International law, international co-operation and multilateralism have all been important and
consistent dimension of the British security policy documents. A set of key principles provides the
legitimate ground for national security and includes: human rights, the rule of law, legitimate and
accountable government, justice, freedom, tolerance, and opportunity for all.305 This set of values
needs to be reinforced at home and established/protected overseas, by putting greater emphasis
on creating stable institutions and on the rule of law.306
The EU emphatically stresses the establishment of an international rule-based system as one of its
primary objectives in achieving security. It further emphasises its commitment in developing
international law and to commits to the international framework for international relations
established in the United Nations charter. In 1999, international law is not formally mentioned, yet
the European Council stresses the importance of consulting UNHCR and other international
organisations.307 In 2003, the ESS stipulates that: Our security and prosperity increasingly depend
on an effective multilateral system. We are committed to upholding and developing international
law. The fundamental framework for international relations is the United Nations Charter.308 It also
emphasise the importance of cooperation with key institutions such as the World Trade Organisation

300
Swedish Ministry of Defence, A Usable and Accessible Defence Force The Policys Orientation, 2009, p. 2
301
Swedish Ministry of Defence, A More Secure Neighbourhood Insecure World, 2003, p. 8
302
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
303
Ibid.
304
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
305
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 6
306
UK Ministry of Defence, European Defence, 2001
307
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
308
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003, p. 9

59
(WTO), and the other financial institutions as part of this endeavour. In the ESS the EU also indicates
its support and the importance of transatlantic cooperation. NATO being a key actor in these
activities, albeit it one with which the EU experiences significant difficulties in terms of establishing
genuinely cooperative relations with (despite the significant overlap in membership).309 In 2010, the
rule of law is clearly defined as a dimension of security: opportunities provided by a (...) society
based on the rule of law generate prosperity amongst Europes citizens.310
The respect of international law and norms are particularly important in Ukrainian strategic thinking:
Our armed forces will be ready to protect the national interests in this area in full compliance with
the international law;311 Rule of law and strict compliance with the legislation.312 The importance
of international law in Ukrainian strategic thinking is further emphasised through the identification of
the development of a dangerous trend to revise national borders outside the international law.313
What is more, the use of force [to solve disputes] and threat of force have returned to the practice
of international relations, including in Europe in 2010 (also identified in the 2008 Defence Policy).
The 1997 Russian national security concept already formulated the notion of multipolarity which, in
Russian views, is guided by international law: countries that are considered as partners are those
whose policies do not damage [Russias] national interests and security and do not contravene the
UN Charter.314 The generally recognised principles and norms of international law form part of the
2000 Military Doctrines legal basis. The provisions of the UN Charter as a basis for operations are
emphasised as well, in addition to the decisions of the UN Security Council, and other norms of
international law.315
In the 1995, 2006, 2002 United States National Security Strategies, there was little to suggest that
international law was a crucial dimension in the US definition of national security. In the latest
National Security Strategy (2010), international law is mentioned several times, for example through
the objective to strengthen the legitimacy and authority of international law and institutions,
especially the UN.316 However, when observing the general evolution of all selected documents,
there seems to be less emphasis placed on international law after 9/11.The law is defined as the
foundation of the American security strategies: Throughout our Nations history, we have used laws
to promote and safeguard our security and our liberty. The law will both provide mechanisms for the
government to act and will define the appropriate limits of action;317 externally, the United States
has over the course of the past six decades sought to shape the international environment through
strong global political, economic, military, and cultural engagement. Internally, we have relied
primarily on law enforcement and the justice system to provide for domestic peace and order.318 In
addition, nations unwilling to abide by international norms319 are consistently identified as a

309
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
310
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
311
Ukrainian Ministry of Defence, National Strategic Defence Bulletin until 2015, 2004 (95
312
National Security and Defence Council of Ukraine, National Security Strategy, 2010
313
Ibid.
314
Russian Ministry of Foreign Affairs, Military Doctrine, 2000
315
Ibid.
316
The White House,, National Security Strategy, 2010, p. 3, 12, 13, 38
317
The White House, National Strategy for Homeland Security, 2002, p. x
318
Ibid., p. 8
319
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010.

60
menace. Yet the US position with regard to the respect of international law is more ambiguous than
that of other nations.However, the dimension seems to gain a form of importance in the US strategic
thinking and as a basis of security.

2.4.2.8.1 Parameter: International law

Based on the above description, this parameter assesses the extent to which the definition of
security, in the views of the selected countries, places an emphasis on international law.
We assess the selected countries based on the following scale:
Limited emphasis on international law as a dimension of security (10) Strong emphasis on
international law as a dimension of security (100); not mentioned: (0).320

Country Score 1990s Score 2000s

France 60 80

Italy n/a 100

Sweden n/a 90

Netherlands 100 100

United Kingdom 100 100

European Union 70 100

Ukraine n/a 90

Russia 70 70

United States 40 60

Table 13: Scores per country over time

320
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

61
Figure 16: International law; cross-country comparison in the nineties and in the years 2000

62
2.5 Sources of Security
2.5.1 Globalisation
The UNESCO defines globalisation as a set of economic, social, technological, political and cultural
structures and processes arising from the changing character of the production, consumption and
trade of goods and assets that comprise the base of the international political economy.321
The globalisation of security is widely perceived as a threat across the French policy documents, yet
the effects identified remain economic in the 1994 White Paper. In 2008 however, globalisation has
become the element shaping international security and influencing the structure of international
relations.322 This contrasts with the 1994 White Paper, whose primary focus was the implications of
the end of the Cold War. Although it is acknowledged that the defence of France is no longer limited
to its borders and that there is a strong feeling of insecurity323, globalisation is not a central theme
in the 1994 document. The context is then described rather as a transition, from bipolarity to
ruptures in the world order. In 2008, globalisation has indeed enabled a more complex, more
insecure, more unforeseeable environment.324 More precisely, globalisations downside leads to a
range of additional sources of insecurity325 which did not appear in 1994 and undermines the
capacity of the State to regulate.
In Italian views, the complexity of international relations, is generated by economic globalisation
and the increased cultural interaction. This creates an environment where rapid and unforeseen
changes326 will occur. It is important to note here that this attitude may be generated by the
uncomfortable feeling that Italian state institutions needed to cope with this new complexity due to
a number of required institutional changes and transformation.327 More recent documents stress the
greater impact of globalisation as source of instability by underling the global economic,
environmental and demographic challenges.328
Sweden stresses both the positive and negative aspects of globalisation. The report A More Secure
Neighbourhood (2003) states that the technological development has led to new opportunities but
able to observe that in the age of globalisation, there has been a change in the character of what is
to be protected and defended.329 Globalisation has created interdependence, and despite being
basically positive for peace and stability, it also makes society more vulnerable and sensitive to
disruption.330

321
Source: http://www.unesco.org/most/globalisation/Introduction.htm
322
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 3
323
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994;
translated from French to English. Original text: la dfense de la France ne se joue plus immdiatement ses frontires;
un sentiment souvent diffus dinscurit [est] fortement ressenti.
324
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 302
325
For instance: conflict contagion, the interconnection of threats and risks, the cascading of crises, and sudden bursts of
violence (Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 55).
326
Ministero della Difesa, Strategic Concept, 2005, p. 21
327
Ibid., p. 25
328
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, p. 61, 82.
329
Swedish Ministry of Defence, A More Secure Neighbourhood Insecure World, 2003, p. 17
330
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy 20052007 (summary), 2004,
p. 6

63
According to the Dutch documents, the key factor affecting security policy is the increasing global
interdependence in 1993.331 As in most national security strategies, globalisation was not openly
identified as a reflection of this interdependence in the nineties. It only becomes recognised in the
2007 National Security Strategy as leading to developments occurring far beyond our national
borders can directly or indirectly affect [Dutch] security. In 1993, the new source of insecurity was
mostly uncertainty, i.e., the fundamental uncertainty about how the new security situation will
develop. The 2008 White Paper reiterates however: uncertainty about the development of the
international and national security situation in the next twenty years is greater than it has been since
the end of the Cold War.332
The UK consistently recognises its environment as increasingly complex and uncertain, and perceives
globalisation as magnifying the likelihood of conflict both between states and non-state and failed-
state actors.333 In addition, a source of economic instability is found in the potential restrictions and
barriers to the open world trading system that some countries may establish. As emerging
economies move up the value chain, it is expected that the effects of liberalisation will be felt by
skilled workers, particularly in developed countries thereby pushing some countries and national
lobbies to turn their back to free trade and open markets.334 However, the UK emphasises that in
British views, globalisation brings huge benefits, to security as well as prosperity.335
The EUs two key security documents, the ISS and the ESS, mention globalisation as an important
factor for understanding and combating modern day security threats and challenges. In the EU
discourse it globalisation is mentioned both as an opportunity to combat threats but also as a
challenge in itself since it introduces new threats.336 The ESS explicitly mentions the interlinkage
between internal and external security is highlighted together with the increasing interdependence
caused by trade and investment, the development of new technologies, the spread of democracy
bringing freedom and justice to people inside and beyond EU borders.337 At the same time as these
developments have created interdependencies among EU member states and the international
community at large it also creates vulnerabilities to an even more interconnected infrastructure in
transport, energy, information and in other fields.338. In 1999, globalisation or its related concepts
were not mentioned.Except for mentioning a globalised world in both National Security
Strategies,339 Ukraine barely refers to the elements at stake with regard to globalising processes.
In Russian views, although the 2009 strategy adapted to a changing global context, the links of
security and globalisation as a risk are more loose than in the 2008 French White Paper, for example.
However, the uncertainty of the unknown remains emphasised: although external threats are no
longer directly menacing Russia, the country must prepare for their potential re-emergence.

331
Dutch Ministry of Defence, Prinsjesdagbrief, 2003
332
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
333
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 14
334
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 14-16
335
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008
336
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003; European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS),
Communication from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels,
November 22, 2010
337
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003, p. 2
338
Ibid.
339
Ukrainian Ministry of Defence, National Security Strategy, 2007; National Security and Defence Council of Ukraine,
National Security Strategy, 2010

64
The 2011 US National Military Strategy indicates a strategic inflection point as well, caused by the
ongoing shifts in relative power and increasing interconnectedness in the international order. As a
result, this requires Americas foreign policy to employ an adaptive blend of diplomacy,
development, and defence. While the strength of our military will continue to underpin national
security, we must continuously adapt our approaches to how we exercise power. There are also
elements indicating that globalisation represents a growing threat in recent years, for instance: The
accelerated flow of ideas, goods, and people around the world, while vital to supporting and
advancing Americas interests, also creates security challenges that are increasingly borderless and
unconventional; globalisation will continue to make it increasingly difficult to prevent health
threats to the United States, whether from emerging disease or deliberate attacks, or via imports;
illicit, dangerous, or uncontrolled movement of people and goods 340 Yet unsurprisingly,
globalisation is also essential to the US security: Ensuring the security of the global trading system is
essential to our security and world commerce; our economic security depends on the efficient flow
of people, goods, and services.341

Parameter: Globalisation

Based on the above description, this parameter assesses the extent to which globalisation, in the
views of the selected countries, is perceived as a source of security.
We assess the selected countries based on the following scale:
Globalisation as a source of insecurity (10) Globalisation is identified as both a source of security
and insecurity (50) Globalisation is a source of security (100); globalisation is not mentioned: (0).
342

Country Score 1990s Score 2000s

France 40 20

Italy n/a 100

Sweden n/a 50

Netherlands 40 20

United Kingdom 80 70

European Union 0 50

Ukraine n/a 0

340
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010.
341
The White House, National Strategy for Homeland Security, 2002, p. 68.
342
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

65
Russia 40 40

United States 70 70

Table 14: Scores per country over time

Figure 17: Globalisation as a source of security; cross-country comparison in the nineties and in the years
2000

2.5.2 Economic development/growth


The term economic development is defined by Massey (1988) as the application of capital to raise
human productivity, generate wealth and increase national income. It is part of a constellation of
social and cultural changes that scholars generally call modernisation.343

In French views, in order to avoid the ruptures related to demographic trends and economic
developments (e.g., inequalities, both in 2008 and 1994), the priority of European nations and the
international community should consist of ensuring growth and the fair allocation of resources,
necessary to the imperatives of solidarity and security.344 Indeed, the growth f gross domestic
product conditions the defence effort. Interestingly, global socio-economic inequality is seen as a
source of instability, as is its levelling, i.e., the world becoming more equal. Despite policies in other
areas aimed at promoting economic development and decreasing povery rates ( on the basis that
whole regions are failing to share in the benefits of world growth, and instead of narrowing, the gap
between richest and poorest is widening 345), the economic growth of emerging powers, is seen as a
threat to international stability: The economic growth of the new powers goes hand-in-hand with
rising energy consumption, as well as a growing demand for natural resources and strategic raw
materials. This is contributing to two types of disorder (...).The first concerns damage to the
biosphere, including global warming(). The second of these is the growing pressure on strategic
supplies.346
Economic development has strongly emerged as an important concern within the Italian policy
documents. While initial documents only briefly mention this dimension, more recent publications

343
Massey, D.S., Economic Development and International Migration in Comparative Perspective, in Population and
Development Review, Vol. 14, Issue 3, September 1988, pp. 383-413; cited in Samuel, John, and Susan George,
Globalisation, Migration and Development, Special Issue on Migration and Globalisation, Canadian Studies in Population,
Vol. 29, Issue 1, 2002, p. 33.
344
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994, p. 17
345
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 24-25
346
Ibid., p. 25

66
deem economic development as an important component of Italian security. This refers to the
increasing global economic competition and the need to accelerate economic development in the
regions of highly strategic concern.347
The selected Swedish documents do not particularly focus on economic growth. The Defence
Commission is of the opinion that in future too, security policy should primarily concern itself with
threats to security that can potentially lead to rapid and serious deterioration in the functioning of
society. This does not include long-term changes in trade and the economic situation, which may
entail poorer conditions for life, depletion of natural resources, climate change or societal
transformations. Nonetheless, it is important to see the links between long-term changes and acute
situation.348
Surprisingly, economic growth is not widely mentioned as a source of security for the Dutch in recent
years. The 2007 Dutch National Security Strategy only refers to undisrupted functioning of the
Netherlands as an effective and efficient economy,349 as a dimension of economic security.
According to recent Dutch policy documents, economic growth is largely taking place outside the
developed world while international economic developments affect Dutch economic security The
social and economic developments taking place elsewhere in the world also have an impact on our
society. The international economic crisis has unmistakably exposed the fragility of our
prosperity...350
Economic growth has slowly emerged as acquiring a strong emphasis in more recent years. The UK is
confident that economic growth in the coming decades is likely to be driven by the world knowledge
economy, in which UK companies are highly globally competitive.351 In 2008, the UK noted that
success in building security depends on () economic development352 which was also affirmed in
earlier documents: Our security and national prosperity depend on economic development.353
In 1999, the EU mentions the single market, economic and monetary union and the capacity to
take on global (...) economic challenges as the major ingredients of a shared area of prosperity and
peace:354 sources of security were already of economic nature then. In 2010, economic growth is
clearly defined as a source of security, as it generate[s] prosperity amongst Europe's citizens.355 In
addition, the EU particularly emphasises the economic development/growth of its closest
neighbourhood. This is a priority area in which the EU has contributed with significant investment
and assistance in various sectors of the economy. Particularly mentioned in the ESS (2003) is the
concern of the economic stagnation and social unrest in the Mediterranean area.356 The EU, in the
initial framework of the Barcelona process, base their cooperation on more effective economy,

347
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008p. 59, 100
348
Swedish Ministry of Defence, A More Secure Neighbourhood Insecure World, 2003, p. 17
349
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007, p. 16
350
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), English Summary, 2008, p. 4:
351
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 21
352
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008
353
UK Ministry of Defence, Delivering Security in a Changing World: Defence White Paper, 2003, p. 4
354
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
355
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
356
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003

67
security and cultural cooperation. Another priority area is the Balkan region, where several initiatives
for reform and partnerships have been made. The ISS does not explicitly mention economy as a
specific sector of security, but it is implicitly understood and incorporated within other segments of
security threats: critical infrastructure, health, terrorism, natural and man-made disasters,
immigration, etc.357More globally, the 2008 document frames the following development as positive:
high growth in the developing world, led by China, has lifted millions out of poverty.358
In Ukrainian views, economic competitiveness, the states competitiveness, and development
emerge as important aspects to security: the main goal of the 2007 National Security Strategy is to
secure a sufficient level of national security to ensure Ukraines steady development to strengthen its
competitiveness.359 The 2010 National Security Strategy also indicates that the effective use of
public financial resources, and the resilience of the financial system must be improved in order to
ensure economic security.
In Russian views, an important way to achieve sustainable development as an objective of national
security, is through economic growth. The further development of industry is an important element
which would allow to control the countrys (energy) resources and enhance the national economic
power. Economic growth can be achieved by developing the national innovation system and
invest[ing] in human capital.360 In 1997, economic security involved the preferential development
of competitive sectors and production facilities and the steady expansion of the market for high-
technology output.361 In addition, energy security (particularly under the influence of Vladimir Putin)
is brought in as a new element of security in 2009: energy is increasingly emphasised as a power tool
and strategic asset to national security.362
While Ukraine and Russia mostly insist on their own internal economic developments and the
relevant challenges they are facing, the US has focused on the economic state of developing nations.
In addition, as described in the 2001 Quadrennial Defence Review, the history of the 20th century
has proven time and again that Americas security is linked directly to that of other nations, and that
Americas prosperity depends on the prosperity of others. The 2002 National Security Strategy
elaborated on this, and stated that the goals on the path to progress are clear: (...) [and include]
economic freedom. In US views, economic growth appears closely linked to globalisation as well. As
previously mentioned, this element is identified in the US National Strategy for Homeland Security of
2002: Ensuring the security of the global trading system is essential to our security and world
commerce; our economic security depends on the efficient flow of people, goods, and services.363
Over time, the importance of economic growth remains consistently emphasised, for instance in
2002: We must (...) be prepared to protect and restore institutions needed to sustain economic

357
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010
358
European Council, S407/08 Report on the Implementation of the European Security Strategy: Providing Security in a
Changing World, Brussels, December 11, 2008
359
Ukrainian Ministry of Defence, National Security Strategy, 2007
360
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
361
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
362
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
363
The White House, National Strategy for Homeland Security, 2002, p. 68

68
growth and confidence,364 and in 2007, with advancing economic growth and vitality identified
as a crucial condition to security.365

Parameter: Economic development/growth

Based on the above description, this parameter assesses the extent to which economic
development/growth, in the views of the selected countries, is perceived as a source of security.
We assess the selected countries based on the following scale:
Limited emphasis on economic development/growth as a source of security (10) Strong
emphasis on economic development/growth as a source of security (100); economic
development/growth is not mentioned as a source of security (0). 366

Country Score 1990s Score 2000s

France 80 80

Italy n/a 70

Sweden n/a 30

Netherlands 60 80

United Kingdom 60 90

European Union 80 90

Ukraine n/a 80

Russia 90 90

United States 90 90

Table 15: Scores per country over time

364
Ibid.
365
The White House, National Strategy for Homeland Security, 2007
366
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

69
Figure 18: Economic development/growth as a source of security; cross-country comparison in the nineties
and in the years 2000

2.5.3 Population welfare and well-being


According to most authors, measures of economic growth remain critical in assessing individual
and societal well-being. For instance, the economic literature argues that individuals derive well-
being from the satisfaction of their wants according to their own preferences;367 in particular,
employment may also be important to the personal, social and economic wellbeing of people in at
risk groups.368 Such economic variables are discussed earlier in the study, under the source of
security economic development/growth. Yet the determinant of well-being can be complemented
with other dimensions, for instance leisure time, household size and inequality.369 More generally,
the concept of well-being comes close to that of quality of life, and the degree of perceived
satisfaction within a number of domains.370

Based on our investigation of the policy documents, the concept appears to be indeed related to a
variety of issues, including health risks, demographic challenges e.g., population decline, ageing,
illegal migration (e.g., Italy, UK), socioeconomic risks e.g., unemployment, inequalities. A number of
concrete solutions aim to protect a way of life (e.g., US), reduce poverty (e.g., Ukraine), good
governance and democracy (e.g., UK), public trust (e.g., Netherlands), and the protection of public
health (e.g., Ukraine, Russia).

The selected French policy documents place little to no emphasis on population welfare and well-
being.

While initial Italian documents only briefly touch on the need to focus on the general concept of
public welfare, more recent documents take a stronger stand on this dimension. Immigration and, to
a certain extent population decline, are viewed as extremely important in the Italian policy
documents.

367
Boarini, Romina, Asa Johansson, and Marco Mira dErcole, Alternative Measures of Well-Being, OECD Social,
Employment and Migration Working Papers, February 17, 2006. http://www.oecd.org/dataoecd/13/38/36165332.pdf
368
Australian Bureau of Statistics, Social Capital and Social Wellbeing, August 2002, p. 14.
http://www.oecd.org/dataoecd/2/30/2380806.pdf
369
Boarini, Romina, Asa Johansson, and Marco Mira dErcole, Alternative Measures of Well-Being, OECD Social,
Employment and Migration Working Papers, February 17, 2006. http://www.oecd.org/dataoecd/13/38/36165332.pdf
370
Hrnquist, J.O., Quality of Life: Concept and Assessment, Journal of Public Health, Vol. 18, No. 1, March 1990, pp. 69-79

70
The Dutch policy documents refer to the welfare of all Dutch citizens371 or the welfare of the
home nation. To this end, a nation undertakes political, diplomatic, economic, socio-cultural,
humanitarian and military activities.372 In Dutch views, a source of security is to promote a sense of
trust and well-being among the population.373 Public trust emerges as an important guarantee of
societys security and well-being: the lack of such trust can lead to political and social division and
unrest in many countries.374
Population welfare has been consistently viewed as important dimension of British national security.
Above all illegal immigrants, illicit goods and organised crime have consistently deemed as an
important source of instability undermining and corrupting economies, societies and governments;
exacerbating state failure; and supporting terrorism. This threat is perceived as acquiring new forms
and exploiting new opportunities, including revolutionary changes in technology and
communications, and increasing global movements of goods, people and ideas.375 Furthermore, the
ability to prevent events or situations which could create serious damage to human welfare in the UK
has also acquired more relevance.376 In British views, democracy and governance are sources of
population welfare: democracy will continue to spread, and governance to improve, with resulting
benefits for global security as well as for well-being and prosperity.377
Democracy, but also public trust and prosperity are also crucial to EU security: "the quality of our
democracy and public confidence in the Union will depend to a large extent on our ability to
guarantee security and stability in Europe".378 Another document issued in 2010 adds:
opportunities provided by a free and democratic society based on the rule of law generate
prosperity amongst Europes citizens.379 Finally, the same document specifically refers to the lives,
safety, and well-being of citizens" as part of the concept of internal security.380
In Ukrainian documents published from 2007 on, it becomes important to enhance the standard of
living and well-being of the population,381 and harmonise quality of life standards to those of
Europe. In particular, the 2007 National Security Strategy identifies a number of solutions to the
negative trends in socioeconomic conditions, among which supporting the middle class development
and reducing poverty. The Ukrainian documents insists on enhancing the importance of the
economic well-being of the population through all-round development of the human, scientific-
technological, and innovative potential of the country.382 To solve demographic and health issues,
both 2007 and 2010 Ukrainian national security strategies suggest a number of concrete measures,
including a reform the social security system, and in particular pension reform,383 improving the

372
Dutch Ministry of Defence, National Defence Doctrine, 2005, p. 15, 35
373
Ibid.
374
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), English Summary, 2008, p. 10
375
UK Homeland Government, Securing Britain in an Age of Uncertainty: The Strategic Defence and Security Review, 2010,
p. 52
376
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012, p. 1
377
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 20
378
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
379
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
380
Ibid.
381
Ukrainian Ministry of Defence, National Security Strategy, 2007, p. 2
382
Ukrainian Ministry of Defence, National Security Strategy, 2007
383
Ibid.; National Security and Defence Council of Ukraine, National Security Strategy, 2010

71
effectiveness of social protection for vulnerable groups of the society, as well as overcoming
vagrancy and homelessness.384
In Russian views, quality of life emerges as a fundamental element of national security in recent
years: sustainable development necessary to national security can be achieved by improving quality
of life of Russian citizens.385 The improvement of quality of life can be achieved by guaranteeing
personal security, and well as high standards of livelihood. Furthermore, sources of health security
can be developed through national programs for the treatment of socially significant diseases
(cancer, cardiovascular disease, diabetes, tuberculosis, drug addiction, alcoholism), the development
of uniform nationwide approach to diagnosis, treatment and rehabilitation of patients; development
of quality management system and access to care, preparation health professionals.386 As suggested
in 2009, socioeconomic inequalities can be prevented by the deployment of a full-scale national
innovation system by forming a territorial perspective, that is, by means of rational state regional
policy aimed at improving coordination activities of public authorities, local authorities, business
community and the civil society.387
Although the US Constitutions preamble sets general welfare, as one of the basic objectives of
security, the selected policy documents place no particular emphasis on population welfare and well-
being except for the most recent homeland security document. The use of the term enterprise
integrated in the definition of national homeland security in 2010, connotes a broad-based
community with a common interest in the public safety and well-being of America and American
society.388 In addition, homeland security becomes as much about protecting the American way of
life as it is about protecting this country from future attacks.389

Parameter: Population welfare and well-being

Based on the above description, this parameter assesses the extent to which elements of population
welfare and well-being, in the views of the selected countries, are perceived as sources of security.
We assess the selected countries based on the following scale:
Limited importance of population welfare and well-being as a source of security (10) Population
welfare and well-being as a source of security (100); population welfare and well-being are not
mentioned: (0).390

Country Score 1990s Score 2000s

France 30 60

Italy n/a 100

384
National Security and Defence Council of Ukraine, National Security Strategy, 2010
385
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
386
Ibid.
387
Ibid.
388
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010.
389
Ibid.
390
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

72
Sweden n/a 0

Netherlands 10 90

United Kingdom 60 80

European Union 40 80

Ukraine n/a 100

Russia 60 100

United States 20 70

Table 16: Scores per country over time

Figure 19: Population welfare and well-being as a source of security; cross-country comparison in the
nineties and in the years 2000

2.5.4 National unity


There is no single conceptualisation of national unity, and the term certainly is ambivalent (the
example of the vision of a rainbow nation in South Africa provides a good example of the pursuit of
national unity based on diversity, yet on the exclusion of certain residents in the country, e.g.,
Zimbabweans or Swazis...). In some national contexts, the use of the terms engages the notion of
nationalism (e.g., China). In others, the understanding of national unity is more nuanced; for
example, it can be based on multiculturalism, ethnic diversity and language unification policy (e.g.,
Ukraine, Russia), family values (e.g., Ukraine), culture (e.g., US, Russia), spirituality (e.g., Russia),
uniformity (e.g., France), the respect of European and international frameworks (e.g., Netherlands),
or democratic rules (e.g., UK).The 1994 French White Paper insisted much more on French history,
the French social organisation, education of men, their solidarity and common values, as well as
the fact that the desire of men and women to live together are important elements of national
unity.391In the most recent French views, the notion of unity clearly appears to be connected to the

391
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994

73
construction of the European Union as a growing economic and trading power.392 In addition, it is
increasingly related to governance structures: a sense of cohesion between the nation and those
who serve it should be nurtured.393 Threats to national unity emanate from globalisation, and
include the rejection of uniformity which giving rise to violent, identity-centred responses and new
fractures.394
National unity is not directly mentioned in the documents selected for Italy or Sweden.
Although in more recent Italian documents immigration is perceived as having an important impact
on social factors, the social factors are not further analysed.
In the Dutch policy documents published in the years 2000, unity appears to be envisaged in the
framework of international co-operation: Mutual respect for the ideas, culture, religion and customs
of partner nations helps to lay the foundations for co-operation and unity of effort.395 Unity is
reflected in the actions of the international community and within Europe, the balance of power, and
in the respect of international rules.396 Interestingly, the Dutch multicultural society is perceived
as a factor of frustrations and social divide; as result, diversity is not referred to as a source of
security.397 Furthermore, there is little to suggest a direct emphasis on national unity as a source of
security.
Although national identity is not directly mentioned in the majority of the British documents, the
emphasis on close co-operation and integration among public, private and third sectors has been a
consistent trait of British policy documents.398 In addition the strong emphasis on common
democratic rules is closely related with the idea of creating an unified, prosperous, secure, modern
and outward-looking nation, confident in its values and ideas.399 More recent documents also stress
the importance of spreading this British outlook globally and use it to expand British influence400 as
well as dealing with the social and political causes of most recent internal public unrests (erosion of
national identity could be one of these causes ).401
National unity is not a relevant source of security in European documents, and consequently, this
parameter will not be scored for the EU. However, some elements related to unity emerge.
Interestingly enough, in 2010, it is through unity in diversity, (that) this free and prosperous Europe
continues to facilitate and enrich peoples lives.402 The shared commitment to principles and values
of the Union", i.e., respect for human rights and fundamental freedoms, the rule of law, democracy,

392
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 21
393
Ibid., p. 244
394
Ibid., p. 24
395
Dutch Ministry of Defence, National Defence Doctrine, 2005, p. 61
396
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
397
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007, p. 44
398
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998, p. 5-7; UK Cabinet Office,
The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 8
399
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 10
400
Ibid., p. 4
401
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012, p. 39
402
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010

74
dialogue, tolerance, transparency and solidarity403 has been constantly reaffirmed over the years,
and seems to reflect best European unity.
In the 2007 Ukrainian Strategy, the Orange Revolution is perceived as opening up new
opportunities for national unity. In the Ukrainian perspective, the national idea is also largely defined
through language unification, i.e. the diffusion of the state language within society. In addition, the
avoidance of polarisation or fragmentation of identities guarantees security. Precisely, the 2007
National Concepts central priority is national unity, defined as a guarantee of effective protection
of the individuals, the society and the state. In particular, it can be achieved by the creation of a
competitive and socially-oriented market economy.404In addition, both societal security and national
integrity are reflected in unity and societal integration through the appeasement of identities, i.e.
through the removal of both natural and imposed tensions of a socio-cultural, confessional, ethnic,
linguistic, or regional character on the basis of unconditional guaranteeing of constitutional civil
rights and freedoms.405 National identity and unity are based on ethno-cultural diversity in the
2010 document,406 and is preserved through the protection of the domestic cultural and spiritual
heritage in the 2007 document,407 similarly to Russian views. The introduction of effective
mechanisms for consolidating family values is seen as a source of security and unity in the 2007
Concept, but no longer appears as such in 2010.
In Russian views, culture is important element in meeting the challenges of national security, in both
1997 and 2009. In this respect, the 1997 national security strategy emphasises the protection of the
cultural, spiritual, and moral heritage and the historical traditions and norms of social life. Russia
needs to ensure the safety of its great cultural wealth, and specifically the museum and archive
stocks, the main library collections, and historical and cultural monuments.408 In particular, the
cultural objective of national security is achieved through the recognition of the paramount role of
culture with regard to the revival and preservation of cultural and moral values, strengthening
spiritual unity [spiritual value in 1997] of the multinational people of the Russian Federation.409 To
preserve and develop native cultures in Russia, a number of concrete solutions are spelt out:
improvement of the logistics and leisure facilities, of training and social security, the development of
production and distribution of products of domestic cinematography, the development of cultural
tourism, building government orders to create a cinematic, and printed materials, TV and radio
programs and Internet resources.410 The cultural potential of Russia is even envisaged as being in
the interest of multilateral international co-operation.411 This level of detail and ambition with
regard to culture as a source of internal and external security is quite specific to the Russian
documents.
In addition, social consensus based on shared values are also strongly emphasised, as they are the
prerequisites for a reliable prevention of (...) threats to national security, rapid development and

403
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
404
National Security and Defence Council of Ukraine, National Security Strategy, 2010
405
Ukrainian Ministry of Defence, White Book 2007: Defence Policy of Ukraine
406
National Security and Defence Council of Ukraine, National Security Strategy, 2010
407
Ukrainian Ministry of Defence, National Security Strategy, 2007
408
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
409
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
410
Ibid.
411
Ibid.

75
transformation of the Russian Federation.412 A number of values described across both national
security concepts (1997 and 2009) include the respect of family traditions, and patriotism.413 The
Russian security objectives of education, health and culture can be developed by strengthening
the role of the state and improve public-private partnership.414
The US policy documents make no direct reference to national unity as a source of security. Yet
interestingly, national unity in the US seems to be ensured by a culture of preparedness: Our entire
Nation shares common responsibilities in homeland security. In order to help prepare the Nation to
carry out these responsibilities, we will continue to foster a culture of preparedness that permeates
all levels of our society from individual citizens, businesses, and non-profit organisations to Federal,
State, local, and Tribal government officials and authorities.415 Furthermore, in the 2010 homeland
security document, a fair and effective immigration system enriches American society, unifies
families, and promotes our security.416

It should be noted that national unity is referred to in one US document as a source of insecurity:
autocratic rulers have repressed basic human rights and democratic practices in the name of
economic development and national unity.417

Parameter: National unity

Based on the above description, this parameter assesses the extent to which national unity, in the
views of the selected countries, is emphasised as a source of security.
We assess the selected countries based on the following scale:
Limited emphasis on national unity as a source of security (10) National unity as a source of
security (100); national unity is not mentioned: (0).418

Country Score 1990s Score 2000s

France 60 80

Italy n/a 30

Sweden n/a 0

Netherlands 0 40

United Kingdom 60 75

412
Ibid.
413
Ibid.
414
Ibid.
415
The White House, National Strategy for Homeland Security, 2007.
416
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010.
417
The White House, National Security Strategy, 2010, p. 35
418
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

76
European Union n/a n/a

Ukraine n/a 90

Russia 90 90

United States 50 70

Table 17: Scores per country over time

Figure 20: National unity as a source of security; cross-country comparison in the nineties and in the years
2000

2.5.5 Societal resilience


The definition of societal resilience varies among authors. According to Bruneau, M., S.E. Chang, et
al., it is the ability of social units to mitigate hazards, contain the effects of disasters when they
occur, and carry out recovery activities in ways that minimise social disruption and mitigate the
effects of future disasters.419 In the views of Walker, B. Et al, societal resilience is [t]he capacity of a
system to absorb disturbance and reorganise while undergoing change so as to still retain essentially
the same function, structure, identity and feedbacks,420 whereas Cascio describes it as [t]he
capacity of an entity [] to withstand sudden, unexpected shocks, and (ideally) be capable of
recovering quickly afterwards.421 A society becomes resilient through elements of public trust,
government accountability, robust institutions (e.g., Ukraine), the participation and empowerment of
a variety of actors (in most countries views), creativity (e.g., Russia), equality, common identity and
memory (e.g., France, Netherlands). In French views, the resilience of democratic institutions, of

419
Bruneau, M., S.E. Chang, et al., A Framework to Quantitatively Assess and Enhance the Seismic Resilience of
Communities, in Earthquake Spectra, Vol. 19, No. 4, 2003, pp. 733-752; cited in Crisis and Risk Network (CRN), Centre for
Security Studies (CSS), ETH Zrich Commissioned by the Federal Office for Civil Protection (FOCP), Factsheet Examining
Resilience: A concept to improve societal security and technical safety, Zurich, June 2009
420
Walker, B. et al., Resilience Thinking: sustaining Ecosystems and People in a Changing Word, Washington: Island Press,
2004. Cited in Evans, A., Steven, D. (2009) Risks and resilience in the new global era in Renewal Vol. 17, No. 1. Retrieved
from Crisis and Risk Network (CRN), Centre for Security Studies (CSS), ETH Zrich Commissioned by the Federal Office for
Civil Protection (FOCP), Factsheet Examining Resilience: A concept to improve societal security and technical safety,
Zurich, June 2009
421
Cascio, J., Resilience in the Face of Crisis: Why the Future Will Be Flexible in FastCompany.com, 2009; Crisis and Risk
Network (CRN), Centre for Security Studies (CSS), ETH Zrich Commissioned by the Federal Office for Civil Protection
(FOCP), Factsheet Examining Resilience: A concept to improve societal security and technical safety, Zurich, June 2009

77
society and of economic life as a whole is identified in 2008.422 Societal resilience can result from
different elements, for instance, from societal cohesion, public trust, education, the support of the
civil society, the private sector, or even the media. The most recent French White Paper emphasises
the news media a key partner in the event of a crisis,423 an ambition which was not developed to a
comparable extent in 1994.424 The pressure from the media was even denounced then, for creating a
restrictive environment. In 1994, societal cohesion is explicitly defined as a necessary condition to
the nations security. In 2008, this element is completed the necessity to rally the nation.425
Concretely, this means the support of the French society is crucial to the effective implementation of
national security (e.g., through the existence of a common memory,426 but also the training and
education of young people.427 It is interesting to note that Administration appears as a key name
related to security when observing the text mining results for both documents. Indeed, another
element of importance in both documents is the societal and administrative support which helps
protect the national security: everyone must be aware of its responsibilities.428 Even more so in
2008, when the important role of institutional reforms is central, e.g., larger role of Parliament, and
reorganisation of public authorities.
Elements of societal resilience are not directly mentioned in the Italian policy documents. However
there is a reference to a multilayered security which requires initiatives of a political, diplomatic,
economic, social, legal and informational nature beyond traditional military aspects.429 Such an
extension also embraces aspects which are generally connected to internal security, or external
function, such as public welfare. Furthermore, in more civil related documents, strong reference is
made to the need for the Government and civil authorities to plan, prepare, respond and prevent
civil emergencies.430 This seems to indicate an initial shift towards social resilience.
The support of the civil sector is important to the Swedish societal resilience. Long-term efforts by
central agencies, municipalities, county councils, organisations and the business sector are needed to
create an adequate crisis management capability, where priority can be allocated to the most
effective measures in the event of a severe peacetime emergency occurring in society. This desired
capability covers a large number of social sectors, where it will be necessary to consider and
prioritise between measures.431
The support of both the civil society and private actors is a source of security in Dutch views. The
public and private parties both in a national and an international context play a role in protecting
national security; a safe and secure living environment in the Netherlands requires everybodys
involvement: from government in all its various forms and levels, but also from the private sector and
civil society, including the business community.432 The armed forces can also contribute to social

422
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 60
423
Ibid., p. 182
424
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994, p. 20
425
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008
426
Ibid., p. 287
427
Ibid., p. 10, 288
428
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994
429
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, p. 20
430
Presidenza del Consiglia Dei Ministri, Law on the creation of the Italian National Civil Protection Authority, 1992, pp. 2-3
431
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy 20052007 (summary), 2004,
p. 29
432
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007

78
cohesion in the Netherlands.433 Societal resilience is directly referred to in the 2004 document: the
objective is to strengthen and improve the effectiveness and quality of the system of crisis
management. On these way the government wants to contribute to a resilient, robust and therefore
safer society.434 For this purpose, citizens should be taken seriously and be regarded as an equal
partner.435 In addition, as the increased complexity, individualism and changing composition of
Dutch society place social cohesion under pressure, the Dutch government must respond by
promoting equal opportunities for all and prevent the derailment of social deprivation and social
insecurity.436

Recent British views mention this source of security, less extensively however: human and social
resilience, often at the community level, will continue to be crucial to ensuring British citizens future
security and well-being.437 Indeed, in an age of uncertainty resilience has slowly become a dominant
attribute of security. Recent documents apply the concept to any institutions and infrastructure of
British society.438
The EU recognises the need for resilience to disasters and crisis particularly associated with terrorist
and cyber-attacks on critical, against the spread of diseases and climate change. Key components of
EUs cross-sectoral response includes a more efficient and coherent crisis and disaster management.
The EU particularly stresses the need for investment in prevention and preparedness, solidarity in
responding, risk assessment, and risk management at the EU level.439 As early as 1999, the EU
insisted on the importance of developing an open dialogue with civil society on the aims and
principles of this area in order to strengthen citizens acceptance and support.440 The accountability
and transparency of EU institutions is an important element in gaining this support: in order to
maintain confidence in authorities, common standards on the integrity of authorities should be
developed.441 Although it does not seem to be included in 2003, this principle is constantly
reaffirmed over time, and the active participation of certain actors is progressively given a stronger
importance: in 2008, civil society and NGOs have a vital role to play as actors and partners;442 and
more specifically in 2010, civil society organisations can also play a role in running public awareness
campaign.443
According to the Ukrainian perspective, an important element of national security is the participative
dimension of security. Indeed, the national security and defence policy are formed by the interested
state authorities with the participation of science establishments, citizens and NGOs. Over time,

433
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008
434
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
435
Ibid.
436
Ibid.
437
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 42
438
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 5.
439
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS),
Communication from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels,
November 22, 2010; see also: Council conclusions on a Community framework on disaster prevention within the EU,
November 2009.
440
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
441
Ibid.
442
European Council, S407/08 Report on the Implementation of the European Security Strategy: Providing Security in a
Changing World, Brussels, December 11, 2008
443
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010

79
efforts are made towards ensuring openness and transparency of national security strategies and
military policy processes, e.g., through the involvement of mass media, NGOs, national and foreign
experts into its discussion.444 The importance to inform citizens and publish policy documents
becomes more emphasised. Both the 2007 and 2010 National Security Strategies identify the
importance of raising the civil trust in the judicial system445 as a source of stability. Indeed, the
activity of the Ukrainian security and defence sector is not open and transparent enough; corrupted
state institutions and systemic deficiencies in the judicial system cause public trust crises. As a result,
more democratic civil control must be exerted on the system of institutions that guarantees national
security and defence. The 2010 Concept even envisages the supervision of state institutions activity
through civil society institutions, which would ensure security.
In Russian views, internal actors have a role to play in safeguarding military security: Enterprises,
institutions, organisations, public associations, and citizens of the Russian Federation.446 This
element was emphasised in 1997, although to a lesser extent: the Russian Federation components'
organs of state power () conduct in conjunction with organs of local self-government measures to
enlist citizens, public associations, and other organisations to assist in safeguarding national security
in accordance with Russian Federation legislation.447 It is in the interest of society to enhance the
population's creative activeness.448 In recent years, the emphasis on societal resilience becomes
more pronounced. The protection of national security becomes based on the establishment of
effective mechanisms ensuring the interaction of the organs of state power with the civil society
in order to implement the rights of citizens of the Russian Federation on life, safety, labor, housing,
health and healthy lifestyle for affordable education and cultural development.449 In spite of these
elements, it should be noted that the role of the civil society is much less emphasised than in other
countries policy documents.
The US policy documents mostly those dealing with homeland security consistently reflect the
importance of societal resilience in US views through the coordination, responsibility, involvement
and commitment of all actors in defending the country, and the empowerment, mobilisation and
proactiveness of society. As stated in the 2002 National Strategy for Homeland Security: The private
sectorthe Nations principal provider of goods and services and owner of 85 percent of our
infrastructureis a key homeland security partner (...). An informed and proactive citizenry is an
invaluable asset for our country in times of war and peace. Volunteers enhance community
coordination and action, whether at the national or local level; the Strategy (...) seeks to empower
all key players by streamlining and clarifying federal support processes. 450 Likewise, in 2007:
Homeland security is a shared responsibility built upon a foundation of partnerships. Federal, State,
local, and Tribal governments, the private and non-profit sectors, communities, and individual
citizens all share common goals and responsibilities as well as accountability for protecting and
defending the Homeland.451 Furthermore, the 2010 Quadrennial Homeland Security Review places a
large emphasis on enterprise-wide missions which ensure homeland security and necessitates the

444
Ukrainian Ministry of Defence, National Strategic Defence Bulletin until 2015, 2004 (95
445
Ukrainian Ministry of Defence, National Security Strategy, 2007
446
Russian Ministry of Foreign Affairs, Military Doctrine, 2000
447
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
448
Ibid.
449
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
450
The White House, National Strategy for Homeland Security, 2002, p. viii
451
The White House, National Strategy for Homeland Security, 2007, p. 4

80
responsibility of a variety of actors and in the definition of homeland security involving a variety of
actors: Hundreds of thousands of people from across the Federal Government, State, local, tribal,
and territorial governments, the private sector, and other nongovernmental organisations are
responsible for executing these missions.452 In other words, the engagement of the community and
the collective strength of this entire country complement government action, as individual citizens
and cohesive communities are key partners in the homeland security enterprise and have an
essential role to play in countering terrorism.453 Interestingly, the 2007 homeland security
document refers to the resilience of the American spirit.454

Parameter: Societal resilience

Based on the above description, this parameter assesses the extent to which societal resilience, in
the views of the selected countries, is emphasised as a source of security.
We assess the selected countries based on the following scale:
Limited emphasis on societal resilience as a source of security (10) Societal resilience as a source
of security (100); none of the aspects of societal resilience are mentioned: (0).455

Country Score 1990s Score 2000s

France 80 90

Italy n/a 60

Sweden n/a 70

Netherlands 10 90

United Kingdom 60 90

European Union 40 80

Ukraine n/a 90

Russia 30 50

United States 70 90

Table 18: Scores per country over time

452
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010, p. ix
453
Ibid.
454
The White House, National Strategy for Homeland Security, 2007, p. 31.
455
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

81
Figure 21: Societal resilience as a source of security; cross-country comparison in the nineties and in the
years 2000

2.5.6 Military power


We refer to the importance of military power as the extent to which the emphasis is placed on
military capabilities as a source of security. Increasingly, national security is based on civilian and
military co-operation; in recent years, it also appears that military force can be used in broader
contexts (e.g., humanitarian, resources), and no longer appear as the panacea.
French documents place a similar emphasis on military power over the years. A number of
capabilities are given priority for further development in the 2008 French White Paper. The
improvement of detection and early warning capabilities, an offensive cyber-war capability or the
launch of new programs related to intelligence and foresight emphasise the strategic importance of
knowledge and intelligence newly defined in 2008. Nuclear deterrence as a means to guarantee
security prevailed in the 1994 White Paper; this strategic importance is still present in 2008, although
to a lesser extent. The text mining results show an interesting shift in the use of words defining
security: defence is no longer a key theme in 2008, whereas it used to be the second most
important theme in 1994. The same observation is made for military. The following text fragment
extracted by the text mining software provides a form of explanation: Military force remains useful
and even indispensable in certain circumstances, but by itself it can no longer claim to provide a
sufficient response to crises.456 A new fundamental principle of the 2008 French National Security
Strategy becomes the coordination between civilian and military agencies: National Security (...)
calls for closer co-operation between civil and military forces, ministries and the State and other
bodies concerned.457
Both French and Italian documents place an important emphasis on the modernisation of capabilities
in order to deal effectively and timely with present and future threats. In Italian views, this is mainly
viewed as requiring the integration of command and information and the development of a
technological advantage.458
Building and maintaining a modern and efficient army are important factors in the Italian security.
The emphasis is placed on the modernisation of Italian capabilities in order to deal effectively and
timely with present and future threats. This is mainly viewed as requiring the integration of
456
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008
457
Ibid.
458
Ministero della Difesa, Strategic Concept, 2005, p. 25-26.

82
command and information and the development of a technological advantage.459 However, in more
recent documents this position has been slightly deemphasised in favour of the economic power.460
Military defence is a key resource in an active Swedish foreign and security policy, aimed at
peaceful and sustainable development in the world through the promotion of democracy, human
rights and social justice.461 The Swedish military power emphasis is more directed towards the
military capabilities as a source of additional capability to handle complex situations. It should be
possible to use resources of the total defence to help the society at large to deal with serious
incidents and severe emergencies in peacetime. The total defence has been reduced and is more
focused on international security.462
As a result of the fact that most Dutch documents focus on defence policy and often reassess the
Dutch capabilities, the improvement of the armed forces is emphasised as a source of enhanced
security. The armed forces constitute an important (...) instrument promoting peace and stability
throughout Europe and elsewhere in the world.463 The 2000 White Paper describes the role of the
armed forces as protectors of national security both on the national and allied territory. In Dutch
views, major objectives are the enhancement of the military capabilities and resources of NATO and
European defence, the improvement of the flexibility and sustainability of the armed forces, as well
as peacekeeping missions.
Building and maintaining a modern, efficient and affordable army is a key factor in the British
security. A stronger emphasis has been on maximising military resources, while eliminating
duplication and waste to cope with broader responsibilities in an era of globalisation and
internationalism where British interests are seen as directly connected with external influences and
developments.464 This view has been consistent within the British policy documents. The EU
mentions military power as of 2003, yet in only two of the selected documents, and with nuance. For
instance, the ESS (2003) states that none of the new threats is purely military; nor can any be
tackled by purely military means. Each requires a mixture of instruments.465 In addition, threat or
use of military force cannot be allowed to solve territorial issues anywhere.466 This suggests that
military instruments alone are not a (sufficient) source of security. Nevertheless, the EU shows its
commitment towards military power, e.g., by strengthening efforts on capabilities for military
missions. What is more, these efforts must be supported by a competitive and robust defence
industry across Europe, with greater investment in research and development.467
The dimensions of security emerging from Ukrainian Defence Policies are also much more of a
military nature. Most defence policy documents place a strong emphasis on the armed forces as the
basis of national security: The armed forces of Ukraine will be the core of national security

459
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008
460
Ibid., p. 101
461
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy 20052007 (summary), 2004,
p. 5
462
Ibid., p. 10-11
463
Dutch Ministry of Defence, White Paper on Defence, 2000
464
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998, p. 5
465
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
466
European Council, S407/08 Report on the Implementation of the European Security Strategy: Providing Security in a
Changing World, Brussels, December 11, 2008
467
European Council, S407/08 Report on the Implementation of the European Security Strategy: Providing Security in a
Changing World, Brussels, December 11, 2008

83
system;468 our citizens want to have armed forces that guarantee their freedom, national
independence and the respect of their neighbours goals valued by every nation;469 a State can be
strong, stable and secure only when it has a strong armed forces; the armed forces always was and
is a basic, fundamental element of national security.470 More specifically, the 2008 Defence Policy
insists on the importance of creating highly professional and mobile armed forces in Ukraine;471
this objective came from the need to prevent and respond to crises such as that of Caucasus in 2007.
Another military source of security worth noting is emphasised in the 2010 document, and consists in
merging military and civil opportunities of all components of the system of national security.472
In Russian views, military preparedness and modernisation of the military are major elements to
Russias national security in the defence sphere; for instance, according to the 1997 document,
threats lie in the incomplete nature of the process of the reform of the states military organisation,
the continuing gulf between political aims and their implementation in military and military-technical
policy, inadequate financing for national defence, the lack of elaboration of modern approaches
toward military organisational development, and the imperfection of its normative legal base.473 At
the same time, the document recognised that the expansion of security to the global level
significantly increases the opportunity to ensure Russias national security by non-military means,
i.e. by means of legal treaty, political, economic, and other measures.474 In recent years, Russia
envisages the use of military force in a broader perspective, e.g., as a solution in the competition for
resources.475 Yet the massive use of military force could lead to consequences that would be
comparable to those of the global economic crisis.476
A similar nuance appears in recent US views.For instance, the 2011 US National Military Strategy
indicates that while the strength of our military will continue to underpin national security, we must
continuously adapt our approaches to how we exercise power. With respect to homeland security
documents, there is less emphasis on the military in the 2010 Quadrennial Homeland Security
Review Report than in the 2002 National Security for Homeland Security. In 2010, military activities
also appears to be connected to civilian activities in many instances.477

Parameter: Military power

Based on the above description, this parameter assesses the extent to which military power, in the
views of the selected countries, is emphasised as a source of security.
We assess the selected countries based on the following scale:
Limited emphasis on military power (10) Strong emphasis on military power (100).478

468
Ukrainian Ministry of Defence, National Strategic Defence Bulletin until 2015, 2004 (95
469
Ukrainian Ministry of Defence, White Book 2006: Defence Policy of Ukraine
470
Ukrainian Ministry of Defence, White Book 2009: Armed Forces of Ukraine
471
Ukrainian Ministry of Defence, White Book 2008: Defence Policy of Ukraine
472
Ukrainian Ministry of Defence, White Book 2010: Armed Forces of Ukraine
473
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
474
Ibid.
475
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
476
Ibid.
477
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010, e.g., pp. 48, 84, 85.
478
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

84
Country Score 1990s Score 2000s

France 100 100

Italy n/a 60

Sweden n/a 70

Netherlands 100 80

United Kingdom 90 90

European Union 0 50

Ukraine n/a 90

Russia 90 85

United States 80 80

Table 19: Scores per country over time

Figure 22: Military power as a source of security; cross-country comparison in the nineties and in the years
2000

85
2.6 Strategies for Security
2.6.1 Formulation of strategy
As a result of the recognition of the link between internal and external threats, and the integration of
additional dimensions of security over time, many national security strategies have become more
comprehensive in many aspects.
In the 1994 French White Paper, the scope of national security was restricted to defence policy. The
document emphasises the decline of the logics of defence purely focusing on military dimensions.479
In 1994, domestic and foreign security remain defined as distinct from each other, however France
will have to wait until 2008 for the conceptualisation of a comprehensive national security strategy.
Both the very name and the content of the new document published in 2008 stress and deal with the
importance of national security as an overarching concept combining both defence and security
policies and strategies.480 The national strategy embraces both external and domestic security,
military means as well as civil ones, defence policy in the strict sense of the term and domestic
security policy and civil security, together with foreign policy and economic policy.481 In the 2008
White Paper, the continuity between domestic and foreign security is fully recognised as a new
strategic parameter.
The Italian documents outline a comprehensive strategy where the emphasis is an integrated
response cutting across traditional policy boundaries at the national but above all at the
multinational level. The Italian documents recognise that security requires integration and
coordination beyond the traditional military and defence activities. This approach is needed given
the rapidly evolving nature of future threats.482 The internal and external dimensions are therefore
viewed as closely connected and as part of a single concept of national security.
As a result of the recognition of the increased international dimension, Sweden has outlined a new
strategy to address the need for a usable, accessible, flexible defence force. The Swedish Armed
Forces must be deployable here and now and contribute to a greater extent than hitherto to
Swedens security and stability in the world.483 The Swedish civil security documents have outlined a
comprehensive strategy for emergency management.
In the Dutch policy documents, the focus is predominantly on defence policy until the beginning of
the years 2000. However, the 1993 document already stressed that greater priority should be given
to improving the cohesion in the use of all the various instruments of foreign policy;484 the 2000
White Paper suggested that foreign policy and domestic policy are bound to overlap. This is
comparable to the paradigms defined in other White Papers produced in the first decade of the years
2000. The 2005 National Defence Doctrine made a first step towards developing an overarching,
integrated Dutch military doctrine, which is justified in the document by the fact that the joint
operations have become more commonplace. However, the first comprehensive definition of
national strategy only emerges in the 2007 National Security Strategy. With respect to crisis
management, the understanding of civil security has expanded as well: the use of 'civil protection' in

479
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994, p. 13
480
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 15
481
Ibid., p. 16
482
Ministero della Difesa, Strategic Concept, 2005p. 41-43
483
Swedish Ministry of Defence, A Usable and Accessible Defence Force The Policys Orientation, 2009
484
Dutch Ministry of Defence, Defence Priority Review (Hoofdlijnennotitie), English summary, 1993

86
crisis situations requires more (...) than betting only on the field of disaster and requires further
elaboration.485

Both EU strategic documents (ISS and ESS) outline several areas and actions in which members states
will and does work together to combat and prevent security threats and challenges. In the ISS, five
strategic objectives are highlighted: 1) Disrupt international crime networks; Prevent terrorism and
address radicalisation and recruitment; 3) Raise levels of security for citizens and businesses in
cyberspace; 4) Strengthening security through border management; 5) Increase European resilience
to crises and disasters.486 It further emphasises that the implementation of the common objectives is
a shared responsibility between EU member states and the EU agencies. This shared endeavor that
requires agreed procedures and clear roles and responsibilities. It is suggested in the ISS that with the
entering into force of the Lisbon treaty in 2009, the ISS shall be the shared strategy among member
states in which measures and actions shall be taken.487 The ESS emphasises that the EU shall take a
proactive stance in combating threats from terrorism, organises crime and state failure. It further
emphasise the role of the EU in global crisis management and the promotion of human rights and
democracy in the neighborhood as important common objectives.488 It should however be noted that
the 2003 ESS is not fully comprehensive, as it mostly integrates elements or actors of the external
environment, e.g., international partners, global challenges, failed states. The recognition of external
and internal security as interdependent,489 and the objectives to insure consistency with the wider
European Security Strategy and to exploit synergies between internal and external policies490 only
appear in 2010.The creation of the British National Security Council (NSC) in May 2010 epitomises
the comprehensive and integrated approach that the UK has been pursuing since the end of Cold
War. Indeed, the primary objective of the NSC is to ensure a strategic and tightly coordinated
approach across the whole of government to the risks and opportunities that the UK faces. The
majority of British documents underline the importance of active management of internal and
external threats and the need for an integrated external policy through which British interests can be
pursued using all the instruments at the UKs disposal, including diplomatic, developmental and
military. This approach started after the Cold War491 and has been reinforced ever since. Indeed, in
more recent years there has been a stronger recognition of a fully integrated and comprehensive
security where civil and economic components are as important as diplomatic and military ones.492
The text analysis also supports the idea of an integrated and comprehensive approach for security:

485
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
486
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010, pp.
4-15
487
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010
488
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
489
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
490
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010
491
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998, p. 5-7
492
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 9; UK
Cabinet Office, National Risk Register for Civil Emergencies, 2012, pp. 1-58

87
security in the 21st Century is multi-dimensional. It demands a multi-dimensional response both in
the range of institutions we call on to provide our security, and within each of those institutions.493
Ukraine is one of the few post-soviet countries that has adopted a comprehensive approach to
security at the level of foreign policy concepts, with two national security strategies in 2007 and
2010. The National Security Strategy adopted in 1997 reflected Ukraines efforts to create a national
security framework coming from the need to reconcile the newly acquired independence with the
European interdependence.
The Russian National Security Strategy prepared in 1997 reflects the aggregate of officially accepted
views regarding goals and state strategy in the sphere of ensuring the security of the individual,
society, and the state from external and internal threats of a political, economic, social, military,
man-made technological, ecological, informational, or other nature in the light of existing resources
and potential.494 The 2009 National Security Strategy is comprehensive in the means deployed to
ensure security, yet the strategy is described as aiming to implement national priorities; it does not
provide an extensive description of the strategy itself.
The US has a tradition where the executive branch of government is very explicit on its strategy,
epitomised in periodical documents like the national security strategy, the national military strategy,
or the quadrennial defence reviews. Further, these documents clearly reflect how convictions, ideas,
solutions and strategies of the political leaders change over time. The most recent document dealing
with homeland security seems to place a greater emphasis on joint actions and efforts, as well as on
the need for a comprehensive strategy: The national security of the United States depends on a
comprehensive approach to preserve and advance our interests while managing the risks posed by
the threats outlined above. An effective strategy for homeland security forms an important
component of our overarching national security strategy.495 Finally, as the security strategy is
defined by the president, it is comprehensive by nature.

Parameter: Formulation of strategy

Based on the above description, this parameter assesses the extent to which the formulation of
national security strategies is based on a narrow or comprehensive perspective.
We assess the selected countries based on the following scale:
No assessment possible (0) Narrow, separate strategy (10) Comprehensive, integrated
strategy (100).496

Country Score 1990s Score 2000s

France 50 100

Italy n/a 80

493
UK Ministry of Defence, European Defence, 2001
494
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
495
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010, p. 8.
496
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

88
Sweden n/a 60

Netherlands 10 90

United Kingdom 70 100

European Union n/a 60

Ukraine n/a 90

Russia 60 75

United States 90 90

Table 20: Scores per country over time

Figure 23: Formulation of strategy: narrow versus broad; cross-country comparison in the nineties and in the
years 2000

2.6.2 National versus international perspectives


Whereas most definitions of national security continue to focus on the national impacts of threats,
and conflicts in specified zones (blocs of the Cold War), the importance of global threats and the
expansion of instabilities further from national borders have become more perceptible.
The 2008 French White Paper emphasises that the dimensions of national security can no longer be
envisaged outside of a global perspective.497 The results generated by the text mining software show
that international and global appear to be significantly relevant to security, revealing the
attention France pays to the importance of the global dimension of security. Simultaneously
however, national and borders are prevalent concepts that relate to security in both 1994 and
2008. Regional threats were a greater concern in the nineties,498 due to the potential outbreak of
crises in Europe after the end of the Cold War. The 2008 White Paper determines a new geographical
focus of insecurity, with the shift from the traditional spheres of influence and the regional focus
observed in the 1994 document to a new axis critical to French and European security and named the

497
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 59
498
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994

89
arc of crisis.499 This arc is defined from the Atlantic Ocean to the Sea of Oman (new crises are taking
place from the Middle East to Pakistan) and the Indian Ocean.
Regionalism is a core dimension of Italian security. Although the Italian perspective recognises that in
the present global environment it is difficult to geographically isolate threats to clearly
circumscribed areas, areas of geographical interest are clearly stated. This implies that Italy views the
world as a combination of regions where Italian interests and willingness to intervene may differ
greatly from region to region, both in term of commitment of resources, efforts and doctrine. The
key regions for Italy are: NATO, the EU, the Balkans, Eastern Europe, the Caucasus, North Africa and
the Horn of Africa, the Near and Middle East and the Persian Gulf.500 However, Italy recognises the
need for a transnational focus given the rapidly evolving nature of future threats.501
Sweden has a distinguishable focus on the international perspective. The Swedish government bill
Our Future Defence - The focus of Swedish defence policy 20052007 (2004) states that todays
threats and conflicts are not restricted to a single country or region. They produce ripple effects and
have an impact on all of us. By participating in international operations for peace and security in the
world, Sweden also enhances its own security.502 The Government stresses in the same bill the
central importance of effective multilateral co-operation for Swedish security policy.503
The international dimension of security is of foremost importance to the Netherlands and has
remained so over time: the Netherlands traditionally defines security at national, regional and
international levels.504 This dimension was already recognised as prevalent in 1993, as conflicts in
other parts of the world are becoming increasingly important for the situation in the Netherlands.505
Ten years later, security becomes veritably defined as located beyond the national context: an
active security encompasses the willingness to early intervention in crises elsewhere in the world, of
course in international context.506 In 2004, the Netherlands is aware that crisis management has
increasingly taken on international dimension.507 In addition, national security is envisaged as
depending on that of regional (EU) or international entities (NATO) and cannot be dissociated from
that of Europe: : the position and security of Europe - and hence also of the Netherlands.508A
particular characteristic of Dutch defence and security policy is that it also strongly focuses on the
overseas territories of the Netherlands.

The United Kingdom has traditionally supported an international perspective. In recent years, this
international stand has further intensified; policy makers have deemed the UK to be one of the most
open societies in Europe and an economic and political vital link in the global network. Successive

499
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 41
500
Ministero della Difesa, Strategic Concept, 2005, p. 26
501
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, p. 41-43
502
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy 20052007 (summary), 2004,
p. 5
503
Ibid., p. 9
504
The text mining results generated from all Dutch policy documents loyally reflect this perspective: security emerges as
being related to names such as NATO, EU/European, and words such as external, foreign, international - showing
the outside-in conception of security in the Netherlands - but also national, risk, threat, and peace (which for the latter
is not as relevant when observing the French documents).
505
Dutch Ministry of Defence, Defence Priority Review (Hoofdlijnennotitie), English summary, 1993
506
Dutch Ministry of Defence, Prinsjesdagbrief, 2003
507
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
508
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008

90
British governments have been willing to exercise force across the globe.509 As result, British security
is highly dependent on and fully embedded in external events and developments. Indeed, an
interesting aspect of this internationalism is the recognition that that although Europe and key
economic partners (e.g., the US) are important to the security of the UK, the British vital interests are
not only confined to Europe and the US: developing and emerging countries are becoming more and
more dominant in the security policy documents of the UK.
Interestingly, the EU tends to focus on its neighborhood: building security in our neighbourhood is
a major objective in the 2003 ESS,510 and aims to extend the benefits of economic and political
cooperation to our neighbours in the East.511 This close neighbourhood particularly includes Russia,
in the same document: we should continue to work for closer relations with Russia, a major factor in
our security and prosperity.512 The interest for EU neighbours is reaffirmed in 2010, as working with
them is seen as a way to guarantee the quality of our democracy and public confidence in the
Union, and address the root causes of the internal security problems faced by the EU. 513
In addition, EU enlargement has been emphasised as an important strategy towards ensuring
security: Successive enlargements are making a reality of the vision of a united and peaceful
continent.514 The focus of European security strategies seems to be mostly regional and EU-centric,
although some elements suggest the EU systematically incorporates a global perspective into its
strategies. For instance, in the 2010 ISS, the values and priorities in the Internal Security Strategy
(...) in our neighbourhood and beyond. In recent years, it is declared that the EU must not restrict
itself just to cooperation between the law-enforcement agencies of Member States and other
countries, especially EU neighbours.515 In addition, in the selected document produced in 1999, the
global perspective was already expressed in the fact that the existence of freedom guaranteed by the
EU acts as a draw to many others world-wide.516
Over time, Ukraines perspectives on security remained national and regional, with some additional
emphasis on the international context in recent years. The countrys security - and economic
prosperity itself is organically linked to that of Europe.517 It should be noted that in recent years,
more emphasis is placed on the potential regional role and influence of Ukraine: Raising Ukraines
role as an active participant in resolving frozen conflicts, first of all, in Transdniestria region.518
Ukraines security is also resolutely internationally oriented, as the ultimate purpose is to raise
Ukraines international status and promote its national interests. In the 2007 Ukrainian National

509
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 3
510
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
511
Ibid.
512
Ibid.
513
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
514
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
515
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
516
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
517
Ukrainian Ministry of Defence, National Strategic Defence Bulletin until 2015, 2004 (95
518
National Security and Defence Council of Ukraine, National Security Strategy, 2010

91
Security Strategy, national security must further enhance the international standing and influence of
the Ukrainian state in the modern world.519
Russia openly seeks to build a multipolar world. At the same time, many developments in the
international environment are consistently and widely perceived as potential threats to Russias
national security. In 1997, Russian foreign policy efforts were defined as depending on the creation
of a model for ensuring global, regional, and sub regional security (...) based on the principles of
equality and indivisible security.520 This text fragment shows the importance of an equal and global
partnership to ensure international security, but also secure the international position and influence
of Russia. The 2009 National Security Strategy asserts that Russia should develop into a global power,
given its influence on global processes.
Although much attention is paid to homeland security, the United States definition of national
security is resolutely internationally oriented over the entire period - as could be expected from the
worlds single surviving superpower. The 1995 National Military Strategy stated that today the US
faces no immediate threat to its national survival. However, global interdependence and
transparency, coupled with our worldwide security interests, make it difficult to ignore troubling
developments almost anywhere on earth.521 The National Security Strategy in 2002 stated that the
aim of this strategy is to help make the world not just safer but better. Two years later, the 2004
National Military Strategy establishes homeland security as the first priority of the Nation. The 2006
National Security Strategy adds elements reflecting a tendency for expansionism: to protect our
Nation and honour our values, the US seeks to extend freedom across the globe by leading an
international effort to end tyranny and to promote effective democracy. America cannot know
peace, security, and prosperity by retreating from the world.522 The 2010 National Security Strategy
voices ambitions to renew US global leadership in order to more effectively advance [national]
interests in the 21st century.523

Parameter: National versus international perspectives

Based on the above description, this parameter assesses the extent to which national security, in the
views of the selected countries, is a national or a global matter.
We assess the selected countries based on the following scale:
No assessment possible (0) National perspective (10) Both national and international
perspectives (50) International perspective (100).524

Country Score 1990s Score 2000s

France 60 80

Italy n/a 50

519
Ukrainian Ministry of Defence, National Security Strategy, 2007
520
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
521
Department of Defence of the United States of America, Joint Chiefs of Staff, National Military Strategy, 1995, p. 2
522
The White House, National Security Strategy, 2006, p. 3
523
The White House, National Security Strategy, 2010, p. 1
524
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

92
Sweden n/a 100

Netherlands 70 50

United Kingdom 80 50

European Union 40525 60

Ukraine n/a 50

Russia 40 60

United States 80 60

Table 21: Scores per country over time

Figure 24: National versus international perspectives; cross-country comparison in the nineties and in the
years 2000

2.6.3 Ambitions for international co-operation and multilateralism


This dimension includes (if applicable):
The emphasis placed on international and regional co-operation, international peace, order and
stability; regional co-operation refers to the importance of developing partnerships and
relations with neighbouring countries or regional alliances.
The role of international institutions in ensuring security. International institutions refer to the
UN, or the Organisation for Security and co-operation in Europe (OSCE);
The emphasis placed on the transatlantic partnership, i.e., NATO membership and the
importance of the countrys relation with the Alliance;
The role of Europe in ensuring security, including the European integration, European security, or
European security co-operation.
International co-operation and partnerships are major elements of national security strategies, and
have become increasingly emphasised since the end of the Cold War and the recent perception that
in a multipolar world, partnerships are essential. After 9/11, co-operation is also increasingly defined
as the solution to threats emanating from terrorism, and to the decline of major international forces.

525
In the case of the EU, national perspective is understood as a EU-centric focus.

93
In some national views, international co-operation is also a means towards building, preserving or
reinforcing a countrys international stature.
The overall French strategy, while traditionally focused on nuclear deterrence and sovereignty, has
undergone a shift from basing the national strategy on independence to one basig it on
interdependence, i.e. towards Europeanisation of security policy and towards more atlanticism.
France invokes multilateralism as an important element to ensure national security more by
necessity in the nineties, but with more conviction in 2008: The 2008 White Paper gives priority to
the reinforcement of multilateralism, founding principle of security. This can be explained by the
idea that the collective mobilisation of all actors on the international scene is the only means to
resolve or prevent the new security issues raised by globalisation.526
According to the French document prepared in 1994, the 1992 EU Treaty, which suggests a
perspective for common defence527 has become a major basis for the effectiveness of security. More
generally, the 1994 White Paper emphasises the hopes that the European integration process will be
the vector of stabilisation on the continent. In 2008, the EU is recognised as a major player in
international security. As identified by the text mining software which connected text fragments to
security, making the European Union a major player in crisis management and international
security is one of the central tenets of our security policy.528 The European framework clearly stands
out as a whole new priority of the French strategy.529 The latest national security strategy also pays
more attention to Europe and the transatlantic co-operation, although the French documents both
recall their traditional areas of national sovereignty. The 2008 document states that the EU and
NATO are no rivals. The 2008 White Paper emphasises that the European Union and the North
Atlantic Alliance are complementary.530 Although renewing NATO was already an objective in the
1994 White Paper, France reaffirms the nations commitment to the Alliance and its will to renovate
the transatlantic partnership in 2008.531 A major innovation is that the 2008 White Paper gives a new
strategic direction to the nation, by normalizing the relationship of France and NATO. This will be
implemented a year later with the reintegration of France in the Alliances military command
structure. Furthermore, the text mining results show that NATO is a key concept in 2008, but was
not an important one in 1994.
Italian tradition and strategic culture have always been atlanticist and multilateralist. International
co-operation and multilateralism are important elements of the Italian security. As the protection of
national security assumes a wider meaning, Italy has focused on developing even stronger co-
operation, for stability and international security, with key international organisations, namely NATO,
the EU and the UN.532 The text mining results also identify the importance of the Euro-Atlantic focus
in the Italian security approach. For instance, European Union and NATO are also correlated with
the concept of security. Italian security is seen as intrinsically embedded within the Euro-Atlantic
area and its strategic and/or vital interests.533 In particular, NATO guarantees an elevated level of

526
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008
527
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1 and 2, 1994, p. 15
528
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008
529
Ibid., p. 306
530
Ibid., p. 304
531
Ibid., p. 93
532
Ministero della Difesa, Strategic Concept, 2005, p. 16
533
Ibid., p. 10, 60

94
stability and security in Europe.534 It is interesting to note that throughout the post-Cold War era,
Italy has been willing to affirm its importance within the alliances it belongs to, by actively engaging
itself not only in the regions of its direct interest (Balkans, the Mediterranean, North Africa and the
Middle East), but also in more distant theatres.
Sweden places very strong emphasis on international co-operation with a main focus on the roles of
UN and EU in ensuring security. Sweden contends that the EU is central to Swedens security and that
the UN has the ultimate responsibility for maintaining international peace and security.535
Furthermore, the report A usable and accessible defence force the policys orientation (2009) also
stated that the Government wished to intensify co-operation with the Nordic countries in recent
years.536
The Dutch strategic culture has always been more atlanticist than that of the French, and in fact,
the Netherlands considers international co-operation and commitment to NATO as major sources of
national security. In most documents, the Netherlands gives priority to the intensification of
international (military) co-operation allowing joined-up, integral approach537 e.g., through
strengthening of NATO and European defence capabilities; the co-operation between EU and
NATO538 and maintaining good transatlantic relations as well as functioning security institutions.539
These elements are perceived as indispensable to the Dutch security, and as a necessity to carry out
peacekeeping operations. The intensification of international co-operation is also described as
solution to overcome the fragmentation of European defence efforts.540 European security co-
operation is a major objective towards ensuring security according to the 2008 document. In 2004,
the international dimension of crisis management was already reflected in bilateral agreements
and in the deployment of troops on the territory of the EU.541 The Dutch defence policy remains
firmly committed to NATO over time, and aims to develop more cohesion and vitality within the
Alliance. To name a few examples, NATOs doctrine and policy tenants of collective security and
peacekeeping are often referred to as the cornerstone of Dutch security.542 The 2005 Defence
Doctrine itself is clearly based on the NATO doctrine (the essence of Dutch policy) and its structure
is even derived from the British defence Doctrine.543
Across British policy documents, international co-operation and multilateralism emerge as key
dimensions of security: Bilateral defence co-operation have key roles in promoting and developing
constructive security relationships between all the nations of Europe. Furthermore, collective
action notably through the UN, the EU and NATO is seen as the most effective way to deal with a
constantly expanding external and global focus.544 Multilateralism is the answer to cope with this
increasingly broadening global security agenda. However, similarly to the French perspective, the UK

534
Ibid.
535
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy 20052007 (summary), 2004
536
Swedish Ministry of Defence, A Usable and Accessible Defence Force The Policys Orientation, 2009, p. 3
537
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work Programme 2007 - 2008,
2007, p. 11
538
Dutch Ministry of Defence, Prinsjesdagbrief, 2003
539
Ibid.; Dutch Ministry of Defence, Defence Priority Review (Hoofdlijnennotitie), English summary, 1993
540
Dutch Ministry of Defence, Prinsjesdagbrief, 2003
541
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
542
Dutch Ministry of Defence, Prinsjesdagbrief, 2003
543
Dutch Ministry of Defence, National Defence Doctrine, 2005, p. i.
544
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998, p. 8; UK Cabinet Office,
The National Security Strategy of the UK: Security in an Interdependent World, 2008, p. 7

95
must also maintain the ability to act alone if required. This will insure its leadership role in the
international context.
The EU has been long committed to contributing to an effective multilateral system leading to a
fairer, safer and more united world, as our history, geography and cultural ties give us links with
every part of the world: our neighbours in the Middle East, our partners in Africa, in Latin America,
and in Asia. These relationships are an important asset to build on. In particular we should look to
develop strategic partnerships, with Japan, China, Canada and India as well as with all those who
share our goals and values, and are prepared to act in their support.545 The importance of this
dimension is also reflected in the willingness to work with international powers such as Russia. The
EU also puts great importance on its transnational relationship with the US in 2003546 and 2010:
relationships with our partners, in particular the United States, are of fundamental importance.547
This was exemplified by the cooperation in combating terrorism since early 2000s.548 Yet, as the
emphasis in the field of EU external action is put on how the EU can best play its role as a global
player, the language used in this field reveals an ambition to be not only a global player alongside
other global powers such as the US, Russia or China, but rather to play a role closer to that of the UN,
yet with a specific European trademark. Furthermore, in recent years, co-operation is understood in
multiple aspects: it is necessary to build relationships with other countries through a global
approach to security, working closely with them and, when necessary, supporting their institutional,
economic and social development.549 Other actors are key in this respect as well, in particular the
cooperation with the UN, on all levels of external action. It is also more beneficial at time for most of
the Member States to talk through the EU within the UN, in order to have greater leverage than if
each played individually. For instance, the EU wishes to develop a capacity to act and be regarded as
a significant partner on the international scene, which requires close co-operation with partner
countries and international organisations, in particular the () OSCE, OECD and the United
Nations.550 Over time, cooperation with other international organisations such as the African Union
has become crucial in many of the areas the EU is involved in.551 The EU also aims at playing on its
gravitational pull, especially in its close neighborhood, based on the pacifying and stabilizing
functions of the prospective of a future EU membership or close association to the EU through
bilateral agreements. The EUs engagement goes beyond the closest neighborhood however, which
can be seen in its European Neighborhood Policy, developed following the 2004 enlargement and
engaging with countries in Eastern Europe, the South Caucasus and the South Mediterranean. This
can also be seen as part of a strategy to extend the zone of security around Europe. All in all, the
external action of the EU is based on its ambition to be a normative power internationally. This is
based on the idea that the role that EU integration has had for European security internally has a

545
2003 Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels,
December 12, 2003
546
Council of the European Union, A Secure Europe in a better world, European Security Strategy (ESS), Brussels, December
12, 2003
547
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
548
European Commission, The EU Internal Strategy in Action: Five steps towards a more secure Europe (ISS), Communication
from the Commission to the European Parliament and the Council, COM(2010) 673final, Brussels, November 22, 2010
549
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
550
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
551
EU Parliamentary Meeting, The role of the EU in conflict prevention 2006, Background Note, The Future of Europe:
from reflection to action, Brussels, December 4-5, 2006

96
tremendous role to play in order to advance security elsewhere, through sharing lessons and best
practices in terms of regional integration552.
Sustaining an appropriate level of mutual trust is an important basis to ensure security and
international co-operation in the views of Ukrainian documents, and according to the 2009 Defence
Policy, an important element of the promotion of Ukraines European and Euro-Atlantic
ambitions.553 The 2010 National Security Strategy emphasises the importance of institutional
effectiveness within international organisations such as the OSCE.554 Most selected policy documents
suggest that the Ukrainian national security system would be inefficient without close international
co-operation. Both defence policies and national security concepts strongly underscore the
importance of promoting European and Euro-Atlantic integration, as well as expanding and
intensifying both regional (i.e., EU and Black Sea Caspian region) and international co-operation (e.g.,
NATO). In 1997, the participation of Ukraine in international security systems (including, joining and
creating these systems, participating in bilateral and multilateral political, economic and military
bodies), was already defined as a means to ensure national security. All documents published before
2010 insist on the fact that a major source of security resides in integrating both NATO and the EU;
their enlargement and collective security mechanisms were then considered as key factors for global
security. For instance: NATO and the EU continue to be vitally important organisations for sustaining
peace and stability,555 Ukraines security is closely linked to Europes security.556 In addition, the
rejection of [EU] integration policy would objectively lead to a threat of being left outside the
European community.557 The co-operation with NATO was then one of the key directions of defence
policy in Ukraine in terms of global security and stability. This element appears until the first decade
of the years 2000. However, it should be noted that today, Ukraine is still not a member of the
European Union, and is not candidate for membership either. In addition, the plans for Ukrainian
membership to NATO were suspended in 2010 and removed from the agenda. A striking illustration
lies in the removal of a statement originally issues in the 2007 National Security Concept, which
referred to the purpose of integrating Euro-Atlantic security and NATO membership. Instead, the
2010 National Security Concept opted for the implementation of a non-aligned policy. This shift in
the Ukrainian strategic posture is very much perceptible across in the most recent Ukrainian policy
documents: as of 2010, the Ukrainian policy documents recall that the main priority of Ukraines
external policy is to provide the countrys integration to European political, economic, legal and
security environment with the aim of European Union membership.558
The Russian policy documents emphasise the existence of a multipolar world. In Russian views, the
multipolar world is guided by equal strategic partnership, i.e. without unilateral domination, co-
operation and peacekeeping operations. In 1997, Russias international security depended on the
establishment of equal partnership with the worlds leading states. Next to co-operation,
peacekeeping activities consistently appear as an important element as to ensure the Russian

552
European Commission, Communication from the Commission on Conflict Prevention, COM(2001)211 final, Brussels, April
11, 2001
553
Ukrainian Ministry of Defence, White Book 2009: Armed Forces of Ukraine
554
National Security and Defence Council of Ukraine, National Security Strategy, 2010
555
Ukrainian Ministry of Defence, National Strategic Defence Bulletin until 2015, 2004 (95
556
Ibid.
557
Ibid.
558
Ukrainian Ministry of Defence, White Book 2010: Armed Forces of Ukraine

97
national security in the foreign policy sphere:559 the preservation of the international position of
Russia is a core pillar of its national concepts. The most recent documents place an increased
emphasis on the will to cooperate and develop friendly relations with all countries, beyond the near-
border that is, including the West. This can be strengthened through the active participation of
Russia in the development of a multipolar model world order.560 The objective of the 2010 Military
Doctrine is to expand the circle of partner states and develop co-operation561 by participating in
the maintenance of international peace and security.
The importance of international organisations to Russian security interests is systematically recalled.
In fact, Russia particularly sees a major source of insecurity in the potentially decrease of the
influence of international security institutions e.g., UN and OSCE. The existing international security
architecture (system), including its international-legal mechanisms, does not ensure equal security
for all states.562 This suggests the Russian rejection of the Wests security programs and is an
obvious reference to the US. In addition, NATOs (eastward) expansion near Russias borders and
attempts to grant the military alliance a global role (seen as unilateralist by Russia) is perceived as a
threat to the provision of international security.563 In Russian views similarly to what is observed
across the Chinese policy documents -, insecurity (threats to national security) emanates from the
unilateral use of force in international relations. In addition, the regional perspective and ambition
emerge as important elements across recent Russian documents. In the 2010 Military Doctrine, the
country expresses its will to form and develop allied relations with the member states of the
CSTO564 and the member states of the CIS and relations of friendship and partnership with other
states; to develop the negotiations process for the creation of regional security systems with the
participation of the Russian Federation.565
In US views, international cooperation remains an enduring feature of the national approach to
security, including with respect to homeland security; while the 2002 strategy mostly refers to
international co-operation (which are require[d],566 must be increase[d],567 foster[ed]568 or
amplif[ied]569), the 2010 document uses the term international partnerships, e.g., international
partnerships are essential to success).570 In many US documents, international co-operation should
aim to promote democratic movements and institutions. It is closely linked to the interdependence
of nations. The 2001 Quadrennial Defence Review elaborated on this: the history of the 20th century
has proven time and again that Americas security is linked directly to that of other nations, and that
Americas prosperity depends on the prosperity of others. America seeks to use its current political,
economic, and military advantages not to dominate others, but to build a durable framework upon
which the US and its allies and friends can prosper in freedom now and into the future. The 2001
Quadrennial Defence Review recognises that a nation can be safe at home only if it is willing and able

559
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
560
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
561
Russian Security Council, Military Doctrine, 2010
562
Ibid.
563
Ibid.
564
Collective Security Treaty Organisation.
565
Russian Security Council, Military Doctrine, 2010
566
The White House, National Strategy for Homeland Security, 2002, p. 71
567
Ibid., p. 72
568
Ibid., p. 43
569
Ibid., pp. 11, 73
570
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010, p. 3.

98
to contribute to effective security partnerships abroad. The 2010 US Quadrennial Defence Review
elaborates on international co-operation and partnership: our security is increasingly tied to
building partner capacity. Further, the 2010 Quadrennial Defence Review also relates security to
other US interests: and an international order that promotes co-operative action. While US policy
and strategy might not have changed that much, at least the tone of the debate altered in recent
policy documents: alliances are clearly one of the nations greatest sources of strength.571

Parameter: International co-operation and multilateralism

Based on the above description, this parameter assesses the extent to which international co-
operation and multilateralism are important elements to national security.
We assess the selected countries based on the following scale:
Limited or no emphasis on international co-operation and multilateralism / rather on unilateralism
(10) Strong emphasis on international co-operation and multilateralism (100); international co-
operation and multilateralism are not mentioned: (0).572

Country Score 1990s Score 2000s

France 60 90

Italy n/a 100

Sweden n/a 70

Netherlands 100 100

United Kingdom 90 90

European Union 80 100

Ukraine n/a 90

Russia 70 70

United States 70 70

Table 22: Scores per country over time

571
Department of Defence of the United States of America, Joint Chiefs of Staff, National Military Strategy, 2011
572
n/a means that no document was published by the country in this period, or that the nature of the selected document
does not enable an assessment.

99
Figure 25: Emphasis on international co-operation and multilateralism; cross-country comparison in the
nineties and in the years 2000

2.6.4 The role of diplomacy and prevention


Across a number of national policy documents, it can be observed that prevention should be made
possible through the use of preventive diplomacy573 and diplomatic peaceful means of conflict
resolution574 to reduce tension. This is an indicator of the fact that in the most recent security
strategies, disputes should be mostly solved or anticipated through diplomacy more truly so in
certain nations than others. For instance, in Italian views, diplomacy has been viewed as a key means
to solve the pressing economic and energy competition.575 The Italian governments have always
stressed the humanitarian scope of the Italian foreign missions and their emphasis on safeguarding
democratic values and reconstructing vital infrastructures that make social life possible within
states.576 The military response is only considered when everything else has failed. This attitude
towards the resolution of dispute has remained consistent within the Italian policy documents.
Britain favours a broader set of tools to solve disputes, ranging from diplomacy, influence, trade
(economic means) and deterrent power.577 This stand emerges even more strongly in recent
documents, and is similar to that of the US. However, it is still essential for the UK to maintain highly
capable and flexible armed forces so that it can exercise military power when necessary.578 Across all
selected Russian documents, there is little emphasis on diplomacy, and no reference is made to
preventive diplomacy.
The need to prioritize preventive measures is a recurrent theme in the various EU-policy documents
studied as well, with less emphasis on diplomacy as such. The Gothenburg European Council of
2001 established a Programme for the prevention of violent conflicts, which included measures of
both long-term and short term prevention efforts and improvements of early-warning
mechanisms579. The Lisbon Treaty of 2010 states conflict prevention as a key priority for the EU580.
Prevention is not only necessary to reduce present threats, but also to reduce future impacts of
present threats. The economic and financial perspective is central in the argumentations favouring a
573
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security, 2008, p. 63; Chinas National
Defence, 2004; Dutch Ministry of Defence, National Defence Doctrine, 2005, p. 72
574
National Security and Defence Council of Ukraine, National Security Strategy, 2010
575
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008, p. 24, 69
576
Ibid., p. 31
577
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy, 2010, p. 28.
578
Ibid., p. 18.
579
Gteborg European Council, Presidency Conclusions, SN 200/1/01 REV 1, June 15-16, 2001
580
The Lisbon Treaty, Consolidated Versions of the Treaty on European Union and the Treaty on the Functioning of the
European Union, OJ 2010/C 83/01, March 30, 2010

100
prioritisation of preventive measures, as curbing threats before they develop further and even
possibly preventing them from materializing into full-fledged security disruptions, is seen as more
economically and financially sound than repairing a damage once it has occurred. The preventive
approach to security can be found in different EU documents and policy areas, such as the Justice
and Home Affairs as well as the European Security and Defence Policy. Prevention as a tool is indeed
pushed forward in areas as different as the efforts to prevent radicalisation as part of a broader
effort to prevent terrorism, to using development aid as a tool to prevent the development of
conflicts globally581.

However, the prioritisation of preventive measures is not to say that rapid reaction mechanisms to
urgent crisis situations are not an area prioritised by the EU. As the 2001 Communication from the
Commission on Conflict Prevention shows, long term security thinking is best and should be
prioritised, but there is nevertheless often need for short term reaction capacities582. A background
note from a Parliamentary meeting in 2006 on the role of the EU in conflict prevention underlines
the need for more coordination among the different EU instruments, in order to properly grasp the
root causes of conflicts, to improve the EUs capacity to react quickly, and to promote cooperation
with all major international partners. EU efforts in conflict prevention aim at strengthening countries
and communities at risk, and to reduce their institutions vulnerability to conflict. The EU targets
cross-cutting issues (eg. conflicts related to diamonds, timber and forests, mine action, small arms
and light weapons) and shows by this that prevention also means seeing those issues in a broader
context.

The note further underlines that the EU aims at developing rapid reaction mechanisms, which have
existed since 2001, based on input from early warning tools. Early warning mechanisms are
developed in order to detect emerging conflicts and areas of tension before they reach higher levels
of crisis. Early warning systems are defined as a process that alerts decision-makers to the potential
outbreak, escalation and resurgence of violent conflict, including collection and analysis of
information, prevision of future possible evolutions and recommendations on early responses
(Montanaro and Schnemann, 2011, p. 7). A wide network of delegations in different regions provide
early warning indicators through a so-called root causes check-list, which feeds into the
Commission and the Council political decision making583. Prevention is thus not only a tool belonging
to long-term responses to security issues, aiming to avoid having to respond to crisis situations later
on, it is also a tool to enable the EU to react more swiftly and efficiently to unfolding crisis situations.
Preventive and reactive actions can be seen as part of a same cycle of responses, as even the most
reactive actions have a preventive character, aiming at responding directly to a crisis or a threat, yet
with a longer term aim of thereby preventing further threats in the future (cf. the case of the EU legal
framework on combating terrorism, as pursuing the presumed authors of terrorist attacks also has a
longer term preventive effect, as it seeks to break the cycle of violence by resolving the issue through
the judiciary, and not through military actions for example584).

581
EU Parliamentary Meeting, The role of the EU in conflict prevention 2006, Background Note, The Future of Europe:
from reflection to action, Brussels, December 4-5, 2006
582
European Commission, Communication from the Commission on Conflict Prevention, COM(2001)211 final, Brussels, April
11, 2001
583
Op.cit. EU Parliamentary Meeting, The role of the EU in conflict prevention 2006
584
Council of the European Union, Council framework decision of 13 June 2002 on combating terrorism, 2002/475/JHA, OJ L
164/3, June 22, 2002

101
In the Civilian Headline Goal from 2008, civilian crisis management is highlighted as a central tool for
the EU to achieve its goal of being an important player in the field of global security. There is an
underlying assumption that civilian crisis management, as an essential component of the EUs
overall external policy585 is seen as (i) important for conflict management in general, and therefore
the EU should focus on it, and (ii) as a field where the EU may have a competitive advantage over
other global players, and therefore the EU should invest in making such competencies its specific
area of expertise.

Developing civilian capacities in the field of conflict management aims to address the whole
spectrum of crisis management tasks, such as conflict prevention, peacekeeping and tasks of combat
forces in crisis management, including peacemaking and post-conflict stabilisation586. In many ways,
the policy document shows a dragging between the need for rapidly deployable response
mechanisms to crisis situations, while also seeking to point out the role civilian capacities can play in
the longer-term preventive measures. The recurring mentions of the need for effective response,
rapid reaction, deploy at short notice, deploy civilian means simultaneously with military
means show that prevention does not only belong to the sphere of long term planning and as a
strategy to act before there is need for actually responding to a crisis situation, but also responds to a
need for improving the preparedness of the EU, in order for it to be able to react swiftly whenever
a crisis breaks out.

Prevention can also be seen in relation with the new threats discourse, and the feeling that the
threats Europe has been facing since the end of the Cold War are novel, hard to grasp, diffuse and
unpredictable. This increases the need for being prepared when a threat materializes, and
prevention thus aims at increasing this preparedness. Furthermore, prevention also includes efforts
to seek to better understand and know more about the threats out there, through mechanisms of
early warning, based on the collection of information and intelligence. The development of early
warning mechanism seem to suggest that certain root causes of conflicts can be predefined in order
to predict the likeliness of conflict (or absence of conflict). It however remains important to take into
account the specificities of each particular case, and the fact that future crisis, conflicts or security
disruptions can never be predicted with full certainty.

2.7 Conclusion: Convergence and Divergence in a Complex World


Our examination of the evolution of the official security policy documents across eight countries and
in the EU over the past two decades has provided a birds-eye overview of different concepts of
security, with a special focus on definitions, dimensions, sources and strategies. In addition to
confirming a number of more or less well known facts, the overview also yields a series of interesting
insights that ETTIS can build on in the remainder of this project. Below we will present a synthesis of
the most important takeaways from our analysis of the high-level national security policy documents,
as well as from our benchmarking efforts along the four strands of analysis (definitions, dimensions,
sources and strategies). We conclude with a reflection on how these takeaways could be fruitfully
taken up in subsequent work packages and by future efforts of a similar nature.

585
Council of the European Union, Civilian Headline Goal 2008, 15863/04, Brussels, December 7, 2004, p. 2
586
Ibid, p. 2.

102
2.7.1 Analysis of High-Level Strategic Security Documents
The ETTIS consortium partners set out to collect as wide a collection of official security policy
documents as possible without any preconceived notions of what is or is not security. The main
criterion used in this selection was that we went looking for officially stated expressions of the
security ambitions, intentions and priorities by the highest levels of governance in the various
political entities.
The yield of this (significant) collection effort revealed some important findings

There remains in most countries, but much less so in the European Union a very clear
defence bias in these documents. All national defence organisations have had a long and
established tradition of publishing such high level policy guidance. These documents differ
with respect to how often they publish them, who signs off on them (the head of state, one
ministry, many ministries, etc.), how comprehensive they are, what their actual impact is on
real choices, etc. But all defence organisations produce them, and we therefore still observe
an undeniable defence bias in the high-level documents a bias we find quite revealing (as
we also see it reflected in overall R&D priorities).
In those countries that are starting to move (typically gingerly) towards more truly
comprehensive (and integrated) approaches to security, we see the emergence of new
high-level defence and security-strategies that tend to mirror (and even subsume) their
more purely defence strategic predecessors. We observe that despite much lip-service to the
various linkages between internal and external security, even the European Union resorted
to producing two separate high-level policy documents.
In the United States (and only in the United States), which resorted to the largest re-
organisation of its security governance since World War II after 9/11 by creating a (gigantic)
Department of Homeland Security (that was in many ways inspired by procedures and ways
of thinking in its Department of Defence counterpart), we see the emergence of a separate
hierarchical set of high-level capstone documents like the National Homeland Security
Strategy or the Quadrennial Homeland Security Review.
Internal security remains in most other countries distributed across a large number of
government ministries (Interior, Justice, but also many other line-ministries with substantive
responsibility in other areas like Agriculture, Transportation, etc. that have at least some
security dimension). Most of these ministries or agencies or agencies tend to be quite
operational in nature. Many key documents in this area to the extent that they are even
produced at all therefore also tend to be more of an operational nature and to inscribe
themselves in the yearly more budget-driven policy cycles. And they are typically not
integrated in a broader internal security strategy asis the case within the European Union
itself.
As we pointed out, the ETTIS team decided to still go ahead and to analyse this (and only this) set of
(comparable) high-level policy documents, despite the clear biases we noted. It undoubtedly would
be possible to extract some insights about what the countries who lack the high-level internal or
comprehensive security documents think about internal security from the myriad lower-level
documents that could be collected in this field. But the effort we engaged in for the particular set of

103
documents we used was already significant, and the effort we just described would be many times
more time- and labour-intensive.

2.7.2 Definitions
A striking result of this analysis is that in the era of globalisation and growing interdependence of
economies and political systems, security veritably has taken on a new meaning in the views of many
states. Since the end of the Cold War, there has been a growing emphasis on the global,
multidimensional nature of security, the complexity of the environment states operate in, the
increased interconnection of both external and internal threats and risks to security as well as on the
rise of non-conventional threats.

Security is widely perceived to be multidimensional


The notion of security has become much broader to encompass a wide range of novel
dimensions. These dimensions are no longer limited to political, military, economic or
territorial matters: they now include human security (including health-related risks,
environmental hazards such as natural disasters or global warming), technology and
information security (in particular cyber), resources such as water, energy and food, and
societal security to reduce a number of new social vulnerabilities related to e.g., the
fragmentation of identities. In addition, although security remains based on hard,
traditional aspects, soft, human security-related elements have progressively entered
national security policy documents. National security is increasingly also considered within a
global perspective rather than from a purely national point of view.
Similarly, nearly across the board, states pay increasing attention to the impact of instabilities far
away from the national borders on national security.
The distinction between internal and external threats is increasingly fading.
A growing awareness of a connection between internal and external security is particularly
noticeable where the demarcation between what is national and what international is increasingly
blurred. Risks as varied both in their nature and in their impact as terrorism, cyber crime, and
natural disaster, cannot really be usefully placed in either of these two categories.
Non-conventional threats are connected to conventional threats and are increasingly seen as
a menace to national security
In addition to conventional threats (e.g., interstate conflict) which remain to be acknowledged as
important across the national policy documents, national security must also cope with non-
conventional, transnational threats which have taken on a new dimension in recent years. These
include terrorism, organised crime, drug or human trafficking, the rise of radicalism, polarisation and
extremism, but also non-traditional risks such as cyber attacks, natural disasters or global pandemics.
What is more, in most views, potential attacks are seen to be perpetrated by non-state actors, which
is deemed more likely than a traditional territorial attack by another sovereign state.

2.7.3 Dimensions
With the expansion of the definition of security, not only is it considered to encompass a greater
number of dimensions as explained in the previous section, also the interpretation of the nature of

104
these dimensions themselves has changed over time as a result of rapid technological, political and
social transformations.

The nature of traditional dimensions has evolved over time


Traditional dimensions refer to those already present across national policy documents in the
nineties. They include territorial, economic, technology security, social and political stability, and
international law. First, it is widely acknowledged that territorial security in the strict sense of the
word is no longer limited to the protection of national borders but, for instance, has stretched and
come to include the protection of vital infrastructures. Second, more recently, national policy
documents tend to focus on the international nature of economic security, in particular following the
emergence of globalisation processes and the outbreak of the global financial and economic crisis. In
this context, most states emphasise the general vulnerability of their national economies to the
interconnected, systematic and global nature of economic risks. Third, although the importance of
technology as a dimension of security was already emphasised in the nineties, similar to many other
dimensions of security, it has been cast in a new light. Especially technology development has
become a central issue in recent years due to the potential risks associated with technological
breakthroughs becoming readily accessible to rogue states and hostile non-state actors. Fourth, the
dimension of social and political stability was traditionally defined by freedom of expression and the
respect of a series of universal (democratic) values. Over time, this dimension has come to include a
much broader spectrum of issues. Social and political stability is perceived to be jeopardised by social
division through the fragmentation of identities and the rise of extremism (including religious), as
well as a number of other socio-demographic trends (e.g., rich versus poor and old versus young).
Fifth, and finally, also the nature of international law as a dimension of security has evolved. While
most national postures in this respect have remained consistent in emphasising its importance or
not over the last two decades, notions of national sovereignty and national prerogatives have
been constantly reconceptualised. In addition, there is considerable variation in how states have
regarded the role of certain international institutions, which has also evolved over time.
Recently, a small set of novel dimensions have been receiving ample attention
Whereas the abovementioned traditional dimensions of security are consistently emphasised and
reaffirmed across most of the national security policy documents, some dimensions have gained
substantial traction recently.
First, although it is mostly understood as a part of economic security, the increasing attention paid to
energy security in recent years is particularly noticeable. Second, if discussed at all, physical/health
security used to be mostly related to mental or reproductive health, or discussed in light of the
resilience of health security systems and affordable health care services. With the rise of nuclear
threats, global pandemics, and increasing concerns for food security, physical/health security has
entered the mainstream of national policy documents in recent years.
Third, environmental security has become important only recently, in particular due to the increasing
awareness about the effects of climate change and natural disasters.
There are both significant similarities and dissimilarities in how states assess the importance
of these dimensions
Whereas some, primarily European, states, harbour the view that their territories are no longer
directly threatened e.g., Netherlands, Sweden, the UK, this remains a prime concern for other

105
states, including Russia. Generally, territorial security appears to be related to such conceptual
notions as national independence and sovereignty of the nation. This is particularly perceptible
among the French and Ukrainian policy documents, and is a constant over time.
Economic security features as relatively equally important across the selected national policy
documents, albeit in different guises. Western European countries as well as the US seem to
emphasise concerns for the current internal economic hardships. Energy security is increasingly
discussed in Russia, Ukraine and the Netherlands, even more so than in the other selected countries.
This can be explained by the concern for external demand (Russia), inefficient use of the national
potential (Ukraine), or external dependence (Ukraine, Netherlands).
National differences in terms of the priority attached to technology and information security are less
apparent. These dimensions clearly moved to centre stage in recent policy documents of all
countries. Cyber security is particularly emphasised in the British policy documents. Russian and
Ukrainian documents insist on the danger of a lack of innovation or competitiveness in this respect.
In US views, health security was initially mentioned as a major issue for the developing world, or
referred to affordable health care and reproductive health. In more recent American and Western
European documents, health security is also discussed in relationship to major health hazards (e.g.,
pandemics). Only Italy and Sweden place little to no emphasis on these issues. Traditionally, Russia
and Ukraine focus on internal health crises and expressed concerns for global health in recent years.
The extent to which national policy documents place an emphasis on environmental security differs
significantly. The Netherlands, France and the UK have recently expressed clear concerns for global
warming. However, the US places rather limited emphasis on environmental security; while
environmental security is mentioned, little detail is provided with regard to its impacts. Perhaps
surprisingly, Sweden does not place a greater emphasis on this dimension. Russia and Ukraine insist
on nuclear risks and their impact on both public health and the environment. For similar reasons, the
Netherlands usually express concerns with regard to the impact of natural disasters they have been
exposed to (e.g., flooding in the Netherlands).
Social and political stability is consistently emphasised in developed countries, yet more particularly
so in Italy, the UK, Ukraine and the Netherlands. For the Dutch, it is even defined as a vital interest of
national security.
The importance of international law as a dimension of security is diversely emphasised across
national security policy documents. Over time, the Netherlands, the UK, Sweden, Italy, Ukraine, and
to a lesser extent Russia, place a large emphasis on the legal dimension with respect to the
implementation of international law. France and the US adopt a more ambiguous stance as they
recall the importance of their national sovereignty.
There are remarkable cross national differences in how dimensions are considered to relate
to one another and to risks
Although a cluster analysis of co-occurrences of dimensions and the risks they are associated with fell
beyond the scope of this study, it is interesting to take note that states associate different sets of
dimensions with one another. Ukraine and Russia, for instance, establish a link between health and
environmental security. The US and the UK envisage environmental insecurity and cultural tensions
as potentially exacerbating political instability. Again in Ukraine, the lack of technological
development is seen as likely to provoke increased social tensions. In the Netherlands, on the other

106
hand, technological developments themselves may lead to social dislocation. Sovereignty and
territorial security seem to be intrinsically linked to one another in French and Ukrainian views.

2.7.4 Sources
When it comes to sources of security, it is strikingly apparent that these have not systematically kept
pace with the expansion of the dimensions of security. With some exceptions, countries seem to
prefer to elaborate numerous dimensions of security while identifying long lists of risks threatening
these dimensions, rather than to focus on articulating the key sources of security. Yet, analogous to
the expansion of the security concept and its inclusion of softer dimensions, recently the softer
sources of security have been getting more mention in various national security policy documents.
Similar sources of security are evaluated differently across different countries. Furthermore, in many
instances, the link between sources, dimensions and threats is implicit rather than explicit.
The comprehensive turn observed in the recognition of dimensions is not matched in the
identification of sources
The spectrum of sources of security is not as wide ranging in scope as its dimensions-corollary. Newly
identified sources of security in recent years are mostly of societal nature. Economic and military
sources of security remain of central importance. Most national policy documents do not provide
concrete solutions to prevent certain threats from arising, perhaps with the exception of Russia or
Ukraine with respect to health security and population welfare.
Increasing attention to soft sources of security
Population welfare and well-being, national identity and societal resilience have emerged as main
sources of security. In addition, more attention is given to socio-economic development and to the
importance of national unity in the face of increased migrations and socio-demographic trends.
Societal resilience becomes an important source of security for most countries.
Similar sources of security are evaluated differently across different countries
Although most countries recognise it as an opportunity for economic development (in particular the
UK), they also see globalisation as a factor of (economic) uncertainty and (social) instability. Most
countries recognise that population welfare and well-being must be enhanced through a better
quality of life (Russia), standards of living and the promotion of human capital (Ukraine), public trust
(Netherlands, Ukraine), or the mitigation of demographic risks and criminality (Italy, UK). However,
France or the US place a rather limited emphasis on this dimension relatively to the other countries.
Most Western European countries and the US continue to emphasise democracy as a source of
security ensuring the welfare of populations.

Economic development is at the heart of Russian, Chinese and Ukrainian bases of national security.
Although economic prosperity remains mentioned as a vital interest in most Western European
nations and in the US over time, the focus has been mostly on the potential threats economic growth
generates, in particular those emanating from the developing world. The achievement of national
unity is reflected in the French vivre-ensemble. It can be based on cultural, spiritual and moral
heritage (Russia, Ukraine), language unification (Ukraine), or ethno-cultural diversity (Russia,
Ukraine). Societal resilience is emphasised as a source of national security to different degrees:
France considers resilience to be based on the participation of various actors, including the nation,
the media and democratic institutions. The Netherlands emphasise the role of private actors,

107
including the business community, and the promotion of equal opportunity for all. Russian
documents insist on equality and mutual trust, whereas Ukraine insists on transparency and
openness of state institutions.

Furthermore, military power remains referred to as a major source of national security. In particular,
the role of the armed forces has expanded due to the new nature or stronger impact of a number of
risks (e.g., environmental disasters) and their increased participation to peacekeeping or
humanitarian missions.

2.7.5 Security strategies


The strategies employed by the various political entities to navigate the complex and
multidimensional security environment, have increasingly been putting more emphasis on the need
for comprehensive strategy formulation and execution. Whether they actually practice what they
preach was impossible to ascertain within the context of this study, but it seems that the
comprehensive approach is still in its infant stages and continues to be made up principally of a large
military component. Across the board international co-operation is viewed as a key component of a
national strategy although the nature and the terms of such cooperation is a hotly contested issue.
Increasingly, states have been calling for proactive rather than reactive policies, emphasising the
need to focus on prevention and resilience.

Increasing emphasis on the need for comprehensive strategy formulation and execution
In recent years, similarly to the trends observed for the definitions of security, most selected national
policy documents have also started to conceptualise comprehensive strategies, integrating different
policies (including foreign and domestic ones) and increasingly mobilise a variety of actors for the
protection of national security interests.

International co-operation is viewed as a key component of a national security strategy but


different conceptions about the nature and terms of such cooperation endure
The international dimension of national security arises naturally from the emergence and novelty of
the aforementioned risks: they necessitate more than mere national measures, and must be
enhanced through international co-operation. Even France has become more inclined to include the
transatlantic partnership as a major element in this respect. The acknowledgement of the
importance of building regional partnerships or preserving good neighbouring relations emerges
from the Ukrainian and Russian policy documents as well. Overall, most nations perceive
international co-operation as a source of security. Nevertheless, it should be noted that the
international environment, and particularly the current international order are not seen as always
beneficial; they may even be perceived as potentially hostile to national security (e.g., in Russian
views).

Countries are progressively focusing their efforts upstream, moving from reactive to
proactive policies
Prevention and resilience are becoming central strategic concepts in many national security
strategies. This, in some cases, translates into strategies propagating the notion of forward defence
through interventionist policies abroad. At the same time, it is also featured in the increased focus on
strengthening domestic resilience.

108
The repeating tension between freedom and security in EU policy documents

There is a fundamental idea within the EU of a close association between security and freedom, yet
this association is also manifested in various tensions between the aims of advancing security all the
while remaining committed to the preservation of the freedoms and rights upon which the EU is
built. The association between freedom and security is visible in the conceptualisations of a secure
European citizen as a citizen who is free: free from fear, free from threats, free also from too
intrusive control over their private lives, as the right to privacy is a central value in the European
context. This view is closely linked with the articulation of the relation between security and freedom
as developed within the UN, and more specifically in the report authored by Kofi Annan In Larger
Freedom587. The report underlines the interdependence of threats and thereby defines the
responses along the lines of the rights to a freedom from want, freedom from fear and freedom to
live in dignity. This is first and foremost articulated as ways to respond to pressing challenges in
countries ridden by poverty, conflicts and political turmoil, which is not the case of the EU. But this
way of thinking about security as closely linked with freedom is reminiscent of the one we find in EU
policy documents.

On the one hand, the creation of a policy area specifically designated to the fields of justice, freedom
and security, dating from the European Council in Tampere in 1999588, demonstrates the close
association between the three in the framework of EU thinking about security. However, although
freedom was given a central importance in the conclusions of the Tampere meeting, stressing this as
a distinctively European approach to security issues, the security side has gained increased weight
following a balancing effort in the Hague Programme of 2005589. As the 2010 Draft Internal Security
Strategy For the European Union Towards a European Security Model590 shows, there are synergies
and overlappings in the three areas: Europe's Internal Security Strategy must exploit the potential
synergies that exist in the areas of law-enforcement cooperation, integrated border management
and criminal-justice systems. Indeed, these fields of activity in the European area of justice, freedom
and security are inseparable: the Internal Security Strategy must ensure that they complement and
reinforce one another591. The European security model shows us that a secure citizen is a citizen
whose rights are ensured and safeguarded. Furthermore, as the strategy puts it, security is in itself a
basic right592.

On the other hand, there is as mentioned above a continuous tension between the priorities of
freedom and security. Indeed, how can we step up security measures, all the while respecting
fundamental rights and preserving the values of freedom that Europe is built upon? This tension is
visible in various policy and regulative documents, outlining security priorities and the actions
needed to reach them, all the while reminding the importance of respecting fundamental rights as
outlined in the European Charter and other relevant European and international legal frameworks.

587
United Nations, In Larger Freedom: Towards Security, Development and Human Rights for All, Report of the Secretary-
General of the United Nations for decision by Heads of State and Government, September 2005
588
European Parliament, Presidency Conclusions, European Council, Tampere, October 15-16, 1999,
http://www.europarl.europa.eu/summits/tam_en.htm#union
589
European Council, The Hague Programme: Strengthening Freedom, Security and Justice in the European Union, OJ
2005/C 53/01, March 3, 2005
590
Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security
Model, 7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010
591
Ibid, p. 3.
592
Ibid, p. 9.

109
This tension is particularly put to the fore in the fields of counter-terrorism and border control. In the
field of counter-terrorism, the questions revolve around how to further policy strategies of financial
surveillance and surveillance in public spaces, without affecting the freedom and liberty of EU
citizens and jeopardizing their and other individuals basic rights? In the area of border control, the
dilemma raised is also related to information gathering. Indeed, how can sufficient amounts of data
be collected through surveillance in order to prevent unauthorised entries, without jeopardizing the
right to seek asylum, the right to privacy and protection of personal data, as well as other
fundamental rights? These dilemmas often remain unresolved, as different stakeholders, policy
makers, and legal experts and decision makers alternate in reminding the importance of prioritizing
the one over the other, or seeking to balance the two.

2.7.6 Policy documents and R&D Priorities


An analysis of the high-level security-related policy documents of a number of countries reveals the
extent to which defence organisations continue to dominate official policy statements about national
security. We have already pointed out that this is in some sense a result of the fact that defence
organisations have been thinking in a structured way about the future of national security for many
decades, whereas internal security (or, in US parlance, homeland security) organisations have
tended to be more driven by ongoing operational concerns. In addition to the civilian-military
mandate of these defence organisations, this explains why they are more likely to produce such
forward-looking (public) documents than internal security organisations. Put differently, this
chapters focus on official policy documents in many ways distorts the actual policy priorities of many
of the countries that were surveyed.

And yet, this observed imbalance is not inconsequential to these countries security-related R&D
choices. Since most countries have quite elaborate processes for allocating (increasingly scarce) R&D
resources, if new insights about security do not find their ways into high-level policy documents, they
are also unlikely to be translated into research priorities. In some sense, the situation is even worse:
many of the broad trends described in this chapter in the ways in which governments are redefining
their views of and approaches to national security have found their ways into these policy documents
much more quickly than they have in the adjustment of their research investment portfolio. This is
not overly surprising: it is much easier to write new perceived security concerns like terrorism,
pandemics, or migration into policy documents than it is to develop a medium-to-long-term security
research strategy for them. This suggests that an exercise like the one represented in this chapter is
of great importance if we want to better align our research portfolio to the policy concerns
expressed in various high-level policy statements. This theme will be further taken up in the overall
conclusion to this deliverable.

110
3 Concepts of Security in Academic Disciplines
3.1 Introduction: Beyond Broadening the Concept of Security

Security is a topic that has been analysed in depth in a number of different scientific disciplines.
Even a casual observer of these literatures is bound to be struck by the remarkable lack of cross-
references across these various disciplines. In the public discourse about national security, for
instance, political science views are quite prevalent. Most political scientists will be able to explain
the different views on security across different schools of thought within their discipline (even if
they will usually make it abundantly clear why their school is vastly superior to all other schools).
Yet these very same scholars would be hard pressed to explain the various ways in which computer
and information scientists, psychologists or public health scholars have been defining and
operationalising security despite the fact that these other disciplines have devoted significant
efforts in developing their own concepts and ideas about security, including the more applied
question of how to deal with it.

Especially in the past decade, the field of political science (and especially the subfield of International
Relations) has paid a lot of attention to the broadening of the concept of national security. The
starting salvo for this re-evaluation actually dates back to 1983, long before the end of the Cold War.
In that year Richard H. Ullman, Professor of International Affairs at Princeton University's Woodrow
Wilson School, wrote a remarkably modern piece in the flagship journal of the theoretical discipline
of International Security (the journal International Security) in which he lamented the fact that
national security had for decades been conceived in excessively narrow and excessively military
terms. He argued that politicians have found it easier to focus the attention of an inattentive public
on military dangers, real or imagined, than on nonmilitary ones. But not only politicians were to
blame, according to Ullman: Just as politicians have not found it electorally rewarding to put
forward conceptions of security that take account of nonmilitary dangers, analysts have not found it
intellectually easy [emphasis added by the authors]. They have found it especially difficult to compare
one type of threat with others, and to measure the relative contributions toward national security of
the various ways in which governments might use the resources at their disposal. Ullman went on to
describe some fundamental security choices: between security and liberty, cure and prevention,
collaboration with regimes with different values, military versus economic assistance to fragile
countries, international vs. domestic priorities. He claimed that these trade-offs are capable of
generating conflicts of values-between alternate ways of viewing national security and its
relationship to what might be called global security.

The early thoughts in this 1983 piece were then picked up again in a wide range of academic (and
subsequently also policy) publications, on both sides of the Atlantic Ocean, that advocated a
broadening of the definition of security (and hence also of the field of security studies).593

593
R. Aitken, Spaces of Individual/National Security: Geopolitics, Citizenship, and Cultural Economy (2005); I. Wing,
Refocusing Concepts of Security (2000); M. Schmid, The Concept of Comprehensive Security: A Distinctive Feature of a
Shared Security Culture in Europe (DTIC Document, 2007); C. Mesjasz, Security as an Analytical Concept, in 5th Pan-
European Conference on International Relations, in The Hague, 2004, 911; B. McSweeney, Security, Identity and Interests:
a Sociology of International Relations, vol. 69 (Cambridge Univ Pr, 1999); M. Matsuo, Whither Peace Studies?

111
This chapter tries to move the debate about what security is and how we can best deal with it a few
steps beyond the broadening of (the field of) security (studies). It was inspired by a sentiment that
much of the academic re-evaluation of security was driven by a mostly normative impulse against
what was perceived by many scholars as an excessively limited focus on nation states as the main
unit of analysis and on traditional defence and the military dimension in terms of solutions. Many
scholars criticised these limitations and encouraged the security field to broaden its definition of
security or at least to shift the focus from a definition that was based on the security of states to
one that would focus on the security of societies and from solutions that were primarily military-
focused to a broader set of dimensions (and presumably also instruments or stratagems).

The starting point for this work package is deliberately and decidedly different. We chose not to
engage in yet another literature review of the already well-rehearsed human security literature. We
also did not embark upon a new normative discussion of whether our current policy definitions of
security are still not broad enough, just right or too broad. Our aim in this chapter is of a more
purely analytical nature. Essentially, we set out to systematically dissect various definitions,
dimensions and sources of security as well as the various ways in which security can be dealt with
across a wide range of (high-level) disciplines.594 In doing so we did not want to claim that any or all
of these forms of security are part of (or should be part of) national security. But we did want to
compare the ways in which security is defined and dealt with in those (less well-rehearsed and less
internalised) disciplines with the ways in which that is done in the traditional national security
debates. Moreover, in examining security scholarship across this diverse array of disciplines, we
expected to be able to arrive at truly novel insights which in turn may be transferred to the security
domain in one form or another. To give an example: if we find as we did interesting new insights
on what security is and what can be done about it in the ways in which psychology deals with
attachment security, education with school security or economics with tenure security, we are
merely trying to learn from those insights, not to include them in the national security domain. We
want to emphasise in this context that the main purpose of this exercise is not to broaden the
definition of security to encompass all sorts of new security threats (see for example the
securitisation-debate, which claims that security-specialists are starting to impose their concepts,
tools, solutions to all sorts of policy issues that were not traditionally viewed - and, in the view of
many, are better not viewed - as security issues), but rather the opposite: to apply some of the
insights, tools and methods from the non-security area to the traditional security realms. And above
all, in line with the overall objective of the ETTIS project, we hope that this leads us, at a later stage,
to finding out whether there may be certain biases in our current national security R&D efforts that
could benefit from a stress-test based on the findings from other disciplines that have also looked
hard and deep at security albeit in different contexts.

Fragmentation to a New Integration?, Journal of International Development and Cooperation 7, no. 2 (2001); G. Luciani,
The Economic Content of Security, Journal of Public Policy 8, no. 2 (1989): 151173; K. Krause and M. C Williams,
Broadening the Agenda of Security Studies: Politics and Methods, Mershon International Studies Review (1996): 229254;
K. Krause, Critical Theory and Security Studies, Cooperation and Conflict 33, no. 3 (1998): 298333; E. Krahmann, From
State to Non-State Actors: The Emergence of Security Governance, New Threats and New Actors in International Security.
New York: Palgrave Macmillan (2005): 319; E. Krahmann, Conceptualizing Security Governance, Cooperation and Conflict
38, no. 1 (2003): 526; A. Hyde-Price, Beware the Jabberwock!: Security Studies in the Twenty-First Century, Europes
New Security Challenges (2001): 2754; Aitken, Spaces of Individual/National Security.
594
We refer to the overall introduction for a further elaboration on the choice for these four parameters, as well as a
succinct description of their meaning.

112
This chapter summarises the main findings of the analysis the consortium performed in those high-
level disciplines looking at definitions, dimensions, sources and strategies of security. In the next
section, we will briefly describe the methods and sources we employed in conducting the analysis,
which included human analyst expert judgment aided by the automated text mining software
processing of the selected literature. Readers who are merely interested in the substantive findings
of our analysis are advised to skip this part and immediately go to definitions of security. The
description of definitions is followed by an assessment of dimensions of security which in turn leads
to the section considering sources and strategies. We conclude with a concise conclusion of the key
takeaways of this chapter.

3.2 Methods and Sources

In line with the aforementioned objectives, we decided to take an unapologetically high-level


approach and to try to collect as wide a variety of conceptual views on security as currently
possible595. We set out to collect a uniquely broad set of documents from all peer-reviewed academic
journals that discuss definitions and dimensions of security. We took the largest available datasets of
academic journals from the EBSCO-database596 and searched for all articles that contain the search
keys definitions, dimensions and sources in close proximity to the term security597 This yielded
tens of thousands of articles, of which we selected approximately 1000 of the most relevant articles
(as determined by EBSCOs relevance ranking598). We then automatically sorted these by disciplines
based on the classification scheme used by JournalSeek (which covers about 60000 academic
journals, and lists those by main and sub-disciplines).599

595
We also want to emphasise that this type of analysis would have been virtually impossible until a few years ago and the
appearance of ever more complete full-text databases and various text-mining tools.
596
These included Academic Search Complete (containing abstracts for 13000 journals, with full text for more than 9000
academic journals - among which 7700 peer-reviewed journals - dating back to when digital articles started becoming
widely available, with the full list of articles available here http://www.ebscohost.com/titleLists/a9h-journals.htm), but also
some additional specialized EBSCO databases such as Business Source Complete (2,000 peer-reviewed journals in this area),
Military and Government Collection (), SocINDEX (800 journals, 820 monographs, and almost 14,000 conference papers),
Humanities International Complete (more than 2,300 journals, of which more than 1,200 full-text ones), Environment
Complete (more than 2,350 domestic and international titles, with full text for more than 930 ones and also for for over 190
monographs) and MEDLINE (full text for more than 2,060 journals). EBSCOhost automatically excludes duplicates from
searches across multiple databases.
597
The search queries that were used were "defin* N3 security" OR "security is defined as" OR "definitions of security",
drive* N3 (security or insecurity), dimensio* N3 (security or insecurity), as well as cause* N3 (security or insecurity).
598
Details about how the EBSCO search engine determines relevance ranking can be found at
http://support.ebsco.com/knowledge_base/detail.php?topic=957&id=3971&page=1. The ranking order is first of all based
on the presence of the search query terms within (in order of priority) subject headings from controlled vocabularies;
article titles; author keywords; abstracts and within the full text. For instance, if words like security and definition co-occur
within 3 words of each other in the article title or (official) abstract, then it will rank higher in the list than if the terms just
co-occur within 3 words of each other in the full text. Other factors that are included in the ranking are match (exact
matches are favoured over partial matches), density (the number of times the word(s) appears relative to the size of the
document: more is better), frequency (the number of times the word(s) appears in the database - also here more is better),
currency (all other factors being equal, more recent articles rank higher), document type (certain document types (like book
reviews) may be relegated to lower relevance, so they do not dominate results) and length (articles of a more substantial
length have a heavier weighting, so when all things are equal, a page article is considered less valuable than a 4 page
article).
599
Journalseek is the largest completely categorised database of freely available journal information available on the
internet, currently containing some 98144 journal titles (see http://journalseek.net/). The method we used for this is that
we used the public-domain bibliographical management tool Zotero (www.zotero.org) to download all articles including the
bibliographical reference data as well as the pdf-files of the articles themselves in pdf-format) from EBSCOHost into Zotero.
We then used a Zotero-plugin developed by HCSS (with thanks to Mr. Jona Andersen) to sort all downloaded articles into

113
Our main guiding principle throughout this effort was to exclude our own (conscious or sub-
conscious) professional, cultural, temporal, ideological, psychological, or other biases in the selection
of both the disciplines (which was determined by the coverage EBSCO provides - which is not truly
exhaustive, but as exhaustive as is currently available) and the actual articles (again determined by a
combination of the general neutral search query that was used, and then again by the EBSCOs
relevance ranking algorithm, which is entirely based on frequency of (co-)occurrence of search terms
throughout the entire set). We want to emphasise that this (re)search strategy did not necessarily
yield the seminal papers in the respective disciplines that deal with definitional issues of security, but
led us to articles that considered definitions, dimensions and sources of security. In our ambition of
capturing weak signals with regard to the meaning of security the review presented did not
consider any of the more traditional review methodologies. These methodologies included strategies
for selecting articles (citations), journals (Impact Factor, i.e. the average number of citation of a
article in a particular journal) or even people, e.g. H-index, an index with aims at capturing both
quantity and quality of an individuals scientific production. The guiding idea here was that such
strategies would have led us to a too conservative view of what security could mean.

In previous similar efforts, HCSS, the lead partner of this work package, consciously excluded certain
search terms in the search query, which we felt did not properly belong to the security field as we
tend(ed) to interpret it. A good example of this are terms like social security or (financial)
securities, which do indeed pollute any findings that aim specifically at national security. But in this
effort we are consciously looking for broader definitions, possibly even entirely different
definitions from other disciplines - precisely as they may offer new insights into both the essence of
security. The same rationale applies - arguably even more importantly so - to possible approaches or
solutions for dealing with security challenges that might lead to novel R&D avenues. We therefore
purposefully decided not to exclude such terms in our efforts, as their mere usage of the word
security may point to a more profound substantive similarity.

Journalseeks top-level categories (the figures between the brackets indicate the number of journals covered): Arts and
Literature (2410), Astronomy/Astrophysics/Space Science (273), Biological Sciences (7075), Business Administration (4731),
Chemistry (2186), Computer and Information Science (1613), Earth Sciences (2295), Economics (2639), Education (2769),
Electrical and Electronic Engineering (1000), Engineering (3280), Environmental Sciences (1119), Humanities (3073), Law
(1612), Linguistics (1119), Materials Science (1697), Mathematics (1227), Medicine (13178), Management
Science/Operations Research (159), Philosophy (1137), Physics (1246), Psychology (2423), Social Sciences (4396), Sports and
Recreation (536). We also have the information for the lower-level categories (e.g., the top-level category social sciences is
broken down in Africa (86), Anthropology (406), Archaeology (195), Communication (188), Criminology (105), Defence (40),
Demography (64), Development Studies (24), Ethnology (170), Geography (304), Gerontology (87), International Relations
(204), Social Issues (52), Methodology of Social Sciences (13), Miscellaneous (1687), Native Americans (22), Political Science
(345), Public Opinion (34), Public Welfare (26), Sociology (256), Social Work (79), Tourism and Hospitality (9). The team feels
a closer look at the differences between these lower-level categories might also prove extremely revealing, but for
pragmatic reasons this chapter only uses the top-level categorisation. We have to note that this categorisation - as any
categorisation - is in many ways suboptimal. The categorisation of certain journals by Journalseek is sometimes surprising.
Whenever a journal belongs to various categories, we only included it in the alphabetically first one, which is not always
necessarily the most obvious one - but we wanted to avoid duplications as much as possible. At times we also found articles
(e.g., book reviews) in the journal of one discipline about books that really hailed from another discipline. But even here,
the mere fact that some author who associates himself with the first discipline decides to submit a book review about that
book to the journal of another discipline can be construed as being significant. As with all other choices in this effort, we as
a rule opted for neutrality and consistency - in this case the categorisation of journals into academic disciplines by
Journalseek. The main exceptions we did make was for journals that only contain book reviews, in which case we manually
re-categorised the articles in the disciplines we felt they belonged to. In addition, for to the category small disciplines we
added the category Political Science with a particular Focus on Cyber Space as we felt that this discipline a specific domain
of expertise of one of the consortium partners was so particular that it merited exclusive consideration.

114
To that uniquely broad set of articles dealing with what security really means in different disciplines,
we also added a smaller set of articles that were selected by all consortium partners on the basis of
their own expertise across a variety of disciplines. These articles were supposed to represent some of
the most authoritative thinking in the disciplines consortium partners were familiar with. We also
recategorised these articles using the same JournalSeek classification scheme and included them in
our analyses. The selected disciplines are as follows:

Large Disciplines
Business Administration and Economics
Computer and Information Science
Humanities
Law
Psychology
Social Sciences
Table 23: Four 'large' academic disciplines

Small disciplines
Arts and Literature
Biology
Education
Environmental Sciences and Climate Change
Linguistics
Medicine with a focus on Health Science
Philosophy
Political Science with a focus on Cyber Space
Table 24: Eight 'small' academic disciplines

We refer to large disciplines as those grouping the largest amount of articles.

The entire set of selected articles was subsequently processed with a commercial textmining tool,
Leximancer.600 Leximancer in essence builds a semantic network out of the co-occurrences of terms
in certain sets of documents601. An easy way to understand the underlying logic is to compare what
Leximancer does for words with what social networking sites like Facebook or LinkedIn do for people.
When somebody befriends somebody else in Facebook, Facebook finds out that it can draw a line
between those two people. As those people start connecting to ever more additional people, it starts
building up an ever richer network of associations between these people. Leximancer does the same
with words. After some initial cleaning of texts (e.g., by identifying sentences; by ignoring frequently

600
https://www.leximancer.com/ A. E Smith, Machine Mapping of Document Collections: The Leximancer System, in
Proceedings of the Fifth Australasian Document Computing Symposium, 2000, 3943; A. E Smith, Automatic Extraction of
Semantic Networks from Text Using Leximancer, in Proceedings of the 2003 Conference of the North American Chapter of
the Association for Computational Linguistics on Human Language Technology: Demonstrations-Volume 4, 2003, 2324; A. E
Smith and M. S Humphreys, Evaluation of Unsupervised Semantic Mapping of Natural Language with Leximancer Concept
Mapping, Behaviour Research Methods 38, no. 2 (2006): 262279.
601
We want to emphasise that Leximancer does NOT use any pre-defined ontologies or taxonomies in building this
semantic network (e.g., things like we KNOW that security is mostly military, and therefore we link security
automatically to that known association). Whereas taxonomies can certainly be useful for certain purposes, we
intentionally opted for a fully open approach like Leximancers (without any preconceived notions).

115
used words such as the or it; or by merging various grammatical versions of the same word such as
link, links, linked and linking into the concept link, etc.), Leximancer starts drawing lines
between words that co-occur within two sentences. The main underlying intuition is that when an
author decides to put her ideas in words, she is likely to put words that occur in the same line of
thought close to each other - meaning within one or two sentences of one another. Leximancer uses
this intuition to build up an ever richer semantic network as it systematically goes - in a number of
iterations - through all of these documents sentence by sentence. When it finishes this analysis, it is
able - on the basis of these associations between co-occurring concepts - to identify the main
themes within a set of documents: those concepts that travel together through the various texts
(in the Facebook analogy - these would be clusters of people that tend to be friends with other).
Since we only collected the articles from the various disciplines that deal with more conceptual
issues of security (definitions, dimensions, sources, etc.), these themes essentially summarise the
main substantive issues that the texts collectively focus on.

At the same time, conceptual security issues did not have to be (and indeed were not always) the
central focus of many articles that were collected from EBSCO. Although the search terms had to be
significant enough within the text to place the article towards the top of all articles containing them,
the conceptual part may very well be limited to one or a few paragraphs. This is where another
functionality of Leximancer comes in handy. At the end of its lexical analysis, Leximancer also
generates lists of (ranked) concepts with some numerical values reflecting their centrality in the texts
(not only how often they occur in the text, but also - and even more importantly - how often they co-
occur with other words). This means that we were able to zoom in on all concepts that co-occur
within two sentences of the word security. Also these are numerically ranked, allowing our analysts
to quickly (and without any preconceptions or other biases) get a sense of what security-associated
concepts tend to be more important throughout the set. Since Leximancer then also allows the user
(in this case the analysts that worked on these write-ups) to drill down to the actual snippets of text
in which those two concepts co-occur, the broader context could then also be used to make sense
of the purely numerical data.

Within the context of this project, we typically had a few iterations of usage of Leximancer for every
set of documents we collected. In the first iteration, we just ran Leximancer to identify the key
themes that emerged from each set (in the sense of concepts that appear to travel together through
the entire set of documents) and to rank the individual discovered concepts in terms of their
centrality to the texts: both in terms of how often those concepts occur throughout the text, but also
in terms of their relevance. We then zoomed in on the concept security itself and looked at the
concepts that are most frequently associated with it. Since Leximancer calculates the likelihood of a
concept (e.g., security) occurring within a certain block of text (a window of two sentences before
and after the sentence within which that concept is mentioned602), the numerical value of that
association measures the likelihood of that concept being mentioned near security. The findings of
this first iterations were then used in the write-ups for the individual disciplines, which attempt to
analyse how security is actually defined and described in the various disciplines. In this stage, our
analysts thus used Leximancer both as a first (fully automated) cut into the set of documents, but
also as a tool to help them navigate the documents. So in order to make sense of a certain theme

602
We used the default value for this parameter, which is two sentences. So Leximancer in this case looks for all concepts
that occur within two sentences (either before or after) of the concept security.

116
that emerged from the text, they clicked through to the underlying texts in which these connected
concepts co-occurred in order to interpret what that theme actually meant.

In a second iteration, the team went in search of the main focal points of this analysis: definitions of
security (how does this discipline define security), dimensions of security (which various dimensions
of security are identified in this discipline), sources of security (what are the sources from which it
can emerge) and security strategies (what are the various ways in which these different disciplines
try to deal with security)603. Most of this analysis was again inspired by taking a closer look at the
actual texts in which Leximancer observed these terms (e.g., security and definition) to appear
together within two sentences of one another.

The one final stratagem that was used by the ETTIS-team to compare the various dimensions of
security across the disciplines in a more automated and systematic way was to construct baskets
with various concepts that relate to various dimensions of security. We identified - based on the
automated content analysis of the collected (both policy and academic) documents as well as some
additional background research604 - 11 dimensions of security that appear to denote distinct aspects
of security: the economic, educational, environmental, health, human, international law, military,
natural resource, social-political , technology and territorial dimensions. The complete list of
concepts that were used to construct these baskets can be found back in the Annexes, but to give an
example: the basket for the economic dimension of security contains concepts such as trade,
development, protection, market, industry, poverty, growth, competitiveness, etc. The entire set of
documents was then reprocessed in Leximancer with these new baskets. This yielded a numerical
value for the importance of the various baskets within the various disciplines, but also across them.
(these values are available upon request).. Secondly, this second iteration also allowed us to zoom in
again on the concept security to find out which of the baskets are more strongly associated with it
(again in the sense that any of the words contained in the respective baskets co-occurred a certain
amount of times with the concept security within two sentences). This allows us to identify, in a
more systematic way than either a cursory or in many ways even a more detailed human analysis
could, both similarities and differences across these various academic disciplines with respect to
which dimensions of security they tend to focus on.

The team wants to emphasise that there are many more insights this new dataset and new method
of analysing it could yield. Given time constraints, for instance, we were unable to systematically
track differences across time - although it is clear that there have been significant changes here that
are also relevant for setting (new) priorities for R&D. We also mostly605 limited ourselves to
Journalseeks higher-level disciplines (like social science) to the detriment of some fascinating
differences at the lower-level disciplines (such as, for instance, sociology or anthropology within the
603
Often these various focal points proved to me much less distinguishable from one another than they are described here.
It was not always possible to draw clear lines between definitions and dimensions, for instance; or between sources and
strategies. Since the discipline chapters were also written up by various members of the team, the careful reader may also
discern some differences in the ways in which the focal points were interpreted by the analysts. But we want to stress here
that these focal points were just identified to ensure that the write-ups would cover all of these aspects, and that from this
point of views, different interpretations of them may even be viewed as an advantage.
604
This included the resources of visualthesaurus.com and http://dico.isc.cnrs.fr/dico/en/search, where we looked for all
applicable free associations with and synonyms of the various baskets that we selected.
605
Some consortium partners also conducted some explorations into more detailed sub-disciplines (such as cryptography or
political science) or even schools of thought within those disciplines (such as critical theory within - mostly - political
science), which will be added to this chapter.

117
larger social science-family). Thirdly, we decided to focus primarily - in line with the focus of this work
package - on the very concept of security. As a result our analysis has unearthed many revealing (and
different) insights from different disciplines on how these disciplines approach security, the tools
they use, the solutions they have developed, of which we only describe the top level findings in this
report. Finally, our analysis would have benefited from a number of additional iterations, in which we
could have refined the concepts (e.g., which words could be safely excluded or merged in the
analysis for various reasons), the granularity or labels of the discovered themes, the content of the
baskets we created, etc., which fell outside of the scope of this project given the resources at our
disposal. This can be taken up in future RTD projects.

The following sections present the high-level findings that emerged across the different disciplines.
They are based on the separate analyses for the individual disciplines. The write-ups of these
analyses are presented in the Annexes. We present these high-level findings in the hope of providing
new insights in existing definitions of security in other disciplines, which can potentially enrich our
understanding of various (also different) ways of how we can deal with security. These in turn can be
used as input for the framework in deliverable 1.2, which will develop an analytical framework to
frame the understanding of the concept of security in the context of this research project in order
toguide the identification of sources, the collection of information, the analysis of topics, and the
presentation and dissemination of results in the subsequent stages of the research.606

3.3 Definitions of Security

In this section we will describe a number of key elements that have surfaced in our examination of
definitions of security. This is explicitly not intended to be an exhaustive historical survey of the
evolution of various definitions of security. Rather it seeks to highlight a number of angles on security
that may be relevant to security policy making at a later stage.

3.3.1 Levels of analysis: individual group state global

The main unit of analysis in the mainstream national security discourse as we also clearly saw in the
official national policy documents remains the nation-state. Significantly less attention is devoted
to global security challenges (which still tend to be primarily viewed from a national perspective) and
increasingly, but still very modestly to human security. From the dataset of articles from various
disciplines that we collected for this work package, however, it is quite clear that in most other
disciplines, the priority is different. In many disciplines the individual human being really stands at
the heart of security. This is the case in education (e.g., school violence607), environmental
studies608, law (human security, which allows the convergence between international relations and

606
ETTIS, Description of Work, 2011-09-12
607
Family structure and supervision of children (Mayer, Matthew J., and Peter E. Leone, School Violence and Disruption
Revisited: Equity and Safety in the School House, Focus on Exceptional Children, Vol. 40, No. 1, September 2007, p. 22) are
one of the main focuses of study when education focuses on school violence.
608
In the Human Development Report, two main aspects of human security can be noted: first safety from chronic threats
such as hunger, diseases and repressions, and second, protection from sudden and harmful disruptions in the patterns of
daily life. Mobjrk, Malin, Mikael Eriksson, and Henrik Carlsen, On Connecting Climate Change with Security and Armed
Conflict. Investigating knowledge from the scientific community, FOI, Swedish Defence Agency, Stockholm, 2010.

118
law, state and individuals, public and private dimensions609), medicine and health science (e.g.,
health security610), philosophy and psychology (e.g., attachment security611, sexual security612).

This is not to say that these disciplines ignore the broader communities within which individuals live.
In psychology, for instance, home is associated with a refuge, a sanctuary, a place of personal
growth through social and psychological security, providing a feeling of belonging and a source of
strengthened, nurturing personal relationships and approximating, as much as possible, a family
ethos.613

Furthermore, quite a few academic disciplines also focus on such groups as their main level of
analysis, which provides an interesting contrast with mainstream national security. One article in the
linguistics set (reflecting a theme from the biological literature) argues that human security aims to
reduce the risk to our existence as individuals and as a species [emphasis added] and to increase our
choices in realising and expanding human potential for present and future generations. Species
survival, the quality of individual life and the realisation and expansion of human potential are the
content of human security. This concept of human security is historical, ethical and policy-
oriented.614 Human security, also in the sense of the security of humankind is a frequent
occurrence in the social sciences literature: Although current security policy trends are more
concerned with redefining the policy agendas of nation-states than with the concept of security
itself615, the United Nations Development Programme's (UNDP) Human development report (1994)
has urged a ``human-centred'' approach, supplementing these five national security dimensions with
seven human security dimensions of economic, food, health, environmental, personal, community
and political insecurity616. We find a similar focus on multiple levels of analysis in the environment
set: Beyond states (States can develop shared norms and values with the objective of building

609
Goldewijk, B.K., Why Human? The Interlinkages Between Security, Rights and Development, Security & Human Rights,
Vol.19, No. 1, 2008, pp. 2425; The ethic of human security accords moral priority to the security of individual human
beings (Bain, W., Against crusading: The ethic of human Canadian foreign policy, Canadian Foreign Policy Journal, Vol. 6,
No. 3, Spring 1999, pp. 85-98.).
610
Security-related health policies are oriented towards designing enhanced diet patterns (Andrus, Ruth, and Eugene L.
Horowitz, The effect of nursery school training: insecurity feelings, Child Development, Vol. 9, No. 2, June 1938, pp. 169-
174) and a safer transition to adulthood (Hemmeter, J. , Health-Related Unmet Needs of Supplemental Security Income
Youth after the Age-18 Redetermination", Health Services Research, Vol. 46, Issue 4, August 2011, pp. 12241242) for
individuals in their early stages of life.
611
Attachment security makes reference to the family as the unit of societal organisation where security is more visible, and
the individuals behaviour within it: human beings are innately equipped with attachment and caregiving behavioural
systems, among other important behavioural systems (e.g., exploration, sexual mating) because, during evolution,
becoming emotionally attached to caregivers (e.g., parents) and providing care for dependent or injured individuals (e.g.,
infants, injured family members) enhanced inclusive fitness. (Gillath, Omri, Phillip R. Shaver, Mario Mikulincer, Rachel E.
Nitzberg, Ayelet Erez and Marinus H. van Ijzendoorn, Attachment, caregiving, and volunteering: Placing volunteerism in an
attachment-theoretical framework, Personal Relationships, Vol. 12, Issue 4, December 2005, pp. 425446)
612
In the case of sexual security, individuals and the couple they constitute are the more frequently studied units: in
looking for a spouse the man is looking for that sort of security which combines sexual and social adjustment. During the
courting period a good deal of insecurity is experienced, although most people try to minimise it ( Karpman, B., Insecurity
in search of security, American Journal of Psychotherapy, Vol. 50, No. 4, Fall 1996, p. 437),"For an ageing man, marriage is
very secure" (Steigman, K., The literal American: rereading Graham Greene in an age of security (Report), West Chester
University, West Chester, 2012.).
613
Al-Krenawi, Alean, John R. Graham, and Mahmud A. Sehwail , Mental Health and Violence/Trauma in Palestine:
Implications for Helping Professional Practice, Journal of Comparative Family Studies, Vol. 35, Issue 2, 2004, pp. 185-209.
614
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal, Vol. 59, Issue
Supplement s1, September 2008, pp. 101112.
615
Baldwin, D., The concept of Security, Review of International Studies, Vol. 23, 1997, pp. 5-26.
616
Brauch, H.G., Conceptualising the environmental dimension of human security in the UN, International Social Science
Journal, Vol. 59, Issue Supplement s1, September 2008, pp. 19-48.

119
order in inter-state relationships (Bull 1977, 13; Buzan 2001; Wheeler 1992)617), climate change is a
security issue for all layers of society, and at all levels of government.618

Some scholars also point out that changes in the topology of the international system make the
distinction between the various levels more murky: features of the global economy underline the
need to rethink the distinction between the global and the local, notably the assumption about the
necessity of territorial proximity to the constitution of the local. This means rethinking spatial
hierarchies that are usually taken as given, such as local < national < global.619

Also here, we get an interesting perspective that this debate may be losing its relevance in a more
non-linear, globalising world that produces: distinctive and complex spatialities that cannot be
completely subsumed under the national or the global and thus have their own sociological reality.
Demonstrably forces of globalisation, their most telling feature may be to `denationalise elements of
national geography, identity, and practice, where that process refers to the deconstruction (although
seldom the obliteration) of the national frame of reference and competence in areas as diverse as
defining political community, framing regulatory policy, and constructing urban space (Sassen,
2006).620

We also want to point out that we find a similar multi-level focus (component group of
components system system of systems) in the literatures we surveyed (mainly from the harder
sciences) that focus on the security aspects of (hardware or software) systems. Also here we find
different levels of analysis (e.g., the overall system and/or its component parts), and the relationship
between the security of the individual components and the security of the entire system is a point of
attention.

3.3.2 Relative vs. absolute security

Especially the theoretical security literature (in the field of international relations621), but also the
more policy-applied security literature, pay a lot of attention to the importance of a countrys
relative standing vis--vis other countries, and the role this is thought to play in its security. Even if all
countries show economic growth (absolute gains), for instance, but some countries grow more
quickly than others (relative gains), that is often construed as (potentially) having security
implications.

617
Cudworth, Erika, and Stephen Hobden, Beyond environmental security: complex systems, multiple inequalities and
environmental risks, Environmental Politics, Vol. 20, No. 1, February 2011, pp. 42-59
618
Light, J.S., Urban Planning and Defence Planning, Past and Future, Journal of the American Planning Association, Vol.
70, No. 4, Autumn 2004, pp. 399-410.
619
Saskia Sassen, Spatialities and Temporalities of the Global: Elements for a Theorisation, Public Culture 12, no. 1
(January 2000): 215.
620
Axford, B., "Editorial", Borders and Networks in the Global System, Globalisations, Vol. 4, Issue 3, 2007, pp. 321-421.
621
See e.g., J. Grieco, R. Powell, and D. Snidal, The Relative-gains Problem for International Cooperation, American
Political Science Review (1993): 727743; M. Mastanduno, Do Relative Gains Matter? Americas Response to Japanese
Industrial Policy, International Security 16, no. 1 (1991): 73113; R. Powell, Absolute and Relative Gains in International
Relations Theory, The American Political Science Review (1991): 13031320; J. M Grieco, Anarchy and the Limits of
Cooperation: a Realist Critique of the Newest Liberal Institutionalism, International Organisation 42, no. 03 (1988): 485
507.

120
If we take a closer look at some other academic disciplines, we also find back the idea of that security
can be construed in relative terms. For instance, in the psychology literature, many authors argue
that a lack of psychological security inevitably leads to an increased focus on economic security and
individual social status: humanistic perspectives suggest that when feelings of safety and security
are threatened, individuals are less likely to focus on activities that promote growth and well-being,
and more likely to concern themselves with issues such as money, image, and status (Maslow 1956).
From an evolutionary perspective, it also seems likely that status, looks, and wealth may have
offered important short-term means of countering threats to security and survival in our
evolutionary past, and thus people may be somewhat hard-wired to orient towards extrinsic goals
in various types of threats listed above have all been linked to times of uncertainty.622

We note, however, that this theme which is quite dominant in the mainstream discourse seems
to play a somewhat less prominent role in other disciplines.

3.3.3 Objective vs. subjective security

Most disciplines acknowledge a discrepancy between objective and subjective security concerns
the differences between these two but also and the difficulty in differentiating between them.
Psychology, for instance, makes a difference between dispositional and situational security:
Generally speaking, when people feel insecure, either dispositionally (e.g., because of chronic
anxiety) or situationally (due to life events or experimental manipulations), they tend to be more
defensive, rigid, aggressive, and sensitive to emotional threats (e.g., separation from loved ones,
failure, or attacks on personal beliefs). Conversely, when people feel secure, they tend to be more
open, flexible, pro-social, and resilient.623 Also in the Linguistics set we find a reference to this topic:
the inclusion of the following factors make security eligible for lack of objectivity: Inevitably, a
definition reflects societal views on a myriad of topics, including the distribution of power, social
relations, gender issues, the nature vs nurture debate, collective and individual values and so on.624

Whereas many articles criticise the securitisation of society and the ensuing constant subjective state
of fear, some articles emphasise the dangers of attaching to much weight to objective levels of
security. They claim that certain populations may be lulled into a potentially false sense of security
despite the fact that this may bear little relationship to the objective security situation that
surrounds them: There is no doubt that that government agencies and private companies are
starting to make significant changes in their security, in both policies and spending. Yet, as time goes
by, most people naturally tend to be less concerned about security. This is a huge problem, but
nevertheless very typical.625

The distinction between subjective and objective security is certainly acknowledged in more
traditional security discussions (and certainly in the theoretical literature referring to perception

622
Sheldon, Kennon M., and Tim Kasser, Psychological threat and extrinsic goal striving, Motivation & Emotion, Vol. 32,
Issue 1, March 2008, pp. 37-45.
623
Gillath, Omri, and Joshua Hart, The effects of psychological security and insecurity on political attitudes and leadership
preferences, European Journal of Social Psychology, Vol. 40, 2010, pp. 122-134.
624
Oquist, P., Basic elements of a policy framework for human security, International Social Science
Journal, Vol. 59, Issue Supplement 1, September 2008, pp. 101112.
625
Rincon, David, and Cristina Cano, Mitigation of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin America
Traavidsactions, IEEE (Revista IEEE America Latina), Vol. 5, No. 3, 2007, pp. 128-135.

121
issues626). But there does seem to be a more dominant focus there on the (presumed) objective
aspects of security a bias that is also clearly reflected in the security research agenda. We find a
similar focus on the objective dimension back in the business administration and economics
literature, where financial securities are seen as financial instruments that objectively protect the
individuals or entities that own them by law.627

3.3.4 Negative vs. positive security

Security is typically defined in negative terms (against, (free) from, etc.). The very etymological
roots of the word also suggest such a negative framing as it originally meant "without care628. It
signified a state of mind defined by Cicerco as the absence of distress upon which happy life
depends.629 It may also be worthwhile to point out that the word defence, which is often
associated with military matters in a national security context, also originally had the sense of
pushing away, warding off presumably various cares630. This means that the various threats that
have to be warded off are seen to play a central role in the debates about security.

We have already seen that threats figure prominently in various national security policy documents.
Our analysis of other disciplines shows that the negative dimension of security to be free from
various dangers is quite dominant in other disciplines as well. In Arts and Literature, for instance,
home is a place where people feel in control of their environment, free from surveillance, free to be
themselves and at ease, in a world that might at times be experienced as threatening and
uncontrollable.631 Also in our psychology set, Karpman claims that, the security of the home gives
place to the necessity of creating one's own security in a competitive and generally hostile world.
Home is defined as a secure base on which identities are constructed.632 The Human Development
Report that introduced the concept of human security focused on the struggle to achieve freedom
from fear and freedom from want. Human security is further described as aiming to reduce the
risk to our existence as individuals and as a species and to increase our choices in realising and
expanding human potential for present and future generations.633

626
The seminal work here is R. Jervis, Perception and Misperception in International Politics (Princeton Univ Pr, 1976).
627
Helfat (2007) uses the definition as stipulated in Article 8 of the New York Uniform Commercial Code:
Security means an obligation of an issuer or a share, participation, or other interest in an issuer or in property or
an enterprise of an issuer: (i) which is represented by a security certificate in bearer or registered form, or the transfer
of which may be registered upon books maintained for that purpose by or on behalf of the issuer; (ii) which is one of a class
or series or by its terms is divisible into a class or series of shares, participations, interests, or obligations; and (iii)
which: (A) is, or is of a type, dealt in or traded on securities exchanges or securities markets; or (B) is a medium for
investment and by its terms expressly provides that it is a security governed by this Article. Helfat, J.N., Article 8 of the
New York Uniform Commercial Code, Investment Securities, 2007, p. 86.
628
The word comes from the Latin word secures, meaning "without care, safe," from *se ("free from") + cura "care".
629
As cited in Wver, Ole (2004) Peace and security: two concepts and their relationship in Stefano Guzzini and Dietrich
Jung (eds) Contemporary Security Analysis and Copenhagen Peace Research (Routledge)
630 th th
The origins of this word have been traced back to the mid-13 century to the Old French verb defendre (12 century),
which meant to "defend, resist." This is turn came directly from the Latin verb defendere "ward off, protect, guard, allege in
defence," from de- "from, away" (see de-) + -fendere "to strike, push," from PIE root *gwhen- "to strike, kill".
631
Saunders (1990) in Colic-Peisker, Val, and Guy Johnson, Security and Anxiety of Homeownership Perceptions, Housing,
Theory and Society, Vol. 27, No. 4, 2010, p. 353.
632
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, Vol. 50, No. 4, Fall 1996, p. 437.
633
Oquist, P., Basic elements of a policy framework for human security, International Social Science
Journal, Vol. 59, Issue Supplement s1, September 2008, pp. 101112.

122
And yet we also find a number of disciplines struggling to counterbalance this negative framing of
security with a more positive one. Even in the still surprisingly influential Maslow hierarchy of
human needs, for instance, the (desire for) security (or safety) layer of the pyramid is seen as a
foundation on which the other layers of human needs working their way up to self-actualisation (in
Maslows view regardless of culture). In this sense security could be seen as double-faced: with a
negative face towards all possible threats, but also a positive face towards the higher layers of
fulfillment of human needs.

In the Humanities set, for instance, we find references to a more positive concept of security that
relies on the strength of a group and the effectiveness of the good practices to which it is applied.
Recognise that security is an issue for people as well as for states; [d]evelop strong norms for the
ways states behave internally; and [a]ctively protect the people of the region.634 We find a number of
references also to the biological aspect of evolutionary fitness, in which both the negative and
positive aspects of security can be found back. When we turn to the sources and strategies part of
this chapter, we will also see that the increased focus on aspects like resilience can clearly be seen as
a trend towards a more balance view of the negative and positive faces of security.

3.3.5 Security as a state vs. security as a process

To most disciplines, security is described as a state of the unit of analysis at whatever level. As we
saw in the previous section, that state is often described in negative terms: the state of being free
from. Security became a term in the emerging discipline of psychology in the sense of confidence
[Selbstsicherheit]. This is not identical to the original Roman concept of security however. As Wver
has pointed out, securitas as a state of mind was a level of reality not reductively derivative of
something more real while psychological security is today regarded as a subjective (mis)perception
of an objective state of security.635

Also in religious text such as the Bible security is understood as a mental state characterised by the
absence of fears or concerns (how they dwelt careless, after the manner of the Zidonians, quiet and
secure; and thou shalt be secure, because there is hope; Devise not evil against thy neighbour, seeing
he dwelleth securely by thee 636).

In the Education set, for instance, security is alternatively defined as a state and a process. For
instance, it is described how individuals seek security in places where they feel comfortable in
particular when away from home in order to protect themselves from a hostile external
environment: Locational choice can be seen as one of the major tactics employed by the students
(...) in order to minimise the damage of these perceived risks and concerns.637 But the importance
of process is also underlined: What seems to be important (...) is [to find] a place in which [an
individual can] belong, somewhere that in some way equated to [the] experience of growing up in
[ones] hometown. Such an environment allows to interact with people with which one can connect

634
Rolfe, J., Regional Security for the Asia-Pacific: Ends and Means, Contemporary Southeast Asia, Vol. 30, No. 1, April
2008, pp. 99-117.
635
Wver, O., Peace and security: two concepts and their relationship, 2004, p. 55.
636
Proverbs 3:29. The Holy Bible: King James Version. http://www.bibliacatolica.com.br/07/24/3.php
637
Clayton, John, Gill Crozier, and Diane Reay, Home and away: risk, familiarity and the multiple geographies of the higher
education experience, International Studies in Sociology of Education, Vol. 19, Nos. 3-4, September-December 2009, pp.
157-174.

123
in terms of ethnicity and religion, (...), social class.638 This way, building new social networks
influences the emergence or consolidation of identities, thereby maintaining an individuals social
background, ensuring a level of cultural security,639 and facilitating an individuals development.

Interesting procedural definitions of security also emerge from other disciplines. Computer Science,
for instance, identifies three aspects of information and computer security (CIA): confidentiality
(ensuring that information is not accessed by unauthorised parties), integrity (ensuring that
information is not altered by unauthorised parties), and availability (ensuring that the system can be
accessed). One of the ways in which this can be achieved is through what is called Procedural
security: By security, we especially mean the ability of information and service providers to specify
and have enforced their own rules governing access to their information.640 Social sciences
emphasises the constant need for actions to be taken, which reveals that security is not a state of
things, but a conglomerate of deliberate initiatives, which could be classified into two major
elements: prevention and response.641 One article in the Education set defines security as the
process of individuation during adolescence and the transition to young adulthood has been
characterised in terms of autonomy (Hill & Holmbeck, 1986; Shapiro, 1981), independence (Douvan
& Adelson, 1966; Group for the Advancement of Psychiatry, 1968), and detachment from family
members (Bios, 1962, 1979; A. Freud, 1958), among other dimensions.642 Also in Linguistics we see
that human security is conceptualised as the outcome of the ongoing quest for greater inclusion
and leadership for individuals.643

3.4 Dimensions of Security

In this section, we will present some of the main dimensions of security as they emerge from
different disciplines. In line with the overall objective of this chapter to identify novel takes on
various security related aspects, we will focus in this chapter especially on those dimensions of
security that are less commonly found in mainstream national security discussions. We refer the
reader for more commonly used dimensions to the different dimensions of security that were
identified in the policy documents.

3.4.1 Ontological security and existential anxiety

In psychology, following authors such as Giddens (1991) and Kinnvall (2004), security is a state of
mind based on what is alluded to as ontological security and the avoidance of existential anxiety,
which include the notions of trust and well-being: on the one hand, ontological security refers to
the sense of safety in an individuals environment, and trust of other people. In other words,

638
Clayton, John, Gill Crozier, and Diane Reay, Home and away: risk, familiarity and the multiple geographies of the higher
education experience, International Studies in Sociology of Education, Vol. 19, Nos. 3-4, September-December 2009, pp.
157-174.
639
Ibid.
640
Bryce, Ciaran, and Winfried Kuhnhauser, An Approach to Security for World-Wide Applications, in Sokratis K. Katsikas
(ed.), Communications and Multimedia Security, International Federation for Information Processing, 1997, p. 300.
641
Rincon, David, and Cristina Cano, Mitigation of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin America
Transactions, IEEE (Revista IEEE America Latina), Vol. 5, No. 3, 2007, pp. 128-135.
642
Ryan, Richard M., and John H. Lynch, Emotional Autonomy Versus Detachment: Revisiting the Vicissitudes of
Adolescence and Young Adulthood, Child Development, Vol. 60, 1989, p. 340.
643
Goucha, Moufida, and John Crowley (eds.), Rethinking Human Security, International Social Science, Journal
Monograph Series.1, October 2008, p. 148.

124
ontological security is a security of being, a sense of confidence and trust that the world is what it
appears to be.644 According to Giddens (1991), cited in Kinnvall (2004), obtaining trust from other
people (ontological security) is necessary in order for a person to maintain a sense of psychological
well-being and avoid existential anxiety (Giddens, 1991 cited in Kinnvall, 2004). Trusting others is
like an emotional inoculation against existential anxieties, a protection against future threats and
dangers which allow the individual to sustain hope and courage in the face of whatever debilitating
circumstances she or he might later confront" (Giddens, 1991 cited in Kinnvall, 2004).645

We also find the term ontological security back as an important dimension in the Arts and Literature
set, where it is defined as being about people having trust in the social world, confidence in the
continuity of the social order, and predictability in their day-to-day lives. When these conditions are
breached anxiety comes flooding in and this constitutes a serious threat to our identity and sense
of ontological security.646

3.4.2 Attachment security

Attachment security is a key concept in the Psychology set. The concept is defined by Waters and
Cummings (2000) as a secure base relationship integrat[ing] insights about affect, cognition, and
behaviour in close relationships across age and culture.647 Attachment theory (Bowlby, 1969/1982)
is the most widely accepted view of the infant's emotional tie to the caregiver.648 Attachment is
inherent to human nature, therefore providing for a sense of security and allowing for integration. It
has been studied in a wide spectrum of aspects involved in the parent-child relationship: the effects
of interparental relationship in children's insecurity,649 parental separation anxiety, controlling
parenting, and difficulties in the separation-individuation process.650651 Attachment security, as
Belsky and Pascofearon argue, should not be overlooked, given its risk of leading to developmental
disadvantage and subsequent feelings of insecurity.652

3.4.3 Financial security

The definition of security, that figures most prominently in the Business Administration and
Economics sets, is a security in the financial sense whereby the definitional issues surrounding this
particular concept (what can be termed a security and what cannot) have become an issue of much

644
Kinnvall, C., Globalisation and Religious Nationalism: Self, Identity, and the Search for Ontological Security, Political
Psychology, Vol. 25, Issue 5, October 2004, pp. 741-767.
645
Ibid.
646
Saunders (1990) in Colic-Peisker, Val, and Guy Johnson, Security and Anxiety of Homeownership Perceptions, Housing,
Theory and Society, Vol. 27, No. 4, 2010, p. 353.
647
Waters, E., and Cummings, E.M., A secure base from which to explore close relationships, 2000,
http://www.psychology.sunysb.edu/attachment/online/waters_cummings.pdf
648
AScher, A., Facilitators and regulators: maternal orientation as an antecedent of attachment security, Journal of
Reproductive and Infant Psychology, 2001
649
Davies, P.T,. and Woitach, M.J., Children's Emotional Security in the Interparental Relationship of emotional security
theory: An ethologically-based perspective, Association for Psychological Science, 2008
650
Kins, Evie, Bart Soenens, and Wim Beyers, Why do they have to grow up so fast? Parental Separation Anxiety and
Emerging Adults Pathology of Separation-Individuation, Journal of Clinical Psychology, Vol. 67, No. 7, July 2011, pp. 647-6.
651
Kins, Evie, Bart Soenens, and Wim Beyers, Why do they have to grow up so fast? Parental Separation Anxiety and
Emerging Adults Pathology of Separation-Individuation, Journal of Clinical Psychology, Vol. 67, No. 7, July 2011, pp. 647-6.
652
Belsky, Jay, and R M Pasco Fearon, Early attachment security, subsequent maternal sensitivity, and later child
development: Does continuity in development depend upon continuity of caregiving?, Attachment & Human
Development, Vol. 4, Issue 3, 2002, pp. 361-387.

125
contention in both regulation and litigation and are therefore vigorously discussed in the literature.
Aiken (2006) states that the case that defines a security according to the Securities Act of 1933 is
Securities and Exchange Commission v. Howey, 328 U.S. 293. In Howey, the court defined an
investment contract as a contract, transaction or scheme whereby a person invests his money in a
common enterprise and is led to expect profits solely from the efforts of a promoter or a third party,
it being immaterial whether shares in the enterprise are evidenced by a certificate or by nominal
interests in physical assets employed in the enterprise.653 The key definitional components of
security here appear to be that it is an asset that provides (some) security to its owner.

Whereas this definition from a financial context may appear to be far afield from the concept of
security that is commonly being used in national security communities, it is worth pointing out that
the basic underlying intuition is a very similar one: that the expected payoff combined with the
extreme fungibility of a financial asset provides its owner with a degree of security. So in this sense
security is defined as a bond or pledge that provides assurance or safety for its holder in the face of
danger654.

3.4.4 Social security

Another frequently encountered definition in the Business Administration and Economics sets
involves the concept of social security. The official definition of Social security as developed by the
International Labour Organisation (ILO) is the protection that a society provides to individuals and
households to ensure access to health care and to guarantee income security, particularly in cases of
old age, unemployment, sickness, invalidity, work injury, maternity or loss of a breadwinner655. So
in the case of social security, we are talking about an internationally codified definition that focuses
on protection against various (identified) types of social insecurity that individuals (and groups) in a
labour employment may encounter.

3.4.5 Economic security

Closely related to the concept of social security is the (broader) concept of economic security.
Meneham here usefully distinguishes between two types of security associated with two types of
resources: commodified security derives from commodified income because this arises from
commercial exchanges performed either in labour markets, which fix the terms of paid employment,
or in markets in goods and services which determine incomes from self-employment or from
property; while decommodified security derives from decommodified income, so called because
it is independent of markets and arises either from social benefit entitlements or from grants and
assistance paid by virtue of a persons place of residence or situation of inadequate means.
Decommodified security thus encompasses both social security per se and security in the form of
benefits, assistance and social welfare delivered to the needy by local government and welfare

653
Alken, A., "Evaluating tenant-in-common interests in real estate", The Counselors of Real Estate, Vol. 31, Issue 1, Summer
2006., pp. 1-11.
654
Der Derian, James, The Value of Security: Hobbes, Marx, Nietzsche and Baudrillard in Ronnie D. Lipschutz
(ed.), On Security, Columbia University Press , Columbia, 1995, p. 28.
655
International Labour Organisation (ILO), Facts on Social Security, Geneva,
http://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/documents/publication/wcms_067588.pdf

126
organisations. 656 In Law, economic security is defined as the right to benefit from the fruits of
economic growth.657

In the psychology literature, authors associate money, image, prestige, social status as tenets of
economic security which is seen to be vital to psychological security. As described earlier, various
authors also discern a relation between economic and psychological security through the tendency of
humans to focus on individual social status in times of uncertainty.658

Also the social sciences do not overlook the financial well-being of individuals and identify as the
economic dimension as a key component of human security: human security is defined as the
number of years of future life spent outside a state of "generalised poverty", which occurs when an
individual falls below the threshold of any key domain of human well-being.659

3.4.6 Tenure security

Another very fundamental notion in the economics literature that is less-well known in the national
security context is the concept of tenure security. This concept goes back to the origins of property
rights in the English enclosure movement in the 16th century and refers to the right of a tenant to
continue to occupy a dwelling or site. From there, it has been extended to the tenure not just of
land, but of any form of property. In one of the most interesting articles in this Business
Administration and Economics sets, Arnot et al. summarise (and clarify) a number of academic
debates around tenure security. They point out that security of property rights, or tenure, is
central to the economics of development. The authors cannot help but point out that similar
definitional difficulties have also plagued the field of - and academic inquiry into - national security.
They continue: As a basis for deciding on a preferred definition, we begin with the proposition that
the concept of tenure security has largely evolved in response to efforts to clarify investment
incentives of property holders (e.g., Bohn and Deacon 2000). In a general sense, authors have been
concerned that insecure tenure to a resource reduces incentives to invest by reducing the benefits
that the resource can yield. As such, tenure security has evolved to be a potentially important
determinant in explaining the economic behaviour of property holders. It is interesting to point out
that various incentive problems with national security have also been identified (free riding
problems, moral hazard, etc.), but never in as explicit a way as in this literature.

3.4.7 Environmental security

Since the end of the Cold War, different authors in different disciplines have come to question the
state-centric and militaristic approach to security that had been in place since the Second World War.
This led to new notions of security that until recently had been neglected by academics and policy-

656
Menahem, G., The Decommodified Security Ratio: A Tool for Assessing European Social Protection Systems,
International Social Security Review, Vol. 60, No. 4, October-December 2007, pp. 69-103.
http://ssrn.com/abstract=1014719 or http://dx.doi.org/10.1111/j.1468-246X.2007.00281.x
657
MacFarlane, S. Neil, and Thomas G. Weiss, The United Nations, Regional Organisations and Human Security: Building
Theory in Central America, Third World Quarterly, Vol. 15, No. 2, 1994, pp. 277-295.
658
Sheldon, Kennon M., and Tim Kasser, Psychological threat and extrinsic goal striving, Motivation & Emotion, Vol. 32,
Issue 1, March 2008, pp. 37-45.
659
King, Gary, and Christopher J. L. Murray, "Rethinking Human Security", Political Science Quarterly,
Vol. 116, No. 4, Winter 2002, pp. 585-61.

127
makers alike. Environmental security is one of these notions that has received an increasing amount
of attention over the past two decades. This is also reflected in our findings, in which several
disciplines make elaborate references to environmental security, including Social Sciences and
Philosophy. This has led to a plethora of definitions, which according to Haque (2001), can be
generalised into three major categories: one set of explanations emphasises various forms of
environmental degradation affecting all human irrespective of nationalities; another set of
definitions focuses mainly on national environmental threats that spill over to other countries and
cause interstate tension; and the last set of analyses pays more attention to a nations capacity to
withstand environmental threats, rectify environmental damages, and guarantee public safety from
adverse consequences. 660 Haque recognises that these three categories overlap and cannot be
separated from one another. However, it does represent the different levels and dimensions of
environmental security that can be found in the current academic literature on the topic.

Other disciplines also make reference to environmental security, but maintain a focus on different
aspects of environmental security. Business Administration and Economics, and Law maintain a focus
on sustainability when referring to environmental security. The latter defines environmental security
as the right to a productive and sustainable ecosystem. 661 Within Environmental Sciences, the
security of natural resources, in the sense of guaranteeing their supply, is a constant throughout all
documents, and Computer Sciences includes nuclear safety in the realm of environmental security.

3.4.8 Physical/ Health security

Physical/health security is a recurring notion in many of our disciplines. However, major differences
exist not only between disciplines, but also between authors from a discipline, on what
physical/health security entails.

Disciplines such as Education and Linguistics consider physical integrity as the main component of
physical/health security. Fuentes and Aravena (2005) define physical integrity in relation to gender
equality, and believe it to include various forms of violence exerted over women, such as human
trafficking. 662 A very topical application of physical integrity can be found in the Education
literature,663 which discusses school violence as a threat to ones physical integrity.

Medicine and Health Sciences, Biology and Environmental Sciences look more at threats to human
life in general. Threats include bio-terrorism, biological warfare, pandemics, food insecurity and
water insecurity. The inclusion of these threats in the debate on security have led to a evolution of
the concept of security in the nineties, as is pointed out by Chen and Narasimhan (2003). They argue
that health security has risen on the global agenda,664 and human health has become one of the

660
Haque, M.S., Environmental Security in East Asia: A Critical View, Journal of Strategic Studies, Vol. 24, Issue 4, 2001,
pp. 203-234.
661
MacFarlane, S. Neil, and Thomas G. Weiss, The United Nations, Regional Organisations and Human Security: Building
Theory in Central America, Third World Quarterly, Vol. 15, No. 2, 1994, pp. 277-295.
662
Fuentes, Claudio, and Franciso Rojas Aravena (eds.), Promoting Human Security: Ethical, Normative and Educational
Frameworks in the Caribbean, SHS/FPH/UNESCO, Paris, 2005.
663
See for example: Mayer, Matthew J., and Peter E. Leone, School Violence and Disruption Revisited: Equity and Safety in
the School House, Focus on Exceptional Children, Vol. 40, No. 1, September 2007, pp. 1-28.
664
Chen, Lincoln, and Vasant Narasimhan, Human Security and Global Health, United Nations Development Programme,
Journal of Human Development, Vol. 4, No. 2, July 2003, p. 186.

128
bases of the new understanding of security 665. Particularly within the discipline of Biology, but also
in Environmental Sciences and Philosophy, are food and water insecurity considered as threats to
physical/health security. The definition of food security that is most commonly used throughout our
articles, is the definition as provided by the Food and Agricultural Organisation: food security is
equivalent to a state in which all people, at all times, have physical and economic access to
sufficient, safe and nutritious food for a healthy and active life.666 Whereas the focus is often on
food security in underdeveloped and developing countries, some authors also address the issue in
Western states, which then often revolves around obesity, and the limited or uncertain access to
food667. Water security is defined as the availability of an acceptable quantity and quality of water
for health, livelihoods, ecosystems and production, coupled with an acceptable level of water-related
risks to people, environments and economies. 668

The relationship between health security and economic security is commonly asserted.. Put simply:
an unhealthy society is less productive. Consider for instance the tremendous costs generated by the
victims of chronic diseases.669 In addition, the financial sustainability of modern health care systems
has become a major concern in a number of countries, due to demographic trends (e.g., ageing), the
rise of chronic diseases due to ageing and unhealthy lifestyles.

In recent years, an additional economic aspect has emerged with regard to health security. Health
threats such as pandemics are increasingly posing societies with the problem of current and future
scarcity of human and material resources, i.e., medical scarcity. Enemark (2008)670 also suggests that
they may lead to economic disruption; the economic impact can be massive, from the driving away
of foreign tourists to the cessation of exports.671 In a number of countries severely hit by HIV/AIDS,
the epidemics also undermine economic development, as the phenomenon results in the decline of
the overall size of the labour force, the decrease of productivity, the increase of imports and
therefore, slows the economic growth rates.672 What is more, the danger of new and re-emerging
infections is compounded by the increase in antimicrobial resistance, which has a global scope and
may have substantial economic impact.

Others argue that problems around the concept of health security occur at the intersection of
several fields or disciplines which do not share a common theoretical approach or academic

665
Chen, Lincoln, and Vasant Narasimhan, Human Security and Global Health, United Nations Development Programme,
Journal of Human Development, Vol. 4, No. 2, July 2003, p. 182; citing Alkire (2002)
666
Gomiero, Tiziano, David Pimentel, and Maurizio G. Paoletti, Is There a Need for a More Sustainable Agriculture?,
Critical Reviews in Plant Sciences, Vol. 30, Issue 1-2, 2011, pp. 6-23.
667
Guthrie, J. , C. Newman, and C. Ralston, USDA School Meal Programs Face New Challenges, Choices, Vol. 24, No. 3, 3rd
Quarter 2009.
668
Grey, David, and Claudia W. Sadoff, Sink or Swim? Water security for growth and development, Water Policy, Vol. 9,
2007, pp. 545-571.
669
See for example the Economic Impact of Cancer, published on the website of the American Cancer Society:
http://www.cancer.org/Cancer/CancerBasics/economic-impact-of-cancer
670
Enemark, C., Is Pandemic Flu a Security Threat?, Survival: Global Politics and Strategy, Vol. 51, No. 1, February-March
2009, p. 208.
671
Chen, Lincoln, and Vasant Narasimhan, Human Security and Global Health, United Nations Development Programme,
Journal of Human Development, Vol. 4, No. 2, July 2003, p. 186.
672
Dixon, Simon, Scott McDonald, and Jennifer Roberts, The impact of HIV and AIDS on Africas economic development,
University of Sheffield, British Medical Journal, Vol. 324, No. 7331, January 2002, pp. 232-234.
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1122139/.

129
methodology.673 As a result, thereis no unified approach in the definition or conceptualisation of
health security; in addition, the term is used inconsistently: For those who understand health
security as it is presented in UNDPs 1994 Human Development Report, the concept is not
incompatible with a primary health care approach, emphasizing community involvement, self-
sufficiency and protection of vulnerable groups such as pregnant women and the poor. But if health
security is defined exclusively in terms of protection of national populations against external threats
such as bio-terrorism, the concept becomes disengaged from usual public health epidemiologic
approaches, which measure and respond to differential levels of risk and disease burden within
populations. 674

3.4.9 School Security

School security is one of the particular, and admittedly rather specific, themes that repeatedly
showed up in our set of articles. The security of students at school is an important theme in the
Education literature, which they see as one of the elements of social security. Social security defined
as ones ability to access social support networks, including both formal and informal institutions
(Deumert et al., 2005) is provided by various institutions, including those that provide government
services, such as health care, welfare, education and so on. The informal social support network of a
society includes a persons social network, community, and family.675 In observing student
behaviour, the authors note that clearly, international students access to both formal and informal
social support networks is greatly reduced, leading to a lower level of social security. But school
security is more than just an element of security and has many ramifications. As we already mention
in the Physical/ Health security section, authors such as Mayer and Leone (2007)676 have analysed the
numerous other school security aspects which include: family structure and supervision of children
(suggesting the important role of family in education), poverty and income inequity (economic
dimension), exposure to violence in the media, media coverage of school violence (societal
dimension), access to guns and zero tolerance policies (legal dimension), to name a few. School
can also contribute to security by functioning to improve health habits and interests on the part of
the children as well as to maintain and improve health standards.677 However, schools can also be
understood as a source for insecurity, when they represent the absence of a home environment:
according to Heathers, young children driven to nursery schools can therefore be a traumatic
experience. The author underlines that harmony in the home, sociability in the family, maternal
warmth and parental rearing (including maternal indulgence) are conducive to a childs balanced

673
Aldis, W., Health security as a public health concept: a critical analysis, Gerencia y Polticas de Salud, Vol. 8,
No. 17, June-December 2009, p. 14. http://redalyc.uaemex.mx/redalyc/pdf/545/54514009002.pdf
674
Despite the availability of a vast literature on human security, health security and global public health
security, there is no universally agreed definition. Widespread but inconsistent use of the term by global public
health stakeholders with widely divergent perceptions, priorities and agendas has created confusion and
mistrust (...). A potentially useful distinction between health and security and health security has not been
developed in the literature, with some authors using the terms interchangeably. ldis, W., Health security as a
public health concept: a critical analysis, Gerencia y Polticas de Salud, Vol. 8, No. 17, June-December 2009, pp.
14-15. http://redalyc.uaemex.mx/redalyc/pdf/545/54514009002.pdf
675
Paltridge, Toby, Susan Mayson, and Jan Schapper, The contribution of university accommodation to international
student security, Journal of Higher Education Policy and Management, Vol. 32, Issue 4, August 2010, pp. 353-364.
676
Mayer, Matthew J., and Peter E. Leone, School Violence and Disruption Revisited: Equity and Safety in the School
House, Focus on Exceptional Children, Vol. 40, No. 1, September 2007, pp. 1-28.
677
Andrus, Ruth, and Eugene L. Horowitz, The effect of nursery school training: insecurity feelings, Child Development,
Vol. 9, No. 2, June 1938, pp. 169-174.

130
development and favour adjustment in situations in which a child is away from home, i.e., his or her
safe space.678

3.4.10 Legal security

Legal security is only defined in the discipline of Law, where it is referred to as the rights of
individuals to legal protection and to participation in democratic processes679. Although other
disciplines do not make direct references to legal security as such; democracy and rights appear to be
common notions in many of the documents, particularly as a source of security. In Arts and
Literature, Etienne Dumonts Declaration of the Rights and Duties of the Man and the Citizen from
1975 was cited, in which security is defined as la sret rsulte du concours de tous pour assurer les
droits de chacun. 680 In Linguistics, a rights-based approach to development is established by Oquist
(2008). He argues that a rights-based approach to development, including the right to development
itself, forms a legal foundation for human security. 681

Within the discipline of Social Sciences, references to security linked with democracy, rights and rule
of law, are often made in relation to the European Union. It is argued, by authors such as Kantner et
al., that as a novel actor in the security field, the EU faces the double challenge of finding answers to
serious new security threats while attempting to preserve the achievements of the rule of law and
democracy that are the normative glue of modern political communities.682

678
Heathers, G., The adjustment of two year-olds in a novel social situation, The Fels Research Institute for the Study of
Human Development, Child Development, Vol. 25, No. 2, June 1954, pp. 147-158.
679
Macfarlane, Neil S. and Thomass G. Weiss, The United Nations, regional organisations and human security: Building
theory in Central America, Third World Quarterly, Vol. 15, No. 2, 1994, p. ??
680
Security results from the concurrence of all in the making secure {in the giving security for} the rights of each. Dumont, E.
in Pease-Watkin, C. "A Note on Annotating Bentham," Notes and Queries, Vol. 51, 2004, pp. 12830; p. 129.
681
Oquist, P., Basic elements of a policy framework for human security, International Social Science
Journal, Vol. 59, Issue Supplement 1, September 2008, pp. 101112.
682
Bono, G., Challenges of democratic oversight of EU security policies in Cathleen Kantner, Rafaella Delsarto and Angela
Liberatore (eds.), Security and Democracy in the European Union, European Security, Vol. 15, No. 4, 2006, pp. 431-449.

131
3.4.11 Automated Analysis of the Dimensions of Security

Chart 1: Automated Scores of Baskets Across Disciplines

As we noted in the Method and Sources section, the team also performed an automated analysis
with a textmining tool (Leximancer) to determine the relative weight of a number of baskets across
the difference academic disciplines. The baskets are made up of sets of concepts (words) that
together represent a dimension. For a more detailed description of how the baskets were
constructed and used, we refer the reader to the Method and Sources section. We will here describe
the main findings from this analysis.

Chart 1 Automated Scores of Baskets Across Disciplines presents the relative relevance of the
different baskets across all documents from the various disciplines. The most dominant basket in a
discipline always scores 100, while the others are prorated accordingly: e.g., 50 means that the
weight of that basket is half that of the heaviest basket in that discipline.

The chart reveals that across all documents, the social-political dimension is the most important one
in 5 of the seven disciplines. This implies that the articles that talk about security in more conceptual
terms tend to primarily deal with socio-political issues. Only in business administration where the
economic basket scores the highest does the Socio-political basket score (a bit) less than 50; and
in the Psychology set where the human dimension is dominant it scores around 60.

The second most important basket overall is the Human one, followed by the Economic, Military and
International Law ones. All other baskets score quite a bit lower. It is particularly striking that the
Environmental basket scores so low across all disciplines, as does the Territorial one although that

132
one still receives a bit more attention in the Economics, Humanities and Law disciplines. We also
note that the Military basket scores high in humanities (which has a fair number of articles that are of
a political science origin), Social Sciences and Economics.

Chart 2 Baskets Security zooms in on the text blocks (i.e., two sentences) that contain the word
security and shows which of the various baskets is found most often in those text blocks. We first
note that the overall scores are with a few exceptions fairly low. They tend to hover around 20-
30%, which means that the concepts in those baskets only have a 30% likelihood of co-occurring with
the word security within a text window of two sentences. Given the fact that these articles were
selected on the basis of them dealing with issues like definitions, dimensions, sources and causes,
these low scores may possibly be attributed to the fact that the word security may tend to occur in
sentences of a more abstract nature.

As was the case with the overall texts, the Social-Political Basket comes out as the one with the most
dominant association with security. Both in Business Administration, Economics and Social Sciences,
the likelihood of the word security being found in the vicinity of one of the concepts from those
baskets around is around 50%. What is interesting, however, is that while the Environmental basket
was (by far) the lowest scoring one in the overall texts, it is the second most important one in the
sentences that specifically deal with security. We suspect that the presence of the word
environment in that basket may be part of the explanation (since the di-gram security
environment may occur quite a few times), but we doubt that is the only explanation and the
presence of truly environmental concepts is likely to also play a role here. The third most important
basket here is the Territorial one, although that is to some extent triggered by a fairly (and
predictably) high score in the Social Science set. If we realise, however, that this basket had one of
the lowest scores in the overall set, this still has to be seen as quite significant. In Business
Administration, this basket was almost invisible overall, but here it has a 1-in-5 chance of co-
occurring with security. The reader will find out in the Annexes that this is to a large extent because
economics and business administration also focus quite a bit on the national level of analysis where
elements like national protection, trade wars etc. are quite prevalent. All other baskets tend to
hover around an average of about 20% likelihood. We observe that the CIS set is very much the
outlier here, with low scores overall and only the International Law, Economics and Human baskets
scoring between 30 and 40%, whereas the Environmental basket only scores 1%.

133
Chart 2: Baskets - Security

3.5 Sources of Security & Strategies for Security

Our survey of the various disciplines has also harvested a variety of sources of security and a wide
range of ways in which security can be ensured ways that sometimes go beyond what is
traditionally conceived of in the mainstream national security discourse. We present these below.

3.5.1 Identity and social context

From the dataset of selected articles published across various disciplines, it appears that the well-
being of individuals stands as a major source of security over time. It includes the importance of
identity, group entitativity, relationships and bonding. In particular, identity leads to a sense of trust
and control, which leads to psychological security as suggested by Kinnvall (2004).683 Group

683
Identity is seen as an anxiety-controlling mechanism reinforcing a sense of trust, predictability, and control
in reaction to disruptive change by re-establishing a previous identity or formulating a new one. Kinnvall, C.,
Globalisation and Religious Nationalism: Self, Identity, and the Search for Ontological Security, Political
Psychology, Vol. 25, Issue 5, October 2004, pp. 741-767.

134
entitativity, i.e., the perception of a group as an entity,684 as well as in-group identification and
absorption,685 also appear to be related to security and the perception of being protected.

At a more generic level, it appears that shared identity and values constitute a source of
psychological security, which could manifest itself, however, in aggressive behaviour towards
outsiders.686

In the articles of education as a selected academic disciplines, maintaining connections and


relationships to home appears as a solution and vital system valued by students to preserve their
identity and self-worth from educational systems characterised by inequalities, thereby avoiding
damaging exposure.687 Friendships are also significant, yet the family remains an important source
of reliance.688

In addition, in psychology, Mikulincer and Shaver (2007) and Karpman (1996)689 emphasise the
importance of trust, relationships and bonding, in particular through the love of attachment figures
who help establishing both effective coping strategies and being compassionate toward oneself and
other people.690 It thus appears that the social context - in which individuals are embedded - may
merit more explicit attention in security agendas as a source of security.

3.5.2 Prevention

Virtually all of the disciplines we have surveyed pay attention to the stage within the security cycle
in which security can be defined as preventing, protecting, preparing, responding and

684
In the views of Arriagada (2002), the perception of entitativity, intentionality, and security are intrinsically related. She
therefore relates that the evaluation of a highly entitative in-group as a valid source of security for its members could
make it suitable to satisfy the individual's motivational need of protection, at a symbolic, imagined level as well as in
actuality. Arriagada, I., Changes and Inequality in Latin American Families, Cepal Review, No. 77, Summer 2002, pp. 135-
153.
685 After the individual has become absorbed in the group he feels more secure. Karpman, B., Insecurity in search of
security, American Journal of Psychotherapy, Vol. 50, No. 4, Fall 1996, p. 437.
686
According to Gillath and Hart (2010), espousal of aggressive military action against antagonising entities
(e.g., North Korea) provides psychological security because it reminds people of the in-group's power and
potency, in addition to providing evidence that the in-groups' shared identity and values are valid (to the
extent that military action is anticipated to be successful), thereby providing a sense of symbolic immortality.
Gillath, Omri, and Joshua Hart, The effects of psychological security and insecurity on political attitudes and
leadership preferences, European Journal of Social Psychology, Vol. 40, 2010, pp. 122-134.
687
One of the main ways in which the students who have moved away maintain this link with home is through
frequent trips back (...). Students would use weekends as an opportunity either to take up their part-time work
commitments or to visit friends and family back home. These trips were especially important during the first
year: a period of significant change and adjustment. Clayton, John, Gill Crozier, and Diane Reay, Home and
away: risk, familiarity and the multiple geographies of the higher education experience, International Studies
in Sociology of Education, Vol. 19, Nos. 3-4, September-December 2009, pp. 157-174.
688
Clayton, John, Gill Crozier, and Diane Reay, Home and away: risk, familiarity and the multiple geographies
of the higher education experience, International Studies in Sociology of Education, Vol. 19, Nos. 3-4,
September-December 2009, pp. 157-174.
689
Karpman asserts that to be bound to someone, or to have someone bound to you, conveys a sense of security, for you
can depend upon him not to hurt you but, instead, to protect you. Karpman, B., Insecurity in search of security,
American Journal of Psychotherapy, Vol. 50, No. 4, Fall 1996, p. 437.
690
Mikulincer, Mario, and Phillip R. Shaver, Boosting Attachment Security to Promote Mental Health, Prosocial Values, and
Inter-Group Tolerance, Psychological Inquiry, Vol. 18, No. 3, 2007, pp. 139-156.

135
recovering.691 A number of disciplines place a different degree of emphasis on cure and/or
prevention.

In the social sciences692 but also in the health sciences,693 prevention appears as a major source of
security. According to many articles in the health sciences, the emphasis should be on integrated
surveillance of and response to (health) insecurities through, for example, establishing or expanding
early warning systems, centralised information systems and data analysis collection.694A similar
element is found in law studies, where prevention and risk management include activities such as
early warning, preventive actions, surveillance, situational crime prevention, risk assessment and
management, civil preventive, actuarial justice, etc.695 In the views of studies selected for education,
prevention is mostly reflected is the avoidance of behavioural disorders and violence, e.g., at
school.696 Humanities define security as resulting from preventive measures which ensure
deactivation of potentially destabilising factors mainly, a set of guidelines for domestic and
international action in case of conflict. These measures should include factors suppressing potential
conflicts (i.e., by aiding fragile states).

The psychology literature seems at first glance to be less elaborate on the issue of prevention, yet it
does offer some interesting and concrete insights with respect to strategies to increase psychological
security. These invariably are proactive in nature, focus primarily on boosting mental preparedness,
and concern the mind set level of the population and the ways in which security is discussed in the
public arena.697 The literature also describes proactive strategies that consist in enhancing security by
the reinforcement of surveillance and fortressing (i.e., protection), and eliminating fear and
anxiety.698 However, both in the social and the health sciences it is widely contended that

691
Source: http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_terrorism/jl0035_en.htm
692
Prevention [is defined as] what one can do in order to minimise the chances that a man made emergency will occur
(visible security, such as guards, cameras, fences, etc.). Prevention for an organisation can constitute of improving its
security through the adoption of simple security, safety, and emergency procedures. If done correctly, procedures are the
most economical and effective way to enhance security. Security starts with the people. Rincon, David, and Cristina Cano,
Mitigation of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin America Transactions, IEEE (Revista IEEE America
Latina), Vol. 5, No. 3, 2007, pp. 128-135.
693
Considering that past pandemics were all the more damaging because they took the world by surprise. Enemark, C., Is
Pandemic Flu a Security Threat?, Survival: Global Politics and Strategy, Vol. 51, No. 1, February-March 2009, p. 192.
694
Cecchine, Gary, and Melinda Moore, Infectious Disease and National Security: Strategic Information Needs, RAND
National Defence Research Institute, 2006, p. xv.
695
Zedner, L., Security, London: Routledge, 2009, p. 56.
696
Mayer and Leone (2007) have investigated key areas of school violence prevention, legislative developments, the nexus
of students' social skills, mental health, bullying, school exclusion, and tradeoffs between educational rights and
maintaining a safe and orderly environment. They formulate a number of suggestions aiming to enhance prevention in this
respect. Specifically, research has clearly demonstrated that to prevent school violence, programming at the school level
include a multifaceted approach, with programs meaningfully addressing physical safety, educational practices, and
programs that support students' social-emotional-behavioural needs. Research-based violence-prevention and related
comprehensive support programs should be offered, using a three tier approach, functioning at the universal, targeted, and
intensive levels. Specific areas of programming should include, among others, mental health supports, bully prevention,
anger management, and conflict resolution. Mayer, Matthew J., and Peter E. Leone, School Violence and Disruption
Revisited: Equity and Safety in the School House, Focus on Exceptional Children, Vol. 40, No. 1, September 2007, p. 22.
697
According to Martin and Simon (2008), the answer to the quandary of homeland security lies, partially, with the
cultivation of preparedness. In an ideal state of readiness, a prepared nation should stand poised to prevent adequately or
respond to any actualisation of emergency.
698
Ellin (2003) speaks of concerted efforts to respond to fear in a proactive manner, efforts perhaps elicited by the
prevalent sense of anxiety and despair characterising the last several decades. The events of 9/11 have both stepped up
these efforts and contributed to the reactionary measures that ultimately redouble the fear. The result is two-fold:
continued ultra-fortressing and surveillance, on the one hand, and a wide range of proactive efforts to eliminate the

136
preventative strategies by themselves will no longer be sufficient to overcome emerging
challenges.699 Nonetheless, in the security domain, such strategies should be given consideration as
one of the means of increasing security.

3.5.3 Resilience

Beyond the security cycle (which is very much centred on the conflict itself and what to do before
and after it), we also find fundamentally different approaches with respect to the main attitude
towards potential security challenges. One cluster of strategies, which is dominant in mainstream
national security discussions, equates securing objects or subjects with resisting those security
challenges, e.g., by constructing defence perimeters, pushing them back, etc. In a number of
disciplines and this is a theme that appears to be more dominant in complex situations the focus
has shifted from resisting security challenges to designing more resilience for the objects or subjects
that are to be secured. Within the resilience approach, we again find two different strands.700 One
(more traditionalist) strand of which we find back a number of examples in the Computer and
Information Science set, thinks more about resilience in terms of engineering: defining a steady-
state equilibrium and then designing parameters for system resilience and engineering those into the
system to ensure that the system can bounce back to its steady state equilibrium. The other strand
has a more ecological approach to resilience that is more akin to the way in which nature has built
adaptive resilience into evolutionary biology. In this strand, resilience in complex systems allows
components to not only absorb shocks to the system, but to make them more evolutionarily fit
within the new system that emerges after the shock.701

Many disciplines still focus on the resistance side of this equation, which is typically framed in terms
of the security cycle (prevention, response702, etc.) But a discipline like Psychology, which as we
have already repeatedly pointed out contains many useful insights into the nature of security and
what to do about it has put (psychological) resilience at the heart of its strategic approach to
security. We already noted the example of attachment security in which elements like (e.g
maternal) bonding are not intended to ward off conflicts, but to provide the child and then later

sources of fear, on the other. Ellin, N., Fear and city building. The Hedgehog Review: Critical Reflections on Contemporary
Culture, Vol. 5, No. 3, 2003, pp. 43-61.
699
Social sciences: Security narrowly defined as prevention of physical harm by creating a protective shield is
insufficient. Lloyd, R.M., The Shield and the Cloak: The Security of the Commons, Naval War College Review, Vol. 59,
Issue 4, Autumn 2006, p. 141. Rincon and Cano (2007) argue that security is simply made up of two major elements:
prevention and response. Rincon, David, and Cristina Cano, Mitigation of Traffic Fractality in WLAN IEEE 802.11
Networks, Latin America Transactions, IEEE (Revista IEEE America Latina), Vol. 5, No. 3, 2007, pp. 128-135. For an example
from the Education set: An important indication of social adequacy in young children is their readiness to cope with
situations away from home when their mothers and other family members are absent. According to Heathers (1954),
young children driven to nursery schools can therefore be a traumatic experience. The author further underlines that
harmony in the home, sociability in the family, maternal warmth and parental rearing (including maternal
indulgence) are conducive to a childs balanced development and favour adjustment in situations in which a child is away
from home, i.e., his or her safe space. Andrus, Ruth, and Eugene L. Horowitz, The effect of nursery school training:
insecurity feelings, Child Development, Vol. 9, No. 2, June 1938, pp. 169-174.
700
C.S. Holling, Engineering Resilience Versus Ecological Resilience, in Foundations of Ecological Resilience, by Lance H.
Gunderson, Craig Reece Allen, and C. S. Holling (Island Press, 2009).
701
On this point also see Taleb, Nassim Nicholas, Antifragility, Robustness, and Fragility, Inside the 'Black Swan' Domain
(September 1, 2010).
702
E.g., Response is what can be done in order to reduce the damages to life and property once an emergency has
occurred (procedures such as evacuation, first aid, continuity planning, etc.). Rincon, David, and Cristina Cano, Mitigation
of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin America Transactions, IEEE (Revista IEEE America Latina), Vol. 5,
No. 3, 2007, pp. 128-135.

137
the adult with enough strength to be able to cope with it. Whenever patient experiences a
mental/psychological crisis, the psychiatry branche of the health sciences offers an entire toolbox of
palliative or restorative interventions (much like the national security toolbox), but the bulk of the
literature on attachment security really focuses on strengthening resilience.

We also have another nice example in the health field. For a long time, health care was called
medicine. It was essentially about doctors getting ever better at identifying diseases and then
curing them (both preventatively and responsively) with ever more advanced (and more expensive)
physical technologies. In many ways, much of the national security toolkit is still like that. We call
much of it defence (instead of security or resilience). It is essentially mostly about the security
professionals (police, fire fighters, crisis managers, soldiers, etc.) getting better at identifying
conflicts and then intervening to either prevent or stabilise them with 'hard' (ever more advanced,
ever more expensive) technologies. Yet the health sector has changed. It is called health care now.
It's increasingly much more about the health status of the citizens than about the doctors:
"Addressing the needs across ones lifespan, enabling long and healthy independent living." 703 It cuts
across traditional stovepipes, involving other parts of the public sector (education, sector and the
private sector) in novel 'comprehensive' ways. In the societal security field, the homeland security
community have also embraced the resilience paradigm with notably more enthusiasm than the
defence community.704 Resilience should and undoubtedly will receive more attention by
security policymakers.

3.5.4 Physical and social security technologies

Most disciplines put great stock on technology to solve various security problems. It is interesting to
note how they focus especially on what Richard Nelson has called physical technologies, as opposed
to social technologies: During the Industrial Revolution, for example, Richard Arkwrights invention
of the spinning frame (a Physical Technology) in the eighteenth century made it economical to
organise cloth-making in large factories (a Social Technology), which in turn helped spur numerous
innovations in the application of water power, steam, and electricity to manufacturing (back to

703
Hans Hofstraat, Innovation in Active and Healthy Ageing. Empowering and Engaging People (Philips Research,
November 26, 2010), http://ec.europa.eu/research/innovation-union/pdf/active-healthy-ageing/event-2010/hofstraat.pdf.
704
J. Walker and M. Cooper, Genealogies of Resilience From Systems Ecology to the Political Economy of Crisis
Adaptation, Security Dialogue 42, no. 2 (2011): 143160; M. Schoch-Spana et al., Community Resilience Roundtable on
the Implementation of Homeland Security Presidential Directive 21 (HSPD-21), Biosecurity and Bioterrorism: Biodefence
Strategy, Practice, and Science 6, no. 3 (2008): 269278; M. Schoch-Spana, Community Resilience: Beyond Wishful
Thinking, It Is Important to Recall What We Are Seeking to Achieve in Biosecuritythe Prevention of Sudden, Large-scale,
Deliberate, or Natural Disease Threatsand Failing Prevention, the Capacity to Save Large Numbers of Lives and Diminish
the Consequences of Such Events. (2011): 37; P. H Longstaff et al., Building Resilient Communities: a Preliminary
Framework for Assessment, Homeland Security Affairs 6, no. 3 (2010): 123; T. Lansford, J. Covarrubias, and B. Carriere,
Fostering Community Resilience: Homeland Security and Hurricane Katrina (Ashgate Pub Co, 2010); Y. Y Haimes, K.
Crowther, and B. M Horowitz, Homeland Security Preparedness: Balancing Protection with Resilience in Emergent
Systems, Systems Engineering 11, no. 4 (2008): 287308; Y. Y Haimes, On the Definition of Resilience in Systems, Risk
Analysis 29, no. 4 (2009): 498501; A. Cox, F. Prager, and A. Rose, Transportation Security and the Role of Resilience: A
Foundation for Operational Metrics, Transport Policy 18, no. 2 (2011): 307317; G. A Coles et al., Defining Resilience
Within a Risk-informed Assessment Framework, International Journal of Risk Assessment and Management 15, no. 2
(2011): 171185; M. Castleden et al., Resilience Thinking in Health Protection, Journal of Public Health 33, no. 3 (2011):
369377.

138
Physical Technologies). The stories of the agricultural, industrial, and information revolutions are all
largely stories of the reciprocal dance between Physical and Social Technologies.705

Technology is viewed as a source of security in health sciences as it leads to revolutionary


developments in health sciences.706 Not surprisingly, the business administration and economic
literature pays significant (and increasing) attention to issues of information security, which are
related to ICT, and largely physical technology. More precisely, within the discipline of business
administration, the concept of security or securities appears to be often related to concepts that
point to the security of information flows and systems, the secure access to information and a secure
network. This relation is due to the increased use of online applications by many enterprises and
banks and the importance to counter the risks associated with those applications707 to avoid the
leaking of sensitive business information,708 and protect the clientele and business interests.709
However, a number of elements in business administration and economics point to the importance
of social technology, i.e. the organisation of peoples environment, in particular that of work.710

Not all academic disciplines put so much emphasis on technology, as exemplified in psychology
publications although even there security recently appears to be conditioned by new technologies,
as they can play upon the emotion of fear.711 In addition, technologies are increasingly used to
ensure security at home.712It should be noted that in biology, technology appeared mostly as a

705
Beinhocker, E.D., Origin of Wealth: Evolution, Complexity, and the Radical Remaking of Economics, Harvard Business
School Press, 2006, p. 16. http://www.mdecgateway.org/olms/data/resource/2631/bein.pdf
706
According to Cassell and Mekalanos (2001), a new age of antibiotic discovery is expected to emerge through
revolutionary developments in chemistry, genetics, structural biology, bioinformatics and engineering, but also advances in
synthetic chemistry, genomics and bioinformatics, bacterial functional genomics, and integrative infectious disease biology.
Cassell, Gail H., and John Mekalanos, Development of Antimicrobial Agents in the Era of New and Reemerging Infectious
Diseases and Increasing Antibiotic Resistance, Journal of the American Medical Association, Vol. 285, No. 5, 2001, pp. 601-
5.
707
Information security is a key component in modern enterprise planning and management given the integral role of
information technology (IT) in todays enterprise. Nyanchama, Matunda, and Paul Sop, Enterprise Security Management:
Managing Complexity, Information Systems Security, Vol. 9, No. 6, 2001, pp. 1-8. Authors like Matwyshyn (2009) also argue
that companies have ethical obligations to improve information security. Matwyshyn, A.M., CSR and the Corporate
Cyborg: Ethical Corporate Information Security Practices, Journal Business Ethics, Vol. 88, Issue 4, Fall 2009, p. 579.
708
According to Johnson (2008), this represents one of the largest classes of recent security breaches. Johnson, M.E.,
Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the Financial Supply, Journal of
Management Information Systems, Vol. 25, No. 2, Fall 2008, pp. 97123.
709
According to Mauldin and Arunachalam (2002) consumer online purchasing is hampered by fears about the security of
information transmitted over the Internet. Mauldin, Elaine, and Vairam Arunachalam, An Experimental Examination of
Alternative Forms of Web Assurance for Business-to-Consumer E-commerce, Journal of Information Systems, 2002
Supplement, p. 33-55.
710
Haidar and Spooner (2009) assess the perceived security of employment according to a number factors.
First is the legal situation of employment [...]. The second concerns perceived threat and the possibility of
losing ones employment. The third is the extent of a managers power to counteract the threat of losing
employment. [...] The fourth factor is the importance of employment to a manger. Haidar, A. and Spooner, K.
(2009), Community not Councillors: A Study of Commitment of Australian Senior Council Officers Working
under a Politicised Working Relationship, Australian Journal of Public Administration, 68(2), p. 143.
711
The underlying element in all (...) types of [security technologies and] communications is the fact that play upon the
emotion of fear - the fear of being injured, causing injury to others, becoming ill, or dying. Shropshire, Jordan D., Merrill
Warkentin, and Allen C. Johnston, Impact of negative message framing on security adoption, Journal of Computer
Information Systems, Vol. 51, No. 1, Fall 2010, pp. 41-51.
712
According to Ellin (2003): outside of gated communities, security signage is ubiquitous. When designing new homes or
renovating, safety features are of paramount importance. In the views of the same author, the protection of the home is
related to mistrust, as well as a (perhaps paranoid) safeguard of privacy: houses assure protection through a variety of
means such as sophisticated security systems, the posting of signs that warn trespassers not to enter or indicate armed
response, and so-called security gardens, which group shrubs beneath windows and around yards specifically for the

139
source of insecurity.713 This is also noticeable in the cyber literature: dependency on technology has
emerged from our increasing reliance on computers and artificial intelligence for our-well being and
safety.714 The bottom line here is that a security agenda will benefit by including both physical and
social technologies in the equation.

3.5.5 Education and assistance

Another source of security that many disciplines focus on in terms of how to deal with security is just
education. There is of course much emphasis on education in the national security area, but
primarily focused on the security professionals. What is interesting is that many other disciplines
focus on the importance of mainstreaming some security concerns into the educational curriculum.
The field of psychology, for instance, puts much emphasis on broader parental rearing as a source of
attachment security.715 In fields like Computer and Information Science, Education716 , Health, and
Social Science717 educating individuals on security issues plays an important role.

Some national security scholars have recently started devoting some attention to the nexus between
education and conflict718. Although the evidence remains mixed (often-cited counter-examples are a
number fairly highly educated individuals that execute terrorist acts), a recent PRIO-study
summarising the empirical literature (see Chart 3) still comes to the conclusion that that increasing
education at any level is good for peace and stability.719 It may therefore deserve some

purpose of obstructing intruders. Ellin, N., Fear and city building, The Hedgehog Review: Critical Reflections on
Contemporary Culture, Vol. 5, No. 3, 2003, pp. 43-61.
713
Orr (2002) identifies the uselessness of high-tech weapons against threats such as dirty bombs and cyber threats as a
major source of insecurity. He argues that, the next round of terrorism could involve suitcase nuclear weapons, chemical
or biological materials, or the sabotage of basic services, communications networks, roads, and industrial infrastructure. In
such cases high-technology weapons are worse than useless. They create a false sense of security at a huge expense while
preempting smarter options that promote real security. Orr, D.W., The Events of 9-11: A View from the Margin,
Conservation Biology, Vol. 16, No. 2, 2002, pp. 288290.
714
The Matrix sagas that depict intelligent and autonomous computers taking over the world are indeed
symptomatic of a culturally broad-based and profound fear of technological development. The idea of
depending on machines is both unnerving and non conducive to social flexibility and resilience. Eriksson, Johan,
and Giacomello Giampiero, The Information Revolution, Security, and International Relations: (IR) Relevant
Theory?, International Political Science Review, Vol. 27, No. 3, July 2006, p. 225.
715
As Roelofs et al. (2008) explain: another source of caregiver influences that might be related to children's attachment
security is parental rearing behaviours. Factor analytic studies have identified two main dimensions of parental rearing. The
first dimension can be described as care' and refers to behaviours related to acceptance, warmth, and on the reverse side,
rejection and criticism. The second dimension is labeled as control and refers to parental control, overprotection, and on
the opposite side, promotion of autonomy. It has been suggested that parental warmth and acceptance are related to
children's attachment security Roelofs, Jeffrey, Cor Meesters, and Peter Muris, Correlates of Self-reported Attachment
(In)security in Children: The Role of Parental Romantic Attachment Status and Rearing Behaviours, Journal of Child and
Family Studies, Vol. 17, Issue 4, August 2008, pp. 555.
716
Osipian (2008) examines the relation between educational environments and institutions (e.g., schools), and corruption:
Corruption could be used on a systematic basis as a mechanism of direct and indirect administrative control and
redistribution of wealth that operates on the state level and all the way down to local authorities and administrations of
public and private institutions.Osipian, A.L., Corruption and Coercion: University Autonomy Versus State Control,
European Education, 2008, p. 27.
717
[T]he relationship between education and human security has been recognised ever since the concept of human
security originated and evolved towards greater inclusion and leadership for individuals.Goucha, Moufida, and John
Crowley (eds.), Rethinking Human Security, International Social Science, Journal Monograph Series.1, October 2008, p.
148.
718
Julia Paulson and Jeremy Rappleye, Education and Conflict: Essay Review, International Journal of Educational
Development 27, no. 3 (May 2007): 340347; Gudrun stby and Henrik Urdal, Education and Conflict. What the Evidence
Says, CSCW Policy Brief, no. 2 (2011); Julia Paulson, Education, Conflict and Development (Symposium Books, 2011).
719
stby and Urdal, Education and Conflict. What the Evidence Says.

140
consideration to examine to what extent this finding is reflected in the security R&D priority setting
of various European countries and of the EU.

Chart 3: Relationship between education levels and conflict

Assistance is another strategy for enhancing security that seems much more prevalent in the non-
mainstream than in the mainstream security disciplines. Rather than going in operational mode
oneselves (as security professionals, for instance), the first instinct here is to assist the actual subject
and thereby increase its security. A number of authors in the Psychology set stress the importance of
assistance and identify people, relationships, interaction, information, autonomy, availability of other
subjects as factors of emotional comfort which itself increases the level and perception of security by
a subject.

A central notion in works that address education and assistance is that individuals can be
empowered through education to deal by themselves with risks of various natures. This is a notion
that could be further explored in the security domain.

3.5.6 Language and communication

Another topic that seems more prominent in non-mainstream security discussions is language and
communication. Language remains the main vehicle through which humans interact and can
obviously be a source of both insecurity and security. In the Law set, for instance, the importance of
proper formulations that express the often very subtle nuances of various legal disputes is
emphasised as a source of security. It also receives ample attention in linguistics.720 The broader topic

720
Examples of these providers are provided by all sorts of associations including advocacy groups and the media. The
latter are particularly worth noting from the viewpoint of linguistics because discourse is the axis of their activity: the

141
of communication is also quite prevalent in disciplines like business administration, economics, law,
psychology and the social sciences

National security communities have recently started putting more emphasis on these issues. This is
very visible in the increased emphasis on communication strategies for homeland security and the
battle of the narratives in the external security area. But there are indubitably many lessons these
areas can still learn from the aforementioned disciplines.

3.5.7 Integrity and trust

The importance of integrity and trust and the corrosive effects of corruption and the importance of
integrity are another recurring theme throughout a number of different disciplines (including
Business Administration, Economics, Environmental Science, Education, Law, Social Science). In
Western countries, corruption is generally not seen as an issue in homeland security, but in defence
policy it often is certainly in expeditionary operations in fragile states, and occasionally even at
home through acquisition scandals.

These literatures are replete with the deleterious effects of corruption on societies (especially also on
their levels of security). The importance of the opposites of corruption integrity and trust are
emphasised in quite a few disciplines.721 The Law discipline, which is directly linked to corruption in
its form of typified crime, not surprisingly also goes in this direction. It insists on the point that
morality, ethics and social co-responsibility play an important role in human security and the
universal values that they promote provide a way of maximising it.722

In the field of Humanities we find a reference to the effect that elites and their lieutenants appeal to
the ``collective good'' to mask such manoeuvres. Meanwhile, they exploit the same for labour,
resources, and ideological support. Herein lies the system's inherent contradiction and potential for
instability.723 This discipline not only points to the problem, it also addresses its solution: Develop
strong norms for the ways states behave internally. It is asserted that it this topic is not yet taken up
in the traditional security and more limited approach.724

modern concept of advocacy. Valasek, K., Gender and Security Sector Reform: An Analytical Framework, UN-INSTRAW,
2007.
721
Human integrity is singled out as another source of security through the concept of independence. The reasoning is that
the more independent an individual is, the greater its ability to ensure its own security. Economic independence and
education are instrumental in bringing this about. As Goucha and Crowley (2008) assert: the relationship between
education and human security has been recognised ever since the concept of human security originated and evolved
towards greater inclusion and leadership for individuals.Goucha, Moufida, and John Crowley (eds.), Rethinking Human
Security, International Social Science Journal Monograph Series, Wiley-Blackwell and UNESCO, Weinheim, 2008. Also the
field of psychology emphasises the process of individuation during adolescence and the transition to young adulthood has
been characterised in terms of (...) independence (Douvan & Adelson, 1966; Group for the Advancement of Psychiatry,
1968). Independence refers to self-reliance, the ability to care for oneself. Ryan, Richard M., and John H. Lynch,
Emotional Autonomy Versus Detachment: Revisiting the Vicissitudes of Adolescence and Young Adulthood, Child
Development, Vol. 60, 1989, pp. 340-356.
722
Frerks, Georg, and Kees Homan, Human Security: a Launching Pad for Debate and Policy? Security & Human Rights, Vol.
19, No. 1, 2008, p. 3.
723
Agathangelou, Anna M., and L. H. M. Ling, Power, Borders, Security, Wealth: Lessons of Violence and Desire from
September 11, International Studies Quarterly, Vol. 48, No. 3, September 2004, pp. 517-538.
724
Rolfe, J., Regional Security for the Asia-Pacific: Ends and Means, Contemporary Southeast Asia, Vol. 30, No. 1, April
2008, pp. 99-117.

142
Finally, Environmental Sciences also criticise corruption and authorities abuse of their power. It is
considered a practice that should be targeted by security policies: Security, as emancipation
rationality, aims at problematizing oppressive political, economic, and social structures with the
perspective of transforming them (Devetak 1995: 156). The security rationality based on order, which
constitutes Bull's perspective, understands security as an instrument which serves the interests of
dominant political actors within the existing structures.725

One article from the Philosophy set mentions the relevance for security of trust in others, trust in
society, trust in oneself, which, paradoxically, may be undermined by measures aimed at increasing
security: Less trust generates less security, or more insecurity, something that defeats the purpose
of the desired effect. 726

The key take away here is that integrity and trust are viewed as key sources of security, meriting their
further exploration in the context of security policymaking.

3.5.8 Ownership and incentive structures

Another recurrent source for security and therefore also an area of strategic manipulation - lies in
the area of incentive structures. Many disciplines acknowledge that security challenges may derive
from particular types of incentive structures. If it is unclear who is the real owner of a certain asset,
for instance, this may lead to a cavalier attitude towards its security that might almost beg for
problems. A similar carelessness may result if an actor knows (or thinks) that others will come to the
rescue (a broader community or powerful allies (free-riding), insurance policies (moral hazard), etc.).
Therefore a number of disciplines look for ways to tinker with these incentive structures to maximise
the likelihood of more responsible behaviour. Security is seen as a highly broad concept that
traverses national boundaries and the public-private divide and a plethora of actors, which are state
and non-state actors, should therefore be involved in promoting security (e.g, police, local
authorities, inter-agency partnerships, voluntary groups, and private citizens).

3.5.9 Coercion, compellence and deterrence

Discussions about the merits of coercion are particularly prevalent within international relations and
strategic studies. Within the context of strategic studies, the strategy of coercion is defined as the
deliberate and purposive use of overt threats to influence anothers strategic choices, which can be
employed as a vital instrument in the protection of national security.727 The sources of coercive
strategy reside in the capacity to inflict harm which is used to influence another actors behaviour
and to coerce his decision or choice.728 It in fact is the influence that resides in latent force [...], the

725
Smith, R.E., Land tenure reform in Africa: a shift to the defensive, Progress in Development Studies, Vol. 3 July 2003,
pp. 210-222.
726
Burgess, J.P., Rethinking security strategies: new threats and new actors? in Eduard Soler i Lecha y Fadela
Hilali (eds.), VII Seminario Internacional sobre Seguridad y Defensa en el Mediterrneo. Conflictos regionales y
estrategias de seguridad, CIDOB-CEPAL, Barcelona, 2009.
http://www.cidob.org/es/content/download/22699/252967/file/19_burgess.pdf
727
Lawrence Freedman, Strategic Coercion, in Strategic Coercion: Concepts and Cases, ed. Lawrence Freedman (Oxford
University Press, USA, 1998), 15.
728
Ibid., 2.

143
bargaining power that comes from its capacity to hurt.729 Or, to phrase it differently, it is akin to
placing a demand on an actor backed by a threat of punishment for noncompliance that will be
credible enough and potent enough to persuade him that it is in his interest to comply with the
demand.730 Coercion, in essence, is used to affect the autonomous calculation of an actor. In cases in
which a party either exercises total control over an actor, or enjoys its voluntary consent, coercion
does not come into play.

Deterrence and compellence are, according to the grandfather of these concepts, two different types
of coercion.731 Deterrence refers to the act of persuading an opponent to refrain from a certain
action. Compellence, on the other hand, refers to the act of persuading an opponent to commit a
certain act that he otherwise would not consider.732 Deterrence is indefinite in its timing, whereas
compellence comprises a deadline.733

Ruminations about coercion began in earnest in the strategic environment of the Cold War,
characterised as it was by the principle of mutual assured destruction, with the fitting acronym
MAD.734 In this environment, deterrence was the key strategic concept relied on to protect national
security and prevent the outbreak of nuclear war. In the post Cold War era, strategists have been
and still are pondering whether and how to apply insights relating to deterrence and compellence
in an environment defined by entirely different strategic parameters. These insights are applied to
countering the proliferation of nuclear weapons, terrorism and cyber conflict, amongst other
things.735

In the case of cyber, these time-tested strategic concepts are taken and applied in modern strategies
to increase cyber and physical security. Authors in our set speak in these regards of the development
of a credible and well known cyber triad capability, which will have the ability of orchestrating a
second strike in case of failure of the deterrence. They describe how a cyber triad capability can
consist of regular defence/military assets and networks as forming the first section of the triad, the
second section being an isolated conglomerate of air-gapped networks situated across friendly
nations as part of cooperative defence, which can be initiated as a credible second-strike option, and
the third section consisting of a loosely connected network of cyber militia, involving patriotic
hackers, commercial white hats and private contractors, which can be initiated after the initial strike
or in case of early warning of a potential strike. This cyber triad creates a scenario of credible and
undisputable cyber deterrence and second-strike capability, thus assuring mutually assured
destruction in cyber space. However, in more recent publications attention is called to the

729
Ibid., 30.
730
George, Introduction: The Limits of Coercive Diplomacy, 2.
731
In other interpretations, coercion and compellence refer to two different strategies: in coercion the threat
of force is used to influence another actors choice, whereas in compellence the actor does something
voluntary, something it would also have done without the threat. This is further taken up in the section on hard
and soft power.
732
Schelling, Arms and Influence., 71-73.
733
Ibid., p.73.
734
Freedman, The Evolution of Nuclear Strategy, Third Edition.
735
Jakobsen, Peter Viggo. Western Use of Coercive Diplomacy After the Cold War: A Challenge for Theory and
Practice. Palgrave Macmillan, 1998.; Freedman, Lawrence. Strategic Coercion: Concepts and Cases. Oxford
University Press, USA, 1998; Robert J. Art and Patrick M. Cronin, The United States and Coercive Diplomacy
(United States Institute of Peace, 2003). See also: Glen, C.M., The United Nations. Charter System and the Iraq,
Wars: Ethical Implications, Vol. 11, No. 4, 2009, 309326.

144
difficulties of proper enforcement of the punishment, due to poor attribution and the potentially
asymmetric nature of conflict in cyberspace.

It is remarkable that with some exceptions this concept is not as explicitly discussed within the
literature in our set coming from other disciplines, and is only sparingly touched upon in relationship
to homeland and civil security (i.e, terrorism and cyber).736 It may nonetheless be useful to
investigate further applications of strategies of coercion in the formulation of security policies across
the entire spectrum.

3.5.10 Soft and hard power as sources of security

Soft opposed to hard forms of power as a source of security were popularised by Joseph Nye who
recently re-elaborated on his views in the Future of Power.737 Hard power reflects the power of one
actor to change another actors behaviour against its initial preferences. Soft power is the power of
persuasion and attraction of one actor that enables him to convince another actor to change his
existing preferences.738 Both forms of power constitute sources of security and are reflective of
opposite ways in which power can be implemented. Generally speaking, though, while hard power is
often equaled to military force (with some including economic payments also in the scope of
consideration) and associated with states, soft power is conceived to encompass a much broader
spectrum of instruments including social, cultural and technological ones, and is wielded by both
state and non-state actors. Elements of soft or hard forms of power specifically in relationship to
security are debated in Political Science/Cyber, and in the Environmental Sciences. Several texts
indicate the new nature of soft security after 9/11, which marked a shift in relation to cyberspace. In
addition, the cyber security discourse emphasises the importance of rules.

Especially in the cyber discourse the softer elements of power are identified as direct sources of
security. Generally, states do not enjoy similar degrees of control over cyber space as they do in the
physical world. Security, order, and the abidance by norm based regimes in cyber space is therefore
very much dependent on the actions of non-state actors, which is a function both of coercion as well
as of attraction.739 Similar principles apply to soft security in the Environmental sciences.740 From a
security policymaking perspective, it may be worth wile to investigate to what extent security policies
target hard versus soft sources of power in various domains, and assess which sort of policy is better
suited for the domain in question.

3.5.11 Time (and related aspects) and security strategies

Neither the role of time as a contextual variable that shapes the security environment, nor the ways
in which policy makers strategically use and/or manipulate the factor time to shape and affect the

736
I.E., psychology and education, in Buchan, B., Dying for Security, Cultural Studies Review, Vol. 17, No. 1, 2011. Mitchell,
G.R., Public argument-driven security studies Argumentation and Advocacy, No. 39, Summer 2004, pp. 57-71.
737
Joseph S. Nye Jr, The Future of Power, 1st ed. (PublicAffairs, 2011).
738
Ibid., 9094.
739
Eriksson, Johan, and Giacomello Giampiero, The Information Revolution, Security, and International Relations: (IR)
Relevant Theory?, International Political Science Review, Vol. 27, No. 3, July 2006, p. 231.
740
Cooperation between states of which main interest is to build and protect order is enabled by trust [...].Cudworth,
Erika, and Stephen Hobden, Beyond environmental security: complex systems, multiple inequalities and environmental
risks, Environmental Politics, Vol. 20, No. 1, February 2011, pp. 42-59.

145
outcome of their security strategies, receives a great amount of attention in the mainstream security
literature. Time, however, like space, sets the boundaries within which every human activity takes
place. Its importance as a source of security and a critical element of security strategies is
acknowledged in various literatures, which include but are not limited to psychology, economics,
game theory, political institutional theory, negotiation and system effects. The role of time in these
disciplines is considered from different angles and at various levels-of-analysis: at the international,
national, group and individual level as well as across different domains (e.g., political, military,
economic). Times role can be described in various ways; in our discussion of time and its relevance
to sources and strategies of security, we will look at time horizons principally as a potential source of
security, and timing and time anchoring as elements that any security policymaker should consider in
formulating and executing security policies.

Time Horizons

Studies that discuss time horizons focus on the application of game theory to conflict issues have
demonstrated that the lengthening of time horizons in iterated games, or the shadow of the future
as it is called, can facilitate cooperation between actors that otherwise would not come into
existence.741 It has been found that the length of time horizons affect the incentive structures of an
opponent to comply or escalate. Game theorists thus recognise that expanded time horizons and
iterated interaction can drastically alter the behaviour of actors.742 Furthermore, experiments in
applied (political) psychology have shown that under different objective time horizons subjects
evaluate and assess options differently.743 Generally, subjects tend to prefer gains in the present and
to discount gains that are more distant (in time). Discount rates, moreover, decrease with extended
time horizons, meaning that temporal differences become increasingly unimportant to the way in
which subjects assess the utility of gains. For example, in laboratory settings, subjects tend to prefer
US$ 100 today over US$ 115 next week, but they prefer US$ 115 in 53 weeks over US$ 100 in 52
weeks.744

Despite the existence of this rich research programme in psychology and economics, there has been
little reflection on time horizons in the traditional security realm. Fortunately, various scholars
drawing on knowledge from other disciplines are progressively attempting to fill this gap in the
security literature. One of these scholars, attempting to combine insights from biology and conflict

741
Axelrod, The Evolution of Cooperation, 2769.
742
See for instance Thomas Hobbes, Hobbes: Leviathan: Revised Student Edition, Rev Stu. (Cambridge University Press,
1996); Robert Axelrod, The Evolution of Cooperation (Basic Books, 1985). Robert Axelrod and Robert O. Keohane,
Achieving Cooperation Under Anarchy: Strategies and Institutions, World Politics 38, no. 1 (oktober 1985): 232234.
Charles Lipson, International Cooperation in Economic and Security Affairs, World Politics 37, no. 1 (oktober 1984): 14, 17.
David A. Lake and Robert Powell, Strategic Choice and International Relations (Princeton University Press, 1999), 2627.
743
See Philip Streich and Jack S. Levy, Time Horizons, Discounting, and Intertemporal Choice, Journal of Conflict Resolution
51, no. 2 (April 1, 2007): 199 226. George Loewenstein and J. Elster, eds., Choice over Time, 1st ed. (Russell Sage
Foundation, 1992).; for further background, see also Jonathan Baron, Thinking and Deciding, 4th ed. (Cambridge University
Press, 2007), 471494. Philip E. Tetlock and Barbara A. Mellers, Review: The Great Rationality Debate, Psychological
Science 13, no. 1 (January 1, 2002): 9499. Cass R. Sunstein, Review: Hazardous Heuristics, The University of Chicago Law
Review 70, no. 2 (April 1, 2003): 751782. For the key papers, see Daniel Kahneman and Amos Tversky, Prospect Theory:
An Analysis of Decision Under Risk, Econometrica 47, no. 2 (maart 1979): 263291. Kahneman, Maps of Bounded
Rationality, 1449 Amos Tversky and Daniel Kahneman, Advances in Prospect Theory: Cumulative Representation of
Uncertainty, Journal of Risk and Uncertainty 5, no. 4, Journal of Risk and Uncertainty (1992): 298.; Kahneman and Tversky,
Prospect Theory, 268. Tversky and Kahneman, Loss Aversion in Riskless Choice, 10411043.
744
Streich and Levy, Time Horizons, Discounting, and Intertemporal Choice, 202.

146
studies, for instance, argues that shortened time horizons are associated with more impulsive and
aggressive behaviour, which is triggered by high levels of the hormone testosterone. Such shortened
time horizons are more prevalent amongst high social status males in highly competitive social
environments.745 Cognitive scientists, moreover, have proposed that impulsive individuals
experience time differently [..] [and] therefore overestimate the duration of time intervals and, as a
consequence, discount the value of delayed rewards more strongly than do self-controlled
individuals.746 And conflict scholars looking into the relationship between age and conflict, have
found support for the hypothesis that aging leaders may have shorter time horizons than their
younger counterparts, leading them to initiate military action more often.747 While these illustrative
examples are far from exhaustive, they illustrate that different time horizons may in various ways be
a source of security and are therefore a factor to be reckoned with in the design and execution of
security policies.

Timing

Timing, as the popular adage goes, is of the essence. As argued by two observers, policymakers take
the role of time into account in every decision they make and time is thus a:

resource, scarce and non-renewable, a limited measurable quantity to be allocated through


timetables that determine the duration, the tempo, the timing, the sequence and the
periodicity of actions and events.748

Judging from the literature, the importance of timing for security strategies warrants more attention.
Students of negotiations, for instance, have argued that the timing of mediation interventions ceteris
paribus is a major determinant of their likelihood of success.749 Several scholars suggest that third
party mediation interventions in ongoing conflicts is more likely to be successful (measured by
dispute duration) if they are executed at a ripe moment in time.750 Within the comparatively small
body of literature on system effects in international relations, observers stress that the timing of

745
Rosen, War and Human Nature.
746
Marc Wittmann and Martin P. Paulus, Decision Making, Impulsivity and Time Perception, Trends in Cognitive Sciences
12, no. 1 (January 2008): 7.
747
Horowitz, McDermott, and Stam, Leader Age, Regime Type, and Violent International Relations, 667669, 674.
748
Andreas Schedler and Javier Santiso, Democracy and Time: An Invitation, International Political Science
Review / Revue Internationale De Science Politique 19, no. 1 (January 1, 1998): 518., p.6.
749
Patrick M. Regan and Allan C. Stam, In the Nick of Time: Conflict Management, Mediation Timing, and the Duration of
Interstate Disputes, International Studies Quarterly 44, no. 2 (June 1, 2000): 239260. I. William Zartman, Ripe for
Resolution: Conflict and Intervention in Africa (Oxford University Press, 1985); Mr. Richard N. Haass, Conflicts Unending: The
United States and Regional Disputes (Yale University Press, 1990); Louis Kriesberg and Stuart J. Thorson, Timing the De-
escalation of International Conflicts (Syracuse University Press, 1991); Jacob Bercovitch and Scott Sigmund Gartner, eds.,
International Conflict Mediation: New Approaches and Findings (Taylor & Francis, 2008); MARIEKE KLEIBOER and PAUL t
HART, Time to Talk?, Cooperation and Conflict 30, no. 4 (December 1, 1995): 307 348; Patrick M. Regan and Allan C.
Stam, In the Nick of Time: Conflict Management, Mediation Timing, and the Duration of Interstate Disputes, International
Studies Quarterly 44, no. 2 (June 1, 2000): 239260; J. Michael Greig and Paul F. Diehl, Softening up* Making Conflicts
More Amenable to Diplomacy, in International Conflict Mediation: New Approaches and Findings, ed. Jacob Bercovitch and
Scott Sigmund Gartner (Taylor & Francis, 2008).
750
For the concept of the ripe moment, see the following works, with more information provided in the footnotes below.
I. William Zartman, Ripe for Resolution: Conflict and Intervention in Africa (Oxford University Press, 1985); Mr. Richard N.
Haass, Conflicts Unending: The United States and Regional Disputes (Yale University Press, 1990); Louis Kriesberg and Stuart
J. Thorson, Timing the De-escalation of International Conflicts (Syracuse University Press, 1991); Jacob Bercovitch and Scott
Sigmund Gartner, eds., International Conflict Mediation: New Approaches and Findings (Taylor & Francis, 2008); MARIEKE
KLEIBOER and PAUL t HART, Time to Talk?, Cooperation and Conflict 30, no. 4 (December 1, 1995): 307 348.

147
actions is crucial, because these actions through so called path dependencies are likely to
produce one specific outcome when staged at one moment in time, but an entirely different
outcome when staged at another.751 Eminent political scientist Pierson, calling for the need to insert
time back in the study of politics (or placing Politics In Time), speaks of path dependence through
positive feedback (or self-reinforcement) narrowly defined as the probability of further steps along
the same path increases with each move down that path.752 In these processes, the timing and
sequencing of events is essential.753 Jervis in his 1997 System Effects Complexity in Political and
Social Life pays special attention to these path dependencies in relationship to timing, drawing on
examples from all sorts of domains. 754 For instance, with respect to timing in the context of
strategies of coercion he proposes that

Two policies that have the same mix of concessions and threats can produce very different
outcomes depending on whether the threats are made before or after the concessions, thus
complicating the choice between deterrence and tension-reduction strategies.755

While once again far from exhaustive, these examples show that timing may well be a crucial factor
in determining the outcome of any security strategy.

Time and anchoring

In many instances policy makers seek to create anchoring points in time to dictate the timing of
events according to their own preferences. Insights derived from game theory, psychology,
negotiation studies and decision making sciences show the importance of salience in negotiation
situations and the role of various psychological biases that produce this anchoring effect.756 It is also

751
Paul Pierson, Politics in Time: History, Institutions, and Social Analysis (Princeton University Press, 2004); Paul Pierson,
Big, Slow Moving, and Invisible: Macro-Social Processes in the Study of Comparative Politics, in Comparative Historical
Analysis in the Social Sciences, ed. James Mahoney and Dietrich Rueschemeyer (Cambridge University Press, 2003). Robert
Jervis, System Effects (Princeton University Press, 1998), 3738.
752
Pierson, Politics in Time, 21 .
753
For a more elaborate description, see his third feature of political life in contexts characterised by positive feedback
loops at Ibid., 44.
754
Jervis, System Effects, esp. 3739, 4854, 7980, 126.
755
Ibid., 37.
756
Amos Tversky and Daniel Kahneman, Judgment Under Uncertainty: Heuristics and Biases, Science 185, no. 4157, New
Series (1974): 11241131; Amos Tversky and Daniel Kahneman, The Framing of Decisions and the Psychology of Choice,
Science 211, no. 4481, New Series (January 30, 1981): 453458; Amos Tversky and Daniel Kahneman, Rational Choice and
the Framing of Decisions, The Journal of Business 59, no. 4 (oktober 1986): S251S278; Amos Tversky and Daniel
Kahneman, Loss Aversion in Riskless Choice: A Reference-Dependent Model, The Quarterly Journal of Economics 106, no.
4 (November 1, 1991): 10391061.Peter Cramton and Joseph S. Tracy, Strikes and Holdouts in Wage Bargaining: Theory and
Data, Papers of Peter Cramton (University of Maryland, Department of Economics - Peter Cramton, 1992), 101102,
http://ideas.repec.org/p/pcc/pccumd/92aer.html. http://faculty.haas.berkeley.edu/mopp/conference/Fuchs.pdf Alvin E
Roth, J Keith Murnighan, and Francoise Schoumaker, The Deadline Effect in Bargaining: Some Experimental Evidence,
American Economic Review 78, no. 4 (1988): 812814. Daniel Druckman, Determinants of Compromising Behaviour in
Negotiation: A Meta-Analysis, The Journal of Conflict Resolution 38, no. 3 (1994): 544. See also WERNER GTH, M.
VITTORIA LEVATI, and BORIS MACIEJOVSKY, Deadline Effects in Sequential Bargaining an Experimental Study.,
International Game Theory Review 7, no. 2 (June 2005): 117135; Uri Gneezy, Ernan Haruvy, and Alvin E Roth, Bargaining
Under a Deadline: Evidence from the Reverse Ultimatum Game, Games and Economic Behaviour (Elsevier, 2003),
http://ideas.repec.org/a/eee/gamebe/v45y2003i2p347-368.html.Anne Edland and Ola Svenson, Judgment and Decision
Making Under Time Pressure Studies and Findings, in Time Pressure and Stress in Human Judgment and Decision Making,
ed. A. John Maule and Ola Svenson, (Springer, 1993), 37.
A. John Maule and Robert J. Hockey, State, Stress and Time Pressure, in Time Pressure and Stress in Human Judgment and
Decision Making, ed. A. John Maule and Ola Svenson (Springer, 1993), 83. Jack S. Levy, Prospect Theory, Rational Choice,
and International Relations, International Studies Quarterly 41, no. 1 (March 1997): 105. Rachel Croson, Terry Boles, and J.

148
interesting to take note of recent neuro-imaging studies which have shown that symbolic, i.e.
culturally determined, dates and periods activate brain circuits in a different way and thereby affect
the ways in which subjects assess their options differently.757

One examples of the ways in which actors seek to create anchor points in time is through the use of
deadlines, which in turn has a considerable effect on the outcome of situations. Both in laboratory
experiments and in real life situations it has been demonstrated that negotiation processes
accelerate towards the deadline, with an increase in the number of offers parties made and the
numbers of agreements reached shortly before the deadline.758 Such anchor points can also be used
to put pressure, or merely serve as a frame within which negotiations are conducted. Alternatively,
they can be used to postpone negotiations if parties want extra time or prefer not to reach
agreement.759 Also in the organisational sciences, these are acknowledged to be a key instrument to
set goals and monitor performance, and boost productivity, although its effectiveness in doing so is
considered to vary over different contexts.760

The overall key take away of this section on time is that security policies are well served by more
explicitly considering the issue of time in its various guises, including time horizons, timing and
anchoring. . While time horizons may be an important source of security by themselves, timing and
anchoring apply more to the formulation and execution of strategies to increase security. Timing,
then, is a particularly relevant aspect of the temporal sequencing of security strategies, and
anchoring, in turn, could be used by policymakers in the execution of these strategies.

It may therefore be worthwhile to explore more systematically whether research into the temporal
aspect of strategy might lead to new promising insights that can improve the way in which we deal
with security challenges.

3.5.12 Human decision making biases and the non-rational actor

Studies at the cross roads of psychology and economics have revealed that human decision making is
plagued by a number of systematic biases, which were proposed or perhaps exposed by the
psychologists Tversky and Kahneman in the 1970s and 1980s.761 These decision making biases are
relevant to the formulation and execution of security strategies. What is more, an assessment of
these tendencies elaborates on some of the issues raised in the section on subjective and objective
security.

Keith Murnighan, Cheap Talk in Bargaining Experiments: Lying and Threats in Ultimatum Games, Journal of Economic
Behaviour & Organisation (Elsevier, 2003), 152, http://ideas.repec.org/a/eee/jeborg/v51y2003i2p143-159.html.
757
Marc Wittmann and Martin P. Paulus, Temporal Horizons in Decision Making, Journal of Neuroscience, Psychology, and
Economics 2, no. 1 (2009): 111. http://koso.ucsd.edu/~martin/WittmannTimeReview2008.pdf
758
Cramton and Tracy, Strikes and Holdouts in Wage Bargaining, 101102. see also
http://faculty.haas.berkeley.edu/mopp/conference/Fuchs.pdf Druckman, Determinants of Compromising Behaviour in
Negotiation, 544. See also GTH, LEVATI, and MACIEJOVSKY, Deadline Effects in Sequential Bargaining an Experimental
Study.; Gneezy, Haruvy, and Roth, Bargaining Under a Deadline.
759
Dan Zakay and Dida Fleisig, The Time Factor as a Barrier to Resolution of the Israeli-Palestinian Conflict, in Time
Pressure and Stress in Human Judgment and Decision Making, ed. Ola Svenson and A. John Maule (Springer, 1993), 274.
760
Edwin A. Locke et al., A Theory of Goal Setting & Task Performance (Prentice Hall College Div, 1990), 67, 262.; Fried and
Slowik, Enriching Goal-Setting Theory with Time, 404405, 407.; Stephen Ghee-Soon Lim and J. Keith Murnighan, Phases,
Deadlines, and the Bargaining Process, Organisational Behaviour and Human Decision Processes 58, no. 2, Organisational
Behaviour and Human Decision Processes (1994): 153171.
761
Kahneman, Maps of Bounded Rationality, 1449; Tetlock and Mellers, Review, 9499.

149
In their work on the heuristics people rely on in making judgments under uncertainty,762 Tversky and
Kahneman identified numerous heuristics that real instead of theoretical decision makers employ in
assessing probabilities of events in situations of uncertainty that contradict the rational actor model
that until then prevailed. Chief amongst these heuristics are representativeness, availability, and
adjustment from an anchor.763 Representativeness refers to the fact that in assessing the likelihood
of an event, decision makers tend to ignore probability distributions and favour assessments of
similarity;764 availability to the fact that decision makers tend to base their judgment on whether a
similar event comes readily to mind (for instance because it has recently happened);765 and
adjustment anchor to the fact that decision makers tend to assess a probability by taking an initial
value that they subsequently adjust to arrive at a final estimate.766 Tversky and Kahneman showed in
laboratory set experiments that different starting points yield different estimates, which are biased
toward the initial values, even if the different starting points were generated randomly.767

Tversky and Kahneman also evaluated how decision makers assess their options under conditions of
risk.768 In what became to be known as prospect theory, they once again criticise the rational actor
model, in finding that decision makers tend to underweigh probable relative to certain outcomes.769
Furthermore, the risk propensities of these actors vary over different contexts as losses loom larger
than gains.770 Decision makers are therefore risk averse when it comes to gains and risk acceptant
when it comes to losses. These tendencies are explained by a framing effect (reference
dependence) which has been alternatively duped a status quo bias or an endowment effect, and has
been documented across different domains.771 Also in line with prospect theory (through the
principle of framing effects) is the delay-speedup asymmetry, which refers to the fact that decision
makers experience a greater utility cost of receiving an expected benefit later compared to the utility
gain associated with receiving that benefit earlier.772 Next, decision makers discount smaller pay offs
more than larger pay offs (the absolute magnitude effect),773 and prefer ascending rather than
descending sequences in receiving benefits.774 In addition, as earlier discussed within time horizons,
discounting does not always follow a linear process, meaning that decision makers may prefer one
item today over two items tomorrow, but two items in a (month + 1 day) over one item in a month.
This is known as preference reversals.775

762
For the key papers, see Tversky and Kahneman, Judgment Under Uncertainty; Tversky and Kahneman, The Framing
of Decisions and the Psychology of Choice; Tversky and Kahneman, Rational Choice and the Framing of Decisions;
Tversky and Kahneman, Loss Aversion in Riskless Choice.
763
Tversky and Kahneman, Judgment Under Uncertainty, 1131.
764
Ibid., 11241126.
765
Ibid., 11261127.
766
Ibid., 1128.
767
Ibid.
768
Sunstein, Review.
769
Kahneman and Tversky, Prospect Theory.
770
Tversky and Kahneman, Advances in Prospect Theory, 298.; see also Kahneman and Tversky, Prospect Theory, 268.
771
Tversky and Kahneman, Loss Aversion in Riskless Choice, 10411043. See also Loewenstein and Prelec, Anomalies in
Intertemporal Choice: Evidence and Interpretation, 133.
772
Loewenstein and Prelec, Anomalies in Intertemporal Choice: Evidence and Interpretation, 124.; Streich and Levy,
Time Horizons, Discounting, and Intertemporal Choice, 206.
773
Streich and Levy, Time Horizons, Discounting, and Intertemporal Choice, 206.; Loewenstein and Prelec, Anomalies in
Intertemporal Choice: Evidence and Interpretation, 122.
774
Streich and Levy, Time Horizons, Discounting, and Intertemporal Choice, 207.
775
Ibid., 205. Loewenstein and Prelec, Anomalies in Intertemporal Choice: Evidence and Interpretation, 121.

150
The Copernican turn brought about by these two psychologists has been progressively embraced in
the wider academic world, yet its impact on security policymaking is marginal at most. These
psychological biases cast the often asserted need for evidence based policies in a fundamentally
different light and are of fundamental interest to policy makers, who will need to take such
tendencies seriously when formulating security strategies.

3.5.13 Markets

One of the dominant sources of security in the fields of Business Administration and Economics that
is often neglected in the more mainstream security discussions is the market mechanism (or even
more specifically the price mechanism). Many security specialists who (increasingly) focus on
problems of scarcity come to the conclusion that protectionism (in essence a policy response and
one that is often rationalised in strategic or even security terms) is the only way to ensure a level
playing field. And yet (most) economists typically argue that markets despite a number of widely
acknowledged flaws remain the best mechanism to adjudicate scarcity imbalances. A nice example
of this might be the recent focus on the scarcity of rare earth metals as a threat to national
security. A few years ago, a number of security specialists discovered that China had close to a
monopoly position on these metals. When China then threatened to limit the export of this
strategic resource, this led to various studies trumpeting this as a natural security issue. What
actually happened as a result, however, was that various countries that had stopped the mining of
rare earth metals (mainly for environmental reasons) reopened their mines. This led not to an
increase, but to a decrease in the prices of (most) rare earth metals. We often see similar dynamics
at work in many scarcity issues, where underinvestment in prospection or exploration of a certain
raw material or commodity leads to a supply shock, leading to an increase in its price. This in turn
leads to renewed efforts to explore or to find substitutes, which often leads to a lowering of the price
of that raw materal or sommodity and the de-escalation of that conflict

The same argument is made not only for commodities, but also for factors of production. Whereas
many academics (mostly political scientists) tend to see things like migration or investments as
potential threats to national security, other academics (often economists) also here detect some
security-enhancing characteristics in free market approaches. Thus capital flows (like direct foreign
investment) may dilute a countrys direct control over the sectors in which other countries invest,
but it also tends to lead to various interlinkages between countries that make conflict more difficult.
With respect to labour flows, migration may lead to various adjustment problems in the receiving
countries, but it has also historically provided a quite effective escape valve to alleviate potentially
explosive forms of demographic pressure. The bottom line is that letting markets play their natural
conflict-resolution role is an often underestimated strategy for various security issues.

3.5.14 Liberty and democracy

The same applies to the concepts of liberty and democracy which, in the view of a number of
different disciplines provide one of the most effective ways of ensuring that various societal
cleavages and grievances get adjudicated in a non-violent ways. The empirical findings on this are
dual. On the one hand, political scientists have pointed out that (liberal) democracies are special
because they do not tend to fight themselves. A number of political scientists have also shown (and
argued) that the process of democratisation might actually lead to more security dangers. It is

151
certainly intriguing that the quite astonishing decline in violence both among and within countries
has occurred in tandem with the spread of democracies around the world. Also within Europe, the
creation and then subsequent enlargements of the European Union (with its democratic norms)
seem to have stabilised various long-term political rivalries that had historically proven quite
explosive. From the point of view of this chapter, it is important to point out that certain forms of
aggregating political preferences (overcoming cleavages that might lead to conflict) may be more
conducive to non-conflictual resolution than others. If that is the case, then the agenda to spread
liberty and democracy to various parts of the world becomes not only an issue of values, but also of
enlightened self-interest. Liberty and democracy continue to be relevant sources of security which
should be included in a security policy agenda.

3.5.15 Institutions

It is mostly within law as a selected academic discipline that the safeguard and accountability of key
institutions appear as important sources of security: institutions provide the main mechanisms
ensuring that individual rights and interests are respected and that individual development occurs.
While initially these key institutions were mainly perceived as national (e.g., police, court, etc) now
they are acquiring a much more international (e.g., IGOs and NGOs) and agent focus (e.g., participate
and responsive civil society) nature. Indeed one of the debates within law is around two contrasting
positions: those who hold that the defence of strong state institutions is essential for the
preservation of security and those instead who propose a more de-centred agenda.776 Participants on
either side agree that security is primarily about the preservation of norms, rules, and institutions.777
Rule-based interactions are also an important source of security. Security is viewed as public good
and governed by a set of key principles providing its legitimate underpinning. This set of values
includes: human rights, the rule of law, legitimate and accountable government, justice, freedom,
tolerance, and opportunity and devolvement for all everywhere in the world. 778 Other academic
disciplines tackle contracts, rules and norms as sources of security, although to a lesser extent.
Linguistics insists on the importance to transform existing institutions.779 Interestingly enough, in
education, an institution mostly refers to a family, a community.780 In case of conflict, the
development of norms are one of the solutions recommended in humanities.781 In psychology and
social sciences, security is conceptualised as the capacity to live up to the accepted standards and
agreed rules of conduct of the society in question.782 In the political science discourse, international

776
Zedner, L., Security, London: Routledge, 2009, p. 50.
777
Makinda goes beyond military security by defining security as the preservation of society's principal values, norms,
rules, and institutions. This definition covers the states system, and the principles, values, and norms that go with it.
778
Frerks, Georg, and Kees Homan, Human Security: a Launching Pad for Debate and Policy? Security &
Human Rights, Vol. 19, No. 1, 2008, p. 3.
779
It is argued that one of the most vital steps to ensure the day-to-day security of all is to transform the institutions,
policies and people who are responsible for the security of communities and individuals. Sidel, M., The Third Sector,
Human Security, and Anti-Terrorism: The United States and Beyond, Voluntas, Vol. 17, No. 3, 2006, pp. 119210.
780
Paltridge, Toby, Susan Mayson, and Jan Schapper, The contribution of university accommodation to
international student security, Journal of Higher Education Policy and Management, Vol. 32, Issue 4, August
2010, pp. 353-364.
781
For the traditional security and more limited approach the agenda would have to include (...) the
development of accepted norms for inter-state conduct. Rolfe, J., Regional Security for the Asia-Pacific: Ends
and Means, Contemporary Southeast Asia, Vol. 30, No. 1, April 2008, pp. 99-117.
782
Pieris, R., Ideological momentum and social equilibrium, American Journal of Sociology, 1952.

152
norms, standards and democratic rules are needed in order to build consensus and legitimacy.783 The
crucial lesson here is that institutions can be seen as a source of security and receive further
attention of security policymakers.

3.6 Conclusion: the Unexplored Treasure Trove

As we pointed out in the introduction, the ambition behind this work package was unapologetically
bold and broad. The ETTIS consortium partners were of course keenly aware of the fact that there
are quite a few review articles available about the (changing) nature of security, especially in the field
of political science. We could therefore have taken the easy way out and have once again
summarised these well-rehearsed summaries. But many of us are involved in our nations and the
European Unions research efforts in security. And at least some of us have grown increasingly
frustrated with some systematic biases that we perceive in the focus of that research agenda, in
which the afterglow of both the Cold War and going back further in time the industrial-age
security paradigm is still remarkably strong.

We therefore felt it might be useful to cast our analytical nets more widely into the full range of
academic disciplines to explore how other disciplines that have looked in-depth at security deal
with these problems. As indicated in the introduction, the guiding motivation behind this effort was
always how science and research may be able to better contribute an appropriately balanced (and
hopefully more effective and efficient) security research portfolio? The ETTIS team therefore set out
to collect an unusually broad set of articles from all academic disciplines articles that contained
some discussion about what security really is, what its different dimensions are, where it comes from
and how it can be strengthened.

We have not come across any reviews of the essence of national security that have looked at as
diverse a set of security issues as attachment security (psychology), tenure security (economics),
social security (economics), (financial) securities, health security (medicine); school violence
(education), ecosystem security (biology) etc. Some might be surprised that we included all these
different forms of security in this chapter. We are surprised that nobody has done so before.

In essence, this chapter has identified, described and illustrated a number of insights that emerge
from the various disciplines; always trying - wherever possible - to highlight interesting differences
between mainstream national security literature and the other disciplines treatment of security.
This broad-stroke inquiry has provided a rich harvest of very different views on what security is,
including its definitions and dimension and sources as well as the strategies that can be used to
increase it, which will be used as input for deliverable WP 1.2. Here we will confine ourselves to a
quick recapitulation of what we deem interesting findings in line with this objective.

With regard to definitions we have identified a number of the key definitional building-blocks that
different disciplines chose to put together in different ways to construct their definition of security.
These include choices about the level-of-analysis at which security is analysed (individual, group,
state, global), choices about such notions as absolute versus relative, objective versus
subjective and positive versus negative security, in addition to security as a state versus security

783
Tikk, E., Global Cyber Security Thinking About The Niche for NATO, The SAIS Review of International Affairs, 2010.

153
as a process. We note that the definition-related combinatorial choices made by political science as
a discipline (and especially the subfields of international and national security studies) really make it
the odd-man out in this group of disciplines that study security intensively. No other discipline puts
so much emphasis on the state-level - which may not be overly surprising given the focus of political
science on politics and the continued centrality of nation-states in these matters. But what may be
more surprising, however, is that no other discipline puts so much emphasis on relative security, on
(allegedly) objective security, on negative security and on security as a state instead of a process.
We wonder whether these combinatorial choices are as self-evident as many political scientists seem
to think they are. They may therefore merit further attention in both the formulation and the
targeting of security policies.

The key takeaway from our analysis of the various dimensions of security is that this broad-sweeping
survey of various disciplines uncovered a wide range of dimensions that the more mainstream
literature is only dimly (and sometimes even not at all) aware of. We surmise that a more systematic
and in-depth investigation of this issue would unveil even more of such discoveries. This observation
is important in its own right, as it may push more mainstream security analysts to ponder why they
include certain aspects of security and exclude others. But it is especially important because it opens
a variety of new research avenues to establish whether these less-well-known or unknown
dimensions of security contain any insights or even solutions that mainstream security analysis may
have underestimated. It is perfectly possible that some of those may not be applicable or
translatable to societal security, but as we will see in the next section when discussing sources and
strategies even this birds eye analysis has already revealed some quite intriguing insights in this
regard. As we have emphasised before, our main intention in enumerating these various new types
of security is not to broaden the scope of the concept of security even more (i.e. to securitise even
more societal or human pathologies), but rather to explore whether any from the insights from these
other dimensions of security might be useful for dealing with societal security challenges784.

Our exploration of sources and strategies identified in academic disciplines turned out to be
especially fruitful, certainly within the light of our objective to enrich the ways of thinking, defining
and dealing with security beyond traditional/current concepts, and distil insights from other fields
that may prove new, interesting and/or useful. We found many more interesting notions than we
had expected initially - both in number and in potential usefulness in the field of societal security. To
mention a number of concrete examples that we found particularly stimulating:

Beyond the State: most disciplines have multi-level approaches to security sources and
solutions, but many single out the soc(iet)ial context as particularly relevant, meriting more
explicit attention to policy solutions that deal with the nexus between individuals and the
groups they belong to.

784
One might even go so far as to claim that by criticising scholars and analyst who advocate broader
definitions of security for securitising many issues that these critics feel do not belong to security, this line of
critique actually (unwittingly) accepts the mainstream definition and could therefore be seen as belonging to
the same (definitional) camp. In this work package, the ETTIS team decidedly left both of these camps aside
and tried to pierce through to the very core (if one exists) of security - one that might run through the various
dimensions that we find in different disciplines and might help us uncover new promising research avenues
with broad policy applicability.

154
Integrity and trust are viewed in many areas as key sources of security. Although more
mainstream security scholars are certainly aware of this source and pay some lip service to
its importance, they devote much less attention to how these sources can be stimulated to
prevent or solve security challenges.
Technology is viewed in most (though not all) disciplines as one of the key sources of security
and as a tool that can be used in promoting security. But we are struck by the narrow focus
on hard, physical technologies in the mainstream security literature, whereas most other
disciplines seem to use a broader definition of technology and also to strike a better balance
between physical and social (or socio-technological) technologies (with clear implications
for R&D)
The same applies to power as a source of security. Power is a central theme in the
mainstream literature, which tends to still focus predominantly on what political scientists
now call hard security - whether in the more subtle - and in our view also more profound-
sense of Joseph Nye (i.e., power that can be used to induce others to change their position;
or in the more popular notion of tangible or even military785). Even the mainstream
literature now started focusing more attention on soft power (in Nyes definition, the ability
to co-opt others by getting them to want what you want, in popular parlance things like
cultural power etc.). The main observation here is that the balance between hard and soft
security solutions seems particularly tilted towards the former in the mainstream literature.
Hard power is clearly present in virtually all other disciplines too, but in more balanced
proportions (with psychology being an excellent example).
Prevention and resilience. Most disciplines are starting to move upstream in dealing with
security risks by focusing more preventing security risks ex ante rather than ex post through
the strengthening of actors or systems resilience. They do so primarily from an effectiveness
and efficiency point of view. A salient example is provided by the health domain and the turn
from (expensive, technological) cure to prevention and healthy life choices. The
acknowledgement and acceptance of the fact that in a complex and dynamic world not all
risks can be prevented pushes the debate in many disciplines towards an increased emphasis
on resilience as a security strategy - which we do not find fully reflected in the more
mainstream security disciplines.
We also find back the multi-level approach to security that we saw in many disciplines
definitions of security in their approaches to solutions and strategies. More so than in
mainstream security discussions (which seem particularly captured by the level-of-analysis
debate which seems to urge them to pick one level as better than another786) do we find
back the idea that solution concepts should embrace solutions at multiple levels including
individual, group/society, state and regional/global.
Security with rather than security for/over. Many other disciplines focus on the importance
of empowering individuals (e.g., through education, through the right sets of incentives, etc.)
to act independently and be or become a source of security.

785
Joseph S. Nye Jr, The Future of Power, 1st ed. (Public Affairs, 2011).
786
Even though key proponents of the level-of-analysis issue (even Waltz) really used it to indicate that these
were not levels to be picked from, but different images to look at the same multi-level reality. Kenneth Waltz,
Theory of International Politics, 1st ed. (McGraw-Hill Humanities/Social Sciences/Languages, 1979).

155
Nicely tying in to the objective and subjective angle of security, language and
communication are singled out key strategic instruments in a number of disciplines dealing
with security in ways that they are typically not in the mainstream security literature.
We tapped into some interesting ideas about the strategic use of timing a largely
neglected issue in most of the mainstream literature which suggest that security strategies
will benefit from taking numerous time related aspects into account, including such aspects
as time horizons, path dependencies and anchoring.
Various psychological biases of individuals shed new light on the use and utility of evidence
based policies, and call attention to the need of taking such tendencies seriously when
formulating security strategies.
Markets, which are sometimes viewed as sources of instability (at least by some schools in
political science and certain more politicised subfields of economics), are now increasingly
also seen as important potential sources of security and conflict-prevention in multiple
disciplines. As an example: for many issues of economic scarcity, the price mechanism often
plays an underappreciated role in adjudicating possible conflicts (e.g., scarce food leading to
a price impulse that gives local farmers more incentives to be efficient and others more
incentives to innovate). Thus deeper inquiry in how markets affect security may provide new
promising strategies for dealing with various security issues.
Liberty and democracy continue to be seen as relevant sources of security which should be
included in a security policy agenda not just for normative reasons, but also because they
arguably provide some of the most effective and efficient mechanisms to create sustainable
security.

A final - very important (and in our view actionable) - observation we would like to present is that
there is currently no truly inter-disciplinary security discipline. Our overview shows that the topic of
security is dealt with in depth in a wide number of disciplines - admittedly sometimes with different
definitions, but always still with the quintessence of security (as se-cura or free from care) at the
heart of the scientific inquiry. It also shows that many of the disciplines are only vaguely aware of
each other.787 Academics love castigating governments (in our view legitimately) for being overly
stove piped, but it seems clear that the current incentive structures in academia militate against truly
cross-disciplinary efforts and therefore lead to very similar (and equally pernicious) stovepipes or
siloes. Since governments in most countries still provide some funding to academia for applied
security research, there may be a great opportunity here to counterbalance the existing incentive
structure with some targeted funding.

787
Further rigorous bibliometric research might actually prove quite revealing here.

156
4 Overall Conclusion: Bridging the Security Gap
If our readers have by now come to the conclusion that this work package reads differently from
anything they have read on this topic before, then we have achieved our goal. As we emphasised
throughout this report, the ETTIS team opted deliberately for an unorthodox approach to define
what societal security actually means in different countries and in different academic disciplines and
what we can learn from that. All participants of the ETTIS team have been and remain involved in
both their own national research efforts in the area of national (or societal) security as well as in a
number of EU projects in this field. We do so primarily in our respective fields of expertise. But at the
same time, as analysts and scholars but also as citizens and taxpayers, we feel a certain responsibility
for the bigger security picture that transcends these particular fields. And here some of us shared a
sense that the return on our countries public investment in security research has been distinctly
suboptimal. As scientists, we feel we should (and can) do better; as citizens we feel we deserve a
better return on our investment. That is why we started this effort with a conscious choice to go out
and look for fresh new insights in other countries and other academic literatures that might open up
promising avenues for actionable research on the many intransigent security challenges that we
confront.

So rather than regurgitating the debate in primarily political science about the broadening of the
security concept, and then the subsequent backlash from certain quarters against the presumed
securitisation of a number of policy challenges these quarters feel do not belong in the security
domain, we opted for a new angle for both policy and academic docs. For the policy documents we
just set out - without any preconceived notions of what security is or is not - to collect the highest-
level strategic documents issued by the political leadership of eight selected countries about what
that country feels security is and what should be done about it. For the academic documents, we
decided to take advantage of the increased availability in electronic format of full-text academic
journals across the entire academic spectrum. We boldly set out to query these millions of articles
from all disciplines for any articles that contained terms like definition, dimension, sources, or
strategies in the same sentence as the word security. We also complemented those articles with
some more of the more authoritative articles dealing with these issues from the disciplines
consortium partners were familiar with. In both instances we used both traditional as well as some
more cutting-edge analytical tools to discover interesting and innovative insights about how security
can be defined, what its dimensions and sources are, and how it can be safeguarded.

We have already presented what we see as the most striking takeaways in the conclusions to the
policy and academic chapters. Those revealed many gaps - including quite a few unexpected ones -
within these respective chapters. But some of the most striking gaps can be found when we
compare how official high-level policy statements appear to conceptualise security with how the
various academic disciplines do this. In this conclusion, we will therefore highlight our main
takeaways from a comparison between the high-level policy documents and the academic
disciplines. We will once again do this on the basis of the same structure we have used throughout
this report by focusing on definitions, dimensions, sources and strategies of security.

157
4.1 Towards a New Definition of National Security

As we pointed out in the policy chapter, the ETTIS team struggled with different concepts of societal
security, the very heart of the entire ETTIS project. The team ended up with a working definition for
this chapter that conceptualises societal security as the emergent new overarching concept of what
governments aspire to in their national security agenda, which used to be coterminous with
territorial security, but is now increasingly being associated with the security-health of the societies
that live on those territories.788

Figure 26: National Security

We observed this trend in the high-level policy documents of many of the countries we surveyed,
and which are moving from traditional territorial definitions of security with defence efforts at their
core to more comprehensive definitions that include both internal and external security aspects. But
when we compare this broadening trend in the policy documents with the definitions we found
back in the various academic disciplines, we could not help being struck by the still remarkably
narrow definition of security in national security guidance on certain components of security (mostly
defence, albeit it with a notable trend towards defence and security). This stands in stark contrast to
the overall academic treatments of security, whose scope is immeasurably broader. We stressed
already a few times that we are much less interested in these definitional issues for reasons of
semantic purity or normative judgment than for the sake of finding a more balanced approach to
security solutions that actually work (and at an affordable and acceptable cost). And this may mean
that both policy and academic communities may have to find ways to break out of their current

788
It may be worthwhile to point out that the very concept of nation is much more frequently associated with
a countrys inhabitants than with the territory of that state. The digram nation-state is a nice illustration of
that, referring to the period in (modern) history when the states were delineated essentially on the basis of
the titular nation that lived in them. One could argue that we are witnessing a new epochal change in which
the emphasis shifts from the second part of the digram nation-state to the first one.

158
siloed security views and to discover and accept the many overlapping elements and cross-linkages
between and across these different definitions.

4.2 Dimensions

The team found the treatment of the various dimensions of security in policy documents quite
revealing. As could be expected, countries high-level security policy documents are still very much
within what we have called the current mainstream. As also the more quantitative analysis showed,
the military dimension remains quite dominant, although it has been complemented by some new
dimensions such as terrorism, cyber, health, environment, etc. But overall the mainstream remains
quite dominant.

We found a lot more creativity - even more than we had anticipated before we started branching out
to un- or less familiar disciplines - in the many dimensions we found back in the academic disciplines.
We observe that the policy documents in recent years have started picking up a number of new
dimensions that could already be detected in the - especially political science - academic literature
over a decade ago. But we also uncovered a number of dimensions - especially also from other
disciplines than political science - that have received very little or no attention in the policy
documents. These hail from disciplines like psychology (attachment security), law and economics
(tenure security, property rights), or computer sciences (the dimensions used in formal modelling of
computer security). We noted that our own inference from this is not that all of these dimensions
should now become part of the discussion about societal security, but that we may have to be more
conscious of some systematic biases in the policy debates about security - some of which may be
perfectly legitimate and defensible, but some of which may not.

4.3 Sources and Strategies

If we then turn the sources and strategies of security, the relative poverty of the policy documents
becomes even more glaring. We pointed out in the conclusion to the academic chapter that there
are a fair number of promising research avenues - also and even especially with respect to the
solution space - that security studies or political science have barely scratched. But when we then put
our collection of policy documents next to the broader set of disciplines, the differences become
even more accentuated. Examples of areas of the potential solution space that have hardly been
explored in the high-level policy documents include multi-level approaches to security (beyond the
state), integrity and trust, incentive structures, a better balance between physical and social (or
socio-technological), technologies and between hard and soft power, the importance of
prevention and resilience, language and communication, the strategic use of timing, research into
various psychological biases and their impact on security decision making, and the arguably
untapped potential of markets, liberty and democracy. All of these sources and strategies receive
attention across different academic disciplines.

4.4 Whats Next ETTIS?

The clear conclusion we arrive at is that the policy community runs behind. It is obvious - and we
have duly noted - that we do see movement in numerous high-level strategic security policy

159
documents as well, both in terms of how security is defined, which dimensions are taken into
account, and how security can be or has to be dealt with. The way in which governments define and
deal with security has certainly changed since the end of the Cold War - and in most of the countries
and the European Union we surveyed in this work package in our opinion largely for the better. This
progress should not be underestimated, as it represents some impressive victories over a number of
deeply entrenched vested interests within our defence and security establishments.

But these changes pale in comparison with the unexpectedly - even to us - rich diversity of views
(and potential solutions) we discovered in the academic document set. There therefore is indubitably
lot of room for improvement. On the basis of the unorthodox approach that laid at the basis of this
work package, and at this stage of the ETTIS project, the ETTIS team still feels hesitant to make very
precise and far-reaching recommendations about where exactly these improvements lie. But as a
team, we feel enormously heartened and inspired by the various insights that we culled from this
admittedly unconventional research effort. But if policymakers read this and share at least some of
our enthusiasm for the riches of the many innovative areas of the societal security solution space
that has barely been explored, it is our firm hope that they will provide the security research
community with a new impulse and stronger incentives to reach out beyond their comfort zones in
search of the innovative security solutions our changing societies deserve. With this deliverable we
have hoped to provide the first impetus for this impulse, which will be taken further up in the
deliverable WP1.2 of ETTIS and the remainder of the projects WPs.

160
5 Bibliography
5.1 National policy documents
Department of Defence of the United States of America, Joint Chiefs of Staff, National Military
Strategy, 2011
Department of Defence of the United States of America, Joint Chiefs of Staff, National Military
Strategy to Combat WMD, 2006
Department of Defence of the United States of America, Joint Chiefs of Staff, National Military
Strategy, 2004
Department of Defence of the United States of America, Joint Chiefs of Staff, ,National Military
Strategy, 1997
Department of Defence of the United States of America, Joint Chiefs of Staff, National Military
Strategy, 1995
Department of Defence of the United States of America, National Defence Strategy, 2008
Department of Defence of the United States of America, National Defence Strategy, 2005
Department of Defence of the United States of America, Quadrennial Defence Review, 2010
Department of Defence of the United States of America, Quadrennial Defence Review, 2006
Department of Defence of the United States of America, Quadrennial Defence Review, 2001
Department of Defence of the United States of America, Quadrennial Defence Review, 1997
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007), 2004
Dutch Ministry of Defence, Defence Priority Review (Hoofdlijnennotitie), English summary, 1993
Dutch Ministry of Defence, Future Policy Survey (Verkenningen), English summary, 2008
Dutch Ministry of Defence, National Defence Doctrine, 2005
Dutch Ministry of Defence, Prinsjesdagbrief, 2003
Dutch Ministry of Defence, White Paper on Defence, English summary, 2000
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work
Programme 2007 - 2008, 2007
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy 2005
2007 (summary), Swedish government bill 2004/05:5, 2004
Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica estera, 2008
Ministero della Difesa, Strategic Concept, 2004
Ministero della Difesa, Strategic Concept, 2005
National Security and Defence Council of Ukraine, National Security Strategy, 2010
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense, Part 1+2,
1994
Prsidence de la Rpublique Franaise, White Paper on Defence and National Security (full version
and summary), 2008
Presidenza del Consiglia Dei Ministri, Law on the creation of the Italian National Civil Protection
Authority, 1992
Russian Ministry of Foreign Affairs, Military Doctrine, 2000
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation, 1997
Russian Security Council, Military Doctrine, 2010

161
Russian Security Council, National Security Strategy of the Russian Federation up to 2020, 2009
Secretary of Defence for Intelligence of the United States of America, National Intelligence Strategy,
2009
Secretary of Defence for Intelligence of the United States of America, Defence Intelligence Strategy,
2008
Swedish Ministry of Defence, A More Secure Neighbourhood Insecure World, 2003
Swedish Ministry of Defence, A Usable and Accessible Defence Force The Policys Orientation, 2009
Swedish Ministry of Defence, A strategy for Sweden's security summary, 2006
Swedish Ministry of Defence, Cooperation in Crisis for a more Secure Society,
Government Bill 2005/06:133, 2006
Swedish Ministry of Defence, Defence in Use, Ds 2008:48 (summary), 2008
Swedish Ministry of Defence, Our Military Defence - Commitment and Choices, Ds 2003:34
(summary), 2003
Swedish Civil Contingencies Agency (MSB),
Emergency Response Management in Todays Complex Society, 2010
Government Offices of Sweden. Statement of Government Policy in the Parliamentary Debate on
Foreign Affairs, Wednesday, 12 February 1997.
Government Offices of Sweden. Statement of Government Policy in the Parliamentary Debate on
Foreign Affairs, Wednesday, 15 February 2012.
The White House, National Security Strategy, 1995
The White House, National Security Strategy, 2002
The White House, National Security Strategy, 2006
The White House, National Security Strategy, 2010
The White House, National Strategy for Homeland Security, 2002
The White House, National Strategy for Homeland Security, 2007
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent World,
2008
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security Strategy,
2010
UK Homeland Government, Securing Britain in an Age of Uncertainty: The Strategic Defence and
Security Review, 2010
UK Ministry of Defence, Defence Diplomacy, 2001
UK Ministry of Defence, Defence Industrial Strategy - Defence White Paper, 2005
UK Ministry of Defence, Defence Reform, 2011
UK Ministry of Defence, Delivering Security in a Changing World: Future Capabilities, 2004
UK Ministry of Defence, Delivering Security in a Changing World: Defence White Paper, 2003
UK Ministry of Defence, European Defence, 2001
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998
UK Ministry of Defence, The Strategy for Defence, 2011
Ukrainian Ministry of Defence, National Security Strategy, 2007
Ukrainian Ministry of Defence, National Strategic Defence Bulletin until 2015, 2004
Ukrainian Ministry of Defence, White Book 2005: Defence Policy of Ukraine
Ukrainian Ministry of Defence, White Book 2006: Defence Policy of Ukraine
Ukrainian Ministry of Defence, White Book 2007: Defence Policy of Ukraine

162
Ukrainian Ministry of Defence, White Book 2008: Defence Policy of Ukraine
Ukrainian Ministry of Defence, White Book 2009: Armed Forces of Ukraine
Ukrainian Ministry of Defence, White Book 2010: Armed Forces of Ukraine
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010

5.2 EU official and policy documents


Council of the European Union, A Secure Europe in a Better World, European Security Strategy (ESS),
Brussels, December 12, 2003.
, Civilian Headline Goal 2008, 15863/04, Brussels, December 7, 2004.
, Council Directive 2008/114/EC of 8 December 2008 on the Identification and Designation of
European Critical Infrastructures and the Assessment of the Need to Improve Their Protection, OJ L
345/75, Brussels, December 23, 2008.
, Council Framework Decision of 13 June 2002 on Combating Terrorism, 2002/475/JHA, OJ L
164/3, Brussels, June 22, 2002.
, Draft Internal Security Strategy for the European Union: Towards a European Security Model,
7120/10, CO EUR-PREP 8 JAI 182, Brussels, March 8, 2010.
, Fight Against Terrorist Financing - Six Monthly Report, 11948-2-07 REV 2, Brussels, October 5,
2007.
, Framework Decision of 13 June 2002 on Combating Terrorism, Brussels, June 22, 2002.
, Regulations, Council Regulation (Euratom) No 300/2007 of 19 February 2007 Establishing an
Instrument for Nuclear Safety Cooperation, OJ L 81, Brussels, March 22, 2007.
, The European Union Counter-Terrorism Strategy, 4469/4/05 REV 4, Brussels, November 30,
2005.
EU Parliamentary Meeting, The Role of the EU in Conflict Prevention 2006, Background Note, The Future
of Europe: From Reflection to Action, Brussels, December 4, 2006.
, The Role of the EU in Conflict Prevention 2006, Background Note, The Future of Europe: From
Reflection to Action, Brussels, December 4, 2006.
European Commission, A Strategy on the External Dimension of the Area of Freedom, Security and
Justice, Communication from the Commission, COM(2005) 491 Final, Brussels, October 12, 2005.
, Communication from the Commission on Conflict Prevention, COM(2001)211 Final, Brussels,
April 11, 2001.
, Proposal for a Directive of the European Parliament and of the Council on Attacks Against
Information Systems and Repealing Council Framework Decision 2005/222/JHA,COM(2010) 517,
2010/0273, Brussels, 2010.
, Protecting Europe from Large Scale Cyber-attacks and Disruptions: Enhancing Preparedness,
Security and Resilience, Communication from the Commission to the European Parliament, the
Council, the European Economic and Social Committee and the Committee of the Regions, COM
(2009) 149 Final, Brussels, March 30, 2009.
, Tackling Crime in Our Digital Age: Establishing a European Cybercrime Centre, Communication
from the Commission to the Council and the European Parliament, COM(2012) 140 Final, Brussels,
March 28, 2012.
, The EU Internal Strategy in Action: Five Steps Towards a More Secure Europe (ISS),
Communication from the Commission to the European Parliament and the Council, COM(2010)
673final, Brussels, November 22, 2010.
, Towards a General Policy on the Fight Against Cybercrime, Communication from the Commission
to the European Parliament, the Council and the Committee of the Regions, COM(2007) 267 Final,
Brussels, May 22, 2007.
European Commission, Home Affairs, Boosting Europes Defences Against Cyber Attacks, Brussels,
March 2012.

163
European Council, 2001/500/JHA Council Framework Decision of 26 June 2001 on Money Laundering, the
Identification, Tracing, Freezing, Seizing and Confiscation of Instrumentalities and the Proceeds of
Crime, Brussels, 2001.
, S407/08 Report on the Implementation of the European Security Strategy: Providing Security in a
Changing World, Brussels, December 11, 2008.
, The Hague Programme: Strengthening Freedom, Security and Justice in the European Union, OJ
2005/C 53/01, Brussels, March 3, 2005.
European Parliament, and Council of the European Union, Regulation (EC) No 851/2004 of the European
Parliament and the Council of 21 April 2004 Establishing a European Centre for Disease Prevention
and Control, OJ L 142, Brussels, April 30, 2004.
European Parliament, and Tampere European Council, Presidency Conclusions, Tampere European
Council, October 15, 1999.
Gteborg European Council, Presidency Conclusions, SN 200/1/01 REV 1, Gteborg European Council,
June 15, 2001.
The Lisbon Treaty, Consolidated Versions of the Treaty on European Union and the Treaty on the
Functioning of the European Union, OJ 2010/C 83/01, Lisbon, March 30, 2010.

5.3 UN documents
United Nations, In Larger Freedom: Towards Security, Development and Human Rights for All, Report of
the Secretary-General of the United Nations for decision by Heads of State and Government,
September 2005.
United Nations Development Programme (UNDP), Human Development Report: New Dimensions of
human security, 1994.

5.4 Academic documents


Agathangelou, Anna M., and L . H . M. Ling, Power, Borders, Security, Wealth: Lessons of Violence and
Desire from September 11, International Studies Quarterly, Vol. 48, No. 3, 2004, pp. 517538.
Aitken, R., Spaces of Individual/National Security: Geopolitics, Citizenship and Cultural Economy., 2005.
Aldis, William, Health Security as a Public Health Concept: a Critical Analysis, Revista Gerencia y Polticas
De Salud, Vol. 8, No. 17, December 2009, pp. 1227.
Alken, A., Evaluating Tenant-in-Common Interests in Real Estate, The Counsellors of Real Estate, Vol. 31,
No. 1, 2006.
Al-Krenawi, Alean, John R. Graham, and Mahmud A. Sehwail, Mental Health and Violence/Trauma in
Palestine: Implications for Helping Professional Practice, Journal of Comparative Family Studies, Vol.
35, No. 2, Spring 2004, pp. 185209.
Amoore, Louise, and M. de Goede, Introduction, Journal of Cultural Economy, Vol. 5, No. 1, February
2012, pp. 38.
Andrus, Ruth, and Eugene L. Horowitz, The Effect of Nursery School Training: Insecurity Feelings, Child
Development, Vol. 9, No. 2, June 1938, p. 169.
Arriagada, Irma, Changes and Inequality in Latin American Families, Journal of Comparative Family
Studies, Vol. 37, No. 4, 2006, pp. 511537.
Art, Robert J., and Patrick M. Cronin, The United States and Coercive Diplomacy, United States Institute of
Peace, 2003.
Ascher, A., Facilitators and Regulators: Maternal Orientation as an Antecedent of Attachment, Journal of
Reproductive and Infant Psychology, 2001.
Axelrod, Robert, The Evolution of Cooperation, Basic Books, 1985.
Axelrod, Robert, and Robert O. Keohane, Achieving Cooperation Under Anarchy: Strategies and
Institutions, October 1985, pp. 226254.
Axford, Barrie, Editorial: Borders and Networks in the Global System, Globalizations, Vol. 4, No. 3, 2007,
pp. 321326.

164
Bain, W., Against Crusading: The Ethic of Human Canadian Foreign Policy, Canadian Foreign Policy
Journal, Vol. 6, No. 3, 1999.
Baldwin, D., The Concept of Security, Review of International Studies, Vol. 23, 1997.
Beck, Ulrich, Risk Society: Towards a New Modernity, Sage, London, 1992.
Beinhocker, Eric D., Origin of Wealth: Evolution, Complexity, and the Radical Remaking of Economics,
Harvard Business School Press, Cambridge, 2006.
Beitz, C., Political theory and international relationships, Princeton: Princeton University Press, 1979.
Belsky, Jay, and R. M. Pasco Fearon, Early Attachment Security, Subsequent Maternal Sensitivity, and
Later Child Development: Does Continuity in Development Depend Upon Continuity of Care giving?,
Attachment & Human Development, Vol. 4, No. 3, December 2002, pp. 361387.
Bercovitch, Jacob, and Scott Sigmund Gartner, eds., International Conflict Mediation: New Approaches and
Findings, Taylor & Francis, 2008.
Bernstein, Peter L., Against the Gods: The Remarkable Story of Risk, Wiley, 1998.
Bigo, D, The Mbius Ribbon of Internal and External Security(ies), in M. Albert, Y. Lapid, and D. Jacobson
(eds.), Identities, Borders, Orders. Rethinking International Relations Theory, University of Minnesota
Press, Minneapolis, 2001, pp. 91116.
Bigo, D., Internal and External Aspects of Security, European Security, Vol. 15, No. 4, n.d., pp. 385404.
, Security: A Field Left Fallow, in Michael Dillon and Andrew W. Neal (eds.), Foucault on Politics,
Security and War, Palgrave Macmillan, New York, 2008.
, When Two Become One - Internal and External Securitisations in Europe, in International Relations
Theory and the Politics of European Integration. Power, Security and Community, Routledge, London,
2000.
Bilgin, Pinar, Critical Theory, in Paul D. Williams (ed.), Security Studies: An Introduction, Routledge, New
York, 2008.
Bono, Giovanna, Challenges of Democratic Oversight of EU Security Policies, European Security, Vol. 15,
No. 4, 2006, pp. 431449.
Boy, Nina, Peter Burgess, and Anna Leander, The Global Governance of Security and Finance, Security
Dialogue, Vol. 42, No. 2, 2011.
Brauch, Hans Gnter, Conceptualising the Environmental Dimension of Human Security in the UN,
International Social Science Journal, Vol. 59, No. s1, September 20, 2008, pp. 1948.
Bryce, Ciaran, and Winfried Kuhnhauser, An Approach to Security for World-Wide Applications, in
Sokratis K. Katsikas (ed.), Communications and Multimedia Security, International Federation for
Communication Processing, 1997.
Burgess, J. Peter, Global Societal Security (Brief), 2011.
, Rethinking Security Strategies: New Threats and New Actors, in Eduard Soler i Lecha and Fadela
Hilali (eds.), VII Seminario Internacional Sobre Seguridad y Defensa En El Mediterrneo. Conflictos
Regionales y Estrategias De Seguridad, CIDOB-CEPAL, Barcelona, 2010.
, The Ethical Subject of Security: Geopolitical Reason and the Threat Against Europe, 1st ed.,
Routledge, 2011.
Burgess, J. Peter, ed., The Routledge Handbook of New Security Studies, 1st ed., Routledge, 2010.
Burgess, J. Peter, There Is No European Security, Only European Securities, Cooperation and Conflict,
Vol. 44, No. 3, 2009, pp. 309328.
Buzan, Barry, People, States, and Fear: The National Security Problem in International Relations, University
of North Carolina Press, 1983.
Buzan, Barry, Ole Weaver, and Jaap de Wilde, Security Analysis: Conceptual Apparatus, Security: A New
Framework for Analysis, Lynne Rienner, London, 1998.
C.A.S.E. Collective, Critical Approaches to Security in Europe: A Networked Manifesto, Security Dialogue,
Vol. 37, No. 4, December 1, 2006, pp. 443487.
Campbell, David, Writing Security: United States Foreign Policy and the Politics of Identity, University Of
Minnesota Press, 1998.

165
Cassell, G H, and J Mekalanos, Development of Antimicrobial Agents in the Era of New and Re-emerging
Infectious Diseases and Increasing Antibiotic Resistance, JAMA: The Journal of the American Medical
Association, Vol. 285, No. 5, February 7, 2001, pp. 601605.
Castleden, Matthew, Martin McKee, Virginia Murray, and Giovanni Leonardi, Resilience Thinking in
Health Protection, Journal of Public Health, April 6, 2011.
http://jpubhealth.oxfordjournals.org/content/early/2011/04/06/pubmed.fdr027.
Chabinsky, Steven R., Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Line,
Journal of National Security Law & Policy, Vol. 4, 2010.
Chen, Lincoln, and Vasant Narasimhan, Human Security and Global Health, Journal of Human
Development, Vol. 4, No. 2, United Nations Development Programme, 2003.
Clayton, John, Gill Crozier, and Diane Reay, Home and Away: Risk, Familiarity and the Multiple
Geographies of the Higher Education Experience, International Studies in Sociology of Education,
Vol. 19, No. 3/4, December 2009, pp. 157174.
Coles, Garill A., Stephen D. Unwin, Greg M. Holter, Robert B. Bass, and Jeffery E. Dagle, Defining
Resilience Within a Risk-Informed Assessment Framework, International Journal of Risk Assessment
and Management, Vol. 15, No. 2/3, 2011, pp. 171 185.
Colic-Peisker, Val, and Guy Johnson, Security and Anxiety of Homeownership: Perceptions of Middle-class
Australians at Different Stages of Their Housing Careers, Housing, Theory & Society, Vol. 27, No. 4,
December 2010, pp. 351371.
Comfort, Louise K., Arjen Boin, and Chris C. Demchak, eds., Designing Resilience: Preparing for Extreme
Events, 1st ed., University of Pittsburgh Press, 2010.
Conze, W., Sicherheit, Schutz, in Otto Brunner, Werner Conze, and Reinhart Koselleck (eds.),
Geschichtliche Grundbegriffe: Historisches Lexikon Zur Politisch-Sozialen Sprache in Deutschland,
Klett-Cotta, Stuttgart, 1984.
Cooper, Melinda, On the Brink: From Mutual Deterrence to Uncontrollable War, Contretemps, Vol. 4,
2004.
http://www.researchonline.mq.edu.au/vital/access/manager/Repository/mq:4277?exact=metadata.
department%3A%22Dept.+of+Politics+and+International+Relations%22&highlights=false.
Cox, Andrew, Fynnwin Prager, and Adam Rose, Transportation Security and the Role of Resilience: A
Foundation for Operational Metrics, Transport Policy, Vol. 18, No. 2, March 2011, pp. 307317.
Cramton, Peter, and Joseph S. Tracy, Strikes and Holdouts in Wage Bargaining: Theory and Data, Papers of
Peter Cramton, University of Maryland, Department of Economics - Peter Cramton, 1992.
http://ideas.repec.org/p/pcc/pccumd/92aer.html.
Crane, David M., Fourth Dimensional Intelligence Thoughts on Espionage, Law and Cyberspace, Intl L.
Stud. Ser. US Naval War Col., Vol. 76, 2002.
Croson, Rachel, Terry Boles, and J. Keith Murnighan, Cheap Talk in Bargaining Experiments: Lying and
Threats in Ultimatum Games, Journal of Economic Behaviour & Organization, Elsevier, 2003.
http://ideas.repec.org/a/eee/jeborg/v51y2003i2p143-159.html.
Cudworth, Erika, and Stephen Hobden, Beyond Environmental Security: Complex Systems, Multiple
Inequalities and Environmental Risks, Environmental Politics, Vol. 20, No. 1, February 2011, pp. 42
59.
Davies, Patrick T., and Meredith J. Woitach, Childrens Emotional Security in the Interparental
Relationship, Current Directions in Psychological Science (Wiley-Blackwell), Vol. 17, No. 4, 2008, pp.
269274.
Der Derian, James, The Value of Security: Hobbes, Marz, NIetzsche and Baudrillard, in Ronnie Lipschutz
(ed.), On Security, Columbia University Press, New York, 1995.
Dillon, Michael, Politics of Security: Towards a Political Philosophy of Continental Thought, Routledge,
1996.
Dillon, Michael G., Global Security in the 21st Century: Circulation, Complexity and Contingency, October
2005. http://www.chathamhouse.org.uk/files/3281_bpsecurity2.pdf.
Dillon, Michael, and Andrew W. Neal, eds., Foucault on Politics, Security and War, Palgrave Macmillan,
New York, 2011.

166
Dixon, Simon, Scott McDonald, and Jennifer Roberts, The Impact of HIV and AIDS on Africas Economic
Development, BMJ: British Medical Journal, Vol. 324, No. 7331, January 26, 2002, pp. 232234.
Druckman, Daniel, Determinants of Compromising Behaviour in Negotiation: A Meta-Analysis, 1994, pp.
507556.
Douyle, M., Kant, Liberal Legacies, and Foreign Affairs, Philosophy and Public Affairs, 12, 1983, pp 205-
253; 323-353.
Ellin, Nan, Fear and City Building, Hedgehog Review, Fall 2003.
Enemark, Christian, Is Pandemic Flu a Security Threat?, Survival, Vol. 51, No. 1, 2009, pp. 191214.
Eriksson, Johan, and Giampiero Giacomello, The Information Revolution, Security, and International
Relations: (IR)relevant Theory?, International Political Science Review, Vol. 27, No. 3, July 1, 2006,
pp. 221244.
Freedman, Lawrence, Strategic Coercion, in Lawrence Freedman (ed.), Oxford University Press, USA,
1998.
, Strategic Coercion: Concepts and Cases, Oxford University Press, USA, 1998.
, The Evolution of Nuclear Strategy, Third Edition, 3rd ed., Palgrave Macmillan, 2003.
Frerks, Georg, and Kees Homan, Human Security: A Launching Pad for Debate and Policy?, Security and
Human Rights, Vol. 19, No. 1, January 1, 2008, pp. 17.
Fried, Yitzhak, and Linda Haynes Slowik, Enriching Goal-Setting Theory with Time: An Integrated
Approach, July 1, 2004, pp. 404422.
Fuentes, Claudio, and Franciso Rojas Aravena, Promoting Human Security: Ethical, Normative and
Educational Frameworks in the Caribbean, SHS/FPH/UNESCO, Paris, 2005.
http://unesdoc.unesco.org/images/0013/001389/138940e.pdf.
Grtner, Heinz, Adrian G. V. Hyde-Price, and Erich Reiter, Europes New Security Challenges, Lynne Rienner
Publishers, 2001.
Geers, Kenneth, Strategic Cyber Security, NATO Cooperative Cyber Defence Centre of Excellence, CCD COE
Publication, Tallinn, n.d. https://media.defcon.org/dc-19/presentations/Geers/DEFCON-19-Geers-
Strategic-Cyber-Security-WP.pdf.
George, Alexander L., Introduction: The Limits of Coercive Diplomacy, in Alexander L George and William
E Simons (eds.), 2nd ed., Westview Press, 1994.
Gillath, Omri, and Joshua Hart, The Effects of Psychological Security and Insecurity on Political Attitudes
and Leadership Preferences, European Journal of Social Psychology, Vol. 40, No. 1, February 2010,
pp. 122134.
Gillath, Omri, Phillip R. Shaver, Mario Mikulincer, Rachel E. Nitzberg, Ayelet Erez, and Marinus H. Van
Ijzendoorn, Attachment, Caregiving, and Volunteering: Placing Volunteerism in an Attachment-
Theoretical Framework, Personal Relationships, Vol. 12, No. 4, December 2005, pp. 425446.
Glen, Carol M., The United Nations Charter System and the Iraq Wars, Public Integrity, Vol. 11, No. 4, Fall
2009, pp. 309326.
Gneezy, Uri, Ernan Haruvy, and Alvin E Roth, Bargaining Under a Deadline: Evidence from the Reverse
Ultimatum Game, Games and Economic Behavior, Elsevier, 2003.
http://ideas.repec.org/a/eee/gamebe/v45y2003i2p347-368.html.
Goldewijk, Berma K., Why Human? The Interlinkages Between Security, Rights and Development,
Security & Human Rights, Vol. 19, No. 1, January 2008, pp. 2436.
Gomiero, Tiziano, David Pimentel, and Maurizio G. Paoletti, Is There a Need for a More Sustainable
Agriculture?, Critical Reviews in Plant Sciences, Vol. 30, No. 1/2, April 2011, pp. 623.
Goucha, Moufida, and John Crowley, Rethinking Human Security, Wiley-Blackwell/UNESCO, Oxford, 2008.
Greig, J. Michael, and Paul F. Diehl, Softening up: Making Conflicts More Amenable to Diplomacy, in
Jacob Bercovitch and Scott Sigmund Gartner (eds.), Taylor & Francis, 2008.
Grey, David, and Claudia W. Sadoff, Sink or Swim? Water Security for Growth and Development, Water
Policy, Vol. 9, No. 6, November 2007, pp. 545571.
Grieco, Joseph M., Anarchy and the Limits of Cooperation: A Realist Critique of the Newest Liberal
Institutionalism, International Organization, Vol. 42, No. 03, 1988, pp. 485507.

167
Grieco, Joseph, Robert Powell, and Duncan Snidal, The Relative-Gains Problem for International
Cooperation, American Political Science Review, Vol. 87, No. 3, 1993, pp. 727743.
Gth, Werner, M. Vittoria Levati, and Boris Maciejovsky, Deadline Effects in Sequential Bargaining - An
Experimental Study, June 2005, pp. 117135.
Guthrie, JoanneNewman, USDA School Meal Programs Face New Challenges, Choices: The Magazine of
Food, Farm & Resource Issues, Vol. 24, No. 3, Quarter 2009, p. 36.
Haass, Mr. Richard N., Conflicts Unending: The United States and Regional Disputes, Yale University Press,
1990.
Haidar, Ali, and Keri Spooner, Community Not the Councillors: A Study of Commitment of Australian
Senior Council Officers Working Under a Politicised Employment Relationship, Australian Journal of
Public Administration, Vol. 68, No. 2, June 2009, pp. 139151.
Haimes, Yacov Y., On the Definition of Resilience in Systems, Risk Analysis, Vol. 29, No. 4, March 18,
2009, pp. 498501.
Haimes, Yacov Y., Kenneth Crowther, and Barry M. Horowitz, Homeland Security Preparedness: Balancing
Protection with Resilience in Emergent Systems, Systems Engineering, Vol. 11, No. 4, June 16, 2008,
pp. 287308.
Haque, M. Shamsul, Environmental Security in East Asia: A Critical View, Journal of Strategic Studies, Vol.
24, No. 4, December 2001, p. 203.
Hardy, K., WMDs: Cyber-Attacks Against Infrastructure in Domestic Anti-Terror Laws, Computer Law and
Security Review, Vol. 27, 2011.
Heathers, Glen, The Adjustment of Two Year-Olds in a Novel Social Situation, Child Development, Vol. 25,
No. 2, June 1954, pp. 147158.
Helfat, Jonathan N., Legal Notes, Secured Lender, Vol. 63, No. 4, 2007, p. 85.
Hemmeter, Jeffrey, Health-Related Unmet Needs of Supplemental Security Income Youth After the Age-
18 Redetermination, Health Services Research, Vol. 46, No. 4, 2011, pp. 12241242.
Hobbes, Thomas, Hobbes: Leviathan: Revised Student Edition, Rev Stu., Cambridge University Press, 1996.
Hofstraat, H., Innovation in Active and Healthy Ageing: Empowering and Engaging People, Philips
Research, 2010. http://ec.europa.eu/research/innovation-union/pdf/active-healthy-ageing/event-
2010/hofstraat.pdf.
Holling, C.S., Engineering Resilience Versus Ecological Resilience, in Lance H. Gunderson, Craig Reece
Allen, and C.S. Holling (eds.), Foundations of Ecological Resilience, Island Press, 2009.
Horowitz, Michael, Rose McDermott, and Allan C. Stam, Leader Age, Regime Type, and Violent
International Relations, October 2005, pp. 661 685.
Huysmans, Jef, Security! What Do You Mean? From Concept to Thick Signifier, European Journal of
International Relations, Vol. 4, No. 2, June 1, 1998, pp. 226255.
, The Politics of Insecurity: Fear, Migration and Asylum in the EU, 1st ed., Routledge, 2006.
Hyde-Price, Adrian, Beware the Jabberwork!: Security Studies in the Twenty-First Century, Europes New
Security Challenges, 2001.
Idis, W., Health Security as a Public Health Concept: A Critical Analysis, Gerencia y Polticas De Salud, Vol.
8, No. 17, 2009. http://redalyc.uaemex.mx/redalyc/pdf/545/54514009002.pdf.
International Labour Organisation, Facts on Social Security, n.d.
http://www.ilo.org/wcmsp5/groups/public/---dgreports/---
dcomm/documents/publication/wcms_067588.pdf.
Jakobsen, Peter Viggo, Western Use of Coercive Diplomacy After the Cold War: A Challenge for Theory and
Practice, Palgrave Macmillan, 1998.
Jervis, Robert, System Effects, Princeton University Press, 1998.
Johnson, M. Eric, Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the
Financial Supply Chain, Journal of Management Information Systems, Vol. 25, No. 2, Fall 2008, pp.
97123.
Kahneman, Daniel, Maps of Bounded Rationality: Psychology for Behavioural Economics, December 1,
2003, pp. 14491475.

168
Kahneman, Daniel, and Amos Tversky, Prospect Theory: An Analysis of Decision Under Risk, March 1979,
pp. 263291.
Kamradt-Scott, Adam, Changing Perceptions: Of Pandemic Influenza and Public Health Responses,
American Journal of Public Health, Vol. 102, No. 1, January 2012, pp. 9098.
Karpman, B., Insecurity in Search of Security, American Journal of Psychotherapy, Vol. 50, No. 4, 1996.
Kaufmann, F.X., Sicherheit Als Soziologisches Und Sozialpolitisches Problem, Ferdinand Enke Verlag
Stuttgart, Stuttgart, 1973.
, Sicherheit: Das Leitbild Beherrschbarer Komplexitaet, in Stephan Lessenich (ed.),
Wohlfahrtsstaatliche Grundbegriffe: Historische Und Aktuelle Diskurse, Frankfurt/NY: Campus Verlag,
Frankfurt, 2003.
Keller, Peggy, and Mona El-Sheikh, Childrens Emotional Security and Sleep: Longitudinal Relations and
Directions of Effects, Journal of Child Psychology & Psychiatry, Vol. 52, No. 1, 2011, pp. 6471.
King, Gary, and Christopher J. L. Murray, Rethinking Human Security, Political Science Quarterly, Vol.
116, No. 4, Winter 2001, p. 585.
Keohaene, R. and Nye, J.S., Power and Interdependence. World Politics in Transition. Boston:
Little/Brown, 1977.
Kinnvall, Catarina, Globalization and Religious Nationalism: Self, Identity, and the Search for Ontological
Security, Political Psychology, Vol. 25, No. 5, October 2004, pp. 741767.
Kins, Evie, Bart Soenens, and Wim Beyers, Why Do They Have to Grow Up So Fast? Parental Separation
Anxiety and Emerging Adults Pathology of Separation-Individuation, Journal of Clinical Psychology,
Vol. 67, No. 7, July 2011, pp. 647664.
Kleiboer, Marieke, and Paul t Hart, Time to Talk?, December 1, 1995, pp. 307 348.
Krahmann, Elke, Conceptualizing Security Governance, Cooperation and Conflict, Vol. 38, No. 1, March 1,
2003, pp. 526.
, From State to Non-State Actors: The Emergence of Security Governance, New Threats and New
Actors in International Security, Palgrave, 2005.
http://eis.bris.ac.uk/~poxek/New%20Threats%20Chap1.pdf.
Krause, Keith, Critical Theory and Security Studies, Cooperation and Conflict, Vol. 33, No. 3, 1998, pp.
298333.
Krause, Keith, and Michael Williams, eds., Critical Security Studies: Concepts and Cases, University Of
Minnesota Press, 1997.
Krause, Keith, and Michael C. Williams, Broadening the Agenda of Security Studies: Politics and Methods,
Mershon International Studies Review, Vol. 40, No. 2, 1996, pp. 229254.
Kriesberg, Louis, and Stuart J. Thorson, Timing the De-escalation of International Conflicts, Syracuse
University Press, 1991.
Lake, David A., and Robert Powell, Strategic Choice and International Relations, Princeton University Press,
1999.
Lansford, Tom, Jack Covarrubias, Brian Carriere, and Justin Miller, Fostering Community Resilience,
Ashgate, 2010.
Levy, Jack S., Prospect Theory, Rational Choice, and International Relations, March 1997, pp. 87112.
Light, Jennifer S., Urban Planning and Defence Planning, Past and Future, Journal of the American
Planning Association, Vol. 70, No. 4, 2004, pp. 399410.
Lim, Stephen Ghee-Soon, and J. Keith Murnighan, Phases, Deadlines, and the Bargaining Process,
Organizational Behavior and Human Decision Processes, 1994, pp. 153171.
Lipson, Charles, International Cooperation in Economic and Security Affairs, October 1984, pp. 123.
Lloyd, Richmond M., The Shield and the Cloak: The Security of the Commons, Naval War College Review,
Vol. 59, No. 4, 2006, pp. 141142.
Locke, Edwin A., Gary P. Latham, Ken J. Smith, and Robert E. Wood, A Theory of Goal Setting & Task
Performance, Prentice Hall College Div, 1990.
Loewenstein, George, and J. Elster, eds., Choice over Time, 1st ed., Russell Sage Foundation, 1992.
Longstaff, P.H., Building Resilient Communities: a Preliminary Framework for Assessment, Homeland
Security Affairs, Vol. 6, No. 3, 2010.

169
Luciani, Giacomo, The Economic Content of Security, Journal of Public Policy, Vol. 8, No. 02, 1988, pp.
151173.
MacArthur, Julie, A Responsibility to Rethink? Challenging Paradigms in Human Security, International
Journal, Vol. 63, August 2007.
MacFarlane, S. Neil, and Thomas Weiss, The United Nations, Regional Organisations and Human Security:
Building Theory in Central America, Third World Quarterly, Vol. 15, No. 2, June 1994, p. 277.
MacLean, George A., Human Security and the Globalization of International Security, Whitehead J. Dipl.
& Intl Rel, Vol. 7, 2006.
Martin, Lauren, and Stephanie Simon, A Formula for Disaster: The Department of Homeland Securitys
Virtual Ontology, Space & Polity, Vol. 12, No. 3, December 2008, pp. 281296.
Mastanduno, M., Do Relative Gains Matter? Americas Response to Japanese Industrial Policy,
International Security, Vol. 16, No. 1, 1991.
Matsuo, M., Whither Peace Studies? Fragmentation to a New Integration?, Journal of International
Development and Cooperation, Vol. 7, No. 2, 2001.
Matwyshyn, Andrea, CSR and the Corporate Cyborg: Ethical Corporate Information Security Practices,
Journal of Business Ethics, Vol. 88, 2009, pp. 579594.
Mauldin, Elaine, and Vairam Arunachalam, An Experimental Examination of Alternative Forms of Web
Assurance for Business-to-Consumer e-Commerce, Journal of Information Systems, Vol. 16, No. 1,
2002, pp. 3354.
Maule, A. John, and Robert J. Hockey, State, Stress and Time Pressure, in A. John Maule and Ola Svenson
(eds.), Springer, 1993.
Mayer, Matthew J.Leone, School Violence and Disruption Revisited: Equity and Safety in the School
House, Focus on Exceptional Children, Vol. 40, No. 1, 2007, p. 1.
McDonald, M., Constructivism, in Paul D. Williams (ed.), Security Studies: An Introduction, Routledge,
New York, 2008.
McSweeney, B., Security, Identity and Interests: a Sociology of International Relations, Vol. 69, Vol. 69,
Cambridge University Press, Cambridge, 1999.
Menahem, Georges, The Decommodified Security Ratio: A Tool for Assessing European Social Protection
Systems, International Social Security Review, Vol. 60, No. 4, December 2007, pp. 69103.
Mesjasz, C., Security as an Analytical Concept, 5th Pan-European Conference on International Relations,
in The Hague, 2004.
Mikulincer, Mario, and Phillip R. Shaver, Boosting Attachment Security to Promote Mental Health,
Prosocial Values, and Inter-Group Tolerance, Psychological Inquiry, Vol. 18, No. 3, July 2007, pp.
139156.
Mitchell, G.R., Public Argument-Driven Security Studies, Argumentation & Advocacy, Vol. 39, 2004.
Mobjrk, Malin, Mikael Eriksson, and Henrik Carlsen, On Connecting Climate Change with Security and
Armed Conflict. Investigating Knowledge from the Scientific Community, FOI Swedish Defence
Agency, Stockholm, 2010.
Moore, Melinda, and Gary Cecchine, Infectious Disease and National Security: Strategic Information Needs,
1st ed., Rand Publishing, 2006.
Nojeim, Gregory T., Cyber security and Freedom on the Internet, Journal of National Security Law &
Policy, Vol. 4, 2010.
Nyanchama, Matunda, and Paul Sop, Enterprise Security Management: Managing Complexity,
Information Systems Security, Vol. 9, No. 6, February 2001, p. 37.
Nye, Joseph S., The Future of Power, Reprint., Public Affairs, 2011.
Oberleitner, Gerd, Human Security: A Challenge to International Law?, Library, Vol. 11, No. 2, 2005, pp.
185203.
Oquist, Paul, Basic Elements of a Policy Framework for Human Security, International Social Science
Journal, Vol. 59, No. 193, 2008, pp. 101112.
Orr, David W., The Events of 9-11: a View from the Margin, Conservation Biology, Vol. 16, No. 2, April
2002, pp. 288290.

170
Osipian, Ararat L., Corruption and Coercion: University Autonomy Versus State Control, European
Education, Vol. 40, No. 3, Fall 2008, pp. 2748.
stby, Gudrun, and Henrik Urdal, Education and Conflict: What Evidence Says, CSCW Policy Brief, No. 2,
2011.
Paltridge, Toby, Susan Mayson, and Jan Schapper, The Contribution of University Accommodation to
International Student Security, Journal of Higher Education Policy & Management, Vol. 32, No. 4,
2010, pp. 353364.
Paulson, Julia, Education, Conflict and Development, Symposium Books, 2011.
Paulson, Julia, and Jeremy Rappleye, Education and Conflict: Essay Review, International Journal of
Educational Development, Vol. 27, No. 3, 2007, pp. 26522657.
Pease-Watkin, C., A Note on Annotating Bentham, Notes and Queries, Vol. 51, No. 2, June 1, 2004, pp.
128130.
Peissl, Walter, Surveillance and Security - A Dodgy Relationship, SSRN eLibrary, January 2002.
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=475522.
Pieris, R, Ideological Momentum and Social Equilibrium, American Journal of Sociology, Vol. 57, 1952,
pp. 339346.
Pierson, Paul, Big, Slow Moving, and Invisible: Macro-Social Processes in the Study of Comparative
Politics, in James Mahoney and Dietrich Rueschemeyer (eds.), Cambridge University Press, 2003.
, Politics in Time: History, Institutions, and Social Analysis, Princeton University Press, 2004.
Pogge, T., Global Justice. Malden: Blackwell 2001.
Powell, R., Absolute and Relative Gains in International Relations Theory, The American Political Science
Review, 1991.
Regan, Patrick M., and Allan C. Stam, In the Nick of Time: Conflict Management, Mediation Timing, and
the Duration of Interstate Disputes, June 1, 2000, pp. 239260.
Rincon, David, and Christina Cano, Mitigation of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin
America Transactions, IEEE (Revista IEEE America Latina), Vol. 5, No. 3, 2007.
Roelofs, Jeffrey, Cor Meesters, and Peter Muris, Correlates of Self-reported Attachment (In)security in
Children: The Role of Parental Romantic Attachment Status and Rearing Behaviours, Journal of Child
& Family Studies, Vol. 17, No. 4, 2008, pp. 555566.
Rolfe, Jim, Regional Security for the Asia-Pacific: Ends and Means, Contemporary Southeast Asia: A
Journal of International & Strategic Affairs, Vol. 30, No. 1, April 2008, pp. 99117.
Rosen, Stephen Peter, War and Human Nature, 1st ed., Princeton University Press, 2007.
Roth, Alvin E, J Keith Murnighan, and Francoise Schoumaker, The Deadline Effect in Bargaining: Some
Experimental Evidence, 1988, pp. 80623.
Rothschild, Emma, What Is Security?, Daedalus, Vol. 124, No. 3, 1995.
Ryan, Richard M., and John H. Lynch, Emotional Autonomy Versus Detachment: Revisiting the Vicissitudes
of Adolescence and Young Adulthood., Child Development, Vol. 60, No. 2, 1989, pp. 34056.
Sassen, Saskia, Spatialities and Temporalities of the Global: Elements for a Theorization, Public Culture,
Vol. 12, No. 1, 2000, pp. 215232.
Schedler, Andreas, and Javier Santiso, Democracy and Time: An Invitation, January 1998, pp. 518.
Schelling, Prof. Thomas C., Arms and Influence: With a New Preface and Afterword, Yale University Press,
2008.
Schmid, M., The Concept of Comprehensive Security: A Distinctive Feature of a Shared Security Culture in
Europe, DTIC Document, 2007.
Schoch-Spana, Monica, Community Resilience: Beyond Wishful Thinking, Center for Biosecurity, 2011.
http://www.upmc-biosecurity.org/website/resources/publications/2011/2011-09-08-community-
resilience-beyond-wishful-thinking.html.
Schoch-Spana, Monica, Brooke Courtney, Crystal Franco, Ann Norwood, and Jennifer B. Nuzzo,
Community Resilience Roundtable on the Implementation of Homeland Security Presidential
Directive 21 (HSPD-21), Biosecurity and Bioterrorism: Biodefence Strategy, Practice, and Science, Vol.
6, No. 3, 2008, pp. 269278.

171
Sharma, A., Cyber Wars, in C. Czosseck and Kenneth Geers (eds.), The Virtual Battlefield: Perspectives on
Cyber Warfare,, Cryptology and Information Security Series, IOS Press, Amsterdam, 2009.
Sharp, Walter G., The Past, Present, and Future of Cyber security, Journal of National Security Law &
Policy, Vol. 4, 2010.
Sheldon, Kennon M., and Tim Kasser, Psychological Threat and Extrinsic Goal Striving, Motivation &
Emotion, Vol. 32, No. 1, March 2008, pp. 3745.
Shropshire, Jordan D., and Merrill Warkentin, Impact of Negative Message Framing on Security
Adoption, Journal of Computer Information Systems, Vol. 51, No. 1, 2010.
http://www.docstoc.com/docs/68847211/IMPACT-OF-NEGATIVE-MESSAGE-FRAMING-ON-SECURITY-
ADOPTION.
Sidel, Mark, The Third Sector, Human Security, and Anti-Terrorism: The United States and Beyond,
Voluntas: International Journal of Voluntary & Non-profit Organizations, Vol. 17, No. 3, 2006, pp.
199210.
Smith, Andrew E, Machine Mapping of Document Collections: The Leximancer System, 2000.
Smith, Andrew E, and Michael S Humphreys, Evaluation of Unsupervised Semantic Mapping of Natural
Language with Leximancer Concept Mapping, Behaviour Research Methods, Vol. 38, No. 2, May
2006, pp. 262279.
Smith, Andrew E., Key Centre, and Human Factors, Automatic Extraction of Semantic Networks from Text
Using Leximancer, Proceedings of HLT-NAACL, 2003, pp. 2324.
Smith, Martin A., and Grahem Timmins, The EU, NATO, and the Extension of Institutional Order in
Europe, World Affairs, Vol. 163, No. 2, Fall 2000, p. 80.
Smith, Robert E., Land Tenure Reform in Africa: a Shift to the Defensive, Progress in Development
Studies, Vol. 3, No. 3, July 2003, pp. 210222.
Spector, Bertrami I., and Amanda Wolf, Negotiating Security: New Goals, Changed Process, International
Negotiation, Vol. 5, No. 3, 2000, pp. 411426.
Steigman, K., The Literal American: Rereading Graham Greene in an Age of Security, West Chester
University, West Chester, 2012.
Streich, Philip, and Jack S. Levy, Time Horizons, Discounting, and Intertemporal Choice, April 2007, pp.
199 226.
Sunstein, Cass R., Review: Hazardous Heuristics, April 1, 2003, pp. 751782.
Tellmann, U., Imagining Catastrophe: Scenario Planning and the Striving for Epistemic Security, Economic
Sociology, Vol. 10, No. 2, 2009.
Terriff, Terry, Stuart Croft, Lucy James, and Patrick Morgan, Security Studies Today, 1st ed., Polity, 1999.
Tetlock, Philip E., and Barbara A. Mellers, Review: The Great Rationality Debate, January 1, 2002, pp. 94
99.
Tikk, E., Global Cyber Security: Thinking About the Niche for NATO, The SAIS Review of International
Affairs, 2010.
Tversky, Amos, and Daniel Kahneman, Judgment Under Uncertainty: Heuristics and Biases, New Series,
1974, pp. 11241131.
, Loss Aversion in Riskless Choice: A Reference-Dependent Model, November 1, 1991, pp. 1039
1061.
, Rational Choice and the Framing of Decisions, October 1986, pp. S251S278.
, The Framing of Decisions and the Psychology of Choice, New Series, January 30, 1981, pp. 453
458.
Ullman, R.H., Redefining Security, International Security, Vol. 8, No. 1, Summer 1983.
United Nations, In Larger Freedom: Towards Security, Development and Human Rights for All, Report of
the Secretary-General of the United Nations for Decision by Heads of State and Government, 2005.
United Nations Development Programme (UNDP), Human Development Report: New Dimensions of
Human Security, 1994.
Vaisanen, R., I. Kraav, and P. Niemela, Insecurity Related to Working Life by Age Groups in Finland and
Estonia in the 1990s, International Journal of Social Welfare, Vol. 9, No. 3, July 2000, p. 158.
Valasek, K., Gender and Security Sector Reforms: An Analytical Framework, UN-INSTRAW, 2007.

172
Vassilios, Grammatikas, EU Counter-Terrorist Policies: Security Vs. Human Rights?, EC-HUMSEC, 2007.
Vicedo, Marga, Mothers, Machines, and Morals: Harry Harlows Work on Primate Love from Lab to
Legend, Journal of the History of the Behavioural Sciences, Vol. 45, No. 3, Summer 2009, pp. 193
218.
Waever, O.,Societal Security. The concept. In: Weaver, O./ Buzan, B./ Kelstrup, M./ Lemaitre, P. (eds):
Identity, Migration and the new security agenda in Europe. London: Pinter, 1993, pp. 17-40.
Waever, Ole, Concepts of Security, Institute of Political Science, University of Copenhagen, Copenhagen,
1997.
, Identiy, Migration and the New Security Agenda in Europe, Pinter, London, 1993.
, Peace and Security: Two Concepts and Their Relationship, in Stefano Guzzini and Dietrich Jung
(eds.), Contemporary Security Analysis and Copenhagen Peace Research, Routledge, New York, 2004.
, Politics, Security, Theory, Security Dialogue, Vol. 42, No. 45, 2011.
, Securitisation and Desecuritization, in Ronnie Lipschutz (ed.), On Security, Columbia University
Press, New York, 1995.
Walker, Jeremy, and Melinda Cooper, Genealogies of Resilience from Systems Ecology to the Political
Economy of Crisis Adaption, Security Dialogue, Vol. 42, No. 2, 2011.
Waltz, Kenneth, Theory of International Politics, 1st ed., McGraw-Hill, 1979.
Waters, Everett, and E. Mark Cummings, A Secure Base from Which To Explore Close Relationships.,
Child Development, Vol. 71, No. 1, 2000, pp. 16472.
Weiss, Moritz, and Simon Dalferth, Security Re-Divided: The Distinctiveness of Policy-Making in ESDP and
JHA, Cooperation and Conflict, Vol. 44, No. 3, 2009, pp. 268287.
Wing, Ian, Refocusing Concepts of Security: The Convergence of Military and Non-Military Tasks, Land
Warfare Studies Centre, 2000.
Wittmann, Marc, and Martin P. Paulus, Decision Making, Impulsivity and Time Perception, January 2008,
pp. 712.
, Temporal Horizons in Decision Making, 2009, pp. 111.
Wolfendale, Jessica, Terrorism, Security and the Threat of Counterterrorism, Studies in Conflict &
Terrorism, 2007.
Wolfers, Arnold, National Security as an Ambiguous Symbol, Publications Oboulo.com, September 29,
2010. http://en.oboulo.com/national-security-as-an-ambiguous-symbol-by-arnold-wolfers-
71738.html.
Yeonjung Lee, Work Incentive and Labour Force Participation After the Senior Citizens Freedom to Work
Act of 2000, Journal of Human Behaviour in the Social Environment, Vol. 20, No. 6, 2010, pp. 778
790.
Zakay, Dan, and Dida Fleisig, The Time Factor as a Barrier to Resolution of the Israeli-Palestinian Conflict,
in Ola Svenson and A. John Maule (eds.), Springer, 1993.
Zartman, I. William, Ripe for Resolution: Conflict and Intervention in Africa, Oxford University Press, 1985.
Zedner, Lucia, Security, Routledge, 2009.
Zellner, Wolfgang, Addressing Transnational Threats and Risks: a Key Challenge for the OSCE, Helsinki
Monitor, Vol. 16, 2005.
Proverbs 3:29, Holy Bible: Kind James Version, n.d. http://www.bibliacatolica.com.br/07/24/3.php.
The Economic Impact of Cancer, The American Cancer Society, n.d.
http://www.cancer.org/Cancer/CancerBasics/economic-impact-of-cancer.

5.5 Other publications


EUBusiness, EU proposal for a new policy package on chemical, biological, radiological and nuclear (CBRN)
security briefing, 24 June 2009, http://www.eubusiness.com/topics/defence/cbrn-security.
Montanaro, L., Schnemann, J., Walk the Talk: The EU needs an effective early warning system to match
its ambitions to prevent conflict and promote peace, Initiative for Peacebuilding: Early Warning,
Fride, International Alert, 2011, www.ipf-ew.eu/pdfwalkthetalk.pdf.

173
6 Annexes
6.1 Annex 1 Meta-Analysis of the Policy Documents
The types of policy documents selected are national security strategies and national defence
strategies. They are indeed most likely to be found in all selected countries. The date of publication
of the selected documents must enable a comparison of the evolution of the individual countrys
policy documents and facilitate countries. For this reason, the selected documents should cover
several time periods in which we distinguish between the 1990s and the 2000s. However, for some
countries such as Sweden or Ukraine, documents published in the nineties were not available.

6.1.1 France - Selected documents (2):

Prsidence de la Rpublique Franaise, White Paper on Defence and National Security (full
version and summary), 2008 (332 pages, official translation).
Prsidence de la Rpublique Franaise, White Paper on Defence - Livre Blanc sur la Dfense,
Part 1+2, 1994 (178 pages; unofficial translation used for Leximancer, original text used for
the analysis)
Downloaded from the Military Education Research Library Network (MERLN)1
2008 White Paper: focuses on defence and security
1994 White Paper: focused primarily on defence policy.

Both key French documents (the White Papers) were triggered mostly by domestic political events:
the cohabitation of a socialist president with a conservative prime-minister (Balladur) in the final
years of President Mitterrand, and the election of Nicolas Sarkozy in 2007. But they also coincided
with important changes in international security: the 1994 White Paper (the first in 22 years) was
written in the new post-Cold War context, whereas the 2008 White Paper was prepared in an
entirely different security context. As a result, their perspectives as to identifying both threats can
jeopardise national security and options for dealing with those differ. The 2008 White Paper was
published simultaneously to other European attempts to define national security strategies, including
the UK, Germany, and the Netherlands. France has been developing long-term visions and strategies
for defence policies since 1972 with the publication of the first White Paper. The French national
security strategy of 2008 gained a more prominent role. Indeed, the White Paper was then prefaced
by the President of the French Republic Nicolas Sarkozy, while similar documents previously
published used to be prefaced by the Prime Minister, as well as the Ministry of defence in 1994. This
reflects the presidential nature of the French Constitution (although, at the same time, Parliament
was also much more involved in the 2008 paper than in the 1994 version). Some also see the
publication of the 2008 White Paper as the metamorphosis of French strategic thinking and the
renaissance of its international role. One reason is that the document marks Frances reintegration
into the North Atlantic Treaty Organisation (hereinafter: NATO).

174
6.1.2 Italy - Selected documents (4):

Il Ministero degli Affari Esteri, Report 2020, Foreign Policy Choices: Le scelte di politica
estera, 2008 (104 pages; original language. First publication of the Strategic Reflection
group part of the Italian Foreign Ministry). Retrieved from Google.
Ministero della Difesa, Strategic Concept, 2005 (93 pages; original language. Regular
publication from the Italian Defence Ministry). Retrieved from the MERLN database.
Ministero della Difesa, Strategic Concept, 2004 (22 pages; unofficial translated. Regular
publication from the Italian Defence Ministry). Retrieved from the MERLN database.
Presidenza del Consiglia Dei Ministri, Law on the creation of the Italian National Civil
Protection Authority, 1992 (15 pages; original language. Special document by the Italian
Government establishing the Italian National Civil Protection Authority and its
responsabilities). Retrieved from Google.

Italy does not have a national security strategy in the strict sense of the word. However, Italy has
developed multilateral, bilateral and national strategies dealing with security threats. These
strategies and long-term interventions are decided by the Parliament, sometimes through special
laws. Permanent or temporary parliamentary commissions are in charged with either general or
specific problems in security or safety. This parliamentary involvement implies some political
bargaining. However, this bargaining has not modified the overall attitude of the Italian government
to largely follow the international security strategies agreed upon by the European Union
(hereinafter: EU), the United Nations (hereinafter: UN), and NATO.

6.1.3 Sweden - Selected documents (7):

Swedish Ministry of Defence, A Usable and Accessible Defence Force The Policys
Orientation, 2009 (9 pages)
Swedish Ministry of Defence, A More Secure Neighbourhood Insecure World, 2003 (19
pages)
Swedish Ministry of Defence, Our Military Defence - Commitment and Choices, Ds 2003:34
(summary), 2003 (11 pages)
Government Offices of Sweden, Our Future Defence The Focus of Swedish Defence Policy
20052007 (summary), 2004 (37 pages); Swedish government bill 2004/05:5
Swedish Ministry of Defence, A strategy for Sweden's security summary, 2006 (4 pages)
Swedish Ministry of Defence, Cooperation in Crisis for a more Secure Society, 2006 (33
pages); Government Bill 2005/06:133
Swedish Civil Contingencies Agency (MSB),
Emergency Response Management in Todays Complex Society, 2010 (317 pages)
Swedish Ministry of Defence, Defence in Use, Ds 2008:48 (summary), 2008 (6 pages)

All selected Swedish documents were published during the 21st century (between 2003 and 2010), all
of them after 9/11. The short time-span could explain the relatively small variations of the definition,
dimension and source of security between the documents. The documents are of different nature,

175
making it difficult to make comparisons of the definition, dimension and sources of (in)security over
time.

6.1.4 The Netherlands - Selected documents (7):

Dutch Ministry of Defence, Future Policy Survey (Verkenningen), 2008 (English summary - 40
pages - and full version (unofficial translation, from Dutch to English) - 210 pages)
Dutch Ministry of the Interior and Kingdom Relations, National Security: Strategy and Work
Programme 2007 - 2008, 2007 (52 pages)
Dutch Ministry of Defence, National Defence Doctrine, 2005 (125 pages)
Dutch Cabinet, Policy Plan for Crisis Management (Beleidsplan Crisisbeheersing 2004-2007),
2004 (55 pages)
Dutch Ministry of Defence, Prinsjesdagbrief, 2003 (47 pages)
Dutch Ministry of Defence, White Paper on Defence, 2000 (English summary, 24 pages)
Dutch Ministry of Defence, Defence Priority Review (Hoofdlijnennotitie), 1993 (English
summary, 7 pages).
Contrary toDefence Priority-Review
- for instance (Hoofdlijnennotitie),
the French documents, which 1993 (English
offer a moresummary, 7 pages).
comprehensive, long-term
oriented vision, most Dutch policy documents of the 1990s were departmental, which - in the case of
national security meant driven by the Ministry of Defence and focusing on deriving capabilities, and
specific goals such as the improvement of the armed forces. This changed in the 2000s when the
Netherlands formulated and implemented Europes first genuinely whole-of-govermnent national
security strategy, launching a government wide security-related horizon scanning and risk
assessment exercise which subsequently feeds into to comprehensive capabilities planning process.
It is interesting to note that the 2004 Policy Plan for Crisis Management was published following
incidents like the attacks of September 11, 2001 and subsequent actions, the war in Iraq, the threat
of smallpox as a result of bioterrorism, the outbreak of avian flu and the SARS epidemic, power
failures and ICT incidents.

176
6.1.5 United Kingdom - Selected documents (12):

UK Ministry of Defence, Defence Reform, 2011 (81 pages)


UK Ministry of Defence, The Strategy for Defence, 2011 (8 pages)
UK Homeland Government, A Strong Britain in an Age of Uncertainty: The National Security
Strategy, 2010 (38 pages)
UK Homeland Government, Securing Britain in an Age of Uncertainty: The Strategic Defence
and Security Review, 2010 (77 pages)
UK Cabinet Office, The National Security Strategy of the UK: Security in an Interdependent
World, 2008 (61 pages)
UK Ministry of Defence, Defence Industrial Strategy - Defence White Paper, 2005 (145
pages)
UK Ministry of Defence, Delivering Security in a Changing World: Future Capabilities, 2004
(145 pages)
UK Ministry of Defence, Delivering Security in a Changing World: Defence White Paper,
2003 (28 pages)
UK Ministry of Defence, Defence Diplomacy, 2001 (22 pages)
UK Ministry of Defence, European Defence, 2001 (20 pages)
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World,
1998 (390 pages)
UK Cabinet Office, National Risk Register for Civil Emergencies, 2012 (55 pages)
All documents were retrieved from the MERLN database with the exception of the National
Risk Registered that was retrieved from Google.

Also in the UK, the main security-related high-level policy documents came from the Ministry of
Defence. Many of them were driven by internal and external political triggers, but also by financial
ones. In addition, and in relation to security, there has been a constant need to re-modernise the
defence apparatus to match the country leadership aspirations (in order to maintain a
leadership/major power position in the international context) and complex international
environment. The British strategic posture in the world is perceived as one of leadership
accompanied with a moral responsibility to be a force for good.789 This posture is clearly embedded
in the highly developed strategic and liberal tradition that is part of British history. All documents
stress a complex mixture of uncertainty and instability,790 which characterises the present and
future external and internal environment facing the UK as well as a need to prepare for the future as
much as for the present. This has remained a constant in British security policy since the end of Cold
War.

789
UK Ministry of Defence, Strategic Defence Review: Modern Forces for the Modern World, 1998, p. 5.
790
Ibid.

177
6.1.6 Ukraine - Selected documents (9):

National Security and Defence Council of Ukraine, National Security Strategy, 2010 (26
pages, unofficial translation)
Ukrainian Ministry of Defence, White Book 2010: Armed Forces of Ukraine (76 pages)
Ukrainian Ministry of Defence, White Book 2009: Armed Forces of Ukraine (96 pages)
Ukrainian Ministry of Defence, White Book 2008: Defence Policy of Ukraine (100 pages)
Ukrainian Ministry of Defence, National Security Strategy, 2007 (17 pages)
Ukrainian Ministry of Defence, White Book 2007: Defence Policy of Ukraine (120 pages)
Ukrainian Ministry of Defence, White Book 2006: Defence Policy of Ukraine (96 pages)
Ukrainian Ministry of Defence, White Book 2005: Defence Policy of Ukraine (136 pages)
Ukrainian Ministry of Defence, National Strategic Defence Bulletin until 2015, 2004 (95
pages)
This selection does not include policy documents published before 2004.

The scope of both Ukrainian National Security Strategies791 is much broader than that of the selected
military doctrines. Since 1997, Ukrainian policy documents and strategies have become more
Western-oriented and have increasingly focused on integrating European structures and
international co-operation systems. This can be seen as a sign of emancipation from Russia and the
will to avoid a dependence on Russias economy and foreign policy. It can also be explained by the
fact that Ukraine gained self-confidence with regard to its independence, as it received support from
the international community and European institutions. A National Security Strategy was adopted in
1997, reflecting Ukraines efforts to create a national security framework coming from the need to
reconcile a newly acquired independence with the necessity of entering the European system based
on interdependence. Indeed, after the dissolution of the USSR, Ukraine faced difficulties in becoming
an independent actor in international relations. An important objective was to consolidate the
international recognition of Ukraine as a sovereign state. The 2007 National Security Strategy was
written in a post-Orange Revolution context (2004). According to the 2007 National Security
Strategy, the 2004 events catalysed the democratic progress of Ukrainian society and modified
dramatically the perception of Ukraine in the world; the country has obtained new opportunities
for the attainment of its national interests in the changeable and difficult global environment. In the
views of the 2010 National Security Strategy, the 2007 strategy failed to become the effective policy
guidance for state institutions since their practical activity was aimed at achieving short-term political
and economic goals, and requirements to strategic development of the society and state were
ignored. 2010 also marks the adoption of a new posture, as Ukraine removed the integration to
NATO from the security policy agenda, and opted for a neutral status.

791
Ukrainian Ministry of Defence, National Security Strategy, 2007; National Security Strategy, 2010.

178
6.1.7 Russia - Selected documents (4):

Russian Security Council, Military Doctrine, 2010 (unofficial translation, 43 pages)


Russian Security Council, National Security Strategy of the Russian Federation up to 2020,
2009 (unofficial translation, 23 pages)
Russian Ministry of Foreign Affairs, Military Doctrine, 2000 (translated by the U.S. Foreign
Broadcast Information Service (FBIS), 23 pages)
Russian Ministry of Foreign Affairs, National Security Blueprint of the Russian Federation,
1997 (25 pages)
Retrieved from MERLN database, the Arms Control Association, and the Federation of
American Scientists (fas.org).

Russia has a long (and proud) tradition of thinking deeply about security issues dating back to the
Soviet period - and even before. Surprisingly, much was published on these reflections in a variety of
documents, including official doctrinal documents, towards the end of the Soviet Union even in
unclassified form. Since the collapse of the Soviet Union, the Russian Federation has been going
through numerous tumultuous decades in many areas of life, including the military one. Despite
these turbulences, the tradition of thinking about (especially military) security continued, and this
resulted in a number of authoritative policy documents that will be surveyed in this chapter.

179
6.1.8 United States - Selected documents (20):
The documents were mostly collected through the MERLN database.
Homeland Security:
The White House, National Strategy for Homeland Security, 2002 (90 pages)
The White House, National Strategy for Homeland Security, 2007 (62 pages)
US Department of Homeland Security, Quadrennial Homeland Security Review, 2010 (108
pages)
Quadrennial Defence Reviews:
Department of Defence of the United States of America, Quadrennial Defence Review, 2010
(128 pages)
Department of Defence of the United States of America, Quadrennial Defence Review, 2006
(113 pages)
Department of Defence of the United States of America, Quadrennial Defence Review, 2001
(79 pages)
Department of Defence of the United States of America, Quadrennial Defence Review, 1997
(36 pages)
National Military Strategies:
Department of Defence of the United States of America, Joint Chiefs of Staff, National
Military Strategy, 2011 (24 pages)
Department of Defence of the United States of America, Joint Chiefs of Staff, National
Military Strategy to Combat WMD, 2006 (31 pages)
Department of Defence of the United States of America, Joint Chiefs of Staff, National
Military Strategy, 2004 (38 pages)
Department of Defence of the United States of America, Joint Chiefs of Staff, ,National
Military Strategy, 1997 (28 pages)
Department of Defence of the United States of America, Joint Chiefs of Staff, National
Military Strategy, 1995 (30 pages)
National Security Strategies:
The White House, National Security Strategy, 2010 (60 pages)
The White House, National Security Strategy, 2006 (54 pages)
The White House, National Security Strategy, 2002 (35 pages)
The White House, National Security Strategy, 1995 (41 pages)
National Defence Strategies:
Department of Defence of the United States of America, National Defence Strategy, 2008
(29 pages)
Department of Defence of the United States of America, National Defence Strategy, 2005
(24 pages)
Intelligence Strategies:
Secretary of Defence for Intelligence of the United States of America, National Intelligence
Strategy, 2009 (24 pages)
Secretary of Defence for Intelligence of the United States of America, Defence Intelligence
Strategy, 2008 (24 pages)

In the context of the different strategic context of the Cold War, the US redefined its interests and
strategy both at home and abroad. The 1995 National Security Strategy described this as a period of
great promise but also great uncertainty. The document recognised that the end of the Cold War
fundamentally changed Americas security imperatives: the central security challenge of the past half
century - the threat of communist expansion - was gone. The 9/11 attacks on the US shattered this
sense of optimism about a more secure world. The following ten years, US policy on security was

180
defined by the wars on international terrorism. The policy documents developed around a complex
mix of homeland security, globalisation, economics, and American values. Moreover, security policy
was defined by fighting wars in Iraq and Afghanistan for the last eight to ten years, and numerous
other international interventions. The US has a tradition where the executive branch of government
is very explicit on its strategy, epitomised in periodical documents like the national security strategy,
the national military strategy, or the quadrennial defence reviews. Further, these documents clearly
reflect how convictions, ideas, solutions and strategies of the political leaders change over time.

181
182
6.2 Annex 2 Baskets for Automatic Processing
We identified eleven dimensions of security that appear to denote distinct aspects of security: the
economic, educational, environmental, health, human, international law, military, natural resource,
social-political, technology and territorial dimensions.

The entire set of documents was then reprocessed in Leximancer with these new baskets. This
yielded a numerical value for the importance of the various baskets within the various disciplines and
national security documents, but also across them. For reasons of space, these results are available
upon request.

The following dimensions have been defined in order to establish a scoring of the academic
documents through the use of the text-mining software:

Territorial security
Economic security
Technology security
Human security
Physical/health security
Educational security
Environmental security
Natural resource security
Social and political security
International law
Military security
Each dimension groups a number of concepts, which are listed below.

6.2.1 Territorial security


territorial
borders
national
frontiers
migration
surveillance

6.2.2 Economic security


protection
innovation
development
trade
finance
financial
market
industry
poor
poverty

183
wealthy
income
capital
monopoly
competition
financial crisis
economic crisis
standard of living
growth
development
standard of living
capital
competitiveness
sustainability
market
productivity
GDP
welfare
industrialisation
capitalism
income
per capita
liberalism
stagnation
prosperity
distribution
poverty
social justice
financial
monetary
fiscal
workforce
business
commerce
urban
rural
tax

6.2.3 Technology security


technology
information
digital
tool
machine
technique

184
machinery
system
information
science
progress
instrument
engineer
computer software
Internet
computer
utility
usability
safety
knowledge
research
IT
applied science
access control
communication
authentication
data integrity
non-repudiation
availability
confidentiality
privacy
faults
errors
failures

6.2.4 Human security


individual
man
woman
men
human
people
person
citizen
citizens
taxpayer
taxpayers
dignity
kindness
sympathy
suffering

185
pain
discomfort
joy
welfare
wellbeing
dependence
food stamp
health
relationships
mother
child
children
father
people-centric
society
life
lives
ethic
population
developed
emerging
underdeveloped
urbanisation
disease
HIV
aids
climate
temperature
water
food
epidemic
rights
freedom
education
rule
law
governance

6.2.5 Physical/health security


health
medical
physical
food
infection
biological

186
chemical
pandemic
epidemics
natural disaster
environmental
emergency
infectious
disease
spread
health care
complex emergencies
care
medicine
vaccine
treatment

6.2.6 Educational security


learn
discovery
train
work
experience
human
skill
scientific
artistic
intelligence
research
development
innovation
formation
human capital
communication
dissemination
information
system
school

6.2.7 Environmental security


climate
natural
ecology
ecological
disaster
Climate change

187
Global warming
Fossil fuels
Sea level rise
Greenhouse gas
Ocean acidification
Environmental impact
coal industry
Conservation
species
extinction
poaching
Endangered species
Energy
conservation
renewable energy
efficient energy use
Environmental degradation
Habitat destruction
Environmental health
Air quality
Genetic engineering
Genetically modified
Intensive farming
Overgrazing
Irrigation
Monoculture
Environmental effects
Pesticide drift
Land degradation
Land pollution
Desertification
Soil
Urban sprawl
Habitat destruction
Nanotechnology
Nuclear
waste
Overpopulation
Ozone depletion
Pollution
acid rain

6.2.8 Natural resource security


environment
biodiversity

188
geodiversity
ecosystem
wants
survival
need
materials
components
man-made
fresh water
air
processed
metal ores
energy
oil
energy
allocation
globalisation
globalisation
scarcity
depletion
exportation
exploitation
economy
developed
localised resources
inexhaustible
solar radiation
geothermal energy
exhaustible
finite

6.2.9 Social and political security


social
political
democracy
voice
accountability
social services
social security
labor
labour
health
housing
representation
equality

189
inequality
disorder
civil

6.2.10 International law


law
rule of law
relations
state
actor
nation
NGO
treaty
supranational
jurisdiction
public
private
sovereignty
charter
United Nations
court
justice
resolution
doctrine
charter
agreement
convention
war
armed conflict
humanitarian
sea
enforce
arbitration
binding
non-binding
standard
dispute
party
corporation
universal
International Criminal Court
Security Council
trade
mandatory
global

190
theory
litigation
human rights
values
Charter

6.2.11 Military security


military
weapon
threat
warfare
democracy
armament
Armed Forces
war on terror
deploy
terrorism
threat
risk
capabilities
PLA
army
troops
force
border
conflict
threat
intelligence
expenditure
size
troop
nuclear
conventional
strength
personnel
logistics

191
logistic
land
air
naval
resource
manpower
service
mortar
artillery
vehicle
aircraft
oil
production
consumption
reserve
coverage
defence
defence
budget
marine
carrier
destroyer
submarine
frigate
mine
patrol
assault
strategy
tactic
operation

192
6.3 Annex 3 Detailed Analysis of the Academic Disciplines
6.3.1 Write Ups - Large academic disciplines

Business Administration and Economics


Computer and Information Science
Humanities
Law
Psychology
Social Sciences

Business Administration and Economics792

6.3.1.1.1 Meta-analysis
As a reminder: the set of documents that is analysed here represents the top-ranked articles
resulting from our search on the entire EBSCO-database for articles containing the word security
and - in close proximity thereof - words like definition, dimensions or sources in two different sets
of documents: the ones that were classified by Journalseek under the high-level disciplines Business
Administration and Economics.
For Business Administration, the set consisted of 392 documents and for economics of 274
documents. To give an idea of what types of disciplines are included in these two sets:
Business Administration includes the following sub-disciplines: accountancy, actuarial
studies, banks and banking, entrepreneurship, finance and financial services, industrial
relations, insurance, management and strategy, management information systems,
marketing, personnel management, and technological change
Economics includes the following sub-disciplines: Investment analysis, Computer network
resources, development, Macroeconomics, Pensions, Social security, Taxation, Socio
Economics, Globalisation, Imports, Global warming, Social justice, Military spending,
Consumption, Economic policy, Infrastructure, Welfare, Regionalism and Liquidity.

6.3.1.1.2 Themes and concepts


All articles were selected because they contained the word security within close proximity of words
like definition, defined as, causes, sources and dimensions. We here present the findings of the
automated analysis of these two sets by Leximancer with respect to the main themes that emerge
from the text. The best way to think about these themes is that they are clusters of concepts that
tend to travel together to this entire set. A concept is a word or a name that Leximancer identifies as
it builds a thesaurus of all documents in this set. These then are the main themes and concepts that
we find back in the articles from these two disciplines that deal with conceptual and definitional
issues surrounding the concept security

6.3.1.1.3 Business Administration

792
Although Journalseek has these two disciplines as high-level-disciplines, for the purposes of this analyses, we decided
to present the main insights from these two sets of documents jointly. We will still, however, present the automated
findings for the two disciplines separately.

193
6.3.1.1.3.1 Themes
Throughout this set of business-management documents that talk about what security actually
means to them , the most common themes that were detected by Leximancer were: investment
(100%), policy (97%), market, management, work, benefits and securities. In other words, the articles
in the business literature talks about security issues tend to overwhelmingly deal with investment
issues and policy issues. The investment theme contains concepts such as: value, financial, costs,
assets, funds, account, credit and economy - so essentially financial security issues. And the policy
theme includes concepts like public, government, social, interest, countries, law, states, rules,
federal, local, politics, national, protection, real, legal, community and human - referring essentially
to the political and regulatory dimensions of security for the business community.
It has to be pointed out that the theme securities (which includes both financial securities and the
broader concept of security itself) - is not a very central one in this set of articles (it scores a
relevance of 47%, meaning it is only half as relevant as the top-theme: investment . The securities
theme is linked to: information, system, process, access, function, application, network and key.
Within the discipline of Business Administration the concept of security or securities therefore
appears to be often related to concepts that indicate the security of information flows and systems,
the secure access to information and a secure network. This relation might very well be due to the
increased use of online applications by many enterprises and banks and the risks associated with
those applications. Indeed, information security is a key component in modern enterprise planning
and management given the integral role of information technology (IT) in todays enterprise
(Nyanchama and Sop, 2001 (doc 256)). As a result, authors like Matwyshyn (2009) argue that
companies have ethical obligations to improve information security (p. 579 (doc 213)). This is not
only to avoid the leaking of sensitive business information, which is, according to Johnson (2008)
one of the largest classes of recent security breaches (p. 97(doc 164)). Yet, also to protect the
clientele and business interests. According to Mauldin and Arunachalam (2002) consumer online
purchasing is hampered by fears about the security of information transmitted over the Internet (p.
33 (doc 214)).
The other themes to emerge out of this set include:
The market theme, linking concepts such as: market, firms, stock, returns, investors and
impact.
The management theme, related to the concepts like: control, services, development,
research, product, business, resources, corporate, trust, foreign, technology and framework.
Work associates with concepts such as: individual, employment, group, program, health,
insurance, employees, job, care, population, family, pay, life and coverage.
Benefits is linked to: income, age, plan, workers, retirement, pension and Social Security.

6.3.1.1.3.2 Concepts
It is interesting to see that whereas securities as a theme (i.e. as the dominant concept in a cluster
of concepts that travel together through this set of documents) only had a relevance of 47%, it did
(not overly surprisingly since the articles were selected in that search term) obtain the single highest
score as an individual concept, with an overall count of 13300 in the 392 documents.
Concept List - Top 20:
Concept (word-like) Count Likelihood

194
securities 13300 100%

used 9016 68%

benefits 7674 58%

market 5447 41%

provide 5292 40%

information 4974 37%

age 4936 37%

model 4826 36%

results 4810 36%

different 4779 36%

include 4740 36%

income 4732 36%

rate 4698 35%

time 4626 35%

system 4611 35%

requirements 4598 35%

related 4533 34%

increase 4422 33%

work 4414 33%

data 4346 33%


The concepts that travel together through the business management documents with the concept
security show few surprises when compared to the content of the securities theme793.

6.3.1.1.4 Economics

6.3.1.1.4.1 Themes

793
We want to point out that we did not make any corrective changes to the findings that Leximancer
produced. To give an example: the fact that the concept used has the highest likelihood of co-occurring with
the concept security is clearly of less semantic importance than subsequent words like benefits, market or
information. But we did not exclude it from the analysis in order not to let any normative bias of our own
analysts bias the findings.

195
The economics literature discussing conceptual issues related to security mirrors many of the key
themes we also found in the management literature.
Looking at the concept map, the most connected themes are: Security (100%), Market (71%), Policy
(62%) and government (44%)
The theme Security is related to concepts such as: development, economic, countries,
important, change, social, different, analysis, global, processes, terms, focus, world,
integration, major, problems, order, environmental, impact, strategy, main, present, key,
potential, economy, nature, and account.
The theme Market is related to concepts such as: systems, food, increased, products, level,
services, areas, result, company, control, management, technologies, growth, risk, sector,
industry, resources, large, period, factors, population, network and costs.
The theme Policy is related to concepts such as: politics, international, issues, forces,
national, states, power, role, approach, institutions, threats, Eu, foreign, conflict, makes and
regional.

The theme Government is related to concepts such as: military, interest, human, concerns, rights,
questions, response and relationship.

6.3.1.1.4.2 Concepts
The dominance of the concept of security in this set is not much of a surprise, nor is its closest
association: market. More interesting are the concepts countries, policy, government, international
and politics, suggesting that these documents also recognise that - besides markets - politics and
(government) policies also play an important role in security matters in the field of economics. It
bears repeating here, that these is a fairly robust consensus across ideological lines that governments
have an important role to play in this field. We also note that food and development also seem to be
regarded as a vital part of security in the field of economics.

Concept List - Top 20

Concept (word-like) Count Relevance

security 16524 100%

market 8652 52%

used 7642 46%

related 6200 38%

systems 6164 37%

countries 6158 37%

food 6141 37%

development 6132 37%

increased 5585 34%

196
policy 5574 34%

government 5541 34%

politics 5491 33%

economic 5436 33%

informal 5246 32%

time 5139 31%

provide 5134 31%

including 4953 30%

important 4913 30%

change 4819 29%

international 4782 29%


It is also interesting to note that the concept of Security is often used in the business literature far in
its classical inter- or supra-state conception: Russia must be brought into the European security
structures (Hout, 2010 (doc 118)), All countries have welfare and security goals, yet the manner in
which they pursue them varies across time and over different issues.(Holsti, 2001 (doc 116)) and
The main points about the EU discourse on security with respect to European security as a referent
can be outlined.. (Larsen, 2000, (doc 151)). In addition and as expected, social and economic
security are also stressed such as in Human and economic security: is there a nexus? (Liew, 2000
(doc 186)) and one of the articles provides an empirical analysis of the effects of socio-economic
security policies on Indian's economic performance (Justino, 2007 (doc 132)) Finally, there are also
some entries of sustainability and environment such as in Defence and environmental security
(Oswald, 1993 (doc 208)).

6.3.1.1.5 Definitions and Dimensions of Security in Business Administration and


Economics
As has been pointed out above, securities - or a security - is the most common concept in the
selected documents. Yes behind that term, we find a number of different conceptualisations of
security - some of which are familiar to national security community, and some of which are much
less so. Yet they all shed some light on the multi-faceted incarnations of the concept, as well as on
the deeper underlying essence that these still share

6.3.1.1.5.1 Financial security


The definition of security that figures most prominently in this set is a security in the financial
sense - whereby the definitional issues surrounding this particular concept have become an issue of
much contention in both regulation and litigation and are therefore vigorously discussed in the
literature. Much of the (American) literature here refers to the authoritative initial definition of a
security in the United States Securities Act of 1933. Aiken (2006) states that the case that defines a

197
security according to the Securities Act of 1933 is Securities and Exchange Commission v. Howey, 328
U.S. 293 (1946). In Howey, the court defined an investment contract as "a contract, transaction or
scheme whereby a person invests his money in a common enterprise and is led to expect profits
solely from the efforts of a promoter or a third party, it being immaterial whether shares in the
enterprise are evidenced by a certificate or by nominal interests in physical assets employed in the
enterprise (p. 21). The key definitional components of security here appear to be that it is an asset
that provides (some) security to its owner.

Other documents cite various more modern legal definitions as developed by other legal codes or
committees, e.g., the Canadian Income Tax Committee (2007) or the the Federal Reserve Bulletin
(1998) - in which the precise delineation of what is or is not a security (and thus falls under that
legislation) is updated in light of changing technological and other financial innovations. Helfat (2007)
uses the definition as stipulated in article 8 of the New York Uniform Commercial Code:
Security means an obligation of an issuer or a share, participation, or other interest in
an issuer or in property or an enterprise of an issuer:
(i) which is represented by a security certificate in bearer or registered form, or the
transfer of which may be registered upon books maintained for that purpose by or on behalf
of the issuer;
(ii) which is one of a class or series or by its terms is divisible into a class or series of
shares, participations, interests, or obligations; and

(iii) which:

(A) is, or is of a type, dealt in or traded on securities exchanges or securities markets; or


(B) is a medium for investment and by its terms expressly provides that it is a security
governed by this Article (p. 86 (doc 143)).
In all of these cases, the definition of security changes from the financial instrument in the hands of
the owner itself to the underlying obligation it confers upon the issuer. Other definitional variants
that are encountered in this same context include the same financial security as
Whereas this definition from a financial context may appear to be far afield from the concept of
security that is commonly being used in national security communities, it is worth pointing out that
the basic underlying intuition is a very similar one: that the expected payoff combined with the
extreme fungibility of a financial asset provides its owner with a degree of security. So in this sense
security is defined as a bond or pledge that provides assurance or safety for its holder in the face of
danger (Der Derian 1995: 28).

6.3.1.1.5.2 Social security


Another frequently encountered definition in this set involves the concept of social security. As
Yakushev points out widely different meanings are often attached [to concept of "social security"],
As defined in the draft [stillborn Soviet legislation on social security - note of the authors], the term
covers a broad range of benefits, including old-age, permanent disability and survivor pensions,
medical care, temporary incapacity benefit, unemployment benefit, social and vocational
rehabilitation, social services, lump-sum payments and other types of social assistance. These forms
of social security, on the whole, correspond to the generally accepted meaning of the term
internationally. (Yakushev: 91) This is very similar to the definition that would Social security is the
protection that a society provides to individuals and households to ensure access to health care and

198
to guarantee income security, particularly in cases of old age, unemployment, sickness, invalidity,
work injury, maternity or loss of a breadwinner. (ILO, Facts on Social Security -
http://www.ilo.org/wcmsp5/groups/public/---dgreports/---
dcomm/documents/publication/wcms_067588.pdf). As Otting points out, the Convention is
comprehensive because it brings together in a single instrument all the branches of social security
that had previously been dealt with in different texts, with the addition of family benefits, which till
then had not been the subject of a Convention. It distinguishes and defines nine branches of social
security which cover all the standard contingencies in which workers are prevented from providing
for themselves and their dependants or have to meet additional expenses. (Otting) Also the
European Convention on Social Security extends to all branches of social security as defined in the
ILO's Social Security (Minimum Standards) Convention of1952 (Villars). So in the case of social
security, we are talking about an internationally codified definition that focuses on protection
against various (identified) types of social insecurity that individuals (and groups) in a labour
employment may encounter.

6.3.1.1.5.3 Economic security


Closely related to the concept of social security is the (broader) concept of economic security.
Meneham here usefully distinguishes between two types of security associated with two types of
resources: commodified security derives from commodified income because this arises from
commercial exchanges performed either in labour markets, which fix the terms of paid employment,
or in markets in goods and services which determine incomes from self-employment or from
property; while decommodified security derives from decommodified income, so called because
it is independent of markets and arises either from social benefit entitlements or from grants and
assistance paid by virtue of a persons place of residence or situation of inadequate means.
Decommodified security thus encompasses both social security per se and security in the form of
benefits, assistance and social welfare delivered to the needy by lo-cal government and welfare
organisations. (Menahem).

6.3.1.1.5.4 Employment security


Many employers find offering their own stock as a plan investment attractive, since doing so gives
employees a sense of ownership in the company and helps to concentrate company ownership in
presumably friendly hands (Femstrom, 1993, p. 68) Femstrom (1993) identifies the fact that
employer stock is often not a look-through investment as a source of insecurity. As a result, the DOL
[Department of Labour] imposes a number of constraints on an employer securities fund intended to
qualify for 404(c) protection:
The stock or other security must be a qualifying employer security, as defined for ERISA purposes.

It must be traded on a national or other generally recognised market with sufficient frequency and
volume to enable participants buy and sell orders to be executed promptly.

Participants get the same securities information furnished to other shareholders.


Voting, tender and similar rights are passed through to participants investing in these
securities (Femstrom, 1993, p.67)

6.3.1.1.5.5 Tenure security

199
Arnot et al., in one of the most interesting articles in this set, summarise (and clarify) a number of
academic debates around tenure security. They point out that security of property rights, or
tenure, is central to the economics of development. The literature, they claim, contains a great
variety of definitions regarding tenure security, which may be responsible for difficulties that
empirical studies have had in linking tenure security with economic behaviour. The authors cannot
help but point out that similar definitional difficulties have also plagues the field of - and academic
inquiry into - national security. They continue: As a basis for deciding on a preferred definition, we
begin with the proposition that the concept of tenure security has largely evolved in response to
efforts to clarify investment incentives of property holders (e.g., Bohn and Deacon 2000). In a general
sense, authors have been concerned that insecure tenure to a resource reduces incentives to invest
by reducing the benefits that the resource can yield. As such, tenure security has evolved to be a
potentially important determinant in explaining the economic behaviour of property holders. It is
interesting to point out that various incentive problems with national security have also been
identified (freeriding problems, moral hazard, etc.), but never in as explicit a way as in this literature.
We also present Arnots table as an example of a similar exercise from which the more traditional
national security community could benefit (and for which this chapter might be a contribution)
Authors Definition of Tenure Security Measures Used in Analysis

Benin et al. 2005 No definition provided Perception of tenure


security

Besley 1995 Probability of expropriation Transfer deed, previous


litigation, method of
acquisition, and duration of
ownership

Bohn and Deacon Probability of expropriation Political factors related to


2000 expropriation risk

Brasselle, Long-term, continuous rights free from imposition Categories based on use
Gaspart, and or interference from outside, along with ability to and transfer rights
Platteau 2002 reap benefits of labour and investment either in
use or upon transfer to others

Carter and Perceived change in likelihood of losing land Tenure type


Olinto 2003

Cattaneo 2001 Expected time of residence before eviction Expected time of residence
before eviction

Costello and No definition provided Probability of renewal

200
Kaffine 2008

Deacon 1994 No definition provided Political stability

Deacon 1999 No definition provided Political stability

Feder and Legal title to land Legal title to land


Onchan 1987

Feder, Onchan, Uncertainty over changes in government policy Perceived likelihood of


and Chalamwong contract disruption and of
1992 retaining same plot

Gavian and Uncertainty over a user's claim to land and Type of tenure
Fafchamps 1996 ability to sell or transfer land and duration of
possession

Godoy et al. 1998 No definition provided Conflict with abutters

Godoy, Kirby, No definition provided Conflict with abutters and


and Wilkie 2001 duration of residence

Hayes, Roth, and Probability of eviction Transferability of rights


Zepeda 1997

Holden and Perceived probability of losing ownership of a Same as definition (binary


Yohannes 2002 part or the whole of one's land variable for secureinsecure)

Jacoby, Li, and Risk of expropriation Estimated risk of


Rozelle 2002 expropriation

Kabubo-Mariara No definition provided Bequeath rights and


2007 individual or group
ownership versus tenancy

Kabubo-Mariara No definition provided Ownership versus rental of


et al. 2006 land, and right to bequeath,
sell, or rent land.

201
Kaufmann, No definition provided Governance indicators
Kraay, and derived from several
Mastruzzi 2003 hundred variables based on
perceptions

Li, Rozelle, and Uncertainty in land tenure Duration and expectation


Brandt 1998 that plot will be lost at end
of crop year

Luckert 1991 Expected impacts of changes in various aspects Expected impacts of


of forest tenures changes in various aspects
of forest tenures

Mendelsohn No definition provided Probability of eviction


1994

Nautiyal and Level of uncertainty or likelihood of extension Probability of extension


Rawat 1986

Otsuka et al. Probability of retaining rights Tenure type


2001

Owubah et al. Confidence in rights Capability to legally register


2001 land

Place and Hazell No definition provided Transferability of rights


1993

Place and Otsuka Probability of losing land rights Proportion of land under
2000 different ownership types

Place and Otsuka Probability of losing land rights Method of acquiring land
2001

Place and Otsuka Probability of losing land rights Tenure type


2002

Robinson 2005 Uncertainty of land rights Probability of eviction

202
Sjaastad and Perception of likelihood of losing a specific right Probability of eviction
Bromley 1997

Sjaastad and Risk of losing rights and perception of that risk N/A
Bromley 2000

Smith 2004 Assurance of rights Legal title

Southgate, No definition provided Ratio of adjudicated


Sierra, and agricultural land relative to
Brown 1991 entire study area

Zhang 1996 Deletion conditions, area versus volume-based Tenure type


tenures and "general security"

Zhang and Pearse Renewability, comprehensiveness, obligation to Tenure type


1996 share returns with government, and scope of
regulatory intervention

Zhang and Pearse Renewability, comprehensiveness, obligation to Tenure type


1997 share returns with government, and scope of
regulatory intervention

All of these predominantly economic forms of (often individual) security may, at first glance, seem
far removed from security as it is used in national security. And yet the use of the word security in
the digram social security is far from fortuitous, as it also connotes an element of security in the
original sense of *se cura - from se ("free from") and cura (in the sense of "care"
http://www.etymonline.com/index.php?term=secure&allowed_in_frame=0).

6.3.1.1.5.6 Information security


Not surprisingly, the business management and economic literatures also pay significant (and
increasing) attention to issues of information security.

6.3.1.1.5.7 International security


Defence economist Keith Hartley, in an article in which he struggles to argue the case for defence,
he argues that [d]efence output is concerned with concepts such as security, protection and safety
(reflecting the valuation of human life) plus peace and economic stability. A distinction can be made
between security for firms and households (comprising citizens). Firms are interested in security,
which protects their investments, facilitates international trade and foreign investment and
contributes to profitability. Citizens are interested in security, which provides safety and protects
their lives and property, their prosperity and their way of life (e.g., freedoms of speech, institutions
and the ability to go about their daily lives freely). On this basis, defence and the Armed Forces are a

203
means of ensuring that other nations will encounter military opposition if they seek to use military
force to re-allocate resources in their favour.

Neil MacFarlane, a political scientist, publishing in the Third World Quarterly, expands this more
military definition into the realm of human security:
Scholars reacted and the meaning of security and the agenda of security studies expanded beyond
what sarcastically has been dubbed 'bombs and bullets'." If security means most simply 'an absence
of threat to fundamental values', obviously it includes threats not merely to life, but also to property
and livelihood, as well as to fundamental human rights. In brief, proponents of a more comprehensive
vision argue that in addition to politico-military security, there are three other fundamental 'rights':

economic security--the right to benefit from the fruits of economic growth;


environmental security--the right to a productive and sustainable ecosystem;
legal security--the rights of individuals to legal protection and to participation in democratic
processes. (1994 (doc 160))

Also Makinda goes beyond military security by defining security as the preservation of society's
principal values, norms, rules, and institutions. This definition covers the states system, and the
principles, values, and norms that go with it. It also includes the protection of people and their
institutions from military and non-military threats and the guarantee of basic needs and fundamental
freedoms. This assumes that the role of military force as a guarantor of security will remain
paramount, but it is not the only means of attaining security. Since security is primarily about the
preservation of norms, rules, and institutions, it has a legal dimension. He also points out that This
attempt to define security in non-military terms is not a post-Cold War phenomenon. About two
centuries ago, Carl von Clausewitz argued that war was fought for political reasons, and that 'the
political object, as the original motive of war, will be the standard for determining both the aim of
the military force and ... the amount of effort to be made' . Following Clausewitz's argument, security
should be regarded as the political objective. (Makinda)

Carlo Jeans Security in the Mediterranean and Italy's Role provides some insights on the difference
in concepts of security between the United States and (Southern) Europe:
The nature of the very concept of security in the Mediterranean is differenl. According to the United
Stales, its essence is primarily political-strategic. Economic security, i.e., the stabilisation of the area
through development, is considered a secondary and in any case a subordinate factor. In the U.S.
view, attention is centred on the Persian Gulf and on the Middle
East peace process, not on the rim of this pivotal sea. ln the European view, on the other hand,
security is linked primarily to demographic issues. It is aimed at hindering the massive emigrations
spuned by the ongoing economic crisis in North Africa, the Middle East,
and Turkey; the expansion of terrorism in Europe; and the development of organised crime in the
Mediterranean. (...) For the countries of the South, the concept of security is clearly articulated as a
global concept. It is political, economic, social, and cultural. (2003 (doc 127)).

6.3.1.1.5.8 Other dimensions of security


redeemable security: a security the terms of which entitles the holder, upon presentation
to receive approximately his proportionate share of the issuer's current net assets, or the
cash equivalent thereof (Howat and Reid, 2007, p. 685)

204
National Market System security: any security or class of securities for which transaction
reports are collected, processed, and made available pursuant to an effective transaction
reporting plan or an effective national market system plan (as proposed by the SEC in Rule
600 of Regulation NMS, in: Freeman, Zambrowicz and Kang, 2004, p. 9). NMS securities
further consists of NMS stock and options (Freeman, Zambrowicz and Kang, 2004, p. 9)

6.3.1.1.6 Dimensions Text mining results (baskets)

The ETTIS team used Leximancer to measure the relative relevance of certain baskets of concepts
across the disciplines. This graph visualizes the differences between the two sets of articles: business
administration and economics. It clearly shows the importance of the economic basket in both
disciplines (with it being somewhat higher in the - generally more applied - business literature than in
the - generally more theoretical - economic literature. It is striking that the social-political dimension
achieves the top score in the economics literature - even above the economic basket. Both the
human and the educational dimensions score relatively high in both sets. The military basket scores
surprisingly high in the Economics set, whereas the environmental basket scores surprisingly low in
both sets.

When we then zoom in on which baskets co-occur most frequently with the concept security

6.3.1.1.7 Sources of Security in Business Administration and Economics


This section provides a number of quotes from these two sets of documents referring to various
sources of (in)security in a number of different contexts:

6.3.1.1.7.1 A Security/ securities


Femstrom (1993) identifies the fact that employer stock is often not a look-through investments as a
source of insecurity. As a result, the DOL imposes a number of constraints on an employer securities
fund intended to qualify for 404(c) protection:

The stock or other security must be a qualifying employer security, as defined for ERISA purposes.

205
It must be traded on a national or other generally recognised market with sufficient frequency and
volume to enable participants buy and sell orders to be executed promptly.

Participants get the same securities information furnished to other shareholders.

Voting, tender and similar rights are passed through to participants investing in these securities
(Femstrom, 1993, p.67)

the risk of a decline in value of the pledged securities (doc 388 - 1980)

6.3.1.1.7.2 Energy security


Supply disruptions, either at production or during the course of transport or storage, are the main
sources of risk (OECD, 2010, p. 23). [...] Producing countries are often heavily dependent on
revenues from the sale of gas and oil for their state budgets and indeed for their broader economies,
as shown in the section above. Lower revenues than projected can have important social and
political impacts (p. 23).

6.3.1.1.7.3 Financial security


financial insecurity that arise from expensive and rising medical care costs [...] "Financial Security
theory demands that health insurance limit financial insecurity from these costs (Hoffman, 2011, p.
1874).

6.3.1.1.7.4 Economic security


The security review process, which took effect March 5, 2011, will apply to all foreign investors that
conduct M&A with domestic enterprises related to national security as defined in the notice.
Specifically, foreign investors that would become the controlling shareholder or the actual controller
of a domestic enterprise must submit applications to MOFCOM for a general review process that can
last up to 30 business days (Kahler, 2011).

6.3.1.1.7.5 Social security


The basic reason for exclusion from statutory social security coverage is that many workers outside
the formal economy arc unable or unwilling to contribute a relatively high percentage of their
income to financing social security benefits that do not meet their priority needs (Van Ginneken,
2003, p. 280).

social shifts which the countries of Europe are currently experiencing: changing patterns of work,
the phenomenon she calls the "breakdown in the wage structure", developments associated with
unemployment, precarious employment and exclusion, family instability and countless other factors
which jeopardise the individuals security (Menahem, 2007).

6.3.1.1.7.6 Cyber security


DOS attacks (Hovav and DArcy, 2003, p. 101)

6.3.1.1.7.7 Information security


hackers regularly penetrate poorly secured networks and devices, many of the large recent security
breaches were not technical break-ins, but rather inadvertent disclosures. For example, laptops at
Towers Perrin, Boeing, Fidelity, and the U.S. Department of Veterans Administration were lost or

206
stolen--in each case inadvertently disclosing personal and business information (Johnson, 2008, p.
99).

Understanding security risk in management information systems is an important and rapidly


evolving topic. We analyse the information risk posed by file sharing. We show that confidential and
potentially damaging documents have made their way onto these networks. We also show that
attackers actively search P2P networks hoping to find information that they can exploit (Johnson,
2008, p. 100).

information leaks are the result of accidentally shared data rather than the result of malicious
outsiders, there are many other trends that are driving more security concerns. They include:

Growing usage and network heterogeneity means more leaks. With many networks and
clients, users are not likely to grasp the security issues and P2P developers will likely not
focus on security.

"Set and forget" increases losses. P2P clients tend to be "set and forget" applications that
run in the background while the user is not at the computer. This suggests that the user is
not carefully tracking the activities of the P2P client, increasing the opportunity for abuse.
Further, even benign file-sharing programs consume significant processor time and network
bandwidth, conditioning the P2P user to tolerate sluggish performance that, for others,
might be a first sign that a system has been compromised.

No borders result in global losses. Geography is largely irrelevant in P2P networks, meaning
no particular country or region is safer than another. A computer logging on in Bombay or
Brussels becomes part of the same network as a computer in Pittsburgh.

Malware. While the overwhelming majority of traffic on P2P networks is entertainment


content (games, movies, music, etc.), also lurking on P2P networks are files that pose severe
security risks. Viruses that exist in e-mail and other programs also have variants that exist in
P2P networks (Johnson, 2008, pp. 101-102).

P2P file sharing has become mainstream among large segments of the Internet population. With
estimates of 10 million simultaneous users sharing music, video, software, and photos, file-sharing
clients have joined the suite of standard Pc applications for many users. Unrecognised by many of
these users though is the serious security threat participation in these networks poses to both
corporate and individual security (Johnson, 2008, p. 99)

A deliberately planned security breach in a program. Sometimes it can be exploited and allow a
hacker unauthorised access to data. Brute force hacking. A technique used to find passwords or
encryption keys (McCune, 1998).

Recent surveys suggest that consumer online purchasing is hampered by fears about the security of
information transmitted over the Internet, the legitimacy of the business behind the web site (Cranor
et al. 1999), and the privacy of personal information (Culnan 2000). (Mauldin and Arunachalam,
2002, p. 34).

6.3.1.1.7.8 Employment security

207
Haidar and Spooner (2009) assess the perceived security of employment according to a number
factors. First is the legal situation of employment [...]. The second concerns perceived threat and the
possibility of losing ones employment. The third is the extent of a managers power to counteract
the threat of losing employment. [...] The fourth factor is the importance of employment to a
manger (p. 143).

6.3.1.1.7.9 Job security


A low-source-level job insecurity variable -- representing job insecurity resulting from factors within
unions' traditional bargaining purview -- was constructed in accordance with the second equation,
but using only arbitrary supervision and technological change as sources of threat.'' A high-source-
level job insecurity variable -- representing job insecurity resulting from factors beyond the unions'
purview -- was constructed using only reorganisation and decline as sources of threat (in: Johnson et
al., 1992, p. 52).

6.3.1.1.7.10 Work motivation and security


Warr (1997) found that older workers showed high levels of interest in security and monetary
outcomes of work. In line with this reasoning and descriptive evidence, [Kooij et al] propose the
following hypothesis: hypothesis 3: Age will be positively related to security motives (Kooij et al,
2011, p. 203).

Contrary to [their] hypothesis that security motives increase with age, security motives were
significantly negatively related to age. However, post hoc analyses revealed that the strength of
intrinsic security motives (i.e., job security) does increase with age (r 0.06). Furthermore, the
strength of security motives does increase with age among Traditionals and white-collar workers (p.
214). This suggests that we need more research to better define and study multiple dimensions of
security (p. 216).

Computer and Information Science

6.3.1.1.8 Introduction
This document aims at discussing various ways in which 'security' is conceptualised and dealt with in
the academic discipline Information and Compter Sciences. The discussion is based on an anlaysis of
a selection of published academic papers during the last 20 years. The selection criteria were that the
papers should:

be authoritative, top-notch sources


explicitly touch upon (at least one of the elements of) the concept security, especially upon
definition, dimensions and sources
be published between 1990 and 2012.
In the collection of papers in ICS there were also a few papers published before 1990.

One of the problems in the field is that there are tendencies to mainstreaming in terms of thinking
along the same lines with regard to what security means. As a consequence it is not feasible to just
go for the (conventionally) most highly ranked articles. Instead a much wider search has been
performed based on a fixed search query.

208
In total the collection consists of 90 papers. These range from very technical aspects (e.g., defining
security in terms of computational complexity or cryptology) to very soft issues (e.g., When a
majority of the participants are honest, it is possible to obtain the strongest level of security one
could hope for).

Of the paper almost 38 per cent were published in the Journal of Computer Security. According to
the SJR ranking system, this journal is ranked 468 in subject area Computer Science. If we try to limit
the ranking to journals containing the word security within Computer Science we also find journals
such as Information Foresics and Security (ranked 120), Information and System Security (308),
Computers and Security (373). If one instead rank journals according to cites per article ACM
Transactions on Information and System Security gets 1.2, Information Foresics and Security 1.06,
Computers and Security 1.00 and Journal of Computer Security gets 0.66. Hence, according to more
traditionla ways of ranking journals Journal of Computer Security is not highly ranked. The journal is
not either included in Web of Science.

The Journal of Computer Security covers almost all aspects of computer security: security policies,
modeling and principles of software and hardware systems. The journal explicitly states that it
provides an opportunity to publish articles of greater depth and length than is possible in the
proceedings of various existing conferences and that the audience can be assumed to have a more
specialised background in the field.

Other journals in the collection include the Bulletin of the Atomic Scientists (quite a few articles),
Journal of the ACM (quite a few articles; ranked 78 according to SJR and 34 according to cites per
document), Distributed Computing (some articles), Fundamenta Informaticae (quite a few articles)
and SIAM Journal of Computing (quite a few articles).

The dominance of one rather technical journal implies that the material is on a rather low system
level. A large number of papers are for example concerned with cryptograhical protocols of with
various application areas (on low system level). In some cases there are not even applications areas,
but only mathematical results. What is missing in the collection is papers dealing with softer
issues around information and computer security, i.e. organisational, social, psychological and
behavioural aspects of the field. One example is security policy which outlines the rules, laws and
practices for computer access. A security policy regulates how an organisation will protect and
distribute information. Another, very important field, is of course everything that has to do with laws
and regulations of information security. This is an extremely hot topic today and I think it is a severe
problem that our analysis leaves this out.

In the material there are also papers which are somewhat difficult to include in the discipline
Information and Computer Science. For example, there is one paper stating that republicans are
much more likely to reach arms control agreements (Cirincione, 2000), one paper dealing with NATO
strategies for neutralizing Soviet tanks during the cold war (Aspin, 1987), one paper on a growing
Soviet threat in the Pacific (Arkin, 1987), one on trends in globalisation (Lopez, 1995), one on nations
ruled by the military (Lopez, 1990), a book review on arms control (Sartori, 1978), a paper on missils
in Europe (Osgood, 1983), one paper on Japanese-US military relationships (Menon, 1997), and one

209
on the role of English School in security studies (Makinda, 2005)794, one paper on the British view
of American Security Policy (Hetherington, 1955), and one paper one the connection between
environment and security (Glieck, 1991).795

Obviously, the analysis by Leximancer is based in all 90 documents. My analysis however focusing
on how security is conceptualised and dealt with in the academic discipline Information and Compter
Sciences is limited to the document I find relevant for this task. As a result my analysis will cover
the more technical aspects of information and computer security while the analysis by Leximancer
will cover a broader topic (a broadening I find a bit strange).

6.3.1.1.9 Themes and concepts


The most connected themes are:

services (100%)
security (72%)
using (68%)
general (56%)
keys (53%)
public (50%)

The result perhaps mirrors the fact that information and computer security is a rather applied
scientific field after all; the major part of the work in the area is devoted to solve practical problems
in connection with secure storage and transmission of information. Computer security is about
providing services to clients via e.g., using cryptography.

That two of the themes are keys and public is probably relate to the increased importance of public
key infrastructure (PKI). Traditionally, secure communication relies upon secure key exchange via
e.g., a face-to-face meeting or an exchange via a trusted courier. The key could then be used to
exchange encrypted messages. Of course, both parties must keep the key secret. A problem is then
of course how to distribute keys for parties that have not met. PKI addresses this problem so that
users can communicate over a public channel without having to agree upon a shared key
beforehand.

The theme services is related to concepts such as data, application, networks, levels, issues, policy,
management, risks, protection, interest, needs, resources, cloud, important, infrastructure, ensure,
potential, address, appropriate, critical, content and support.

The theme security is related to systems, access, control, communication, related, operations,
standard, privacy, context, analysis and programs.

The theme using is related to models, attacks, properties, different, user, specific, based, work, type,
identity, authentication, group and paper.

The theme general is related to: allows, problem, possible, particular, order, consider, formal,
present, private, nature, object

794
Saved as Demurjian and Ting 1997.
795
There are also some strange documents like Federal Register of May 23, saved as Desrosiers (2009)

210
The theme keys is related to: protocol, parties, scheme, hash, adversary, message, encryption,
signature, proof, setting, algorithm

The theme public is related to: example, means, states, take, changes, form, current, event, similar.

Some comments: Keys is related to technical terms in the field of cryptography which is to be
expected. The theme services is the theme which is the most soft theme in the material. Here we
find concepst such as management and support. A little more surprising is that the theme public is
not related to anything in PKI.

A human reading of the documents reveal other relevant themes. One is distributed computing.
When more and more information is distributed over many computers or even in the net new
security challenges appear. One expression of this development is so called cloud computing which
includes distributed storage of information but also distribution of computing power.

Another emerging theme is quantum cryptography. This is not well-represented in the material but a
few papers touch upon this potentially revolutionary technology for securing key distribution. A third
theme worth mentioning is requirement engineering, i.e. how security could be an integrated part of
system development and not add-ons after the basic functionality of a system has been
constructed. One example of this is how security requirements could be incorporated in the system
development methodologies using use cases as a key component in determining and communicating
requirements of software systems.

Gupta et al. (2007) exemplifies this aspect of security design:

"grounds-up" approach to security, where each component is individually secure, in a defined


network deployment scenario helps meet the need of minimal risk exposure. Security should not be
bolted on; rather, it should be the prime consideration from the beginning and throughout the entire
lifecycle--from concept to deployment and ongoing operation for each product in the solution

6.3.1.1.10 Dimensions Text mining results (baskets)


It is a bit of a surprise that the concept social-political dimension is on the top of the list. Given the
selection of documents it is not surprising that technology dimension is a vital part of security. An
interesting observation is that international law dimension scores relatively high, cf. the discussion
above on the lack of articles in e.g., law journals.

Concept (word-like) Count Likelihood

social-political dimension 4988 100%

narrow-based 4512 90%

technology dimension 4436 89%

211
use 4108 82%

international law dimension 2823 57%

educational dimension 2543 51%

proposing 2337 47%

follows 2337 47%

keys 2321 47%

definition 2264 45%

one-way 2261 45%

disclosures 2260 45%

schemes 2183 44%

system 2119 42%

model 2055 41%

protocol 1989 40%

provide 1901 38%

cases 1866 37%

economic dimension 1823 37%

parties 1730 35%

6.3.1.1.11 Definitions and Dimensions of Security in Computer and Information


Science

212
Before going into the material we shortly discuss what is normally meant by security in the
information and computer security field. Usually one speaks about three aspects of information and
computer security (CIA):

Confidentiality: Ensuring that information is not accessed by unauthorised parties


Integrity: Ensuring that information is not altered by unauthorised parties
Availability: Ensuring that the system can be accessed.

This triad could both serve as a definition of what is meant by security in the field, or as three
dimensions of security.

The CIA aspects are not exhaustive and there have been attempts to extend these to also include
other aspects of security. Among the extension we find: Access control, nonrepudiation (a way to
guarantee that the sender of a message cannot later deny having sent the message and that the
recipient cannot deny having received the message) and privacy, i.e. ensuring that individuals
maintain the right to control what information is collected about them, how it is used, who has used
it, who maintains it, and what purpose it is used for. The latter has become a key driver for new
political movements in Europe. The Swedish Pirate Party received more than 7% of the Swedish votes
in the European Parliament elections in 2009. At the time of writing we see a similar political party
gaining momentum in Germany. Privacy issues lies at the heart of the ideology of these new political
parties.

It is notoriously difficult to provide one definition of security in the field. The concepts used are quite
distinct and possess different attributes: For example, confidentiality is a property of data while
privacy is a property of individuals.

In the collected documents security is sometimes defined, but in almost all cases (I have studied) the
definitions relate to the above. For example consider the following:

The definition [of security] goes roughly as follows. Consider a protection for an XML document. An
adversary is given an arbitrary set of keys, and the liberty of selecting two instantiations for the data
in all nodes that occur in the XML document. The only restriction on these instantiations is that they
should coincide on the nodes to which the adversary rightfully has access according to its keys and the
abstract semantics of protections. In other words, the adversary selects two documents that contain
the same information in the nodes it can access but may differ elsewhere. Then the adversary is given
the partially encrypted document that corresponds to one of its two documents, and its goal is to
decide which of the two instantiations was used in generating this partially encrypted document.
Security means that the adversary cannot do much better than picking at random. It implies that the
partially encrypted document reveals no information on the data in the nodes that should be hidden
from the adversary, for otherwise this information would be sufficient to determine which
instantiation was used

(Abadi and Warinschi, 2008).

What this lengthy definition really boils down to is confidentiality, i.e. to ensure that information is
not accessed by unauthorised parties (see underline). Another example is given in:

213
The first ("classic") approach, introduced by Shannon, is information theoretic. It is concerned with
the "information" about the plaintext that is "present" in the ciphertext. Loosely speaking, if the
ciphertext contains information about the plaintext then the encryption scheme is considered
insecure. It has been shown that such high (i.e., "perfect") level of security can be achieved only if the
key in use is at least as long as the total amount of information sent via the encryption scheme [86].
This fact (i.e., that the key has to be longer than the information exchanged using it) is indeed a
drastic limitation on the applicability of such (perfectly-secure) encryption schemes

(Goldreich, 2003, p. 185).

And yet another example is

Security requirements for computer systems often involve hiding information from an outside
observer.

(Hughes and Shmatikov, 2004, p. 3).

In information and computer security one also talks about the domain of security. One way of
structuring this is according to

Physical security: Controlling the physical environment surrounding e.g., the computer
system. This could include the flow of people and protection against the natural disasters.
Network security: Protecting networks including controlling access and combatting
eavesdropping.
System security: User access and authentication controls.
Procedural security: Policy decisions (cf. security policy above)
Personnel security: Employees, background screening, training and monitoring.

An example of procedural security is:

By security, we especially mean the ability of information and service providers to specify and have
enforced their own rules governing access to their information

(Bryce and Kunhauser, 1997, p. 226).

A classical risk analysis definition (probability*consequence) can be found in:

The ultimate decisive factor that determines whether a system is "secure enough" is the risk
associated with using that system. This risk is defined as a combination of the likelihood of a
successful attack on a system together with the damage to assets resulting from it

(Hoepman and Jacobs, 2007, p. 80).

This is in fact independent of in what field we are discussing security; the traditional way of
calculating risk is of course also applicable in the domain of information and computer security.

Dodis et al. (2008) write about ways of enhancing system security

a human can precisely memorise and reliably type in only relatively short passwords, which do not
provide an adequate level of security. Greater levels of security are achieved by longer human-

214
generated and biometric passwords, such as pass-phrases, answers to questionnaires, handwritten
signatures, fingerprints, retina scans, voice commands, and other values selected by humans or
provided by nature, possibly in combination

As do Argyropoulos et al. (2010):

Human identification has always been a field of primary concern in applications such as access
control in secure infrastructures. In contrast to passwords or tokens which can be easily lost, stolen,
forgotten, or shared, biometrics offer a reliable solution to the problem of identity management

Some other aspects of information and computer security can be found in the collected documents.
For example, Burkhard et al. (2003) talks about secure information flow:

The secure information flow property requires that information at a given security level does not
flow to lower levels

Of course, information and computer security is a vital field in almost all parts of society today. This is
however, not reflected in the collected papers since they are generally on a low system level. One
exception though is nuclear safety:

As computers are used in nuclear safety systems, security engineering is becoming more and more
important in the nuclear industry. Like all highly technical endeavours, the development of nuclear
safety systems is a knowledge intensive task. Unfortunately, not only do nuclear scientists and
software engineers lack the security knowledge, they are also not familiar with the new security
requirements

(Chou and Fan, 2011).

Humanities

6.3.1.1.12 Meta-analysis
Our search for documents containing the word security in close proximity of words like definition,
sources, causes or dimensions yielded 101 academic documents in journals that were classified by
Journalseek as belonging to academic disciplines within the Humanities field. This field includes
literary criticism, cultural studies, philosophy of education, regional studies and sociology. The
articles range in time from 1943 to 2011. We also added the main religious books of the three major
Abrahamic religions - Christianity (the Bible), Judaism (the Talmud) and Islam (the Koran).
The bulk of academic documents analysed in order to gain an insight into security from the
point of view of Humanities is constituted of research papers which looked into security
through its effect on the human condition. In order to do so, most tackled security as a result
of the analysis of related topics. Rarely is security addressed itself or through indirect analysis
(book review). Most interestingly, an evolution can be observed in terms of time, volume,
content and approach.
Documents reflect theyre from a Humanities discipline because of the means they use for
studying this topic (the construction of security discourses [E. SRIDHARAN, International
Relations Theory and the India--Pakistan Conflict, India Review, vol. 4, no. 2, April, 2005, pp.
103--124]; Security through Intercultural Dialogue? [I. William Zartman, Reinhold Brender,
David S. Sorenson, John P. Entelis, William Lawrence, North Africa: reform, development and

215
Islamism.(Symposium: North Africa), Middle East Policy, Volume 14, Issue 4, pages 122,
Winter 2007]; or because of the topic that security is coupled with [Security and Human
Rights (Dominic Tierney, Does Chain-Ganging Cause the Outbreak of War? International
Studies Quarterly (2011) 55, pp. 285--304)]. International relations are a common
denominator in all of the papers. However, this does not mean that both fields are
necessarily sub-disciplines. Only religion, which will be studied hand in hand with sub-
disciplines from other academic fields, can be considered as such.

6.3.1.1.13 Themes
Humanities will reflect not only on security but also on the disciplines approach to security
as a means to understand security. The relationships that branch from security, and the way
in which they are of interest to Humanities, are frequently made explicit by the academic
sources themselves:
The aim of the article is threefold: first, to define and examine the major approaches to the
study of the relationship between Israel's security sector and civilian realms (political, social,
economic, and discursive).
(Oren Barak and Gabriel (Gabi) Sheffer, The Study of Civil-Military Relations in Israel: A New
Perspective, Israel Studies, Vol. 12, No. 1, "An Army That Has a State?" (Spring, 2007), pp. 1-
27)
The most common themes are: security (100%), countries (69%), political (68%), government
(59%), use (56%), social (49%), author (25%), India (21%). All remaining topics score below
20% relevance.

6.3.1.1.14 Concepts
The theme government is related to concepts such as: general, impact, focus, provide, level,
conflict, economic, situation, change, major, important.
The theme social is associated with: place, cultural, practices, community, specific, forms,
society, law, rights, means, argued, making, sense, specific, formas, civil.
The theme political is linked to: border, common, institutions, terms, national.
The theme security relates to the concepts: importante, approach, relations, possible,
process, view, peace, become, members, Turkey, EU, interests, power, threat, cooperation,
remain, Israel, policy, states, domestic.
Countries associated to concepts such as: control, program, change, countries, relationship,
arms, forces, system,. continue, support, military, influence.
Use is linked to: case, source, use study, information, measures, groups, activities, public,
environment, significant
Security scores 100%, with an overall count of 3,317 in the 101 documents. Normalised
results show the following concept relevance: countries (69%), political (68%), government
(59%), use (56%), social (49%), author (25%), India (21%), work (16%), people (15%) and the
United States (10%).

6.3.1.1.15 Definitions of Security in Humanities


Sources which do not analyse the concept of security, but an aspect of it, rely on institutionalised
definitions:

216
All those organisations which have authority to use, or order the use of, force to protect the state
and its citizens, as well as those civil structures that are responsible for their management and
oversight. It includes: (a) military and paramilitary forces; (b) intelligence services; (c) police forces,
border guards, customs services and corrections; (d) judicial and penal systems; (e) civil structures
that are responsible for the management and oversight of the above. (Hashim, Ahmed S. Military
power and state formation in modern Iraq. Middle East Policy, December 22, 2003)

However, when indeed the objective of the paper is to question an assumed definition it is
interesting to observe a great compartmentalisation of security. Some authors make a great
difference between the concept of security as applied to a nationwide context or the global order
and regional (as within a country or within the international community); so much so that the
concept of security varies according to the geographical boundaries in which it is applied:

I offer the following definition of regional security: a situation in which the financial and human
capital of nations is used primarily for social, political, economic and spiritual development, rather
than for military and security/police forces. (Kraig, Michael. Assessing alternative security
frameworks for the Persian Gulf. Middle East Policy. Sep 22, 2004)

National autonomy during a given period of time is also determining when defining security:
However, the question of which values is fairly clear in structural realism; states survive when they
retain their autonomy. Thus, Snyders formulation suggests a rather precise definition of security: a
states level of security consists of the probability that it will maintain autonomy over some
reasonable time span. (Howes, Dustin Ellis. 2003. When States Choose to Die: Reassessing
Assumptions about What States Want. International Studies Quarterly 47 (4): 669-92.)

We can therefore conclude that, when security is defined by Humanities, a consensus can be found
around security involving the use of tools (human, financial, armed... there are multiple
classifications) at a given territorys disposal willing to maintain the capacity it enjoys of self-ruling.
The nature of the resources used for that purpose vary according to the extent to which it is
acknowledged autonomous, that is, to its geographical breadth.

6.3.1.1.16 Dimensions of Security in Humanities


The dimensions of security are openly tackled in one of the papers. It results from the sum of the
following circumstances: good will in neighbour-oriented actions as well as within the international
community and taking preventive measures to ensure deactivation of potentially destabilizing
factors; mainly, a set of guidelines for domestic and international action in case of conflict, This
prevention should include factors suppressing conflicts-to-be (states in need of aid) and non-
governmental threats (health, energy, environment). Finally, special measures should be
implemented in order not to disregard the individual.
For the traditional security and more limited approach the
agenda would have to include:

Maintenance of the "no war" approach to resolving


regional issues;

Ensuring that non-state actors that try to subvert the state


and harm the people (sometimes in the name of the people,

217
sometimes purely for profit) are either removed as effective
entities or are integrated into accepted political processes;

Development of accepted norms for inter-state conduct;

Determining a way of resolving issues arising when states


do not follow the norms; and

Development of processes and capabilities to allow


assistance to states in need. This could involve formalised
preventive diplomacy processes, a crisis management or
resolution capability and/or peacekeeping facilities.

A more comprehensive approach would add to the mix:

Establishing an agreed comprehensive understanding of


what regional security encompasses;

Ensuring that non-traditional concepts of security, such as


the environment, resource availability, energy and the
potential for pandemics are treated with equal seriousness
alongside the traditional security issues.

More expansively, a regional security regime would:

Recognise that security is an issue for people as well as for


states;

Develop strong norms for the ways states behave


internally; and

Actively protect the people of the region.

(JIM ROLFE, Regional Security for the Asia-Pacific: Ends and Means, Contemporary Southeast Asia,
Vol. 30, No. 1 (April 2008), pp. 99-117) Looking into the themes and concepts will confirm the
dimensions outlined above.

The theme country is linked to arms, control, change, continue, support, military; that is, issues
which vary from country to country. This tells us that research conducted in the framework of
Humanities disciplines conceives security as a relative concept, subject to the change according to
cultural singularities. Therefore, in the definition of Humanities concept of security, national
identities play an important role, and removes decision-taking in certain fields from the international
sphere:

The concept of "Gulf security" is evolving as internal political socioeconomic changes in the Gulf states
interact with the processes of globalisation and the impact of international events in this volatile
region. Policy formulation is consequently enhanced by taking into account the factors that inform
regimes' perceptions of their internal-security matrix.

218
(The Many Faces of Asian Security. Edited by Sheldon W. Simon. Rowman & Littlefield, Oxford, 2001,
272 pp.)

Due to its presence in all documents, security attracts the greatest number of themes. It must be
understood next to politics (process, peace, relations) inasmuch as it involves decision-making,
planning and a goal shared by a plurality of actors: Balkans, of a reliable partner of the security
(Vesselin Bliznakov, "Think globally, act locally" - The reform of the Bulgarian Armed forces, Monch
Publishing Group, 2006)

Security implies an interaction for a common objective. It should therefore be looked into as applied
to communities. When restricted to national boundaries security seems to be more likely to achieve.
In this regard, the idea of a common global action or the existence of global dangers (potential,
policy, region, threat) begins to weigh in papers published in the mid 2000s. When it is indeed
tackled globally, the point of view always refers us back to nation-specific particularities and country
magnitudes:

that [global security] has occurred in an era of accelerating complexity in global interconnections and
transnational flows of people, capital and ideas

(Ulrichsen, Kristian (2009) The evolution of internal and external security in the Arab Gulf States.
Middle East policy, 16 (2). pp. 39-58.)

National desires for security based on neoliberal globalisation transnationalizes violence and
insecurity. By neoliberal globalisation, we refer to the developmental maxims of international
financial institutions like the International Monetary Fund (IMF), World Bank, U.S. Treasury, Citigroup,
as well as the central banks of the world's richest economies. These maxims come in familiar sound
bites: for example, ``free trade benefits everyone,'' ``economies need direct foreign investment to
develop,'' ``liberalisation and privatisation deliver a level playing field,''`governments should not
intervene in the economy,'' and ``markets know best.'' Most Arabs/Muslims agree with Osama bin
Laden's allegations of Western cultural annihilation due to neoliberal globalisation's legacy in the
Middle East (Waldman, 2001). But neither George W. Bush nor other globalizers could recognise this
grievance due to their vested interest in existing infrastructures of power and wealth. At the same
time, bin Laden funds his quest for ``pure Islam'' with riches made from his family's business contracts
with the West, economic enterprises in the Middle East and Northern Africa, as well as the
international opium trade (Robinson, 2002). Indeed, he utilizes neoliberal, corporate strategies to
design his terrorism campaign. Each camp blurs national security with neoliberal wealth such that
one comes to mean the other, regardless of the outcome.

(Anna M. Agathangelou and L. H. M. Ling, Power, Borders, Security, Wealth: Lessons of Violence and
Desire from September 11, International Studies Quarterly, Vol. 48, No. 3. Sep., 2004, pp. 517-538)

The lack of a State status (the acknowledgement thereof) conditions the concept of security:

Although, Russia and China cannot be portrayed as weak or vulnerable states in the same way, they
also face similar international and internal challenges to the legitimacy of their states and their
leaderships tend to define their security policy accordingly.

219
(Stephen Aris, The Shanghai Cooperation Organisation: 'Tackling the Three Evils'. A Regional
Response to Non-traditional Security Challenges or an Anti-Western Bloc? Europe-Asia Studies,
Volume 61, Issue 3 May 2009 , pp 457 482).

This geographical approach is object of study per se:

[...] Understand the evolution of borders by studying the evolution from National Security to
Transnationalised Insecurity

(Anna M. Agathangelou and L. H. M. Ling, Power, Borders, Security, Wealth: Lessons of Violence and
Desire from September 11, International Studies Quarterly, Vol. 48, No. 3 (Sep., 2004), pp. 517-538)

The theme social confirms that security has a social slant reflected in the different forms of social
organisation, along with the regulatory instruments and the inherent variations therein. History is to
be taken into consideration as one of the factors that bring about social variations of security. This is
observed in the sub-themes to which it is associated: cultural, law, rights, means, civil specific, form,
community, traditional.

However, this is not the only way that societal security has impacted on the EU enlargement debate.

(Eamonn Butler, Hungary and the European Union: The Political Implications of Societal Security
Promotion, Europe-Asia Studies, Vol. 59, No. 7 (Nov., 2007), pp. 1115-1144)

Indeed, it is important now to recognise that the category known as "America's nuclear secrets" not
only contains technoscientific information about how to build a nuclear weapons, it also addresses
how race, citizenship, and security are defined at the very centre of the U.S. nuclear complex.

(Masco, J. 2002. Lie detectors: On secrets and hypersecurity in Los Alamos. Public Culture 14: 441
67)

Similarly, the theme political highlights through its associated themes [identity, border, common,
institution, national, peace, process, relations] that Humanities needs to look at the organisational
aspects of society (its limits, its institutions, its integrity, the state of citizens interrelation) in order
to define its security.

The formation of RSCs derives from the interplay between, on the one hand, the anarchic structure
and its balance-of-power consequences, and on the other the pressures of local geographical
proximity ... Adjacency is potent for security.

The theme government groups all the previous themes from the centre of the map: impact, focus,
ethnic, economic, problem, change, development. Texts from Humanities disciplines lay a special
emphasis on the central role played by the body to which decision power is delegated: it is the axis
around which the geographical, anthropological and organisational dimensions of security are
structured.

This distribution into themes reflects exactly the approach that the analysed papers adopt:
international relations are present in each and every one of them, though what categorises these
documents into the field of Humanities is the approach through which international relations are
tackled (national security strategies through the prism of the existing academic debate on security,

220
the state of security through discourse analysis), or the fact that they only study security obliquely:
combined with an humanist or anthropological topic (feminism, insecurity involved in poverty).

Insecurity as such is a target topic under study, seeing as only 16 sources mention it. Judging from
the text that do, we understand that insecurity is considered a side-effect of not having achieved a
first aim: security. Interestingly enough, in the majority of sources where insecurity was mentioned,
it was linked to a regional or global perspective: Humanities tends to approach security from a
positive viewpoint when it comes to small communities or nations, and focuses on how the lack of it
affects multiple communities, through a regional and a global scale.

Thus, security discourses separate the alleged (assumed) victim of insecurity and the cause of
insecurity that is Europe and the Mediterranean respectively.

(Pace, The Ugly duckling of Europe: The Mediterranean in the Foreign Policy of the European Union,
Journal of European Area Studies 10, 2002)

"Insecurity and State Formation in the Global Military Order: The Middle Eastern Case" (Bibliography
from Ulrichsen, Kristian (2009) The evolution of internal and external security in the Arab Gulf States.
Middle East policy, 16 (2). pp. 39-58.)

Insecurity flares whenever that sovereign desire is violated, provoking fears of an external threat and
danger usually embodied by the alien, barbaric Other. This projection of the Other occurs within a
context of colonial power relations, where race and gender take on cultural or civilisational
connotations.

(Anna M. Agathangelou and L. H. M. Ling, Power, Borders, Security, Wealth: Lessons of Violence and
Desire from September 11, International Studies Quarterly, Vol. 48, No. 3 (Sep., 2004), pp. 517-538)

Because the exception confronts us centrally with some of the most troubling puzzles related to
citizenship, the field of citizenship studies needs to generate analyses - genealogies - which can begin
to diagnose the relation between citizenship and exception more fully. Not only do we need
genealogies capable of tracing the exception and the deeply intimate ways in which it threads links
between liberty, security and violence or between security, race and citizenship. We also need critical
analyses capable of making visible the ways in which those exceptions are, themselves, contested and
reshaped in ways not often intended. This paper has sought to contribute to these genealogies of the
exception by tracing some of the specific contours of one exceptional practice -the security certificate.

(Stephen Aris, The Shanghai Cooperation Organisation: 'Tackling the Three Evils'. A Regional
Response to Non-traditional Security Challenges or an Anti-Western Bloc? Europe-Asia Studies,
Volume 61, Issue 3 May 2009 , pp 457 482)

Insecurity flares whenever that sovereign desire is violated, provoking fears of an external threat and
danger usually embodied by the alien, barbaric Other. This projection of the Other occurs within a
context of colonial power relations, where race and gender take on cultural or civilisational
connotations.

221
The individual finality that was recommended from the beginning appears regularly in Humanities.
We observe that the discipline as a whole avoids on purpose (and criticise otherwise) reducing
analysis to a macro level:

a given approach to security is]insensitive to changes and transformations

(Oren Barak and Gabriel (Gabi) Sheffer, The Study of Civil-Military Relations in Israel: A New
Perspective, Israel Studies, Vol. 12, No. 1, "An Army That Has a State?" (Spring, 2007), pp. 1-27)

This human approach confers security gives rise to interesting synesthesiae which allows us to view it
from a qualitative approach:

[...] profound, institutionalised arrogance concerning security and declared the U.S. [...]

(Masco, J. 2002. Lie detectors: On secrets and hypersecurity in Los Alamos. Public Culture 14: 441
67).

An insight that is openly aware of the idiosyncrasies of human nature will look into a wider scope of
conditioning factors of the concept of security, and, most importantly, will explicitly admit their
weight. Security is thus humanised when it is the proved consequence of the following factors:

Class:
The sixth point of difference is that EU circles have also seen
Turkey as a threat just because of the fact that the majority
of the Turkish political-security elite has adopted a Euro-
skeptic attitude towards Turkey's EU accession process.
Construed as such, it is important to discuss the ongoing
discursive battle between the Euro-skeptic established
security elites and pro-EU circles in Turkey in order to
comprehend Turkey's growing critical approach towards the
EU. Of particular importance are their definition of Turkey's
security identity and interests, their view of the EU's
integration process, and their diverging interpretations of the
impact of the EU's accession process on the security of the
nation state. Turkey's particular logic towards the EU and her
performance to meet the EU's demands would strongly
depend on which group of people would rule the country.
(The Role of the EU in Turkish- Greek Relations, Ankara Paper, 2003, p.5. 158)

Gender:

We extend this usage of hypermasculinity to security and


economic domains, especially as one hypermasculine source
(e.g., U.S. foreign policy) provokes another (e.g., Al Qaeda) to
escalate with iterative bouts of hypermasculinity (e.g.,
``jihad''/``war on terror'').

222
(Anna M. Agathangelou and L. H. M. Ling, Power, Borders, Security, Wealth: Lessons of Violence and
Desire from September 11, International Studies Quarterly, Vol. 48, No. 3 (Sep., 2004), pp. 517-538)
Race:
Not only do we need genealogies capable of tracing the
exception and the deeply intimate ways in which it threads
links between liberty, security and violence or between
security, race and citizenship. We also need critical analyses
capable of making visible the ways in which those exceptions
are, themselves, contested and reshaped in ways not often
intended.
Aitken, Rob. Source: Citizenship Studies, Volume 12, Number 4, August 2008, pp. 381-396(16).
Publisher: Routledge

Culture:

He argues that the Hobbesian, Lockean, and Kantian cultures


are each characterised by distinct logics and tendencies
indicative of the dominant roles of enemy, rival, and friend,
respectively (1999: ch.6). In systems where a Hobbesian
culture predominates, states know that their survival is
always in jeopardy, whereas in a Lockean culture states know
that their survival is secured.
Howes, Dustin Ellis. 2003. When States Choose to Die: Reassessing Assumptions about What States
Want. International Studies Quarterly 47 (4): 669-92.
Ideology:

Even as this passage eloquently condenses the key features


of environmentalism as a political ideology, it reproduces the
central elements of the security paradigm.

Gourevitch, A. EnvironmentalismLong Live the Politics of Fear, Public Culture Fall 2010 22(3): 411-
424

We understand that in the event that these factors are indeed determinants, then all concepts within
the sphere of security will be shaped by them. As a result, power can be also humanised, borders can
be analysed also from a non-physical perspective, the military must also be analysed on cultural
grounds, and further on. Humanising these fields means objectivity cannot be required from them,
that a unidirectional approach of study will always be incomplete. What is more, unless juggled
carefully, these person-conditioned factors can be latent threats.
Elites and their lieutenants appeal to the ``collective good'' to
mask such maneuvers. Meanwhile, they exploit the same for
labour, resources, and ideological support. Herein lies the
system's inherent contradiction and potential for instability.
The human, the societal (the human factor under a form of organisation) and the geographical
aspects of security can intertwine and give rise to a destabilizing factor which actually triggers
insecurity:

223
The inhabitants of each location may rail against the other as
the source of their troubles, yet they are the ones who know
only too well the consequences of failing to transform such
violence. Their demand for an alternative social and political
project, however, is drowned by their leaders' desire for and
execution of ``national security,'' conventionally defined as
sovereign, stable boundaries and identities (Weldes and
Saco, 1996; Behnke, 1998; Campbell, 1993, 1998; Neumann,
1999).
As quoted in Anna M. Agathangelou and L. H. M. Ling, Power, Borders, Security, Wealth: Lessons of
Violence and Desire from September 11, International Studies Quarterly, Vol. 48, No. 3 (Sep., 2004),
pp. 517-538.

The concept of stability that was made reference to in the definition is inherent to the concept of
security, inasmuch as it goes beyond a mere continuum in a given period of time: it can be further
understood as the continued absence of the need to use the resources at the disposal of states.

What the EU hopes is at least to provide for a minimum degree of internal stability in those areas,
defined as the absence of militarised warfare, before investing in structural development.

(The Role of the EU in Turkish- Greek Relations, Ankara Paper, 2003, p.5. 158)

Finally, we can understand security as a dimension itself:

As a trait that defines a certain community:

The post-modern understanding of the EU's accession process also holds that the EU treats currently
non-EU members as "less European" rather than "non-European." If so, there does not exist any taken
for granted reason not to join the EU, except rationally inconceivable cases, once aspirant countries
internalise EU's international/security identity.

The lack of a pure state-centric/realpolitik security culture within the EU would certainly shape the
EU's engagement with third states, as the accession criteria are understood as an EU attempt at
dealing with the security challenges around the EU's periphery.

(Abboud, Samer. The siege of Nahr Al-Bared and the Palestinian refugees in Lebanon. Arab Studies
Quarterly (ASQ) Jaarg. 31 Nr. 1-2, January 2009)

As a geostrategic asset (triggering it can be deliberate, not actually respond to a given need):

So the Europeanisation of these problems is in fact an opportunity, not an obstacle as the Euro-
skeptics argue, for Turkey to come closer to the EU and thus claim its rightful place in the western
international community.

(The Role of the EU in Turkish- Greek Relations, Ankara Paper, 2003, p.5. 158)

September 11 has generalised a sense of insecurity that transcends the American state. Three
conventions established since the end of the Cold War now seem suspect: for example, U.S. power

224
reigns supreme,' borders dissolve in a globalised world, and liberal capitalism secures prosperity,
democracy, and stability for all. All ask now: Whom can we trust?
(Anna M. Agathangelou and L. H. M. Ling, Power, Borders, Security, Wealth: Lessons of Violence and
Desire from September 11, International Studies Quarterly, Vol. 48, No. 3 (Sep., 2004), pp. 517-538)

Humanities researchers discourse analysis is markedly aware of the weaknesses that discourse itself
can have:

flexible definitions of Islamist extremism and terrorism, which are consistent with the interpretations
used by the Central Asian, Russian and Chinese leaderships in their own domestic affairs (Allison
2004, p. 482). As highlighted by Lukin, agreement on common definitions of terrorism, extremism and
separatism, at a very early stage, `is very important, considering that problems in agreeing on
definitions often prevent international cooperation in combating these phenomena' (Lukin 2007, p.
142).

(Stephen Aris, The Shanghai Cooperation Organisation: 'Tackling the Three Evils'. A Regional
Response to Non-traditional Security Challenges or an Anti-Western Bloc? Europe-Asia Studies,
Volume 61, Issue 3 May 2009 , pp 457 482)

In addition, it is openly critical of the utilitarianism that surrounds general discourse on security:

This provides legitimacy to act with force to defend their position against any opposition that can be
defined as representing a violent challenge to their authority. As Goldsmith points out `under this
convention, terrorism, extremism, and separatism are given broad definitions, providing its
signatories with wide latitude to repress dissidents and insurgents alike' (Goldsmith 2005)

As quoted in Stephen Aris, The Shanghai Cooperation Organisation: 'Tackling the Three Evils'. A
Regional Response to Non-traditional Security Challenges or an Anti-Western Bloc? Europe-Asia
Studies, Volume 61, Issue 3 May 2009 , pp 457 482.

6.3.1.1.16.1 Religious texts


The Bible does not include the word security; however, it does makes reference to
derivatives like secure, which in most cases appear in a context where security is
understood as a mental state characterised by the absence of fears or concerns (how they
dwelt careless, after the manner of the Zidonians, quiet and secure; and thou shalt be secure,
because there is hope; Devise not evil against thy neighbour, seeing he dwelleth securely by
thee). Furthermore, there are references to security through metaphorical images in which
security is understood as the certainty of experiencing eternity, it can be identified physically
with a feeling of gladness, relief and sureness, and is in many cases synonym with
salvation: but we had to celebrate and be glad, because this brother of yours was dead and
is alive again; he was lost and is found. It is also of the essence to mention the concept of
salvation, as the main source of relief, and therefore, provider of the sense of security.
Salvation refers to eternity, which at the same time is recurrently linked to the concepts of
life, redemption and kingdom.
Similar conclusions can be drawn from the Koran, where up to 72 references are made to the
word security. This concept represents the possibility of relying on a given factor, and the
physical relief involved: You will find others who wish to obtain security from you and [to]

225
obtain security from their people. Every time they are returned to [the influence of] disbelief,
they fall back, Then when you have finished the prayer, remember Allah standing and
sitting and reclining; but when you are secure (from danger) keep up prayer; surely prayer is a
timed ordinance for the believers., It is He who created you from one soul and created from
it its mate that he might dwell in security with her. And when he covers her, she carries a
light burden and continues therein.. It can also reflect being physically protected from
dangers: Therein are supremely evident signs: the station of Ibrahim. (Abraham) And whoever
enters it is secure. And it is (a duty) upon mankind towards Allah (to come) to the Home on
Pilgrimage, for whomever is able to make a way to it., Allah made the Ka'ba, the Sacred
House, an asylum of security for men, as also the Sacred Months, the animals for offerings,
and the garlands that mark them [...].
The Talmud, on the contrary, adopts a very different line of thought from the Bible and the
Koran. Most references made explicitly to security are related to material, and, in particular,
economic aspects regulated by the text. mishnah. if one misappropriated [foodstuff] and fed
his children or left [it] to them [as an inheritance], they would not be liable to make
restitution, but if there was anything [left] which could serve as security they would be liable
to pay (Baba Kamma 111b,CHAPTER X), Our Rabbis taught; If the debtor has no land but one
who is security for him has land, a prosbul may be made out for him. If neither he nor his
security has land but a man who owes him money has land, a prosbul may be made out for
him.,
In conclusion, security can adopt different slants according to religion and the aim of the religious
text. When it is focused on regulating material aspects of everyday life, such as many of the texts of
Judaism, it is synonym with material justice and stability. However, when in texts typically present in
the Bible and the Koran, it acquires a human nuance, where human is identified with emotional life.
On the one hand, on a mental level: it represents a solid protection from fear or concerns, a feeling
of mental rest. In this sense, it approaches the meaning of the original Latin word it comes from,
securus, "without care or anxiety. On the other hand, on a physical level, it constitutes a solid
protection from dangers or damages.

Similarly, security can be classified into temporal categories: it is immediate (felt when applying a
number of principles), infinite (the sense of certainty linked to an eternity free of concern or
suffering). It is worth noting that both aspects can take place at the same time, it is dynamic.
Security, as an achievable reward resulting from deliberate religious action, grants protection during
pledge and as a result of pledge, given Gods unceasing nature, and the unceasing nature that
automatically acquires the believers relationship with him. Security thus implies in a certain way
perseverance.

Both classifications allow for a third one: the different conceptions of eternity make security eligible
for both qualitative and quantitative measuring: security is timeless, and it is assuaging as well.

6.3.1.1.17 Sources of Security in Humanities


From the analysis of the dimensions that we outlined above we conclude that security is provided for
when the following fields fall within planning (prevention):
Setting the basis for sustainable relations within a given territory;

226
Taking into account the ways in which the nature of such territory (culture, demographics,
ideology, but, most importantly, the individual) might shape security;
The consequences of those factors in the extent and approach whereby security is
accomplished (in terms of discourse, extent on a national and international level, means,
threats, periods of time);
Efforts to anticipate to potentially destabilizing factors;
The establishment of guidelines and the acknowledgement and respect of these both
nationally and internationally, in case of conflict and of peace;
The inclusion among threats of both governmental and non-governmental factors (health,
energy, environment).

Insecurity will be brought about by the neglection of these factors. In this regard, Humanities
researchers are wise enough to take a step back and appoint insecurity the right role in conflicts: it
isnt the cause of conflict, but one of its manifestations:
We suggest that the problem [...] is its emphasis on crises
while avoiding the structural problem that underpins them.
In other words, we think that the crises are the symptoms of
the disease rather than its causes. [...] Unlike these
approaches, we maintain that what has actually happened
were growing mutual suspicions and competition over
resources and policy-making between civilian and security
actors
(Oren Barak and Gabriel (Gabi) Sheffer, The Study of Civil-Military Relations in Israel: A New
Perspective, Israel Studies, Vol. 12, No. 1, "An Army That Has a State?" (Spring, 2007), pp. 1-27)
This perspective is also made evident seeing as the concept of sources of security or insecurity is
constantly relativised:

On the opposite side, Turkey both "broadened" the range of


issues that it sees as threats to its national security and
"narrowed" its perspective on dealing with them to largely
military means.71 The use of force as an instrument in
dispute settlement has become more likely, at least in initial
stages.

(Abboud, Samer. The siege of Nahr Al-Bared and the Palestinian refugees in Lebanon. Arab Studies
Quarterly (ASQ) Jaarg. 31 Nr. 1-2, January 2009)

6.3.1.1.18 Solutions in Humanities


It is difficult to extrapolate a common strategy from all 101 documents. That being said, we could
identify common patterns when approaching security strategies.
Security is never tackled without it undergoing an analysis of factors which allow for it once
planned or controlled.
[...] in many cases only partial analyses are produced. This
strategy generally has the advantage of higher precision, but
at the expense of lower recall.

227
Marianne Heimbach-Steins: Education for World Citizens in the Face of Dependency, Insecurity and
Loss of Control, in: Studies in Christian Ethics 19.1 (2006)
The state defines who are or what phenomena constitute
threats to security and how they should be dealt with. It can
also control the discourse by outlining the future of the nation
and its security, defining a national security strategy in the
process.
Kassenova, Nargis. Kazakhstan's national security: conceptual and operational aspects. Central Asian
Survey, Volume 24, Number 2, June 2005 , pp. 151-164(14)
Strategies are always linked to (and therefore expected from) governmental authorities, be it
individuals or international partnerships:
It was replaced by Pax Saudi-Iranica, a product of the Nixon
strategy of using proxy powers to maintain U.S. influence.
zden Zeynep Oktav (2011) The Gulf States and Iran: A Turkish Perspective, Middle East Policy,
Volume 18, Issue 2, pages 136147, Oct 4, 2011
Strategies to tackle security rarely are isolated. They generally constitute a comprehensive
plan.
[...] was applying a "twin-track" strategy - on the one hand,
warning Pakistan against the continuation of its nuclear
program, and on the other, trying to convince Congress to
waive the nonproliferation rules for Pakistan to that the
Soviet could be effectively countered in Afghanistan.
Syed Farooq Hasnat. 2011. Pakistan - U.S. Relations on Slippery. Grounds: An Account of Trust and its
Deficit. Pakistan Vision Vol. 12 No. 1
That being said, a strategy can consist of isolating factors, with a view to making their control
easier. The identification of the different aspects that cater for security as separate entities
within a complex system is of the essence. It may be necessary to carry out this part of the
process several times during the strategy.
This strategy involves a calculation of who the Other is and
therefore carries power notions. More specifically, this
section seeks to ad- dress the context in which the EU
recognises a Mediterranean entity.
The Ugly Duckling of Europe: The Mediterranean in the Foreign Policy of the European Union.
Author: Pace M. Source: Journal of European Area Studies, Volume 10, Number 2, 1 November 2002 ,
pp. 189-210(22)
Prison is another form of displacing someone, to isolate
them. This has been a strategy used by the Dutch since Tjoet
Nya Dhien.
Living through terror: everyday resilience in East Timor and Aceh. Author: Siapno, Jacqueline Aquino.
Source: Social Identities, Volume 15, Number 1, January 2009 , pp. 43-64(22).
The chance for failure is never overlooked. Strategy is expected to require changes. Mistakes
from strategists, or their need to seek alternatives to their initial proposals, is not only
accepted, it is also taking into account as a possibility from the start of the strategy.
The hegemonic strategy does not deviate from U.S. policies in
previous periods and thus risks more policy failure.

228
Kraig, Michael. Assessing alternative security frameworks for the Persian Gulf. - Middle East Policy -
Nbr. 113
It was an approach that rejected the relevance of existing
doctrines for the postSeptember 11 world; in doing so, it
represented the most fundamental reshaping of American
grand strategy since containment (Gaddis 2002). Most
significantly, the doctrine of deterrence (which had been at
the heart of containment) was replaced by the doctrine of
preemption.
Glen, Carol M., The United Nations. Charter System and the Iraq. Wars:Ethical Implications, v. 11, n.
4, 309326.
After describing the chain-ganging that supposedly started
World War I, Waltz (1979:167) notes that each state was
constrained to adjust its strategy and the use of its forces to
the aims and fears of its partners. But this dynamic cuts
both ways.
Tierney, D. (2011), Does Chain-Ganging Cause the Outbreak of War?. International Studies Quarterly,
55: 285304.
Appealing to recurrent strategies can be a strategy itself and it goes in line with the
identification of security and stability (the concept of cliency as a strategy to protect
security interests in Mary-Ann Treteault, Autonomy, Necessity and the Small State: Ruling
Kuwait in the Twentieth Century, International Organisation Vol. 45, No. 4 Autumn 1991,
pp. 56591.)
The linkages between geographical factors and security are inevitable found in strategy, both
when implementing it (it is easier to structure the actions that must be carried out in limited
boundaries) as well as the results of it:
In order to meet the new and dangerous threats, so different
from those of the Cold War era, the Prague Summit decided
upon the creation of a NATO Response Force of rapid
deployment.10 The enlargement strategy of the Alliance was
reformulated and rationalised to serve a broader
geostrategic perimeter of security provision.
Stefanova, Boyka. NATO's Mixed-Policy Motives in the Southeast-European Enlargement: Revisiting
Balkan Geopolitics. Journal of Contemporary European Studies, Vol. 13, No. 1. (2005), pp. 39-58
Fighting terrorism also needs to become a central element in
the regional- security strategy, with great emphasis on the
Gulf region.
Kadry Said, M., Potential Egyptian Contribution to a Security Framework in the Gulf, Middle East
Policy Journal, vol. XI, no. 3, Fall, 2003.
However, the common denominator of humanities papers and which therefore constitutes
the more prominent strategy is the common appeal to a idiosyncrasy-aware approach
throughout policy formulation and implementation.
Finally, we shouldnt fail to point out a clear tendency among some more recent papers to
question traditional approaches to strategy:

229
Up till now, this concept of evacuating based on community,
not geography has yet to be studied and tried as an
alternative strategy.
Siapno, Jacqueline Aquino. Living through terror: everyday resilience in East Timor and Aceh. Social
Identities, Volume 15, Number 1, January 2009 , pp. 43-64(22)

6.3.1.1.19 Dimensions Text mining results (baskets)


The theme military dimensions is related to concepts such as: war, military,
support,terrorism, country, clear, arm, case.
The theme policy is associated with: foreign, continue, relation, remain, cooperation,
region,state, interests, role, position, power, situation.
The theme Turkey is linked to: Europe, possible, world, cooperation, process, security.
The theme social-political dimension relates to the concepts: institutions,dimensions,
territorial, security, domestic, national, approach, identity, political.
Theme government associates with concepts such as: global, influence, involved change,
effects, impact, dimension, economic, global, problem, international law dimension.
Use is linked to: measure, result.
Society is related to concepts such as: traditional, ethnic, create, civil, form, human, law,
means, practices, society, argued.
Human dimension is related to concepts such as: religious, differential, people, social,
cultural, human, particular.
Educational dimension is related to concepts such as: technology dimension, natural resource
dimension, environment, health dimension, research, work, population, public, areas,
information.

Law

6.3.1.1.20 Meta-analysis
The types of academic publications selected focus on the concept and the theory of security as
viewed within the disciple. For the manual analysis the attention has been directed towards
identifying the key articles, books and authors that have led and shaped the discourse on security in
the discipline. These types of academic papers are indeed most likely to be found in all selected
disciplines.

The date of publication of the selected publications must enable a comparison of the evolution of
disciplines discourse and between disciplines. For this reason, the selected documents cover a time
period from the post-Cold War (+ end of the nineties when applicable), after 9/11, and the most
recent documents.796

796
The following articles and books have been included in the manual analysis of the disciplines discourse:
Chabinsky, Steven R. Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Line. Journal
of National Security Law & Policy 4 (2010): 2739; Crane, David M. Fourth Dimensional Intelligence Thoughts
on Espionage, Law, and Cyberspace. Intl L. Stud. Ser. US Naval War Col. 76 (2002): 311321; Didier Bigo, Sergio
Carrera Elspeth Guild R.B.J. Walker. The Changing Landscape of European Liberty and Security. European
Commission, 2007; Frerks, Georg, and Homan, Kees. Human Security: a Launching Pad for Debate and Policy?
Security & Human Rights 19, no. 1 (2008): 17; Goldewijk, Berma Klein. Why Human? The Interlinkages

230
There are a number of observations that can be made with respect to the main historical trends that
emerge from the analysis of the key papers and their evolution.

A combination of disciplinary paradigm shifts, policy changes, and world political events has
pushed security to the forefront of the law agenda;
9/11 and cyber security have challenged law practice and values, making the distinction
between public safety and private protection, policing and security services highly blurred.
Security measures, decided by states, have started to have grave implications for civil
liberties ;
The majority of documents view security as a public good, as a means to other goods, which
should governed by a series of principles;
Security emerged as a highly broad concept that traverses national boundaries and the
public and private divide ( including private enterprises and single individuals);
A comprehensive plethora of actors, which are state and non-state actors, are viewed as
involved in security (e.g police, local authorities, inter-agency partnerships, voluntary groups,
and private citizens);
Security study should be a multidisciplinary enterprise. The security field is deemed to have
been historically dominated by disciplines, traditionally concerned with security, such as
international relations, public international law and war studies. There is a need for different
disciplines, such as political theory, legal philosophy, and economics, to study security;
The growth of surveillance, situational crime prevention, risk assessment, management, and
civil preventive measures in modern society has signified a shift from the largely traditional
retrospective orientation of law to the emergence of a new actuarial justice where
prospective and preventive measures as well as prudentialism dominate.

6.3.1.1.21 Themes

Theme Connectivity Relevance

including 100%

law 92%

Between Security, Rights and Development. Security & Human Rights 19, no. 1 (2008): 2436; Hardy, Keiran.
WMDs: Cyber-attacks Against Infrastructure in Domestic Anti-terror Laws. Computer Law and Security Review
27 (2011): 152161; MacArthur, Julie. A Responsibility to Rethink? Challenging Paradigms in Human Security.
International Journal 63 (2008 2007): 422443; MacLean, George A. Human Security and the Globalisation of
International Security. Whitehead J. Dipl. & Intl Rel 7 (2006): 8999; Nojeim, Gregory T. Cybersecurity and
Freedom on the Internet. Journal of National Security Law & Policy 4 (2010): 119137; Oberleitner, Gerd.
Human Security: A Challenge to International Law? Global Governance 11 (2005): 185203; Peissl, Walter.
Surveillance and Security. ITA, 2002; Sharp, Walter Gary. The Past, Present, and Future of Cybersecurity.
Journal of National Security Law & Policy 4 (2010): 1326; Spector,Bertram, and Wolf, Amanda. Negotiating
Security: New Goals, Changed Process. International Negotiation 5 (2000): 411426; Vassilios, Grammatikas.
EU Counterterrorist Policies: Security Vs. Human Rights? EC-HUMSEC, 2007; Zedner, Lucia. Security: Key Ideas
in Criminology. London: Routledge, 2009; Zellner, Wolfgang. Addressing Transnational Threats and Risks -A Key
Challenge for the OSCE. Helsinki Monitor 16 (2005): 214217.

231
political 81%

rights 69%

different 57%

provide 56%

information 56%

potential 47%

interest 39%

Security 23%

payment 08%

Article 06%

AFSJ 05%

women 05%

available 03%

eds 01%

HUMAN RIGHTS 01%

These are the key themes emerging both from the qualitative analysis of the documents and the text
analysis.

Complex, Multidisciplinary and Integrated: Security requires a multidisciplinary approach


given its broad meaning and impact. This multidisciplinary stand should also address the
issue of multiple interpretations and meanings that have been given to or associated with
the concept of security.797
Human Security: The concept of human security is viewed as an important and fundamental
perspective for security. Since human security promotes a new focus on people rather than
states and defines security as residing in personal, communal, and environmental protection,
not only or chiefly in national or military security, it allows the convergence between
international relations and law, state and individuals, public and private dimension.798
Securitisation: Security provides the lens through which more and more problems are
assessed. It is interesting to note here that while in the early publications the broadening of
the security agenda is fully endorsed and no negative impact of this broadening is foreseen,

797
Zedner, Lucia. Security: Key Ideas in Criminology,Routledge, London, 2009, 3
798
Goldewijk, Berma Klein. Why Human? The Interlinkages Between Security, Rights and Development.
Security & Human Rights, Vol.19, No. 1, 2008, 2425.

232
more recent papers take a slightly different view. They point to the rising risk of competing
interests or perspectives being sacrificed to the more pressing claim of security. Above all
this refers to the sacrifice of civil liberties. More recent publications indicate the need to
balance the attention given to all aspects of human life, which may threaten human survival
or the safety of everyday life, with the risk of demoting other concerns to security and
therefore legitimising emergency powers.799

6.3.1.1.22 Definitions of Security in Law

6.3.1.1.22.1 Human Centred, Equally Universal and Pluralistic, Global, Broad, Developmental,
Normative, Protective, Contextual-Relational and Prospective
The majority of the academic publications underline the importance of a human centred definition of
security, where individuals and community have primacy on the state. In this approach, security
extends downwards from states to human beings and expands from there upwards to the
international system, and wider, to global humanity.800 It is interesting to note here that this human
concept has progressively developed by broadening both in meaning and reach. Initially, the focus
was on national political, economic and social rights: Right to survival, to livelihood, and to basic
dignity for the citizen of a nation. Now the concept is extremely broad and is centred on a pluralistic
and global humanity (the who) and the safety of everyday life (the what); this safety ranging from
freedom from the uncertainty of catastrophic diseases to disruptive or persisting ecological disasters
and economic downturns.801 This implies the recognition of the profoundly pluralistic character of all
human life and therefore, since the two terms are highly interrelated, of security. However, once you
have tightened the definition of security to a pluralist and human centred nature, the concept
becomes highly flexible and relational to its attainments (avoidance of threats) , therefore escaping
an objective dimension. Its meaning becomes the product of location and context where local
conditions and local understandings of what threatens and how best to protect against it shape the
definition.802

In addition, all the publications stress the protective and developmental nature of security. Key
objective of security is to provide protection to individuals from threats, through their neutralisation,
through avoidance, or through non-exposure to risk.803 More recently this objective has been further
extended to include the development of individuals potentials.804

Quite obviously, security has a normative nature. Security is a public good, a means to other goods.
This has been a constant stand within the discipline.

Finally, a more recent development, closely associated with the objective of protection and
avoidance of threats as well as the expansion of cyber capabilities and terrorist fears, is the idea of
the prospective nature of security. This means the movement towards a pre-threat/pre-crime

799
See on this Spector, Bertram, and Amanda Wolf, Negotiating Security: New Goals, Changed Process,
International Negotiation, Vol. 5, 2000, 411416 and Zedner, Lucia. Security, 45.
800
Goldewijk, Berma Klein. Why Human?, 28.
801
Ibid, 13.
802
Zedner, Lucia. Security, 11-13
803
Spector, Bertram, and Amanda Wolf, Negotiating Security, 412; MacLean, George A. Human Security and
the Globalisation of International Security. Whitehead J. Dipl. & Intl Rel, Vol. 7, 2006, 89-91
804
Goldewijk, Berma Klein. Why Human?, 29-30.

233
approach, where the emphasis is on precaution rather than punishment after the threat/crime has
occurred.805 This stand is, however, highly controversial within the disciplines since some documents
underline its negative impact on civil liberties.806

These observations are corroborated by the text-mining analysis.

The results of the text-mining analysis emphasise the human centred approach, by selecting the
Human concept as strongly associated with one of the key themes, Rights. The concept Persons
and Individual is also closely associated with the most important theme Including. The pluralistic
and relational approach appears to be confirmed by the theme Different, which is one of the key
themes as well as the concept Relations, which is strongly associated with the most important
theme Including. The broad and global nature is supported by the key theme Including, and the
strong association of the concept International with the key theme Rights. The concept
Protection is strongly associated with the second most important theme Law. The normative
objective is supported by several concepts, such as Practice and Principle (within the Law theme)
that have been found to be strongly linked with key themes. The text fragment results also select
normative as related to security in Fen Osler Hampson and Holly Reid, Coalition Diversity and
Normative Legitimacy in Human Security Negotiations, in International Negotiation, 2003.
Development appears in the selected fragment from Law/Partner - Law (2): The interlinkages
between security, rights and development. Finally, although the concept Prospective does not
appear in the text analysis result, the themes, Potential and Information have been selected,
which both imply this prospective nature. Also the concept Future is related to Security.

6.3.1.1.23 Dimensions of Security in Law


The in-depth analysis of the law academic production underlines some key guiding principles of
security that have remained constant, although evolving in term of importance. These dimensions
can be regarded as key sources of stability too.

First clearly a Rule Based and Normative dimension, where security is viewed as public good and
governed by a set of key principles providing its legitimate underpinning. This set of values includes:
human rights, the rule of law, legitimate and accountable government, justice, freedom, tolerance,
and opportunity and devolvement for all everywhere in the world. Indeed, morality, ethics and social
co-responsibility play an important role and 'the universal values' that they promote provide a way of
maximising human security.807 This set of values needs to be re-forced at home and
established/protected overseas.

It is interesting to note here that a recent development within the law discourse stresses the
importance of striking the right balance between security and individual rights. More recent
publications indicate the need to balance the attention given to all aspects of human life, which may

805
Zedner, Lucia. Security, 5.
806
Nojeim, Gregory T. Cybersecurity and Freedom on the Internet, Journal of National Security Law & Policy,
Vol. 4, 2010, 1-137.
807
Frerks, Georg, and Kees Homan, Human Security: a Launching Pad for Debate and Policy? Security &
Human Rights, Vol. 19, No. 1, 2008, 3.

234
threaten human survival or the safety of everyday life, with the risk of demoting other concerns to
security and therefore encroaching individual rights.808

As mentioned previously the rule base and normative dimension is supported by several concepts,
such as Practice and Principle, that have been found to be strongly linked with the key theme
Law. Rights and Human Rights have also emerged as key themes.

Second, Multi-Agent and Highly Cooperative where states are not longer seen as the main actor in
and guarantor of security. Given the trans-national nature of modern and future threats and the
emphasis on a global and pluralist humanity, security is obtained and protected by the activities and
close cooperation of multiple agents, acting at different levels. These agents could be: local
communities, single individuals, international organisations, private companies, civil society
organisations, police, local governments, etc. It is important to note here that as the concept of
security has broadened in more recent papers so the multi agent inclusion. Furthermore the national
basis of these agents has also evolved more recently to include concept such as transnational actors,
cosmopolitan citizens and non-citizens. 809 Including in this dimension is also clearly the
multilateralism stand (e.g importance of international organisation and state cooperation).

Third, Comprehensive and Integrative to build an integrated response that cuts across departmental
lines and traditional policy boundaries. This implies a greater emphasis on the soft component of
security (such as economic, social, environmental) rather than the hard power (military, nuclear, etc)
as well as the close integration between domestic and foreign policy, civil and private and among
public, private, and third sectors.810

The theme Including, which is the most important theme, seems to indicate the comprehensive and
integrative dimension. Indeed, NationaI, Public, Relations are all strong concept within the
Including theme so suggesting reference to the strong focus on soft power and the need for
integration across different levels and sectors. The concept Social is also identified as having a
strong relation with the key theme Political. Finally Security is closely related to concepts such as
Civil, Investors, and Business, all indicating this comprehensive and integrative dimension.

Four, Prevention and Risk Management in order to address the underlying causes of insecurity and
protect through the management of the risks and the potential avoidance of the threat. This includes
activities such as: early warning, preventive actions, surveillance, situational crime prevention, risk
assessment and management, civil preventive, actuarial justice, etc. As mentioned previously, it is
important to note here that the debate is extremely polarised on the negative and positive tread-off
of all these activities.811
Although prevention has not been detected by the text analysis as an important theme or a related
concept to Security, Information, which is a key component for prevention and risk management,
has been identified as a strong theme. Protection is also a key concept within the key theme Law.
Protection implies a preventive dimension. Future has also been associated with Security. Finally,

808
See on this Spector, Bertram, and Amanda Wolf, Negotiating Security: New Goals, Changed Process,
International Negotiation, Vol. 5, 2000: 411416 and Zedner, Lucia. Security, 45.
809
Goldewijk, Berma Klein. Why Human?, 35-35.
810
Strategic Defence Review, 1998, pg 5-7; The National Security Strategy of UK: Security in an Interdependent
World, 2008, pg.8;
811
Zedner, Lucia. Security, 56.

235
an in-depth analysis of the selected fragments also indicates the preventive aspect and clearly linked
it with surveillance. In Zender, 2007, the following fragment has been selected: The logic of security
dictates earlier and earlier interventions to reduce opportunity, to target harden and to increase
surveillance even before the commission of crime is a distant prospect.

Finally, the Safeguard of the Key Institutions is the last dimension of security that emerges from the
selected papers. This refers to institutions, which provide the main mechanisms for ensuring that
individual rights and interests are respected and individual development can occur. While initially
these key institutions were mainly perceived as national (e.g., police, court, etc) now they are
acquiring a much more international (e.g., IGOs and NGOs) and agent focus (e.g., participate and
responsive civil society) nature. Indeed the present debate within law is around two contrasting
positions: those who hold that the defence of strong state institutions is essential for the
preservation of security and those instead who propose a more de-centred agenda812

Several of the key concepts associated with key themes, such as System (within Including),
States and EU (within Rights) and Government (within Law), all appear to underline the
importance of established institutions. Also, Security is highly related to EU and Commission.

6.3.1.1.24 Sources of (In)security in Law


Breaches of Fundamental Rights and Lack of Democracy and Legitimate Structures. As expected the
academic discourse in law has constantly stressed the vital importance of maintaining standards of
justice and humanity and promoting fundamental rights and democracy as anchor for peace,
stability and development. As a result, any breach of these standards/rights produces instability and
promote internal and external tensions between diverse and different actors/agents.813 As the
fundamental rights have increasingly expended to include more dimensions (civil, political, economic,
social and cultural) so the variety and impact of these breaches. Recently privacy rights have
emerged as taking more attention and importance as well as the concept cyber rights (see discussion
on cyber threats below).

The results of the text analysis also seem to agree with the manual analysis. Human and
Fundamental are strongly associated with the key theme Rights. The concepts of Freedom
Principle and Practice have also been identified as related to the key theme Law. Furthermore, the
key fragment, explaining the concept Institution, which is closely associated with the theme
Political, contains a clear reference to institutional legitimacy: This calls for an open political
culture, transparent procedures and practices, a commitment to openness that is entrenched
through institutional accountability.

6.3.1.1.24.1 Globalisation, Development, Transnational Threats, Failing/Overstreached States,


Violent Conflicts
Globalisation and development are both seen as source of security but also of insecurity. These two
factors are producing destabilising consequences that cut across the politico-military, economic,
environmental and human dimensions, than any traditional or hard threat ( e.g., major armed
conflicts).

812
Ibid, 50.
813
Frerks, Georg, and Kees Homan, Human Security, 3.

236
Development and Conflict have both been identified by the software as associated with the key
theme Political.

Indeed, transnational threats surface from this destabilising ground.814 Specifically, the academic
discourse in law underlines the importance of organised crime and trafficking in drugs, weapons and
human beings as source of insecurity. In relation to economics, factors such as corruption, fraud,
persistent poverty, high unemployment and economic downturn are all identified as source of
insecurity by the majority of the publications. Environmental factors are also important, specifically
environmental degradation (e.g the degradation of land and water-related ecosystems) and climate
change. These are in turn linked to food and water insecurity. Demographic factors are also viewed
as high risk, above all widespread degradation of health and practices of discrimination and
intolerance.815 It is important to note here that the nature of all these threats has been constantly
treated as transnational, even in the older articles. Furthermore, all the transnational threats are
deemed interlinked and having complex and long-term nature.

Enabling ground for transnational threats are weak and overstretched state structures that cannot
function properly as protector of individuals and their rights and as provider of individual
development816 (this is also clearly connected with the first threat related to lack of legitimacy).

Finally, these transnational threats have also the power to trigger violent conflict, involving both
intrastate and inter-state war.817

Large scale accidents, natural hazards and pandemics are all included as main source of insecurity in
several publications indicating that the meaning of security has broadened and the highly uncertain
environment facing humanity. Catastrophic diseases and persisting ecological disasters have been
gradually considered to bring greater impact on the individual safety of everyday life.818

Careful reading of the fragments stresses the interrelation between environmental changes and
infections disease [in Law/Dimensions - Law , (2001) The Health of Nations: Infectious Disease,
Environmental Change, and Their Effects on National Security and Development (Cambridge, MA:
MIT Press)] while identifying another source of demographic insecurity in population trend [Homer-
Dixon and J. Blitt (eds.), Ecoviolence: Links Among Environment, Population and Security (Lanham:
Rowand and Little eld 1998)].

Terrorism is identified as another source of insecurity in the majority of articles. Terrorism is seen as
a transnational force and caused in turn by other sources of instability. The need is stressed in
relation to addressing the factors that contribute to radicalisation (social, political and economic
conditions) and recruitment to terrorist groups. In more recent publications, terrorism is also linked
to cyber attacks against domestic and international infrastructures. These infrastructures are
identified as the following: a telecommunications system; or a financial system; or a system used for

814
Zellner, Wolfgang. Addressing Transnational Threats and Risks -A Key Challenge for the OSCE. Helsinki
Monitor, Vol.16, 2005, p. 215.
815
Ibid
816
Ibid, p. 215.
817
Goldewijk, Berma Klein. Why Human?, 27.
818
Ibid

237
the delivery of essential government services; or a system used for, or by, an essential public utility; a
system used for, or by, a transport system.819

Terrorism has emerged as a key concept with the main theme Law. Furthermore, an in-depth
analysis of the text fragments selected appears to support the radicalisation factor as an important
cause of terrorism: Cause, which is related to the main theme Including, provide the link between
terrorism and radicalisation: The new outbreak of terrorism has been caused by Islamic jihadists
both from abroad and, more recently, home grown. This has had profound implications for the
maintenance of a peaceful multicultural Britain.

It is also important to note that more recent publications underline the blurring of the distinction
between terrorist threat and serious and organised crime; between anti-terrorist measures and crime
prevention; and between security services and the police.820

In relation to the Cyber threat, this is also interrelated with the need for privacy protection, with
privacy now emerging as a key individual right. In more recent article, lack of privacy is indeed
becoming an important source of instability821 potentially jeopardising development, economic
growth as well as individual freedom and dignity.

The key theme Information, which is related to cyber threat, has been identified by the text mining
software. Observing the results of the text-selection, the following fragment has been identified:
future defence capability against diverse and often asymmetric threats will depend on secure and
robust communications in Defence Industrial Strategy: Defence White Paper, 2005. A more details
analysis of the text fragments also provides support for the lack of privacy as source of insecurity. In
Lack Privacy /Law/Partner Law, the following text indicates concern for inadequate legal framework
for privacy: Bellanova (March 2009), Data Protection in the Area of Freedom, Security and Justice: A
system still to be fully developed?, Study requested by LIBE.

6.3.1.1.25 Law: Takeaway points


Security has taken on a human meaning in the era of globalisation, growing interdependence
and uncertainty
The emphasis in on the global and transnational nature of security, the interconnection and
complexity of threats and risks to security
The concept of security is extremely broad gradually expanding to include the safety of
everyday life and the protection of a global humanity
The initial universalism has been substituted by the recognition of the pluralistic nature of
human life and security. This makes security a highly local and context depend concept
Security requires a fully comprehensive approach where the emphasis is on the soft
component of security (such as economic, social, environmental) rather than the hard power
(military, nuclear, etc) as well as the close integration between domestic and foreign policy,
civil and private and among public, private, and third sectors.

819
Hardy, Keiran. WMDs: Cyber-attacks Against Infrastructure in Domestic Anti-terror Laws. Computer Law
and Security Review, Vol. 27, 2011: 153.
820
Zedner, Lucia. Security, 117.
821
Nojeim, Gregory T. Cybersecurity and Freedom on the Internet. Journal of National Security Law & Policy ,
Vol.4 , 2010,119137.

238
State has lost its central role in providing security to a plethora of different and diverse
agents/actors (e.g., local communities, single individuals, international organisations, private
companies, civil society organisations, police, local governments, etc)
Greater importance is given to new attributes and threats, which have a transnational and
interrelated nature, from intrastate and interstate conflicts to breaches of fundamental
rights and lack of legitimacy, to the impact of development and economic growth,
corruption, fraud, Illegal immigrants, illicit goods and organised crime health-related risks,
environmental hazards, climate changes and environmental degradation, cyber security
threats and demographic trends.
Risks are both traditional and caused by state actors, modern and driven by non-state actors
and post-modern and driven by individuals.
The normative base of security, which views security as a public good and as a means to
other goods and is governed by a set of key principles providing its legitimate underpinning,
has been a constant idea in law. This set of values includes: human rights, the rule of law,
legitimate and accountable government, justice, freedom, tolerance, and opportunity and
devolvement for all everywhere in the world. Recent developments have started to expand
the range of rights to cyber rights (e.g., privacy).
Shift towards a predictive and prospective approach to security where the emphasis is on
precaution rather than punishment after the threat/crime has occurred
Shift towards striking the right balance between the need for security and civil liberties.

Psychology

6.3.1.1.26 Meta-analysis
Our set contains 69 articles published between 1991 and 2012, with only 2 published prior to 1991
(Glen Heathers, 1954 and David Gil, 1983). Many of the articles refer to experiments conducted
between the nineteen fifties and the nineteen eighties (e.g., Maslow, Harlow). In psychology,
contemporary research draws and cites heavily from earlier work. It therefore turned out difficult to
clearly ascertain whether the notion of security in psychology has really evolved over these last two
decades. The documents in our set concentrate particularly on the security of relationships within
particular groups: nations, communities, families. A smaller yet non-neglectable proportion also
included economic security and politics in its focus.

6.3.1.1.27 Themes
In psychology, a number of connected key themes generated by the text mining software are, next to
security (connectivity: 100%), attachment, social, group, political, emotional, but also
identity.
The theme attachment co-occurs with the following concepts: family, children and child,
parents, mother, relationship, conflict, adults and care.
The theme social appears with people, individuals, life, feel, women, response,
human, system, but also needs, risk and means.
The theme group appears with time, change, country, information, conditions and
limited.

239
The theme political is connected to the concepts of threats, terrorism, fear, issues, as
well as economic, community and power.
The theme emotional appears with concepts such as behaviour, or negative.
The theme identity appears next to collectivistic, suggesting the importance of group
identity.

These themes suggest the importance of emotions, affect, and the following dimensions of security:
human security, social security i.e. related to relationships and attachment security (e.g., family,
mother), economic security, as well as political and territorial security understood in the narrow
sense (i.e., country, home). These themes and issues will be explored in more detail below.

6.3.1.1.28 Concepts
According to the text mining analysis, the concept of security co-occurs with a number of concepts
of particular relevance: sense, attachment, emotional, or relationship corroborates the
observations above with regard to emotions and affect as central dimensions of security in
psychology. Concepts such as national (24%), states and government (both are likely to co-occur
with security for 20%), terrorism or leaders (both 19%), suggest the presence of the political
dimension in psychology.

6.3.1.1.29 Definitions of Security in Psychology

6.3.1.1.29.1 Security is a dialectic concept


In the psychology literature, a number of authors have noted that security can only be defined
negatively, as it is not a positive state but an absence of threats to important values such as life,
bodily integrity, health, and property.822

6.3.1.1.29.2 Security always defined in reference to...


In psychology, academic sources seem to borrow the definition of security from critical studies. In
The Concept of Security David Baldwin (1997) points out that any definition of security must meet
several conditions. Security must be defined in reference to: "(...) the actor whose values are to be
secured, the values concerned, the degree of security, the kinds of threats, the means for coping
with such threats, the costs of doing so, and the relevant time period."823 In a similar vein,
psychology bases some parts of its perception of security on a form of philosophical inheritance: for
instance, security consists in the targeting of violence and other coercive means at whomever
appears as a threat to the subject of security (...)..824

6.3.1.1.29.3 Security by definition shrouded in uncertainty...


The relationship between security and uncertainty against the background of the prevention of the
non-existing is particularly emphasised: Threat concerns are always future concerns, yet security is
produced through the pre-emption of unwanted (and unknowable) futures, by preventing them from

822
Wolfendale, J., Terrorism, Security, and the Threat of Counterterrorism, Studies in Conflict & Terrorism,
2007, 77.
823
Wolfendale, J., Terrorism, Security, and the Threat of Counterterrorism, Studies in Conflict & Terrorism,
2007
824
Buchan, B., Dying for Security, Cultural Studies Review, 2011

240
becoming actualised.825 Buchan (2011) adds: the problem relates to the very ontology of security;
to the identification of who is to be secured from whom:826 the subject of security is also subject to
the threat of insecurity. The context of uncertainty in which psychology analyses security is based on
the rise of broader concepts of security, in particular in Western thoughts, from narrow concepts
of security (such as Hobbes's) [to] a broader, more humane concept (such as human
security). In psychology, security is based on a notion of comfort, which is difficult to attain given
the existential concerns inherent to humankind. There is no limit to the insecurity of mankind, for
there is not enough security in this world to make us feel completely at ease.827

6.3.1.1.29.4 Security as an emotional concept which manifests itself in human behaviour


There is convergent evidence from various theories suggesting that psychological security and
insecurity influence human behaviour. Human security and insecurity in psychology are mostly
defined as emotional security and manifest themselves in all forms of psychological behaviour: all
the neurotic symptoms with which we are fairly familiar-anxiety, hate, guilt, inferiority, depression,
sexual maladjustment-are fundamentally expressions of insecurity.828
In line with this, other authors argue: Generally speaking, when people feel insecure, either
dispositionally (e.g., because of chronic anxiety) or situationally (due to life events or experimental
manipulations), they tend to be more defensive, rigid, aggressive, and sensitive to emotional threats
(e.g., separation from loved ones, failure, or attacks on personal beliefs). Conversely, when people
feel secure, they tend to be more open, flexible, pro-social, and resilient.829
According to the work of Keller and El-Sheikh (2011)830, emotional security is based on emotional
arousal, i.e. feelings of anger, sadness, and fear, in particular in response to marital conflict. It is
also based on behavioural dysregulation, i.e., maladaptive behavioural regulation strategies such
as yelling or throwing objects, and destructive family representations with regard to child negative
beliefs and concerns about the stability of the family.
In psychology, following authors such as Giddens (1991) and Kinnvall (2004), security is also a state of
mind based on ontological security and the avoidance of existential anxiety, which include the
notions of trust and well-being: ontological security refers to the sense of safety in an individuals
environment, and trust of other people. In other words, ontological security is a security of being, a
sense of confidence and trust that the world is what it appears to be.831

6.3.1.1.29.5 Security as the capacity to fit in


The sociologist Ralph Pieris defines security as "the capacity to live up to the accepted standards and
agreed rules of conduct of the society in question". (Strauss 1954) Furthermore, continuity, stability,

825
Martin, L., and Simon, S., A Formula for Disaster: The Department of Homeland Security's Virtual
Ontology, Space and Polity, 2008
826
Buchan, B., Dying for Security, Cultural Studies Review, 2011
827
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
828
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
829
Gillath, O., and Hart, J. J., The effects of psychological security and insecurity on political attitudes and
leadership preferences, European Journal of Social Psychology, 2010
830
Keller, P., and El-Sheikh, M., Children's emotional security and sleep: longitudinal relations and directions of
effects, Journal of Child Psychology and Psychiatry, 2011
831
Kinnvall, C., Globalisation and Religious Nationalism: Self, Identity, and the Search for Ontological Security,
Political Psychology, 2004

241
integration and order form elements of both a social and human dimension of security in psychology,
as described by Sheldon and Kasser (2008): Self-esteem, social inclusion, people's sense of order
and control, and people's survival or sense of continuity have at base a commonality: the individual
feels a sense of security.832

6.3.1.1.30 Dimensions of Security in Psychology


The psychological literature touches upon a great variety of dimensions that cannot always be
classified in neatly delineated categories and sub-categories. Below we will explore a number of
these dimensions as they are discussed in the psychology literature. We will also describe the
findings of an automated text mining analysis of various preconceived dimensions in the literature.

6.3.1.1.30.1 Emotional security and guilt


An interesting illustration of human emotional security and the complexity of the human mind is
provided by Karpman (1996), who investigates the complexities of conscience and guilt: Early in the
course of human development, conscience and guilt make their appearance, and one of their
universal effects is that in addition to our basic insecurity, it creates in us still greater insecurity. One
might justifiably paraphrase Hamlet: Insecurity doth make cowards of us all.833 Guilt is defined by
the elements about which any individual does and should feel guilty, suggesting that conscience is
inherent to human emotional insecurity. A number of additional influences guide emotional
insecurity. For instance, according to Karpman (1996), ; simultaneously, however, societal and moral
dimensions appear in psychology, as an individual may feel guilt solely because society says he
should (...). Guilt is maintained by society, including scientists and sociologists and not only religious
entities; society seems to be the guarantor and guardian of morality: Guilt imposed by social
dictates is dependent on changing social viewpoints with respect to what is moral or immoral. The
ultimate establishment of emotional security with respect to one type of guilt is dependent,
therefore, upon a consistent moral code dictated (...), and not by ecclesiastics or women's clubs.834
As a result, according to this author at least, fundamental guilt is permanent.

6.3.1.1.30.2 Social security


Among the selected studies, social security is perceived to be largely determined by work-related
security. For instance, Vaisanen, and Niemela (2000) explore the way emotions related to work-
related insecurity are handled, thereby connecting emotional security to work-related security:
Deterioration of health, loss of prestige, threat of exclusion, feeling of uselessness, disturbance of
harmony, broken relationships, aggravation of ones financial situation...835
Social security in the strict sense also appears to be related to economic security, and as having an
impact on individual situations - thereby potentially leading to psychological insecurity: Social
security will experience a financial deficit in the near future, which will result in the cutback of
benefits, increase of age eligibility for benefits, and the rise of social security revenues (...) As

832
Sheldon, K.M., and Kasser, T., Psychological threat and extrinsic goal striving, 2008
833
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
834
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
835
Vaisanen, R., Kraav, I., and Niemela, P., Insecurity related to working life by age groups in Finland and
Estonia in the 1990s, International Journal of Social Welfare, 2000

242
employers are the main source of health insurance, it might weaken financial security for the elderly
after retirement and also lead to a decline in the quality of life.836
In addition, social security is reflected in social violence, whereby coping, cognitive appraisals are
necessary efforts to deal with external or internal demands and aggression. For instance, according
to Mikulincer and Shaver (2007): People are confronted with frustrating bureaucratic rules and
requirements, rude employees, bullying classmates, angry spouses, natural disasters (such as
tsunamis and earthquakes), and human aggression and cruelty of all forms. Even secure people
mourn losses and sometimes fight ferociously for their rights and the survival of their families.837

6.3.1.1.30.3 Attachment security


Going through the analysis of the selected papers in psychology, we observe that attachment
remains a central topic of study over time.838 In the majority of views, emotional security is very
much connected to attachment security. A majority of the selected studies elaborate on the different
aspects of attachment security. Waters and Cummings (2000) define the attachment theory as a
secure base relationship integrat[ing] insights about affect, cognition, and behaviour in close
relationships across age and culture.839Attachment theory (Bowlby, 1969/1982) is the most widely
accepted view of the infant's emotional tie to the caregiver.840 Psychosocial adjustment is of
particular significance in this respect. Attachment is inherent to human nature, therefore providing
for a sense of security and allowing for integration: human beings are innately equipped with
attachment and caregiving behavioural systems, among other important behavioural systems (e.g.,
exploration, sexual mating) because, during evolution, becoming emotionally attached to caregivers
(e.g., parents) and providing care for dependent or injured individuals (e.g., infants, injured family
members) enhanced inclusive fitness.841Gillath and Hart 2010) suggest that attachment security is
associated with greater openness, higher benevolence and universalism values.842
A number of studies explore the infant-parent relationship as part of attachment security, i.e.,
childrens emotional security as a mediator of the link between marital relations and child
adjustment. This suggests an important connection between the relations within a family (including
the marital relations and infant-parent relations), and the emotional security of the familys
members. In particular, marital relations have an impact on childrens sense of security. Davies and
Woitach (2008) establish a link between children's insecurity and discord in the interparental

836
Lee, Y., Work Incentive and Labour Force Participation after the Senior Citizens Freedom to Work Act of
2000, Journal of Human Behaviour in the Social Environment, 2010
837
Mikulincer, M., and Shaver, P.R., Boosting Attachment Security to Promote Mental Health, Prosocial
Values, and Inter-Group Tolerance, Psychological Inquiry, 2007
838
Additional literature on attachment security: Ruvolo, A., and Fabin, L.A., Two of a kind: Perceptions of own
and partner's attachment characteristics, Personal Relationships, 1999; Belsky, J., and Pascofearon, R.M.,
Early attachment security, subsequent maternal sensitivity, and later child development: Does continuity in
development depend upon continuity of caregiving?, Attachment & Human Development, 2002
839
Waters, E., and Cummings, E.M., A secure base from which to explore close relationships, 2000,
http://www.psychology.sunysb.edu/attachment/online/waters_cummings.pdf
840
AScher, A., Facilitators and regulators: maternal orientation as an antecedent of attachment security,
Journal of Reproductive and Infant Psychology, 2001
841
Gillath, O., Shaver, P.R., Mikulincer, M., Nitzberg, R.E, Erez, A., and van IJzendoorn, M.H., Attachment,
caregiving, and volunteering: Placing volunteerism in an attachment-theoretical framework, Personal
Relationship, 2005
842
Gillath, O., and Hart, J. J., The effects of psychological security and insecurity on political attitudes and
leadership preferences, European Journal of Social Psychology, 2010

243
relationship. Emotional security theory aims to understand precisely how and why interparental
discord is associated with children's psychological problems. Interparental discord leads to
childrens vulnerability to mental illness as it undermines sense of safety or security in the context of
the interparental relationship.843
Karpman (1996) provides an additional example of quarrels between parents which affected the
children in the sense that it threatens their security at home. It disturbed their emotional equilibrium
and their bad behaviour was a reaction to an insecure home situation.844
Anxiety also leads to psychological control exerted over others. For instance, parental separation
anxiety, controlling parenting, and difficulties in the separation-individuation process are dimensions
often analysed in psychology. Parental comfort with secure base role was negatively related to
psychological control, suggesting that parents who deal adequately with their child's developmental
striving for independence refrain from such controlling parenting strategies;845 in addition, parents
may use psychological control as a means to keep the child within close proximity.846
Behaviours can be explained based on the extent to which individuals have felt a sense of
attachment security: a number of authors have established a link between early (attachment)
security and later (attachment) security, which suggests a repercussion of early experiences on
future behaviours. For example, assessing infant-mother attachment security could predict
developmental functioning. According to Belsky and Pascofearon (2002), the potential instability of
attachment security may lead to developmental disadvantage.847

6.3.1.1.30.4 Sexual security, compatibility and marriage


Psychological security stems from the notions of comfort, home, satisfaction, experience, harmony,
compatibility, adjustments, marriage, mutual (relationships). Comfort and certainty or stability are
indeed important elements of sexual security in psychology. Karpman (1996) defines sexual security
as a sexual relationship in which one is comfortable or at home, with his partner. The
importance of home and comfort are therefore related to sexual security. In addition, this
dimension security is predicated upon, or synonymous with, sexual compatibility. According to
Karpman, this can be achieved by a married couple almost automatically. Yet adjustment remains
important in identifying compatibility: initial sexual relations are indeed usually accompanied by too
much tension, too much uncertainty, too much insecurity [recalling the previously mentioned
context of uncertainty and insecurity in psychology] to be mutually satisfactory. Potential past
experiences may increase the other's feeling of insecurity. Harmony is a solution that emerges over
time. But in many cases such harmony is never achieved. This is notably true in cases of sexual
impotence or frigidity, for which there may be a great variety of reasons in different individuals.
843
Davies, P.T,. and Woitach, M.J., Children's Emotional Security in the Interparental Relationship of emotional
security theory: An ethologically-based perspective, Association for Psychological Science, 2008
844
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
845
Kins, E., Soenens, B., and Beyers, W., Why do they have to grow up so fast? Parental Separation Anxiety
and Emerging Adults' Pathology of Separation-Individuation,
Journal of Clinical Psychology, 2011
846
Kins, E., Soenens, B., and Beyers, W., Why do they have to grow up so fast? Parental Separation Anxiety
and Emerging Adults' Pathology of Separation-Individuation,
Journal of Clinical Psychology, 2011
847
Belsky, J., and Pascofearon, R.M., Early attachment security, subsequent maternal sensitivity, and later
child development: Does continuity in development depend upon continuity of caregiving?, Attachment &
Human Development, 2002

244
Fundamentally, however, such disorders are expressions of emotional insecurity. According to
Karpman (1996), in looking for a spouse the man is looking for that sort of security which combines
sexual and social adjustment. During the courting period a good deal of insecurity is experienced,
although most people try to minimise it.848 To complete Karpmans ideas on sexual security with
regard to marriage, Steigman (2012) cites Graham Greene who studied the question of security in
marriage: "For an ageing man, marriage is "very secure.849
According to one study, societal pressures related to sexual preferences can have a profound impact
on an individuals psychology. In the 1980s, increasing attention began to be devoted to the
psychological consequences to gay youth of having been raised in settings biased against
homosexuality (Malyon 1982). A particularly important clinical phenomenon described then was the
destructive effect on self-esteem and the sense of security of non-heterosexual people due to
internalisations of anti-homosexual caretakers.850 Repressed sexual identity leads to insecurity:
Psychobiologically, we are sexually secure when our heterosexuality is balanced with homosexuality
to a point where the heterosexuality is in control of the situation, according with the
psychobiological needs of the society. (...). When our heterosexual security is threatened, it almost
automatically brings the homosexual component closer to the surface, and the individual feels
increasingly distressed and insecure. The acute homosexual panics we see in the wards of a mental
hospital are a good illustration of that.851 Societal pressure impact mental health as to whether our
sexual preferences might or might not be accepted.

6.3.1.1.30.5 Economic and psychological security


In the psychology literature, authors associate money, image, prestige, social status as tenants of
economic security which is seen to be vital to psychological security. Many authors argue that a lack
of psychological security inevitably leads to an increased focus on economic security and individual
social status: humanistic perspectives suggest that when feelings of safety and security are
threatened, individuals are less likely to focus on activities that promote growth and well-being, and
more likely to concern themselves with issues such as money, image, and status (Maslow 1956).
From an evolutionary perspective, it also seems likely that status, looks, and wealth may have
offered important short-term means of countering threats to security and survival in our
evolutionary past, and thus people may be somewhat hard-wired' to orient towards extrinsic goals
in various types of threats listed above have all been linked to times of uncertainty.852
Other studies shed light on a more nuanced perspective, based on relativity: given all that money
promises -security, freedom, power, the good life - it is hard to understand why it has so little impact.
The missing link is subjective perception. It is not the absolute amount that seems to matter for well-
being, but whether the amount is above or below some standard, with the standard based on social
comparison, what one thinks one deserves, what one thinks one needs, and the like. Multiple
Discrepancies Theory (MDT) (Michalos, 1985) correlates the comparisons people make to multiple

848
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
849
Steigman, K., The Literal American: Rereading Graham Greene in an Age of Security, College Literature,
2012
850
Downey, J.I., and Friedman, R.C., Homosexuality: Psychotherapeutic issues, British Journal of
Psychotherapy, 2008
851
Downey, J.I., and Friedman, R.C., Homosexuality: Psychotherapeutic issues, British Journal of
Psychotherapy, 2008
852
Sheldon, K.M., and Kasser, T., Psychological threat and extrinsic goal striving, 2008

245
standards. The overall have-want gap explains more of the variance in SWB than single measures
can.853
A number of happiness studies (e.g., Tatzel, 2003) attempt to measure the dimensions of money
symbolism and money behaviours: security/pessimism, distrust/anxiety (worry about not having
enough money and suspicion about overpaying), retention/obsessiveness (keeping track of money
and budgeting), power/prestige- (attraction to money for its social influence and cachet), and
quality (the belief that expense signifies quality, and wanting to pay more to get the best): those
who are unable to deny themselves things, and who enjoy spending, are in fact healthier and happier
than their tighter counterparts.854
In addition, it is acknowledged that the lack of economic security produces insecurity: poverty and
its many-faceted manifestations is, of course, the major source of insecurity, frustration, and stress
for nearly one third of our society.855

6.3.1.1.30.6 Comfort, technology and perception


In more recent publications, psychological security is also connected to new technologies, as they can
play upon the emotion of fear: The underlying element in all (...) types of [security technologies and]
communications is the fact that play upon the emotion of fear - the fear of being injured, causing
injury to others, becoming ill, or dying.856
Security at home is associated with technology, violence (terrorism) and economic security;
according to Ellin (2003): outside of gated communities, security signage is ubiquitous. When
designing new homes or renovating, safety features are of paramount importance.# In the views of
the same author, the protection of the home is related to mistrust, as well as a (perhaps paranoid)
safeguard of privacy: houses assure protection through a variety of means such as sophisticated
security systems, the posting of signs that warn trespassers not to enter or indicate armed
response, and so-called security gardens, which group shrubs beneath windows and around yards
specifically for the purpose of obstructing intruders. Increasingly, clients are requesting that their
architects provide "safe rooms," terrorist-proof security rooms concealed in the houseplan and
accessed by sliding panels and secret doors. Ellin (2003) also underlines the importance of
technology with respect to home security and comfort: the buzz-word convergence describes the
increased integration of technologies (e.g., the wireless web or mobile internet). Convergence in
residential building is described as "the ultimate integration of everything in the house": security,
lighting, mechanical systems, climate control, entertainment, and internet. Suggesting a political
dimension to these trends, Ellin also relates contemporary traumatic events to the need of
enhancing mobility and flexibility: recent sea changes [such as 9/11] regarding time and space have
also, paradoxically, enhanced our sense of security. Increased mobility and flexibility along with
instantaneity enhance communication, allow greater freedom, confer power to a larger number, and
eliminate waiting.

853
Tatzel, M., The Art of Buying: Coming to Terms with Money and Materials, Journal of Happiness Studies,
2003
854
Tatzel, M., The Art of Buying: Coming to Terms with Money and Materials, Journal of Happiness Studies,
2003
855
Gil, D.G., The United States Versus Child Abuse, Journal of Clinical Child Psychology, 1983
856
Shropshire, J.D., Warkentin, M., and Johnston, A.C., Impact of negative message framing on security
adoption, Journal of Computer Information Systems, 2009

246
In addition, technology has also been shown to play a positive role in enhancing security perception.
Research techniques have demonstrated that emotionally positive but attachment-unrelated stimuli
(e.g., through the visualisation of security-enhancing attachment figures, guided imagery the
availability and supportiveness of an attachment figure) can provide a sense of reward or calmness.
Mikulincer and Shaver (2007) use the example of pictures of a large amount of money as an
emotionally positive but attachment-unrelated stimuli which improved the participants mood.857

6.3.1.1.30.7 Psychological security, politics and political choice


Gillath and Hart (2010) define mortality salience and other fundamental threats as causing feelings of
insecurity that potentially motivate people to adhere to specific kinds of anxiety-reducing political
attitudes and values. The authors explore the effects of the sense of security on political attitudes
priming with representations of attachment security. They examine the effects of psychological
security on political attitudes and leadership preferences: in other words, embracing one's political
attitudes and political leaders can be viewed as a defence mechanism.858 In the views of these two
authors, security eliminates defensive attraction to an anonymous charismatic political figure.859
Research has started investigating these questions, with one author referring to Choma (2007)
[who] has found that liberalism is associated with personality traits that are, in turn, associated with
psychological security, such as valuing inclusiveness and understanding.860
It is interesting to note the connection established by Gillath and Hart (2010) between attachment
security and politics: attachment security (...) is associated with less need for cognitive closure.
[This] suggests that attachment security would also be associated with more liberal and less
conservative political attitudes. Likewise, these findings suggest that attachment security would be
associated with preference of specific type of leaders (less charismatic and more relationship-
oriented).861
In recent years, psychology has examined the impact of traumatic, political events on the population
as perhaps one of the greatest threats to psychological security. Wolfendale (2007) particularly
analyses terrorism as a threat to psychological well-being: Although the threat of terrorism to
individual lives is less than many other threats, terrorism does not only threaten lives; it threatens
psychological well being. Terrorism causes deep anxiety and fear in the target
population.862According to the same authors, it may threaten psychological security: The terrorist
threat is a malevolent and seemingly random threat, and so it threatens citizens psychological sense
of security to a far greater degree than other threats.863 The authors add that it this gets heavily
emphasised in what they call counter-terrorism rethoric, as they observe: According to current

857
Mikulincer, M., and Shaver, P.R., Boosting Attachment Security to Promote Mental Health, Prosocial
Values, and Inter-Group Tolerance, Psychological Inquiry, 2007, p.143
858
Gillath, O., and Hart, J. J., The effects of psychological security and insecurity on political attitudes and
leadership preferences, European Journal of Social Psychology, 2010
859
Gillath, O., and Hart, J. J., The effects of psychological security and insecurity on political attitudes and
leadership preferences, European Journal of Social Psychology, 2010
860
Gillath, O., and Hart, J. J., The effects of psychological security and insecurity on political attitudes and
leadership preferences, European Journal of Social Psychology, 2010
861
Gillath, O., and Hart, J. J., The effects of psychological security and insecurity on political attitudes and
leadership preferences, European Journal of Social Psychology, 2010
862
Wolfendale, J., Terrorism, Security, and the Threat of Counterterrorism, Studies in Conflict & Terrorism,
2007
863
Ibid.

247
counterterrorism rhetoric, non-state terrorism threatens many things: security, lives, values,
freedom, democracy, and the existence of civilisation itself, and poses a greater threat than the
threats posed by war, invasion, accident, natural disasters, and criminal activity.#

6.3.1.1.31 Dimensions Text mining results (baskets)


In addition to a manual analysis of the dimensions we encountered in the literature, we have also
explored how these dimensions featured across the articles through an automated text analysis. In
this analysis, we created baskets of words which represent a dimension and processed the
documents to assess how prominent dimensions featured in the literature. For the psychological
literature this yielded a number of interesting results.
It turned out that the human dimension is particularly prominent (100% connectivity), followed by
the social-political dimension, the educational dimension, the economic dimension, and
attachment. These results corroborate our reading of the literature and the previous manually
derived findings. Whereas the human dimension runs as a central artery through the entire
psychology literature, the socio-political, educational and economic dimensions are often discussed
in association with oneanother. As some authors assert: Together with the right to freedom,
security can be seen as a human right. This so-called right to security comprises economic, social and
educational rights. The idea of the equal right to education and culture as well as employment and
subsistence comes principally from the right to security. (Vasianen et. al. 2000) in these regards, the
literature also touches upon the importance of various group-psychological processes in producing
social order, applying that same logic to the construction of insecurity and arguing that in many cases
people are wrongly guided by these constructions. Beland (2007) for instance argues that a major
aspect of the existing literature on the social construction of in- security is to argue that citizens are
afraid of the wrong things (Beland, 2007) Other authors call attention towards psychological biases
and the role of framing in dealing with insecurity. People, so they argue, see and think in terms of
stereotypes, personalisation, and over-simplifications; [..] cannot recognise or tolerate ambiguous
and complex situations; and [..] accordingly respond chiefly to symbols that over-simplify and distort.
This form of behaviour is especially likely to occur where there is insecurity occasioned by failure
to adjust to real or perceived problems. (Edelman: 699, 1960 quoted by Beland, 2007)
In addition, the concepts relations, family social, parental and relationships feature
prominently in the automated analysis, which is again in line with our previous findings.
Furthermore, amongst the words most closely related to security, we encounter once more the
social-political dimension, in addition to the concepts maternal, attachment, history, sense,
childrens, threats, emotional, death, protection, mother, development, care,
relationships. The latter are particularly salient in the discussion of sources of security, which we
will reflect on in the following section.
The diversity of dimensions emerging from the manual and automated and text mining results is not
surprising as psychology by its nature covers many domains of human activity. This discipline runs a
broad gamut touching upon various aspects of education, social relations, economics, politics and
technology. The political dimension of psychology has progressively entered the debate among
researchers, in particular after 9/11. The link between economic and psychological security is
another associated which is not often made in prevailing security discourses, a theme to which we
will return in the conclusion to this section.

248
6.3.1.1.32 Sources of Security in Psychology
The sources that the literature identifies are, unsurprisingly, one might add, closely connected to the
various dimensions. The psychology of child development and issues related to attachment being
particularly singled out by the authors. These themes in turn are discussed in relationship to various
types of security that were discussed in the dimensions literature including economic and socio-
political security.

6.3.1.1.32.1 Identity, group entitativity and psychological security


Identity leading to a sense of trust and control and as a source of psychological security is suggested
by Kinnvall (2004): Identity is seen as an anxiety-controlling mechanism reinforcing a sense of trust,
predictability, and control in reaction to disruptive change by re-establishing a previous identity or
formulating a new one.864
In-group identification also provides security. In the views of Arriagada (2002), the perception of
entitativity [i.e., the perception of a group as an entity], intentionality, and security are intrinsically
related. She therefore relates that the evaluation of a highly entitative in-group as a valid source of
security for its members could make it suitable to satisfy the individual's motivational need of
protection, at a symbolic, imagined level as well as in actuality.865 Karpman (1996) adds: after the
individual has become absorbed in the group he feels more secure.866
At a more generic level, it appears that shared identity and values constitute a source of
psychological security, which may manifest itself however in aggressive behaviour towards outsiders.
According to Gillath and Hart (2010), espousal of aggressive military action against antagonising
entities (e.g., North Korea) provides psychological security because it reminds people of the in-
group's power and potency, in addition to providing evidence that the in-groups' shared identity
and values are valid (to the extent that military action is anticipated to be successful), thereby
providing a sense of symbolic immortality.867
Aly and Gree (2010) examined the identity of Muslim communities, and claim that the shattering
of security was closely tied to their (...) identity and to a social and political climate in which,
implicated as the enemy, their sense of security and safety is undermined.868
According to Karpman (1996), a solid basis for emotional security would allow society to eventually
solve its economic problems.869

6.3.1.1.32.2 Bonding: Love, trust and attachment


Mikulincer and Shaver (2007) emphasise the importance of attachment figures love for establishing
both effective coping strategies and being compassionate toward oneself and other people.870 Trust

864
Kinnvall, C., Globalisation and Religious Nationalism: Self, Identity, and the Search for Ontological Security,
Political Psychology, 2004
865
Arriagada, I., Changes and Inequality in Latin American Families, Cepal Review, 2002
866
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
867
Gillath, O., and Hart, J. J., The effects of psychological security and insecurity on political attitudes and
leadership preferences, European Journal of Social Psychology, 2010
868
Aly, A., and Gree, L., Fear, Anxiety and the State of Terror, Studies in Conflict & Terrorism, 2010
869
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
870
Mikulincer, M., and Shaver, P.R., Boosting Attachment Security to Promote Mental Health, Prosocial
Values, and Inter-Group Tolerance, Psychological Inquiry, 2007

249
and attachment between individuals lie at the heart of a sense of security. Karpman asserts that to
be bound to someone, or to have someone bound to you, conveys a sense of security, for you can
depend upon him not to hurt you but, instead, to protect you.871
According to Giddens (1991), cited in Kinnvall (2004), obtaining trust from other people is necessary
in order for a person to maintain a sense of psychological well-being and avoid existential anxiety
(Giddens, 1991 cited in Kinvall, 2004). Trusting others is like an emotional inoculation against
existential anxieties - "a protection against future threats and dangers which allow the individual to
sustain hope and courage in the face of whatever debilitating circumstances she or he might later
confront" (Giddens, 1991 cited in Kinvall, 2004).872 Trust leads to attachment as well: When a child
realizes that another child may be a help rather than a threat to him (...), the attachment to another
child becomes a source of additional security. Binding attachments have their origin in the insecurity-
security drive.873
Interestingly enough, a number of authors identify people, relationships, interaction, information,
autonomy, availability of other subjects as factors of emotional comfort which itself increases the
level and perception of security by a subject. This is illustrated by the work of Williams (2004), who
takes the example of a patient in a hospital:
therapeutic interpersonal interaction contribute to emotional comfort;
ability and confidence to perform specific tasks;
getting to know each other as people;
helping the patient to feel secure, informed, and valued;
relevant information is provided;
development of a relationship with hospital staff (in addition, close relationships can serve
as a defence mechanism against death anxiety according to Mikulincer, Florian, &
Hirschberger, 2003);
availability of assistance to patients: generates feelings of personal control and emotional
comfort.

6.3.1.1.32.3 Attachment security increases compassion and altruistic behaviour


The effectiveness of the attachment relationship is defined as a source of security by Scher
(2001).874 The quality of an attachment relationship is rooted in the degree to which a [subject] has
come to rely on the attachment figure as a source of security.875 Secure persons - i.e., those
experiencing effective attachment relationships - are able to maintain relationships, be socially
integrated, caregivers, altruistic, emphatic and open. As Gillath et al. observe: only a relatively
secure person can easily perceive others not only as sources of security and support but also as

871
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
872
Kinnvall, C., Globalisation and Religious Nationalism: Self, Identity, and the Search for Ontological Security,
Political Psychology, 2004
873
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996
874
Scher, A., Facilitators and regulators: maternal orientation as an antecedent of attachment security,
Journal of Reproductive and Infant Psychology, 2001
875
Roelofs, J., Meesters, C., and Muris, P., Correlates of Self-reported Attachment (In)security in Children: The
Role of Parental Romantic Attachment Status and Rearing Behaviours, Journal of Child and Family Studies

250
human beings who themselves need and deserve support.876 They even go as far as saying that
securely attached people tend to maintain high, stable self-esteem without relying on defences,
including defensive derogation of other people, asserting that attachment security is generally
associated with volunteering to help others for altruistic and exploration-oriented reasons. This in
turn promotes societal security, so it is claimed: Attachment security, measured categorically, is
associated with empathy, humane values, willingness to care for others, and cognitive openness (see
Gillath et al., 2005; Mikulincer, 1997) that experimental augmentation of peoples sense of security
increases the likelihood of empathy, compassion, and prosocial behaviour.877

6.3.1.1.32.4 Security and comfort in the home


In the views of Karpman (1996), the security of the home gives place to the necessity of creating
one's own security in a competitive and generally hostile world. Home is defined as a secure base
on which identities are constructed (Dupuis & Thorns, 1998). On the other hand, homelessness
represents exactly the opposite, as it is characterised by impermanence and
discontinuity. Attacks against the home have considerable destabilising impacts on families. Al-
Krenawi, Graham and Sehway (2004) take the example of Palestine, with children reported being
afraid to leave home after their home was bombed; their sense of security in the world had been
shattered. They were afraid that their home would once again be a target for bombing.878 Indeed,
according to these authors, home is associated with a refuge, a sanctuary, a place of personal
growth through social and psychological security, providing a feeling of belonging and a source of
strengthened, nurturing personal relationships and approximating, as much as possible, a family
ethos.

6.3.1.1.32.5 Family relationships as a source of stability


Cohesive family relationships, the mother figure, parental rearing, and marital relationships are
elements that contribute to the sense of security experienced by individuals. This is a widely studied
source of security across the selected papers. Security in the home is closely linked to family and
relationships. [It is also related to the achievement of the good life: a group of authors879 used the
example of combatants who appear to be have made a fresh start towards a good life (...). In terms
of assistance in securing their dream most felt they would have to rely on their family.]
Furthermore, harmony in the home is seen to be conducive to emotional security880 and a sense of
belonging are central themes in the psychological literature. According to Forman and Davies (2005),

876
Gillath, O., Shaver, P.R., Mikulincer, M., Nitzberg, R.E., Erez, A., and van IJzendoorn, M.H., Attachment,
caregiving, and volunteering: Placing volunteerism in an attachment-theoretical framework, Personal
Relationship, 2005
877
Van IJzendoorn, M.H., Attachment, caregiving, and volunteering: Placing volunteerism in an attachment-
theoretical framework, Personal Relationships, 2005
878
Al-Krenawi, A., Graham, J.R., and Sehway, M.A., Mental Health and Violence/Trauma in Palestine:
Implications for Helping Professional Practice, Journal of Comparative Family Studies, 2004
879
Ozerdem, A., Podder, S., and Quitoriano, E.L., Identity, Ideology and Child Soldiering: Community and Youth
Participation in Civil Conflict; A Study on the Moro Islamic Liberation Front in Mindanao, Civil Wars, 2010
880
Heathers, G., The adjustment of two year-olds in a novel social situation, Child Development, 1954

251
a critical function of the family is to serve as a source of stability, cohesiveness, and
predictability;disruptive family events (...) undermine [this] continuity.881
Markiewicz, Lawford, Doyle and Haggart (2006) affirm that an effective attachment relationship, if
experienced in the early years, translates into emotional security in later years: the individual's later
security and success in forming other found that secure attachment was a predictor of closer, source
of security across this age range.
According to Scher (2001), secure infants [are] more likely to have mothers who maintained a
facilitator rather than a regulator orientation. It is concluded that a facilitating attitude contributes to
a secure infant-mother attachment relationship.882 Mothers with secure childhood memories are
also likely to have securely attached children.883 In the views of many authors, the mother figure is a
source of security and comfort, of nourishment and protection. Summing up a number of
observations from various authors:
Usually, a young child's mother is his primary source of security in coping with problem
situations since she has been involved in meeting his needs in a great variety of situations
and since the child can predict her reactions to him with considerable success.884
Maternal warmth, as expressed in acceptance of the child, in affectionateness or in
approval, is conducive to general security and adequacy.885
In general, mothers are used as a secure base consistently more than fathers,886 and are
perceived as a more reliable source of security than fathers.887
The mother figure becomes symbolic of security and, because of that, the child tries to
adjust himself to his mother's demands; some children show an exaggerated zeal to hold
on to this symbol of security.888
Vicedo (2009) cites Harlow, who names this preference selective responsiveness: On the
basis of this experimental work, Harlow drew larger conclusions about the role of the mother
for her childs emotional development. He argued that mothers, human or subhuman,
provide two fundamental things for a baby: a haven of safety and a source of security.
According to him, it was evident that the mother provides a haven of safety because in times
of fear, the frightened or ailing child clings to its mother, not its father; and this selective

881
Forman, E.M., and Davies, P.T., Assessing children's appraisals of security in the family system: the
development of the Security in the Family System (SIFS) scales, Journal of Child Psychology and Psychiatry,
2005, p.94
882
Markiewicz, D., Lawford, H., Doyle, A.B., and Haggart, N., Developmental Differences in Adolescents' and
Young Adults' Use of Mothers, Fathers, Best Friends, and Romantic Partners to Fulfill Attachment Needs,
Journal of Youth and Adolescence, 2006
883
Scher, A., Facilitators and regulators: maternal orientation as an antecedent of attachment security,
Journal of Reproductive and Infant Psychology, 2001
884
Heathers, G., The adjustment of two year-olds in a novel social situation, Child Development, 1954
885
Heathers, G., The adjustment of two year-olds in a novel social situation, Child Development, 1954
886
Markiewicz, D., Lawford, H., Doyle, A.B., and Haggart, N., Developmental Differences in Adolescents' and
Young Adults' Use of Mothers, Fathers, Best Friends, and Romantic Partners to Fulfill Attachment Needs,
Journal of Youth and Adolescence, 2006
887
Al-Yagon, M., Fathers' Emotional Resources and Children's Socioemotional and Behavioural Adjustment
Among Children with Learning Disabilities, Journal of Child and Family Studies, 2011
888
Karpman, B., Insecurity in search of security, American Journal of Psychotherapy, 1996

252
responsiveness in times of distress, disturbance, or danger may be used as a measure of the
strength of affectional bonds (Harlow, 1958, p. 678).889

Going beyond the exclusive focus on the role of the mother, authors also perceive broader parental
rearing as a source of attachment security. As two Roelofs et al. explain: another source of caregiver
influences that might be related to children's attachment security is parental rearing behaviours.
Factor analytic studies have identified two main dimensions of parental rearing. The first dimension
can be described as care' and refers to behaviours related to acceptance, warmth, and on the
reverse side, rejection and criticism. The second dimension is labeled as control and refers to
parental control, overprotection, and on the opposite side, promotion of autonomy. It has been
suggested that parental warmth and acceptance are related to children's attachment security.890

6.3.1.1.33 Solutions in Psychology


On the side of solutions, the psychology literature is less elaborate although it does offer some
interesting and concrete insights with respect to strategies to increase psychological security. These
invariably are proactive in nature, focus primarily on boosting preparedness and resilience, and
concern the mind set level of the population and the ways in which security is discussed in the public
arena.

According to Martin and Simon (2008), the answer to the quandary of homeland security lies,
partially, with the cultivation of preparedness. In an ideal state of readiness, a prepared nation
should stand poised to prevent adequately or respond to any actualisation of emergency.891
Ellin (2003) describes proactive strategies as governmental responses to terrorism. These strategies
consist in enhancing security by the reinforcement of surveillance and fortressing (protection), and
eliminating fear and anxiety. The author speaks of concerted efforts to respond to fear in a
proactive manner, efforts perhaps elicited by the prevalent sense of anxiety and despair
characterising the last several decades. The events of 9/11 have both stepped up these efforts and
contributed to the reactionary measures that ultimately redouble the fear. The result is two-fold:
continued ultra-fortressing and surveillance, on the one hand, and a wide range of proactive efforts
to eliminate the sources of fear, on the other.892 Also with regards to terrorism, Aly and Gree assert
that the implementation of security measures can be viewed as as a source of reassurance and
increased confidence.893 On the other hand, they also point out the danger that such security
measures as responses to the threat of terrorism may not be seen as a source of security and
produce the opposite effect on people. For instance, experiences with increased security on airlines
prompted fears about a security state (and the related loss of freedoms) that actually overshadowed
the fear of a terrorist attack.894

889
Vicedo, M., Mothers, Machines, and Morals: Harry Harlows Work on Primate Love from Lab to Legend,
Journal of the History of the Behavioural Science, 2009
890
Roelofs, J., Meesters, C., and Muris, P., Correlates of Self-reported Attachment (In)security in Children: The
Role of Parental Romantic Attachment Status and Rearing Behaviours, Journal of Child and Family Studies
891
Martin, L., and Simon, S., A Formula for Disaster: The Department of Homeland Security's Virtual Ontology,
Space and Polity, 2008
892
Ellin, N., Fear and City Building, The Hedgehog Review, 2003
893
Aly, A., and Gree, L., Fear, Anxiety and the State of Terror, Studies in Conflict & Terrorism, 2010
894
Aly, A., and Gree, L., Fear, Anxiety and the State of Terror, Studies in Conflict & Terrorism, 2010

253
Communication and presentation, finally, are key in discussing risk in the public arena in order to
forestall the phenomenon of risk amplification which describes the process by which less hazardous
risks can become the focus of social and political attention.895

Social Sciences

6.3.1.1.34 Meta-analysis
Out set contains 300 documents published between 1974 and 2011. 6 documents are from the 1970s
and 80s; the other documents were published after 1990.
The journals from which our documents originate are predominantly American or British. Only in
most recent years - post-2000 - one can identify an increase in journals from other regions, e.g., Asia.
The documents from the 70s tackle security from the political science point of view, by focusing on
issues such as decolonisation, military sociology and foreign affairs. In the 80s the focus shifted to
economic issues, including foreign economic policy and income. From the 90s on, a wider variety of
topics (communication, democracy, values, demographics) is linked to security.

6.3.1.1.35 Text mining results

6.3.1.1.35.1 Themes
In social sciences, a number of connected key themes generated by the text mining software are:
policy (connectivity: 100%), security, social, government, military and individual.

The theme policy co-occurs with the following concepts: international, states, threat,
development, power, economic, national, regional, conflict, world and peace.
Security is linked to concepts such as: political, relations, change, concerns,
environmental, institutions, cultural, actors and debate.
The theme social appears with: human, studies, community, society, insecurity and
relationship.
The theme government is connected to: organisations, support, control, activity, law,
The theme military is linked to concepts such as countries, war, forces, weapon,
nuclear

6.3.1.1.35.2 Concepts
The following concepts are most relevant within the discipline of social sciences:

security
political
policy
international
states
use
power
relations
development

895
Bland, D., Insecurity and Politics: A Framework, Canadian Journal of Sociology, 2007

254
military

6.3.1.1.36 Definitions of Security in Social Sciences


Within the discipline of social sciences security is a contested concept: it means something different
to each and every author. Lang (2007) is one of the authors who argue that security is an essentially
contested concept896. Yet, in general it is agreed that a definition of security involves the alleviation
of threats to cherished values897 or the absence of all threats898.
David Baldwin (1997) adds that one could specify security with respect to the actor whose values
are to be secured, the values concerned, the degree of security, the kinds of threats, the means for
coping with such threats, the costs of doing so, and the relevant time period.899"

6.3.1.1.36.1 The debate: narrow vs. broad definition of security


As mentioned above, scholars within the field of social sciences find it hard to agree on one single
definition of security. This is, for example, reflected in the ongoing debate900 regarding the adoption
of a narrow definition of security, being military and strategic in nature, or a broader definition which
includes more recent threats to society such as human security and environmental security. 901

This debate commenced with the end of the Cold War, when the nuclear threat fell away and other
sources of insecurity became more apparent. Indeed, many authors in the social sciences discipline
focus on how the definition of security changed in the early 1990s. The aftermath of the Cold War
saw a redefinition of international security to embrace not only traditional military threats but large
movements of people, trade in illicit goods, and environmental change902. Similarly, international
security was a concept introduced in the post-Cold War context that found its basis in the wider
human community rather than being confined to individual nation-states. This has led to the
inclusion of threats such as environmental degradation, global economic collapse, and the spread of
infectious diseases as those against which the human community needs to be secured. At the same
time, a concern with war and violence remains part of the international security agenda, leading to a
focus on institutions such as the UN where the threat of war to all peoples can be countered.
A similar shift occurred within international institutions such as the UN. Gradually [...] the narrow,
state-centred focus on peace and international security in the UN Charter during the Cold War has
widened and deepened as economic, societal and environmental dimensions have been added to the
classic diplomatic and military dimension of security. These five dimensions are still addressed
primarily from a state-centred perspective. However, the United Nations Development Programme's
(UNDP) Human development report (1994) has urged a ``human-centred'' approach, supplementing
these five national security dimensions with seven human security dimensions of economic, food,
health, environmental, personal, community and political insecurity903

896
Anthony F. Lang, The violence of rules Rethinking the 2003 war against Iraq, 2007
897
Paul D. Williams (eds.) Security Studies: an introduction. 2008
898
Anthony F. Lang, The violence of rules Rethinking the 2003 war against Iraq, 2007
899
David Baldwin, The concept of Security, Review of International Studies, 23, 1997
900
Including authors such as Richmond, Hart, Baldwin
901
Anthony F. Lang, The violence of rules Rethinking the 2003 war against Iraq, 2007
902
Joanna Macrae, Understanding Integration from Rwanda to Iraq, 2003
903
Hans Gunter Brauch, Conceptualising the environmental dimension of human security in the UN, UNESCO,
2008

255
President Bush (2004) also called for a new definition of security: In this young century, our world
needs a new definition of security. Our security is not merely found in spheres of influence or some
balance of power. The security of our world is found in the advancing rights of mankind.
These rights are advancing across the world, and across the world, the enemies of human rights
are responding with violence.904
As a result of policy makers taking over this call to redefine security, authors such as Baldwin argue
that redefining security has recently become something of a cottage industry. Most such efforts,
however, are more concerned with redefining the policy agendas of nation-states than with the
concept of security itself. Often, this takes the form of proposals for giving high priority to such issues
as human rights, economics, the environment, drug traffic, epidemics, crime, or social injustice, in
addition to the traditional concern with security from external military threats.905
Other authors also pick up this idea, that a narrow or broad definition of security can influence
policy:

If security is defined narrowly as being of a military and strategic nature, it merely revolves around
the ability of states to harness their own resources to develop a military-industrial complex and
strategic foreign policies. This, however, tends to lead to nationalistic and self-perpetuating, self-
fulfilling security dilemmas. If a broad definition of security is adopted, on the other hand, including
environmental and resource security and the security of individuals from oppression and poverty,
then normative questions relating to regional and global standards of human rights, economic aid
and development, as well as a coherent environmental policy, must also be included in policy
responses on the part of all states, regional and global actors906

America will fail in defining its role in the world if it does not recognise a broader definition of
security. Security narrowly defined as prevention of physical harm by creating a protective shield is
insufficient. The cloak of economic, environmental, health, energy, educational, and government
security provides genuine security."907

However, adopting a broader definition of security and allowing it to influence policy, also has other
consequences. Marrin (2007) points out that over time a larger role for foreign intelligence agencies
developed built around a more expansive definition of national security and how that definition can
shape perceptions of threat908.

6.3.1.1.36.2 Security changes over time


A timeline can be observed in the conceptualisation of security in Social Sciences, wherein
unexpected events destabilize the untouched paradigm of the Western World. The attacks on 9/11
played an important role in changing the precedent world order, and therefore depriving the world
order from its usual security. Most papers agree that a redefinition is currently taking place due to
these events. Kantner et al (2006) argue that 9/11, and the subsequent terrorist attacks in other
parts of the world, including European capitals, marked a turning point in respect of the proximity of

904
Bush - 2004 - Remarks to the United Nations General Assembly in New York City September 21, 2004
905
David Baldwin, The concept of Security, Review of International Studies, 23, 1997
906
Richmond - 2000 - Emerging Concepts of Security in the European Order
907
Gary Hart in: Lloyd - 2006 - The Shield and the Cloak The Security of the Comm (Book review)
908
Stephen Marrin, Intelligence Analysis Theory: Explaining and Predicting Analytic Responsibilities,
Intelligence and National Security, Vol.22, No.6, 2007, pp.821 - 846

256
these threats. This accelerated the reforms of existing security policies and institution building
processes909.

Predictably, we will see the concept of security further shaped by globalisation or gradually see its
importance wear off precisely as a result of borders becoming more blurry. However, the truth is
that the risks and vulnerabilities havent changed in the past 5 years. However, we are now more
aware after 9/11, so now [businesses] are more inclined to encapsulate security into their normal
operations. There is no doubt that that government agencies and private companies are starting to
make significant changes in their security, in both policies and spending. Yet, as time goes by, most
people naturally tend to be less concerned about security. This is a huge problem, but nevertheless
very typical910.

6.3.1.1.36.3 Security in Social Sciences


In general terms, Social Sciences focus on how to preserve the power relations that a given
community enjoys. As a result, they prevent living conditions from worsening. Although these
measures can take various shapes, two core lines of action go beyond being recommended by Social
Sciences researchers, they are expected: power preservation by anticipating to unbalancing factors
and as a means for enshrining and protecting community core values. The constant need for actions
to be taken reveals security is not a state of things, but the result of deliberate initiative.

6.3.1.1.37 Dimensions of Security in Social Sciences

6.3.1.1.37.1 Human security


One very dominant dimension of security within social sciences is human security. Human security
focuses, not on weapons, but on basic human dignity and the daily concerns of people911
Other authors use a definition with a stronger focus on the financial well-being of individuals:
human security is defined as the number of years of future life spent outside a state of "generalised
poverty", which occurs when an individual falls below the threshold of any key domain of human
well-being912
We will not enjoy development without security, or security without development, and we will
enjoy neither without respect for human rights913

Although human security is not a monolithic concept, there is some disagreement among states
that have adopted the framework as part of their foreign policy about what human security might
actually mean and how to best make the concept workable in terms of policy. Japan, for example,
adopted what is often termed the `broad' definition of human security. This is exemplified in the
2003 report of the CHS which advocates a definition of human security that encompasses `freedom
from want' and `freedom from fear'--that individuals should be both protected from harm and

909
Challenges of democratic oversight of EU security policies in: Cathleen Kantner, Rafaella Delsarto and
Angela Liberatore (eds) Security and Democracy in the European Union, special issue of European Security, Vol
15(4), 2006, pp 431-449
910
Rincon, David; Cano, Cristina. Mitigation of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin America
Transactions, IEEE (Revista IEEE America Latina), vol 5(3), 2007, pp. 128 - 135
911
Tanada - 1999 - Human Security from a Filipino Perspective
912
Gary King and Christopher J. L. Murray. "Rethinking Human Security." Political Science Quarterly 116 (2002):
585-610
913
2006 - WORLD FUTURES

257
empowered to live the life that they wish to lead (CHS 2003, 2 -4). Canada, on the other hand, has
formally adopted a `narrow' definition of human security in which the focus is on the `freedom from
fear' aspect.6 This ostensibly means that the focus in Canadian policy is aimed at a more limited
`protection' agenda rather than on empowerment914.

6.3.1.1.37.2 Environmental security


The existing interpretations of environmental security can be generalised into three major
categories: one set of explanations emphasises various forms of environmental degradation affecting
all humans irrespective of nationalities; another set of definitions focuses mainly on national
environmental threats that spill over to other countries and cause interstate tension; and the last set
of analyses pays more attention to a nation's capacity to withstand environmental threats, rectify
environmental damages, and guarantee public safety from adverse consequences.7 In fact, there is
no conflict among these three sets of interpretations: they just represent different levels and
dimensions of environmental security, including the human implications of global environmental
disorders, cross-national conflicts arising from these problems, and state capacity to prevent and
manage such disorders915.

6.3.1.1.37.3 Security community


A security community can be said to exist in international relations when war between a group of
states becomes inconceivable. Breaking this down further, it can be argued that in a true security
community, war must be both structurally and conceptually impossible. In other words, for a security
community to become fully and finally established, the states concerned should, first, be incapable of
mounting military operations against one another-the so-called structural incapacity to attack.
Second, their leaders should share an unwritten but general understanding that going to war against
other states in the security community would never be considered, however serious and protracted
disputes with them may become.916

References to security communities are most commonly made in documents discussing the European
Union. Many articles within the social sciences discipline discuss the European Union, particularly
many documents after 2002, when the Maastricht Treaty entered into force. As a novel actor in the
security field, the EU started to receive quite some academic attention. As Kantner et al. argue, the
EU faces the double challenge of finding answers to serious new security threats while attempting
to preserve the achievements of the rule of law and democracy that are the `normative glue' of
modern political communities. These challenges are to be met under very specific institutional and
societal conditions917

6.3.1.1.38 Dimensions Text mining results (baskets)


The concept of security is related to the concepts human, social-political dimension,
discourse, concept and threat.

914
McCormack, Power and agency in the human security framework, Cambridge Review of International
Affairs, vol 21(1), 2008
915
Haque - 2001 - Environmental Security in East Asia A Critical Vi
916
Smith and Timmins - 2000 - The EU, NATO, and the Extension of Institutional O
917
Challenges of democratic oversight of EU security policies in Cathleen Kantner, Rafaella Delsarto and
Angela Liberatore (eds)Security and Democracy in the European Union, special issue of European Security, Vol
15, No 4, 2006

258
Within social sciences the most common dimensions are: social-political (100%), military
(75%) and human (63%)
The dimensions linked to the concept of security are: social-political (56%), territorial (43%)
and educational (35%)

The dimensions for social sciences emerging from the text mining results are not surprising. As
shown above, many concepts linked to the most dominant themes are either political or military in
nature. Moreover, dominant sub-disciplines of social sciences are political science and security
studies. As for the human dimension within social sciences, it appears that in correlation with the
focus on international threats, conflicts, wars and weapons; there is also an increased concern about
the insecurity of society and the individual.

6.3.1.1.39 Sources of (In)security in Social Sciences


Within the discipline of social sciences, several sources of security and insecurity can be defined. Yet,
Rincon and Cano (2007) argue that security is simply made up of two major elements: prevention
and response.918
Prevention [is defined as] what one can do in order to minimise the chances that a man made
emergency will occur (visible security, such as guards, cameras, fences, etc.).919 Prevention for an
organisation can constitute of improving its security through the adoption of simple security, safety,
and emergency procedures. If done correctly, procedures are the most economical and effective way
to enhance security. Security starts with the people.920
This idea of preventing insecurity can also be applied to states and supra-national institutions, like
the EU. The EU has been confronted with the necessity to maintain European order by securing the
outlying periphery. The stabilisation of what is now commonly called "the Wider Europe" emerged as
a major mechanism of security creation inseparable from its eastward enlargement and an
illustration of the security-oriented character of the process.921 Therefore, by stabilizing its
periphery the EU attempt to avoid instability amongst its neighbours to security it external and
internal security.
Response is what can be done in order to reduce the damages to life and property once an
emergency has occurred (procedures such as evacuation, first aid, continuity planning, etc.).922
Sources of insecurity identified in the texts are:

6.3.1.1.39.1 Assymetrical warfare


The definition of security has been expanded both substantially and geographically. Risks to
domestic and intemational order have become more intertwined. The vulnerability of society,

918
Rincon, David; Cano, Cristina, Mitigation of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin America
Transactions, IEEE (Revista IEEE America Latina), Volume: 5(3), 2007, pp. 128 - 135
919
Rincon, David; Cano, Cristina, Mitigation of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin America
Transactions, IEEE (Revista IEEE America Latina), Volume: 5(3), 2007, pp. 128 - 135
920
Rincon, David; Cano, Cristina. Mitigation of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin America
Transactions, IEEE (Revista IEEE America Latina), volume 5(3), 2007, pp. 128 - 135
921
Stefanova, Boyka, The European Union as a Security Actor. Security provision through enlargement, World
Affairs, vol. 168, no. 2, 2005
922
Rincon, David; Cano, Cristina, Mitigation of Traffic Fractality in WLAN IEEE 802.11 Networks, Latin America
Transactions, IEEE (Revista IEEE America Latina), Volume: 5(3), 2007, pp. 128 - 135

259
especially Western society, to asymmetric attacks has increased. The impact on measures to protect
state security from this increased asymmetrical warfare potential is prevailing and fundamental.923

6.3.1.1.39.2 Migration
While Britain and the United States displayed more sensitivity to ethnocultural threats presented by
migration than Germany or France, all adopted a remarkably open trading state approach to trade
and factor mobility. Many of these policies, however, would prove to have unintended consequences
that contributed to societal insecurities later on.924

6.3.1.1.39.3 Lack of identity


The colonial legacy, combined with economic and political factors, have [sic] made the production
of a "citizen identity" in many African countries highly problematic, and this lack of social cohesion is
arguably a source of many of the continent's security problems.925

923
Kostaq Karoli, A modern army in: Eurosatory focus - Army chiefs, 2006
924
Rudolph C., Security and the Political Economy of International Migration, The American Political Science
Review, Vol. 97, No. 4 (Nov., 2003), pp. 603-620
925
Josepha, J., Governmentality of What? Populations, States and International Organisations, Global Society,
Vol. 23 (4), 2009, p. 419

260
6.3.2 Small academic disciplines
Arts and Literature
Biology
Education
Environmental Sciences and Climate Change
Linguistics
Medicine with a focus on Health Science
Philosophy
Political Science with a focus on Cyber Space

261
Arts and Literature

6.3.2.1.1 Meta-analysis
Our Arts and Literature selection only contained sixteen articles published between 2001-2012.
Surprisingly, six articles appeared in journals with a geographic focus on Latin America. The general
focus of the overall Arts and Literature discipline is not well demarcated and spans many different
domains. Our admittedly small subset rendered a limited number of interesting observations on
definitions, dimensions, and sources of security.

6.3.2.1.2 Text mining results

6.3.2.1.2.1 Themes and Concepts


Within the discipline of arts and literature, a number of connected key themes within the texts can
be identified:

relations (100%)
social (98%)
defence (97%)
security (88%)
countries (77%)
work (58%)
housing (51%).

The key concepts and subordinate concepts related to these themes are:

Relations: political, national, democratic, law, issues, interest, war, United States,
power
Social: important, provide, economic, society, focus, change, institutions, world,
including, control, community
Defence: policy, military, states, threat, forces, region, government, international
Security: anthropology, global, neoliberal, context, violence, local, ways, citizens,
practice, crime
Countries: development, role, support, system, during, example, level, problem,
result, significant, general
Work: study, understanding, take, terms, form, insecurity, means, fear
Housing: home ownership, welfare, financial, home, needs, mortgage, market,
respondents

6.3.2.1.2.2 Concepts
Concepts related to security:

anthropology
critical
urban
broader

262
neoliberal
global
citizens
central
daily

local.

6.3.2.1.3 Definitions of Security in Arts and Literature


Within the discipline of arts and literature, definitions of security that have emerged from our sample
conceptualise security as being first and foremost dependent on the interpreter, in which it is
variably seen as a holistic catch all phrase, a product of its environment, and as a social construct and
an instrument of power. Finally, one authors defines it in reference to fundamental democratic
principles as being the foundation pillar of real security.

6.3.2.1.3.1 Security is a catch all phrase...


contend that security has increasingly become a catch-all phrase that refers to both a condition and
the protection of regional, national, and individual well being. It references everything from poverty
to terrorism to cybernetic attacks on computer systems to physical assaults on pedestrians.926

6.3.2.1.3.2 Security is a social construct and a product of its environment...


The role of perception in definitions of security is deemed to be crucial, with, unsurprisingly, ample
attention to the impact of 9/11. Lipschutz (2009), for instance, argues that after 9/11 everything had
changed, including the prevailing perception of the security environment.927 Goldstein partially
endorses this view and, in considering the US, observes that after 9/11 the United States had
supposedly been awakened from a blissful slumber to discover that its empire had become critically
weakened, its interests were being assailed on every front, and an emerging global terrorist threat
was now poised to attack the nation at its very philosophical and economic foundations.928
Goldstein (2010) nonetheless believes that current dominant definitions of of security are
characteristic of a neo-liberalism that predates the events of 9/11, affecting the subjects of
anthropological work and shaping the contexts within which that work is conducted.929 Security in
this interpretation is a social construct and an instrument employed by actors to increase their
power. As Goldstein claims: Security calls on the power of fear to fill the ruptures that the crises
and contradictions of neoliberalism have engendered and so functions as a principal tool of state
formation and governmentality in the world today, albeit one that is constantly challenged and
negotiated by a range of local actors and state subjects, as I go on to explore.' That this "post-
neoliberal" moment is so frequently identified as "post-9/11" points to the ways in which "security"
has usurped the discourses of the present, displacing all other phenomena to the margins of public
scrutiny and scholarly inquiry.930 Goldstein (2010) observers that many issues that fall within the

926
Pion-Berlin and Trinkunas, Attention Deficits: Why Politicians Ignore Defence, Latin American Research
Review, vol. ,42(3), 2007, p.78
927
Lipschutz (2009) in: Goldstein, Toward a Critical Anthropology of Security, Current Anthropology, vol
51(4), 2010, p.487
928
Goldstein, Toward a Critical Anthropology of Security, Current Anthropology, vol 51(4), 2010, p.487
929
Goldstein, Toward a Critical Anthropology of Security, Current Anthropology, vol 51(4), 2010, p.487
930
Goldstein, Toward a Critical Anthropology of Security, Current Anthropology, vol 51(4), 2010, p.487

263
field of anthropology are currently linked to security issues. He therefore argues for a critical
security anthropology" one that recognises the significance of security discourses and practices to
the global and local contexts in which cultural anthropology operates.931

6.3.2.1.3.3 Security as stemming from fundamental democratic principles..


Etienne Dumont, in a section of the `Declaration of the Rights and Duties of the Man and the Citizen'
of 1795, defines security as follows: la sret rsulte du concours de tous pour assurer les droits de
chacun.932

6.3.2.1.4 Dimensions of Security in Arts and Literature


Only very few dimensions emerge from our sample of the literature which lend themselves to
discussion. The most important dimension is so called ontological security, which is about people
having trust in the social world, confidence in the continuity of the social order, and predictability in
their day-to-day lives. When these conditions are breached anxiety comes flooding in and this
constitutes a serious threat to our identity and sense of ontological security.933

6.3.2.1.5 Sources of Security in Arts and Literature


Similar to the dimensions, the identified sources are limited in number and relatively straightforward
in nature.

6.3.2.1.5.1 Home-ownership and ontological security


For ontological security, trust in the social world, confidence in the continuity of the social order, and
predictability in their day-to-day lives. As a result, it can be argued that a persons home is a critical
site through which ontological security is obtained and maintained. [...] Home is a place where
people feel in control of their environment, free from surveillance, free to be themselves and at ease,
in a world that might at times be experienced as threatening and uncontrollable.934 Home
ownership, Touissant and Elsinga contend, is also becoming a more important aspect of welfare,
particularly as a source of income security during old age.935 This source of security has been heavily
and negatively affected by the financial crisis. Colic-Peisker and Johnson therefore claim that the
current global financial crisis that started through sub-prime mortgage lending in the US threatens
the image of home ownership as a source of ontological security.936

6.3.2.1.5.2 The church and emotional security

931
Goldstein, Toward a Critical Anthropology of Security, Current Anthropology, vol 51(4), 2010, p.489
932
Translation by Bentham in Pease-Watkin, A Note on Annotating Bentham: Security results from the
concurrence of all in the makingsecur e {in the giving security for} the rights of each.
Dumont in: Pease-Watkin, C., A Note on Annotating Bentham, Notes and Queries, 2004, p.129
933
Giddens (1991) in: Colic-Peisker and Johnson, Security and Anxiety of Homeownership Perceptions,
Housing, Theory and Society, vol. 27(4), 2010, p.353
934
Saunders (1990) in: Colic-Peisker and Johnson, Security and Anxiety of Homeownership Perceptions,
Housing, Theory and Society, vol. 27(4), 2010, p.353
935
Toussaint and Elsinga, Exploring Housing Asset-based Welfare. Can the UK be Held Up as an Example
for Europe?, Housing Studies, vol. 24(5), 2009, p.670
936
Colic-Peisker and Johnson, Security and Anxiety of Homeownership Perceptions, Housing, Theory and
Society, vol. 27(4), 2010, p.352

264
The church is another source of security as identified within the discipline of arts and literature.
Palmer and Gallagher (2007) argue that higher level symbolic relationships with the Church have
helped to define an individuals belief system and provided a source of emotional security as well as
physical and psychological well-being.937 Authors in this literature also refer to the importance of
attachment: attachment relationships are linked with a sense of security, where the attachment is
the result of a biological emotional trigger, or where the other is seen as either security providing
and the self is seen as security receiving.938

Biology

6.3.2.1.6 Meta-analysis
Our subset of articles in the biology literature consists of sixteen documents, all published between
2002-2011, with the exception of one article dating from from 1986.

6.3.2.1.7 Text mining results

6.3.2.1.7.1 Themes and Concepts


Within the discipline biology, a number of connected key themes within the texts can be identified:

Food (100%)
Water (83%)
Important (47%)
Family (56%).

These themes are associated with certain concepts, providing a snapshot of the key topics discussed
in biology:

Food: production, agriculture, crops, land, farming, market, region, produce,


population, human, price, demand, livestock, and access
Water: security, countries, resources, management, economic, infrastructure,
investments, institutions, costs, growth, sustainable, and environmental.
Important: social, levels, change, value, case, practices, quality, associated, likely,
low, organic, risk, and major
Family: based, consumption, fruit, fuel, yields, community, farmers, household,
adoption, size, and energy.

These themes and concepts suggest the salience of food and water in relationship to security within
the overall discipline. With respect to food, a key theme is the level of food production, particularly
in the agricultural sector. Water, in turn, is often discussed in relationship to security, specifically
with reference to water as a basic security needs of societies, mostly in low developed economies. In
developed economies, discussion seems to centre around issues related to the management and
infrastructure of water.

937
Palmer and Gallagher, Religiosity, Relationships and Consumption A Study of Church Going in Ireland,
Consumption, Markets and Culture, vol. 10(1), 2007, p.32
938
Palmer and Gallagher, Religiosity, Relationships and Consumption A Study of Church Going in Ireland,
Consumption, Markets and Culture, vol. 10(1), 2007, p.34

265
6.3.2.1.7.2 Concepts
The top 10 key concepts within the discipline biology are:

used
food
water
production
agriculture
crops
security
increased
time
social
relationship

Key concepts related to security:

achieve
basic
society
investments
poor
infrastructure
poverty
nations
paper
institutions
water

6.3.2.1.8 Definitions of Security in Biology


The holistic turn in definitions of security - i.e., broader, comprehensive, inclusive - which is so
prevalent in policy discourses these days, is also observed in the biology literature. Quoting one
author at length: In the twenty-first century, no nation on its own can be secure and no narrow
definition of security will provide a foundation for safety. The idea of security must be broadened to
include security for everyone against hunger, pollution, ecological degradation, poverty, ignorance,
and direct physical assaults. Anything less will not work for long. Meeting human needs for food,
shelter, sustainable livelihood, and environmental preservation reduces the sources of conflict and
the dissatisfaction that feed terrorism. Real security will require a larger vision and the development
of the international capacity to solve problems that feed violence, hatred, and fear.939.

6.3.2.1.9 Dimensions of Security in Biology


In the biology literature in our sample, two key dimensions stand out: food security and water
security.

939
Orr, The Events of 9-11 a View from the Margin, Conservation Biology, vol 16(2), 2002

266
6.3.2.1.9.1 Food security
Food security is particularly salient in our subset of articles, with several authors taking on this topic
from various angles.940 An often used definition of food security is the one provided by the Food
and Agriculture Organisation of the United Nations, which stipulates that food security is equivalent
to a state in which all people, at all times, have physical and economic access to sufficient, safe and
nutritious food for a healthy and active life.941 Another, less elaborate, definition is that everyone
has the necessary food on hand rather than simply the means to procure food if available.942 These
definitions are often in regards to food security in low developed economies (LDC). Some authors
also focus on food security in western countries, such as the United States. In this context, food
security can be defined as a condition in which a household, for economic or social reasons, has
limited or uncertain access to adequate food.943

6.3.2.1.9.2 Water security


The second dimension of security addressed within the discipline of biology is water security. Water
security is defined as the availability of an acceptable quantity and quality of water for health,
livelihoods, ecosystems and production, coupled with an acceptable level of water-related risks to
people, environments and economies.944

6.3.2.1.10 Sources of Security in Biology

6.3.2.1.10.1 Technology as a source of security


Technology is viewed as a source of both insecurity and security. Orr (2002) identifies the uselessness
of high-tech weapons against threats such as dirty bombs and cyber threats as a major source of
insecurity. He argues that, the next round of terrorism could involve suitcase nuclear weapons,
chemical or biological materials, or the sabotage of basic services, communications networks, roads,
and industrial infrastructure. In such cases high-technology weapons are worse than useless. They
create a false sense of security at a huge expense while preempting smarter options that promote
real security.945 Others argue that while the advance of science and technology is one reason why
terrorism today has the potential to be catastrophic, science and technology is also a critical tool for
guarding Europe against that threat.946

6.3.2.1.10.2 Food production as a source of food security


Food production is considered to be a principal source of food security. Most of the authors agree
that the way to increase food security is to increase levels of food production, although they differ on
how to increase food production as well as how increased food production will improve the security
conditions. Production seems nevertheless the key to food security through sustainabilisation,

940
Bellow et al. (2008), Himmelgreen et al.(2007), Gomiero et al. (2011), Guthrie et al. (2009), Kendall &
Petracco (2009) and Ralevic et al. (2010)
941
FAO (2008) in: Gomiero et al., Is There a Need for a More Sustainable Agriculture?, Critical Reviews in
Plant Sciences, vol 30, 2011
942
Bellow et al., Adoption potential of fruit-tree-based agroforestry on small farms in the subtropical
highlands, Agroforest Syst, vol 73, 2008
943
Guthrie et al., USDA School Meal Programs Face New Challenges, Choices, 2009
944
Grey and Sadoff, Sink or Swim Water security for growth and development, Water Policy, vol 9, 2007
945
Orr, The Events of 9-11 a View from the Margin, Conservation Biology, vol 16(2), 2002
946
Fraunhofer, Interactions between vulnerability to bioterrorism, 2002

267
localisation, and diversification of production and through supply increase. It is argued that greater
land holdings and more diversified production may produce greater resilience in food security.947
Specifically with respect to LDCs, it is argued that a longer term vision is required in order to
guarantee food security to humanity we have to be concerned with the health of earths natural
resources, soil fertility to start with.948 In addition, the utilisation of local resources is identified as a
source, as authors assert that local resources can play an important role in guaranteeing food
security in poor rural areas, but are often neglected because of the Western perception that these
are not proper food for people.949 Also, food security is a function of both physical and economic
access, as the same authors assert: by producing more food within the villages as stipulated under
the model, the relative prices of food should decrease, improving not only physical but also economic
access to food by the rural poor.

But as has already been pointed out, food security is not only an issue in LDCs, but also in developed
economies, albeit in a slightly different manner. Whereas in LDCs, the core issue really is food
production, in developed economies, it is unhealthy food, with obesitas becoming a major health
problem in some developed economies. As Guthire et al. relate:

Overweight and obesity have become the most common nutrition problems among American
children. Children are described as overweight but undernourished as they consume diets high in
saturated fat, added sugars, and sodium, but low in fruits, vegetables, whole grains, and low fat
milk.950

Apart from health issues, developed economies also face the risk of food insecurity as a reuslt of the
insecurity of food supplies. Especially Western countries rely on other regions and countries for their
food supply. It is argued that no society that relies on distant sources of food, energy, and materials
or heroic feats of technology can be secured indefinitely.951 Orr, amongst others, argues, that it
would be wise to find more resilient and cost-effective ways to provision ourselves that create
fewer targets for terrorists while buffering us from other sources of disruption.952 This may even
entail the implementation of policies to rebuild family farms, local enterprises, community
prosperity, and regional economies, and to invest in the regeneration of natural capital.953

Education

6.3.2.1.11 Meta-analysis
Our set contains 30 papers published between 1989 and 2011. One selected paper was published in
1954 (Heathers), and another was published in 1938 (Andrus and Horowitz). Most sources were
published in recent years, including 5 in 2011, 4 in 2010, 3 in 2009, 2 in 2008 and 4 in 2007.

947
Bellow et al., Adoption potential of fruit-tree-based agroforestry on small farms in the subtropical
highlands, Agroforest Syst, vol 73, 2008
948
Gomiero et al., Is There a Need for a More Sustainable Agriculture?, Critical Reviews in Plant Sciences, vol
30, 2011
949
Gomiero et al., Is There a Need for a More Sustainable Agriculture?, Critical Reviews in Plant Sciences, vol
30, 2011
950
Guthrie et al., USDA School Meal Programs Face New Challenges, Choices, 2009
951
Orr, The Events of 9-11 a View from the Margin, Conservation Biology, vol 16(2), 2002
952
Orr, The Events of 9-11 a View from the Margin, Conservation Biology, vol 16(2), 2002
953
Orr, The Events of 9-11 a View from the Margin, Conservation Biology, vol 16(2), 2002

268
Our selection appears to focus on child education, psychological reactions, parental variables (e.g.,
conflict), but also on sociology, including the environment in which individuals evolve (e.g., families,
nurseries, schools); some also focus on attachment security, detachment and emotional autonomy
(thereby suggesting an overlap with the definitions, dimensions and sources of security as defined in
psychology). Corruption, coercion, consumerism, activism and motivation are also topics identified
among the 30 selected papers.

6.3.2.1.12 Text mining results

6.3.2.1.12.1 Themes and Concepts


Looking at the text mining results generated from the 30 selected papers, the following observations
can be made:

The most connected theme is study (100% relevance). This theme co-occurs with family,
experiences, support, time, results, individuals, groups, participants, findings; these
concepts suggest that most papers are based on experiments.
The second most connected theme is attachment (85% relevance). As previously mentioned
in the meta-analysis, attachment security and relationships seem to be important areas of
focus in educational science. The theme co-occurs with concepts such as parent,
relationships, child, conflict, adolescents, emotional, mother, or childhood. It is
striking to see that in this regard, the text mining results are very close to those generated
for psychology. Affect and emotions seem to constitute a predominant dimension in the field
of educational science, and perhaps in the educational process itself.
Social is an interesting theme (65% relevance) that co-occurs with the following concepts:
university, accommodation, institutions, home, cultural, employment or learning.
The social dimension of education seems to comprise the influence of culture, working life,
studies, and institutions such as family.
Perhaps unsurprisingly, students emerges as a relevant theme (62% relevance); this could
suggest the status of student is an important step in the maturation process of individuals.
Other interesting concepts that travel with this theme are community; information,
public; corruption also emerge.
Other themes that are less connected yet are worth noticing are school, people, systems
and network.

6.3.2.1.12.2 Concepts
Security co-occurs with the following concepts: system, attachment, conditions, physical,
international, adolesce--nts or conflicts.

6.3.2.1.13 Definitions of Security in Education

6.3.2.1.13.1 The process of individuation


As defined in Ryan and Lynch (1989), the process of individuation during adolescence and the
transition to young adulthood has been characterised in terms of autonomy (Hill & Holmbeck, 1986;
Shapiro, 1981), independence (Douvan & Adelson, 1966; Group for the Advancement of Psychiatry,

269
1968), and detachment from family members (Bios, 1962, 1979; A. Freud, 1958), among other
dimensions.954 More specifically,

Autonomy refers to self-governance and self-regulation;


Independence refers to self-reliance, the ability to care for oneself;
Detachment is the adolescents withdrawing from the family, which in turns typically
involves his or her moving toward new attachments or social bonds in the wider
community.

These form inevitable aspects of a childs developments, therefore a form of educational process.

6.3.2.1.13.2 The development of personality


In 1938, Andrus and Horowitz955 investigated nursery school practices in order to examine how
personalities of young children develop. They wrote: Fundamentally involved in many theories of
personality is the sense of security of an individual. Certainly nursery school practice is designed to
develop within the child feelings of security which will serve as the firm base from which the growing
personality may develop and expand in most desirable fashion. In spite of the many differences both
in theory and practice, few educators of very young children would dissent from the statement that
one of the goals of education is to increase the general security of the children (...).956

According to the same authors, educational programs consider the development of personality as a
primary objective: You can't change personality is an implicit criticism in much of the opposition
the public nursery school movement is meeting.957

6.3.2.1.13.3 Parental rearing


The authors largely refer to the dimensions of attachment security, as described in the analysis of
psychology (see section Large academic disciplines).

Similarly to the observations outlined in psychology (see section Large academic disciplines), a
number of authors identify childhood experiences - specifically infant-parent relationships - as
playing an important part in educational development and individuals sense of security in later
stages of life: either insecure attachments in infancy that changed over time or harsh parenting that
might be otherwise associated with insecurity in childhood and/or adolescence.958 These early
experiences may even lead to depressive symptomatology in adulthood.

6.3.2.1.13.4 Family expectations


It is not surprising to observe a particular focus on family emerging from the selected papers. Family
is the primary environment in which the education of individuals takes place. Peer pressure and

954
Ryan, R.M., and Lynch, J.H., Emotional Autonomy Versus Detachment: Revisiting the Vicissitudes of
Adolescence and Young Adulthood, Child Development, 1989, p.340
955
Andrus, R., and Horowitz, E.L., The effect of nursery school training: insecurity feelings, Child
Development, 1938
956
Andrus, R., and Horowitz, E.L., The effect of nursery school training: insecurity feelings, Child
Development, 1938
957
Andrus, R., and Horowitz, E.L., The effect of nursery school training: insecurity feelings, Child
Development, 1938
958
Roisman, G.I., Padrn, E., Sroufe, L.A., and Egeland, B., Earned-Secure Attachment Status in Retrospect and
Prospect, Child Development, 2002, p.1205

270
expectations emerges as an important element in education, in particular for working-class students;
according to Clayton, Crozier, and Reay (2009): For the mature working-class students in the study,
the decision to commence studies as an undergraduate was arguably even more thrilling and
daunting (...) given familial expectations on the basis of gendered and classed roles (such as the
expectation of mothers as the primary carer for children).959

6.3.2.1.13.5 Social security


In the views of authors studying security in educational environments, social security is defined as
ones ability to access social support networks, including both formal and informal institutions
(Deumert et al., 2005). Institutions that are part of the formal social support network of a society
mainly include those that provide government services, such as healthcare, welfare, education and
so on. The informal social support network of a society includes a persons social network,
community, and family.960 When observing student behaviours, the authors note that clearly,
international students access to both formal and informal social support networks is greatly
reduced, leading to a lower level of social security.

6.3.2.1.13.6 Capitals: Integration, social class, the sense of place and role in an environment
Sociology is very much related to educational studies, in particular the study of educational
institutions, described as communities.961 Social spaces, structures and axes are important
environments in which educational phases such as academic years are experienced: Threats to the
body, the pocket and the ontological security or sense of continuity and stability of an individual (...)
are unevenly concentrated across social space on the basis of amongst other social axes: class, race
and gender. Bourdieu (1986) refers to as dominant and legitimate forms of economic, social and
cultural capital. [Bourdieu] highlights a cultural and experiential mismatch between the internalised
dispositions of the working class, (their habitus) and the social spaces or fields, in this case
educational institutions, with which they interact. As Leach (2005) comments, habitus is a sense of
ones (and others) place and role in the world of ones lived environment (21) which works to locate
classed bodies in space. The spaces of home and university are recognised here as material and
physical entities but also spatial resources upon which students draw to make sense of themselves
and use as a means of protecting themselves against such struggles.962 Social capital is crucial in the
experience of education.

What is more, social class would have a moral significance: Class matters because it creates unequal
possibilities for flourishing and suffering.963

A group of authors emphasise the importance of cultural background in perceived security, in


particular in educational environments: In their study of the security of international students,

959
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
960
Paltridge, T., Mayson S., and Schapper, J., The contribution of university accommodation to international
student security, Journal of Higher Education Policy and Management, 2010
961
Herman, C., Managerialism, fundamentalism, and the restructuring of faith-based community schools,
Educational Theory, 2006
962
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
963
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009

271
Forbes-Mewitt and Nyland (2008) defined the sense of security as . . . a low probability of damage to
acquired values that encompasses physical, social, and economic dimensions . . . (p. 198). As values
are culturally determined, this definition indicates there will be cultural differences in terms of
expectations of the level of security, as well as who provides it.964 Cultural backgrounds could thus
determinean individuals sense of (in)security.

However, other criteria are taken into consideration. Experiences in education, in particular those of
students, differ on the basis of social class but are also related to personal history, individual
circumstance, gendered identity (which takes on a different level of significance with age and
changing family responsibilities) and ethnicity, as well as geographic origins and the type of university
attended.965 Such statuses have a strong influence on university experiences, the ability to build
social relations, and integration.

It is worth noting that according to some authors, religious extremism has affected educational
institutions beyond social, economic and cultural capital. According to Herman (2006), schools have
come to provide a site of struggle over the meaning and power of identity and culture.966

6.3.2.1.14 Dimensions of Security in Education

6.3.2.1.14.1 Education and behavioural disorders: School violence


Mayer and Leone (2007)967 have reviewed reports on school violence; they examine a number of
variables related to the topic, including family structure and supervision of children (suggesting the
important role of family in education), poverty and income inequity (economic dimension),
exposure to violence in the media, media coverage of school violence (societal dimension),
access to guns and zero tolerance policies (legal dimension).

6.3.2.1.14.2 Political dimension


Universities, and more precisely the elite, may constitute an important target for political leaders and
potentially have a considerable influence in the political sphere: Universities encompass the
academic elite of society, set the agenda for education (including political and ideological aspects),
direct students, and represent a substantial voting body of the population.968

6.3.2.1.14.3 Control and coercion


Osipian (2008) examines the relation between educational environments and institutions (e.g.,
schools), and corruption: Corruption could be used on a systematic basis as a mechanism of direct

964
Paltridge, T., Mayson S., and Schapper, J., The contribution of university accommodation to international
student security, Journal of Higher Education Policy and Management, 2010
965
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
966
Herman, C., Managerialism, fundamentalism, and the restructuring of faith-based community schools,
Educational Theory, 2006
967
Mayer, M.J., and Leone, P.E., School Violence and Disruption Revisited: Equity and Safety in the School
House, Focus on Exceptional Children, 2007
968
Osipian, A.L., Corruption and Coercion: University Autonomy Versus State Control, European Education,
2008, p.28

272
and indirect administrative control and redistribution of wealth that operates on the state level and
all the way down to local authorities and administrations of public and private institutions.969

6.3.2.1.14.4 Economic dimension: the (neo)liberalisation and commercialisation of education


policies
Hill (2005) examines the relations between the capital and education: The major aspects of
neoliberal education policies include the following: deregulation and decentralisation; the
importation of 'new public managerialism' into the management of schools and colleges and
education services; a fiscal regime of cuts in publicly funded schooling and further education
services; commercialisation of and within schools; the charging of fees; outsourcing of services to
privately owned companies; and the privatisation and ownership of schools and colleges by private
corporations. National and international legal frameworks are developing to ensure international
accessibility to the privatised market in educational services. One salient policy is employment policy:
attacks on and downwards pressures on workers' rights and conditions, and on trade union rights.970
Hill cites Hatcher (2001), who suggests that the British governments intention may be to foster and
promote the private education industry until it is strong enough to compete internationally. He
further suggests that the attempt to develop 'a world class education system' is not for the benefit of
our children but to maintain businesses in the future.971

These observations suggest a strong emphasis on the economic dimension, as well as on social
justice with regard to the fairness of access to education.

In addition, Herman (2006) underlines that neoliberalism with its attendant notions of
marketisation and managerialism, affect educational systems: In this context, schools increasingly
position themselves within the consumer-product discourse of the market, promoting notions such
as efficiency, decentralisation, accountability, and performance.972

6.3.2.1.14.5 Identity and geography: adaptation


A number of authors973 investigate how social relationships influence the university experience of
studies who adapt to new socio-cultural environments, thereby developing identities. In particular,
geographical locations and contexts are linked to the development or reproduction of identities: In
different ways, the security of locality and of what and who is already known is seen here as critical
in dealing with risky and often alien educational environments as a form of social capital.974 For

969
Osipian, A.L., Corruption and Coercion: University Autonomy Versus State Control, European Education,
2008, p.27
970
Hill, D., Globalisation and Its Educational Discontents: neoliberalisation and its impacts on education
workers' rights, pay and conditions, Intemational Studies in Sociology of Education, 2005
971
Hill, D., Globalisation and Its Educational Discontents: neoliberalisation and its impacts on education
workers' rights, pay and conditions, Intemational Studies in Sociology of Education, 2005
972
Herman, C., Managerialism, fundamentalism, and the restructuring of faith-based community schools,
Educational Theory, 2006
973
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
974
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009

273
working-class students, moving away from home and experiencing university simultaneously are part
of an unquestioned rite of passage.975

6.3.2.1.15 Sources of Security in Education

6.3.2.1.15.1 Personal hygiene and health security


In the views of some authors, schools and nursery schools are functioning to improve health habits
and interests on the part of the children as well as to maintain and improve health standards.
Increasing and stimulating the interest of young children in health would therefore be similar to
providing a sense of security.976

According to Hemmeter (2011), the development of a disabled individual, i.e., the transition to
adulthood for youth with disabilities can be challenging in education, especially as far as the role of
health care in human development is concerned. Health insurance appears to be an important basis
in this respect. In addition, young adults in very good or excellent health are less likely than young
adults in poor health to report unmet needs and those with more severe disabilities are also
generally more likely to report unmet needs and therefore more likely to have issues adjusting to a
transition towards adulthood.977

6.3.2.1.15.2 Investing in social capital


Investing in social capital - which is, as previously mentioned, a key element in education - appears
crucial in building or developing identities: The geographies of home and university as spatial
resources are critical to the ongoing re-constitution of student identities and highlight the way in
which working-class students invest in the familiar as a form of social capital in order to alleviate the
dangers associated with what has been recognised as a financially, socially and culturally risky
transition.978

6.3.2.1.15.3 The pursuit of safe spaces


Individuals seek for places in which they feel comfortable - in particular when away from home - in
order to protect themselves from a hostile external environment: Locational choice can be seen as
one of the major tactics employed by the students (...) in order to minimise the damage of these
perceived risks and concerns.979

What seems to be important (...) is [to find] a place in which [an individual can] belong, somewhere
that in some way equated to [the] experience of growing up in [ones] hometown. Such
environment allows to interact with people with which one can connect in terms of ethnicity and

975
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
976
Andrus, R., and Horowitz, E.L., The effect of nursery school training: insecurity feelings, Child
Development, 1938
977
Hemmeter, J., Health-related unmet needs of supplemental security income youth after the age-18
redetermination, Health Services Research, 2011
978
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
979
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009

274
religion, (...), social class.980 This way, building new social networks influences the emergence or
consolidation of identities, thereby maintaining an individuals social background, ensuring a level of
cultural security,981 and facilitating an individuals development.

The absence of space spaces can be a handicap in a childs development: An important indication of
social adequacy in young children is their readiness to cope with situations away from home when
their mothers and other family members are absent.982 According to Heathers, young children
driven to nursery schools can therefore be a traumatic experience. The author further underlines
that harmony in the home, sociability in the family, maternal warmth and parental rearing
(including maternal indulgence) are conducive to a childs balanced development and favour
adjustment in situations in which a child is away from home, i.e., his or her safe space.

6.3.2.1.15.4 The move away from safe spaces


Perhaps paradoxically to the previous source of security identified above, Paltridge, Mayson and
Schapper (2010) argue that living in university accommodation is a possible means of improving the
security of international students. International students living in university accommodation felt
very physically secure and experienced a reduced threat level to their social security.983 As a result, a
new environment can also be conducive to a sense of physical security in the different educational
phases experienced by an individual.

6.3.2.1.16 Solutions in Education

6.3.2.1.16.1 Preventing behavioural disorders


Mayer and Leone (2007) have investigated key areas of school violence prevention, legislative
developments, the nexus of students' social skills, mental health, bullying, school exclusion, and
tradeoffs between educational rights and maintaining a safe and orderly environment. They
formulate a number of suggestions aiming to enhance prevention in this respect. Specifically,
research has clearly demonstrated that to prevent school violence, programming at the school level
include a multifaceted approach, with programs meaningfully addressing physical safety, educational
practices, and programs that support students' social-emotional-behavioural needs. Research-based
violence-prevention and related comprehensive support programs should be offered, using a three
tier approach, functioning at the universal, targeted, and intensive levels. Specific areas of
programming should include, among others, mental health supports, bully prevention, anger
management, and conflict resolution.984

6.3.2.1.16.2 The ways around consumerism in the educational system


Consumerism would have had an influence on the educational system.

980
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
981
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
982
Heathers, G., The adjustment of two-year olds in a novel social situation, Child Development, 1954
983
Paltridge, T., Mayson S., and Schapper, J., The contribution of university accommodation to international
student security, Journal of Higher Education Policy and Management, 2010
984
Mayer, M.J., and Leone, P.E., School Violence and Disruption Revisited: Equity and Safety in the School
House, Focus on Exceptional Children, 2007, p.22

275
Keeley (2010)985 investigates the reasons behind the encroachment of consumerism into the school
system: according to Tim Kasser, neoliberal economists have said that the best economic policies
cut taxes to put money into the hands of consumers. The result of such policies has been an erosion
of tax revenue for schools. Consequently, school administrators have had to seek other sources of
funding.

This has an impact on feelings of security or insecurity, in particular those of school administrators
who have to find ways to fund programs and find consumeristic solutions. In the views of Kasser, the
way education is funded could thus be a source of insecurity. As a result, Kasser suggests making
students, teachers, and administrators more resilient to consumeristic messages by connecting
education with the intrinsic values of self-acceptance, affiliation, and community feeling (...). For
example, teachers can emphasise that learning is about growing as a person, about knowing those
around us, and about contributing to the broader world.986

Kasser describes the methods he uses to this purpose, for instance:987

Encouraging students to develop creativity and pursue personal interests;


Integrating the concerns of social activism in class;
Teaching students about alternative lifestyles, or alternative social and economic
structures.

6.3.2.1.16.3 Family: Maintaining connections to home


Maintaining connections to home appears as a solution and vital system valued by students to
preserve their identity and self-worth from educational systems characterised by inequalities,
thereby avoiding damaging exposure: One of the main ways in which the students who have
moved away maintain this link with home is through frequent trips back (...). Students would use
weekends as an opportunity either to take up their part-time work commitments or to visit friends
and family back home. These trips were especially important during the first year: a period of
significant change and adjustment.988 Friendship are also significant, yet the family remains an
important source of reliance.989 Compartmentalising (i.e., creating boundaries between) social and
family lives is also an important strategy for individual protection in such contexts: Multiple
simultaneous demands result in the construction of boundaries between established social lives at
home and the often more limited social relationships enacted within the spaces of the university.990

6.3.2.1.16.4 Action research for more interaction, rationality, justice and critical capacity in
educational contexts

985
Keeley, J., Consumerism, Activism, Intrinsic Motivation, and Balance: An Interview With Tim Kasser,
Teaching of Psychology, 2010
986
Keeley, J., Consumerism, Activism, Intrinsic Motivation, and Balance: An Interview With Tim Kasser,
Teaching of Psychology, 2010, p.148
987
Keeley, J., Consumerism, Activism, Intrinsic Motivation, and Balance: An Interview With Tim Kasser,
Teaching of Psychology, 2010
988
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
989
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009
990
Clayton, J., Crozier, G., and Reay, D., Home and away: risk, familiarity and the multiple geographies of the
higher education experience, International Studies in Sociology of Education, 2009

276
Graebner et al. (2009), emphasise the educational role of action-research in eliminating
fragmentation through dialogue. Action-research is a form of collective questioning of the
participants in a certain social situation with the intent of promoting rationality and justice within the
social practices, which leads to the understanding of these practices and of the situations in which
they are found, and ultimately to their transformation (...). Action-research is educational when the
analysed problem is posed within educational activities, as it occurs in the classrooms, searching for
ways to improve it. Thus, it is expected to widen the capacity of the community to cultivate and
produce scholarly knowledge, abilities, systems, and resources therein.991 They suggest an
educational policy focused on action-research in order to solve problems through practical action,
dialogical interaction among stakeholders, and the elimination of fragmentation in school
subjects.992 Furthermore, students active involvement in collective and integrated activities 993 is
reinforced by more interaction between teachers and students. The same authors suggest that an
even greater interaction between schools and communities can be enhanced through the
development of awareness with regard to human health, e.g., food and nutrition security as well as
a greater concern for the environment and its social context. Indeed, these would develop critical
capacity among students.994

Environmental Sciences and Climate Change

6.3.2.1.17 Meta-analysis
Our set contains 13 documents published from 2002 to 2011. This reveals that only recently did
security begin to represent a concern for researches from the point of view of environmental
sciences, which is a young discipline itself.
The bulk of documents consists chiefly of research papers published in specialised journals. Only one
editorial escapes this profile. Over half the documents that we analyse have been funded by the
same UK-based publishing house although published in different journals.
Perspectives are diverse, but are mostly delimited on geographical terms (Global Climate Change and
Emerging Environmental and Strategic Security Issues for South Asia, Globalisation and Conflict
Management: Reflections on the Security Challenges Facing West Africa, Wild foods and household
food security responses to AIDS: evidence from South Africa). Alternatively, they might focus on topics
which lead disciplines to interweave, mostly with international relations and geopolitics. A budding
insight linking local to global development issues (Local Contention, Global Framing: The Protest
Campaigns against the TAV in Val di Susa and the Bridge on the Messina Straits; Land tenure reform
in Africa: a shift to the defensive) is also worthy noting.

991
Graebner, I.T., Tal de Souza, E.M., and Hiroo Saito, C., Action-research and Food and Nutrition Security: A
school experience mediated by conceptual graphic representation tool, International Journal of Science
Education, 2009
992
Graebner, I.T., Tal de Souza, E.M., and Hiroo Saito, C., Action-research and Food and Nutrition Security: A
school experience mediated by conceptual graphic representation tool, International Journal of Science
Education, 2009
993
Graebner, I.T., Tal de Souza, E.M., and Hiroo Saito, C., Action-research and Food and Nutrition Security: A
school experience mediated by conceptual graphic representation tool, International Journal of Science
Education, 2009
994
Graebner, I.T., Tal de Souza, E.M., and Hiroo Saito, C., Action-research and Food and Nutrition Security: A
school experience mediated by conceptual graphic representation tool, International Journal of Science
Education, 2009

277
Environmental sciences started to address the environment as a non-traditional threat to security in
the late 1970s. Beginning desertification, water shortages and deforestation got recognised as
potential threats to territories and nations. Within the last 2 decades environmental issues and
climate change have been held responsible for numerous upcoming threats to security and
independence of nations and regions. Several threat scenarios deal with climate change induced
migration, regional conflicts or even possible war for resources. As mankind has no direct means to
engineer the environment and climate under security aspects, the research concentrates on possible
sources of insecurity, states threats and explains causes.

6.3.2.1.18 Text mining results

6.3.2.1.18.1 Themes and Concepts


Security concerns in environmental sciences revolve around a few key topics, or so can be
concluded from the fact that only 7 themes score over 20% relevance: change (100%),
military dimension (65%), educational dimension (58%), social-political dimension (44%),
human dimension (41%), countries (31%), and water (20%).
The most relevant concepts are the following: human dimension (100%), change (37%),
military dimension (35%), social-political dimension (33%), climate (33%), natural
resource dimension (31%), economic dimension (23%), educational dimension (22%),
health dimension (22%).
The theme change is linked to the following concepts: climate, impact, adaptation,
precipitation, warming, vulnerability, temperature, expected, future, environmental
dimension
The theme military dimension is linked to the following concepts: military, armed, land,
democracy, war, conflict, threat, production, risk, violent
The theme educational dimension is linked to the following concepts: research,
development, human, information, technology dimension, system, works,
sustainable, support, early
The theme social-political dimension is linked to the following concepts: social, civil,
security, political, democracy, society, concept, health, threat
The theme human dimension is linked to the following concepts: increasing, religions,
effect, social, human, areas, rise, future, affected, agricultural
The theme countries is linked to the following concepts: markets, economy, trade,
greenhouse, strategies, emissions, view, reduction, affected
The theme water is linked to the following concepts: scarcity, available, supply,
management, demand, natural resource dimension, resources, quality, stress,
degradation.

6.3.2.1.18.2 Concepts
The concepts more closely linked to security in environmental sciences are the following: threat
(62%), concept (58%), tenure (50%), social-political dimension (49%), human (44%), issue
(43%), military (43%), policy (40%), attention (55%), approach (38%).

6.3.2.1.19 Definitions of Security in Environmental Sciences

278
Dimitrov (2002)995 quotes Mische (1989) when reflecting on the conceptualisation of security from an
environmental viewpoint: Upholding the concept of universal harm, one author argues that the
security of non-humans is a value and a right in itself. His paper goes deep into the roots that are
beginning to grow visible between security and environment. However, if we take a look at the most
relevant concepts, security seems to be primarily linked to the word threat. We can deduce that
environmental papers tackle the dearth of security. He takes this idea of threat and structures a
definition upon it:

A conception of security is an idea of what is to be protected, against what dangers. Its two core
elements are thus the referential object of security, and the types of threat. Henceforth, what
security is taken to mean leads one to look in certain directions for the sources of threats, that is, for
sites where danger lurks. Further, this very act of identifying the threats gives a general idea of how
one is to guard against these threats. Finally, this trail of thought brings us to the question of who is
responsible for maintaining security.

He then goes on to justify a debate on definition on the following grounds: Failure to recognise the
multiplicity of competing notions of security precludes proper analysis of the dissimilar goals of water
management that each discourse promotes.

Dimitrovs understanding of security is echoed by other researchers, as most have sounded the alarm
through their papers on the insecurity revolving around environmental issues. Dimitrov only fails to
make a reference to the central role that human beings play in the surrounding environmental
insecurity (scarcity of resources, faulty policies).

Through the concept of cosmopolitan trust, trust-building can be a transformative force in world
politics by producing security for a wider group of individuals, since the underlying rationality of
cosmopolitan trust is security as emancipation. Cosmopolitan trust toward individuals oppressed by
political structures becomes a political force that reveals ideas and practices which can emancipate
individuals from oppression.996

Over recent decades, top- down, centralised approaches to land and tenure reform have been
attempted based on sweeping assumptions - for example that individual private property is the sole
foundation for agricultural development, as in Kenya, or, as in Ethiopia, that all land should be owned
and controlled by the state, and the rural populace should be given use rights in equal shares. Both
of these approaches have generally failed, often undermining security of tenure, and in some cases
deepening poverty and allowing richer groups to gain control over valuable resources.997

We can therefore define security as the guarantee of a universal (sense of) protection, whose
universal character is key to ensuring individual safety, and which is fully aware of the threats it
faces, as well as the ones that loom.

6.3.2.1.20 Dimensions of Security in Environmental Sciences

995
Radoslav, S.D., Water, Conflict and Security: A Conceptual Minefield, Society and Natural Resources, vol.
15, no. 8, 2002
996
Cudworth, E., Hobden, S., Beyond environmental security: complex systems, multiple inequalities and
environmental risks, Volume 20, Number 1, February 2011
997
Smith, R.E., Land tenure reform in Africa: a shift to the defensive, Progress in Development Studies, 2003

279
6.3.2.1.20.1 Natural resources
The security of natural resources, in the sense of guaranteeing their supply, is a constant throughout
all documents:

These indications have led some commentators to note that wild natural resources may be one of
the most important considerations in the relationship between HIV/AIDS and food security.998

6.3.2.1.20.2 Economic, political and societal aspects of climate change


Economic, political and social aspects of climate change are key when defining environmental
policies. In fact, where it not for the political and economic effects of environmental insecurity,
together with the social instability derived, this would not have attracted so much policy attention in
the past decade. Even so, most of the time most states manage environmental disasters without
political repercussions.

Security, as emancipation rationality, aims at problematizing oppressive political, economic, and


social structures with the perspective of transforming them (Devetak 1995, 156). The security
rationality based on order, which constitutes Bull's perspective, understands security as an
instrument which serves the interests of dominant political actors within the existing structures.999

These links between environmental change and violent conflict begin to have so much weight that
whole papers revolve around this idea:

Committees and local politicians, social centres and trade unions, environmental associations

and social forums, all meet, network and bridge their more specific frames in the course of the
protest.1000

Nations continue to be a central actors in international politics, they increasingly participate and are
engaged in cooperation with international and regional organisations (e.g., NATO, UN, EU, etc.) to
respond to non-traditional security concerns including the environment:

Bull put order at the heart of security thinking as the principal norm of security. States can develop
shared norms and values with the objective of building order in inter-state relationships (Bull 1977,
13; Buzan 2001; Wheeler 1992).1001

Climate change is a security issue for all layers of society, beyond nation-states: for instance,
communities and individuals: The first caution concerns technology transfer, analogical enthusiasts

998
Kaschula, S.A., Wild foods and household food security responses to AIDS: evidence from South Africa,
Population & Environment, 2007
999
Cudworth, E., Hobden, S., Beyond environmental security: complex systems, multiple inequalities and
environmental risks, Volume 20, Number 1, February 2011
1000
Della Porta, D., Piazza, G., Local contention, global framing: The protest campaigns against the TAV in Val
de Susa and the Bridge on the Messina Straits, Environmental Politics, 2007
1001
Cudworth, E., Hobden, S., Beyond environmental security: complex systems, multiple inequalities and
environmental risks, Volume 20, Number 1, February 2011

280
from the defence community coaster centrepiece of homeland security planning for cities today
alongside the nation's city planners [...].1002

Researchers show that long-term fluctuations of war frequency and population changes followed
the cycles of temperature change.1003

Climate change may undermine individual and collective economic livelihood, affect human health
through reduced availability of freshwater and food, and by exposing people to new disease vectors.

The starting point of the Human Security concept is attributed to the programme launched by the
United Nations Development Programme (UNDP) in 1994. In the Human Development Report, two
main aspects of human security can be noted: first safety from chronic threats such as hunger,
diseases and repressions, and second, protection from sudden and harmful disruptions in the
patterns of daily life. The character of the first of these two aspects is a probable reason for the
tendency to focus on the worlds poor within much literature on human security.1004

Climate change could also unite the international community, provided that it recognises climate
change as a threat to humankind and soon sets the course for the avoidance of dangerous
anthropogenic climate change. However, this may already come late, and, as a result of the
ineffectiveness of international statutory action, punctual signs of reject to it are already beginning
to crop up.
The campaign against the Tav is considered `the first, concrete no-global struggle, not only in Italy
but at European level. We do not say it, we do not like labels, but this is a no-global struggle, because
we oppose an international project which overrides the rights of local communities (IVS11).1005
Two of the critiques are particularly germane: the first has to do with the overly state-centric focus
of conflict management, while the second relates to the discordant role played by the international
community towards effective conflict management and peace-building in the sub-region.1006
The worlds militaries will increasingly have to reverse their current role and manage the challenges
of climate change; We begin to see a number of armed forces voluntarily becoming involved in
greenhouse gas reduction programmes.
Together and separately, many of the nation's city planners and defence planners began to speak a
common language. Their actions spoke as loud as their words. With the invitation of city
administrations, defence experts already at work assisting with technology transfer found further
opportunities in the violence that had engulfed American cities.1007

1002
Light, J.S., Urban Planning and Defence Planning, Past and Future, Journal of the American Planning
Association, Autumn 2004
1003
Zhang, D.D., Global climate change, war, and population decline in recent human history, Department of
Anthropology, University College London, 2007
1004
Mobjrk, M., Eriksson, M., Carlsen, H., On Connecting Climate Change with Security and Armed Conflict:
Investigating knowledge from the scientific community, 2010
1005
Della Porta, D., Piazza, G., Local contention, global framing: The protest campaigns against the TAV in Val
de Susa and the Bridge on the Messina Straits, Environmental Politics, 2007
1006
Ukeje, C. 'Globalisation and Conflict Management: Reflections on the Security Challenges Facing West
Africa', Globalisations, 2008
1007
Light, J.S., Urban Planning and Defence Planning, Past and Future, Journal of the American Planning
Association, Autumn 2004

281
Indeed, worldwide military activity may be responsible for more greenhouse gas emissions than all
of the United Kingdom. In this respect, militaries are a problem rather than a solution to
environmental insecurity.1008
The US Department of Defence claims to have reduced its greenhouse gas emissions by 20%
between 1990 and 1996 [...].1009

The impact of climate change on human and global security could extend far beyond the limited
scope the world has seen thus far.
This [models developed for prediction purposes] makes the conclusions robust because all current
models predict a warmer future world. The other key factor affecting water availability is the lack of
enough reservoir storage to manage a shift in the seasonal cycle of runoff. Current information about
the climate-related water challenges facing much of the world, although by no means perfect, is
sufficiently robust that major future problem areas can now be defined. The matter takes on a
greater urgency because the model-predicted signals are already being observed.1010
The broader security concept recognises that security and stability have political, economic, social
and environmental elements.
The Chinese government has in fact succeeded in presenting itself as capable of solving these
problems. In fact, its position and legitimacy is built on its promise to develop and modernise the
country, to solve the pressing social and ecological problems and to ensure political and social
stability (Heberer and Senz, 2006b).1011

The relationship between environment and security is indirect and multicausal.


The causes of livelihood contraction are often but not exclusively due to declining access to natural
capital caused by, for example, deforestation, land degradation, natural disasters such as
drought and flood, and population displacement for agricultural expansion, industrial development,
or the building of roads and dams. Declining access to land, or rather to the returns from human uses
of land, is seen as a key process that causes livelihood contraction and hence increases the risk that
people will join armed groups (de Soysa, Gleditsch, Gibson, & Sollenberg, 1999). Other non-ecological
factors such as the rolling back of state services and declining terms of trade also matter, and often
interact with natural resource use and peoples access to them in complex ways (Reed, 1996).1012
Reciprocity and feedback loops: the relationship between environmental stress and conflict is
recursive; because just as environmental stress can lead to conflict, conflict can lead to more
environmental stress. Environmental and security issues are thus multifaceted and complex, in
cultural, political and scientific sense. In a fundamental way, the environment must be viewed as a
strategic factor to be weighed in with many other variables affecting a global or homeland security.
But the key feature of such practices, as Sassen notes, is that they produce distinctive and complex
spatialities that cannot be completely subsumed under the national or the global and thus have their
own sociological reality. Demonstrably forces of globalisation, their most telling feature may be to
`denationalise elements of national geography, identity, and practice, where that process refers to

1008
Barnett, J. Security and Climate Change, TyndallCentre for Climate Change Research, 2001.
1009
Barnett, J. Matthew, R.A., McDonald, B.L., O'Brien, K.L. Global Environmental Change and Human Security.
Cambridge: Polity Press. 2009.
1010
Barnett, T. P., J. C. Adam, and D. P. Lettenmaier, Potential Impacts of a Warming.Climate on Water
Availability in Snow-Dominated Regions., Nature, 2005
1011
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007.
1012
Barnett. J. "Climate change, human security and violent conflict." Political Geography. 2007.

282
the deconstruction (although seldom the obliteration) of the national frame of reference and
competence in areas as diverse as defining political community, framing regulatory policy, and
constructing urban space (Sassen, 2006).1013
Consequences of environmental stress: poverty, food insecurity, poor health conditions,
displacement and disruption of the social and political institutions.
According to Stern (2006), in South Asia and sub-Saharan Africa alone, an additional 145220 million
people could fall below the US$2a-day poverty line. This figures illustrate the extent to which climate
change can jeopardise chances of meeting the Millennium Development Goals.1014

As a result [of the impact of climate change], more than 850 million people worldwide are currently
undernourished.14 This situation is likely to worsen in future as a result of climate change, as food
insecurity in the lower latitude, i.e. in many developing countries, will increase with a temperature
rise of just 2C. This trend will be substantially reinforced by desertification, soil salinisation or water
scarcity.1015
Although fewer people will die of cold in the temperate latitudes, the negative health impacts of the
rising temperatures will predominate, especially in developing countries.1016

While communities generally adapt and are generally resilient to extreme events, climate change
may stretch the limits of adaptability and resilience, making migration an attractive if not the only
option to preserve livelihoods and quality of life. Sea-level rise is very likely to induce large scale
migration in the longer-term.1017

There are other ways that climate change contributes to future violent conflicts, but these are highly
uncertain and will operate through more complex environmental and social process.

Scarcity of natural resources adds to the above mentioned insecurity-bound circumstances that
require urgent reaction.
Taking pro-active measures to promote intergovernmental cooperation: Initiating
intergovernmental cooperation is often a lengthy process. With physical shortages already
foreseeable in many places, there is only a limited window of time to set this process in motion.1018

6.3.2.1.20.3 Evolution over time


Throughout the 1990s an argument was developed, and widely accepted, that scarcity of renewable
environmental resources and the increasing odds of natural disaster doe to climate change can
contribute to violent conflicts within states.
In assessing the financial contribution to be made on the basis of the polluter pays principle,
however, only emissions produced since 1990 should be taken into account, as it is only since this
point in time, when the IPCCs First Assessment Report was published (IPCC, 1990), that the

1013
Axford, B., "Editorial", Borders and Networks in the Global System, Globalisations, 2007
1014
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007
1015
"The security dimensions of climate change" Bangladesh Institute of Peace and Security Studies, 2009
1016
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007
1017
Barnett, J. Security and Climate Change, TyndallCentre for Climate Change Research, 2001
1018
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007

283
international community can be said to have developed an adequate awareness of the climate
problem.1019

These systems should provide timely information and warning in advance of extreme events and
crises. The United Nations recognised the importance of early warning systems long ago, as is
apparent, for example, from its designation of the 1990s as the International Decade for Natural
Disaster Reduction (IDNDR, 19901999), its adoption of the ensuing International Strategy for
Disaster Reduction (ISDR), its staging of a series of UN conferences on early warning systems, and the
launch of the new International Early Warning Programme.1020

Statistical modelling in 2000 found scarcity of renewable resources is not correlated with political
instability. It has recently been argued that it is the abundance of natural resources, rather than
their scarcity, that drives conflict (Collier, 2000; de Soysa, 2000, 2001). Using statistical modelling, de
Soysa and Collier both and scarcity of renewable resources is not correlated with political instability,
nor is ethnic diversity.1021
Climate change being the most prominent and best studied of the suite of environmental change
problems. However, it has thus far received comparatively little attention by researchers and little
systematic analysis as a security issue. This trend is gradually being reversed from the last decade on.
Even the IPCC, which rightly prides itself of being a synthesis of the best peer-reviewed science, has
fallen prey to relying on second- or third-hand information with little empirical backing when
commenting on the implications of climate change for conflict. The research frontier is being pushed
forward in both climate change research and conflict research, but given the combined uncertainties
of the two fields, the gaps in our knowledge appear daunting.1022

The UN Secretary General Ban Ki-moon (Ban, 2007), the European Commission and the High
Representative to the European Council (EC, 2008) have also voiced concerns over the security
implications of climate change. However, the link between climate change and international military
conflict is by no means clear and that beyond reports by think-tanks and governmental and
international agencies, which in general suffer from lack of reference to empirical evidence, there is
little research on the links between climate change, security and conflict.1023

Besides the dominant focus of national security policy on violent conflict and transborder incursions,
the issue of whether, and how climate change may stimulate conflicts and increase migration
became more important throughout the last years.
[...] further research is required before confident predictions that climate change will induce
violence can be made. A research programme looking to empirically investigate climate-conflict
linkages in greater detail would be most effectively targeted at the substrate level in countries where
governance systems are in transition, levels of inequality are high, social-ecological systems are
highly sensitive to climate change, and which have a history of large scale migration.1024

1019
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007
1020
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007
1021
Barnett, J. Security and Climate Change, TyndallCentre for Climate Change Research, 2001.
1022
Nordas, R. and Gleditsch, N., Climate Change and Conflict, Political Geography, 2007
1023
Ludwig, R. et al, "Towards an interdisciplinary research agenda on climate change, water and security in
Southern Europe and neighboring countries", Environmental Science & Policy, 2011
1024
Barnett, J. Security and Climate Change, Global Environmental Change Volume, 2003

284
6.3.2.1.21 Sources of Security in Environmental Sciences

6.3.2.1.21.1 Security
Achieving and sustaining a desirable quality of life through stable environmental factors;
Global climate change will have profound implications for the quality of life of hundreds of millions
of people. The prospect of human-induced climate change illustrates for the first time in history that
humankind is in a position to exercise a significant influence on the global environment. [...] these
issues are researchable and should be made a research priority. Of course, caution must be exercised
in drawing conclusions from the articles published here and particularly in formulating policy
recommendations.1025
Open access to water. For instance, the German Advisory Council on Global Change places among its
2007 conflict constellation Climate-induced degradation of freshwater resources, pointing out that
1.1 thousand million people are currently without access to safe drinking water. The situation could
worsen for hundreds of millions of people as climate change alters the variability of precipitation and
the quantity of available water.1026
Ecological security seeks to minimise the dangers from ecosystem change or loss: successful
measures for avoiding acute political conflict may compromise ecological security1027
Interdisciplinary and international research to understand climate change and its consequences.
Whether security threats arise from climate impacts or options for cooperation evolve does not
depend only on the severity of the impacts themselves, but on social, economic, and institutional
vulnerabilities or resilience as well as factors that influence local, national and international relations.
Multidisciplinary research is needed to tackle the multi-facet complexity of climate change impacts
on water resources in the Mediterranean and neighboring countries.1028

6.3.2.1.21.2 Insecurity
Environmental mismanagement, natural resource depletion, overpopulation. Environmental stress,
as a general rule, is accused of contributing to the incidence and escalation of conflict. Large-scale
statistical investigations highlight the correlations between environmental concerns and conflicts.
Burke et al. 2009 are Zhang et al. 2007 are quoted as references in several papers.
Environmental insecurity is the double vulnerability of people that arises when underdevelopment
and poverty are compounded by environmental change;
Change is to avoid dangerous interference in the climate system, and such impacts have been
defined as a threat to security (Barnett, 2003; Barnett & Adger, 2003; Brown, 1989; Edwards, 1999;
Swart, 1996). There has been some speculation about the ways that climate change may increase the
risk of violent conflict (Brauch, 2002; Gleick, 1992; Homer-Dixon, 1991; van Ireland, Klaassen, Nierop,
& van der Wusten, 1996). There are two broad ways in which conflict might be stimulated by climate
change. First, conflict could come about through changes in the political economy of energy
resources due to mitigative action to reduce emissions from fossil fuels (Rifkin, 2002). The second

1025
Nordas, R. and Gleditsch, N., Climate Change and Conflict, Political Geography, 2007
1026
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007
1027
Radoslav, S.D., Water, Conflict and Security: A Conceptual Minefield, Society and Natural Resources, vol.
15, no. 8, 2002
1028
Ludwig, R. et al, "Towards an interdisciplinary research agenda on climate change, water and security in
Southern Europe and neighboring countries", Environmental Science & Policy, 2011

285
issue is the prospect of conflict stimulated by changes in social systems driven by actual or perceived
climate impacts.1029
Populations could respond to environmental hardships by migrating, which would spread potential
hot-spots of social unrest. The likelihood of migration-induced conflict increases if environmental
migrants have to compete with residents for scarce resources such as farmland, housing, water,
employment, and basic social services. Migrations and conflict are associated a total 1504 times in
the academic documents analysed: this factor should therefore not be overlooked.
Transboundary environmental migration will mainly take the form of south-south migration, but
Europe and North America must also expect substantially increased migratory pressure from regions
most at risk from climate change. The question as to which states will have to bear the costs of
environmentally induced migration in future also contains conflict potential.1030
Fortunately, this fact has already reached certain international institutions. In this regard, Cudworth
and Hobden (2011)1031 praise that the Economic and Social Committee of the European
Communities (1992) warned the European decision-makers that `the signs are already apparent in
environmental deterioration, social and political unrest and the existing conflicts around the world.
Uncertainties in water supply and economic aspects of water shortage and degradation of freshwater
resources. See Dimitrov (2002).1032
Decline in food production:
In the future, heat stress on crops and livestock will occur in an environment of steadily rising
demand for food and animal feed worldwide, making markets more vulnerable to sharp price swings.
High and variable prices are most damaging to poor households that spend the majority of their
incomes on staple foods. [...] Moreover, temperatures have trended upward since 1980. Despite
rains returning to some locations of the Sahel during the past 15 years, the growing season for staple
crops has been reduced, maize yields have remained far below varietal potential, and millet and
sorghum yields continue to stagnate.1033
Increase in storm and flood disasters. Narkar (2011)1034 tackles this topic in great detail.

6.3.2.1.22 Solutions in Environmental Sciences


The numerous links between environmental change and violent conflict turn the accomplishment of
environmental security into not only an aim, but also a tool for stemming security generally related
to other fields.
Societal vulnerability can lead to crises. The more drastic the climate change, the more severe the
impacts of social destabilisation and conflicts may be. [...] Migration, for example, could become
unmanageable. Distributional conflicts and crises of legitimacy between the main drivers of climate

1029
Barnett. J. "Climate change, human security and violent conflict." Political Geography. 2007
1030
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007
1031
Cudworth, E., Hobden, S., Beyond environmental security: complex systems, multiple inequalities and
environmental risks, Volume 20, Number 1, February 2011
1032
Radoslav, S.D., Water, Conflict and Security: A Conceptual Minefield, Society and Natural Resources, vol.
15, no. 8, 2002
1033
Battisti, D. and Naylor, R., "Historical Warnings of Future Food Insecurity with Unprecedented Seasonal
Heat", Science, 2009
1034
Sarkar, A., "Global climate change and emerging environmental and strategic security issues for South
Asia", Asia Pacific Institute of Management, 2011

286
change (especially the industrialised countries and, in future, China and India as well) and those most
affected (particularly the developing countries) would be likely to occur.1035

Although the relationship between environment and security has been under consideration almost
two decades, with all the evolution inherent to this process of reflection, nations continue to be
central actors in international politics and their participation in strategy is still considered necessary.
Engaging in cooperation with international and regional organisations to respond to non-traditional
security concerns including the environment is of the essence.
The impacts of climate change will particularly affect those regions of the world in which states with
weak steering and problem-solving capacities already predominate. Climate change could thus lead
to the further proliferation of weak and fragile statehood and increase the probability of violent
conflicts occurring.1036
Therefore, the construction and protection of international order itself becomes the main security
interest of states. Cooperation between states of which main interest is to build and protect order is
enabled by trust [...].1037

Linguistics

6.3.2.1.23 Meta-analysis
Our subset of the linguistics literature consists of 9 articles, which may be further subdivided in
anthropology, gender studies, gender discourse. The articles have been published between 2002-
2009.

6.3.2.1.24 Text mining results

6.3.2.1.24.1 Themes and Concepts


The concept map reveals a number of these that score over 20% which are use (100%), security
(100%), political (75%), social (62%), human (59%), power (57%), mother (44%), nonprofit
(30%) and EU (24%).

6.3.2.1.24.2 Concepts
The theme use is related to concepts such as: focus, different, individual, world,
action, analysis, increasing, measures, institutions, rights, group, means, effects,
structure, problem, data, services.
The theme security is associated with groups, means, concept, effects, legal,
government, link, law, terrorism, freedom, protection, policy, threat, potential,
practices, specific, information, national, protection, approach and violence.
The theme political is linked to: interests, region, military, case, external,
international, country, terms, national, transnational, potential, conflict, common,
relations, processes, issues and force.
The theme social relates to the concepts: time, system, role, support, nature,
research, provide and development.

1035
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007
1036
Climate Change as a Security Risk', German Advisory Council on Global Change (WBGU), 2007
1037
Cudworth, E., Hobden, S., Beyond environmental security: complex systems, multiple inequalities and
environmental risks, Volume 20, Number 1, February 2011

287
Human associates with concepts such as: women, life, cultural, survival, gender,
equality, human and society.
Power is linked to change, global, position, problem, order, complex, structure,
political, force, processes, relation and participation.
The theme mother appears next to concepts such as monkey, experiment, nature,
view, work and results. This can be explained by the fact that Vicedo (2009b)1038 explores
previous research on rhesus monkey behaviour (specifically looking into maternal protection,
hence its link with security) in linguistic terms. Since the documents analysed amount to a
total 9 papers, what would in other disciplines not stand out, in this case, it is proportionally
relevant.
The theme nonprofit relates to the concepts civil, peace, sector, insecurity and
government.
Finally, EU is associated to integration, external and border.

Security reaps 100% relevance as a theme, as well as a concept. In the latter case, it appears nearly
twice as frequently as the following most relevant concept (human, 55%) with an overall count of
505 in the 9 documents.

6.3.2.1.25 Definitions of Security in Linguistics


There is something eye-catching in the way in which authors in this discipline tackle the definition of
security, as they actively engage in creative deconstruction questioning existing definitions while
considering the background from which such definitions emerge. In comparison to other disciplines,
both the nuances of the security discourse and the factors that shape these nuances receive far more
attention in linguistics. With respect to the latter, authors invite the reader to take into account that
any substantive definition of security is the fruit of its authors origin. Inevitably, a definition reflects
societal views on a myriad of topics, including the distribution of power, social relations, gender
issues, the nature vs nurture debate, collective and individual values and so on. This discursive turn
casts an interesting light on concepts of security illuminating above all their fundamental relative
nature. These concepts, of security have evolved over the years, becoming ever more rich and broad
in scope and substituting older, outdated paradigms. In these regards, one author even suggests
that a common assumption of all of the approximations at forming a human security policy agenda,
from whatever group or country, is that the old, well-known paradigms function less and less
well.1039

6.3.2.1.25.1 Human security


Human security is at the centre of attention throughout the literature. The meaning of human
security, too, is relative and depends on the time and context in which it appears, as asserted by one
author in a lengthy exposition on the historical evolution of the concept: Human security [...] The
term has a long history, going back at least to the founding of the United Nations in 1945. But in its
more modern form the use of human security in debates over civil society, participation, and

1038
Vicedo, M., Mothers, machines, and morals: Harry Harlow's work on primate love from lab to legend,
Journal of the History of the Behavioural Sciences, Vol. 45(3), 193218, Summer 2009. Published online in
Wiley Interscience (www.interscience.wiley.com). DOI 10.1002/jhbs.20378
1039
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal.
Volume 59, Issue Supplement s1, pages 101112, September 2008

288
sustainable development took a giant step forward when it became the focus of the U.N. Human
Development Report in 1994 (Alkire, 2003). In that now famous use of the term human security,
the Human Development Report focused on the struggle to achieve freedom from fear and freedom
from want. This groundbreaking report defines human security as safety from chronic threats such
as hunger, disease and repression, and protection from sudden and hurtful disruptions in the
patterns of daily life whether in jobs, in homes, or in communities (UNDP, 1994).1040 Since 1994
the concept of human security has been taken up in many contexts.

Further elaborating on the concept of human security, authors relate that human security aims to
reduce the risk to our existence as individuals and as a species and to increase our choices in realising
and expanding human potential for present and future generations. Species survival, the quality of
individual life and the realisation and expansion of human potential are the content of human
security. This concept of human security is historical, ethical and policy-oriented.1041

National concepts of human security vary and it is Japans conceptualisation as well as official
embrace of human security that is seen as a shining example as it comprehensively covers all the
menaces that threaten human survival, daily life and dignity . . . and strengthens efforts to confront
these threats. Japan does not prioritise freedom from fear over freedom from want, but holds them
as dual objectives of human security. Japans human security emphasis has found leadership in the
highest levels of government.1042

Other authors place human security squarely within the context of the transition from state-centric
to non-state centric definitions of security. As Ghada Moussa writes: Women and gender issues
connect the state-centric definitions of security towards a suffering of war-affected women and
civilians, concept of human security.1043

In sum, linguistics conceives security as a multidisciplinary phenomenon must be considered in a


comprehensive manner, and that is subject to discourse-determining factors (age, culture, societal
origin, geographical origin, gender, history, class, power relations, ideology, values, religion and
language itself, human nature). The particularities of the human condition are a central topic in the
linguistic security discourse. A common denominator of the various views on human security
expressed in the articles is that it could be viewed as the state of affairs where individual and
collective forms of personal realisation and development are not only preserved but also catered for.

6.3.2.1.26 Dimensions of Security in Linguistics


With the extraordinary attention awarded to human security in this literature, it comes not as a
surprise that many of the discussed dimensions eventually relate to the human condition.

6.3.2.1.26.1 The moral dimension of security

1040
Sidel, M., The Third Sector, Human Security, and Anti-Terrorism: The United States and Beyond, Voluntas,
2006
1041
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal.
Volume 59, Issue Supplement s1, pages 101112, September 2008
1042
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal.
Volume 59, Issue Supplement s1, pages 101112, September 2008
1043
Moussa, G., Gender aspects of human security, International Social Science Journal
Volume 59, Issue Supplement s1, pages 81100, September 2008

289
Interestingly enough, authors draw attention towards the moral dimension of security (very unlike
other disciplines):

Currently we are reducing our species time, our quality of life for ourselves and our progeny and the
earths life support systems. This behaviour is immoral. We have a moral responsibility to contribute
to existence and life and not extinction and death. The ethical goal of human security policy is to
contribute to the construction of harmonious relations between humans and nature, as well as
between humans themselves, that contribute to species and individual survival and realisation. The
immoral nature of prevailing economic and financial institutions, as well as of the political and
cultural institutions that support them, becomes apparent when activities that tend toward
extinction and death are justified for economic reasons, or when their discontinuation or
replacement is delayed because the cost of alternatives is higher. Profit and growth are more valued
than survival and realisation; greed has precedence over need.1044

6.3.2.1.26.2 Cultural expression and human security


Culture is another neglected source dimension of security. The right of cultural expression is not only
an unalienable right, according to authors, but also an essential element safeguarding human
security at the individual and the societal level. As one author argues: Cultural diversity is as
important for the human species as biodiversity is for all living things. This forms the edifice of the
rights-based approach to development, including the right to development itself that forms a legal
foundation for human security. This provides a legal and policy platform that defines human security
at the individual level.1045

6.3.2.1.26.3 Physical security and the gender dimension


Physical security as a key dimension of human security contains an important

gender element. Domestic violence as well as various other crimes compromise physical security. As
related by one author: the physical integrity dimension of human security in its relation to gender
equality focuses on forms of violence exerted over women, such as human trafficking, bonded labour
and girls child domestic labour. The use, or threat, of violence is an important way in which power
relations are maintained in the household. The rise in social violence is a human security problem.
The increasing rate of violence directed towards women is associated with a combination of factors
such as lack of opportunities for women, high levels of poverty and a police system that is concerned
with maintaining social order rather than preventing crime.1046

6.3.2.1.27 Sources of Security in Linguistics


Sources of security also stem from the human condition and are discussed with relationship to
parental love, societal and individual responsibility and autonomy.

6.3.2.1.27.1 Parental love and security

1044
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal.
Volume 59, Issue Supplement s1, pages 101112, September 2008
1045
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal.
Volume 59, Issue Supplement s1, pages 101112, September 2008
1046
Fuentes, C.F., and Aravena, F.R. (eds.), Promoting Human Security: Ethical, Normative and Educational
Frameworks in the Caribbean, 2005

290
The human dimension of security includes other immaterial dimensions, and renders it with a
qualitative dimension it has been traditionally deprived of:

[...] mothers, human or subhuman, provide two fundamental things for a baby: a haven of safety
and a source of security. According to him, it was evident that the mother provides a haven of safety
because in times of fear, the frightened or ailing child clings to its mother, not its father; and this
selective responsiveness in times of distress, disturbance, or danger may be used as a measure of the
strength of affectional bonds [...].1047

At a more general level, such sources of security shouldnt go unnoticed, as argued by many authors
in the linguistics literature, since many of the destabilizing external factors that we generally identify
as threats depend to a great extent and with surprising frequency on the way in which they are
perceived.

6.3.2.1.27.2 Societal actors and security


Another source of security is produced by non-state actors such as individuals and associations who
are security providers in their own right. In fact, many proponents of the role of non-state actor
proscribe that the mechanics of traditional security provision (unidirectional and in a vertical
manner), should be and in fact are already avoided when taking into account alternative providers of
security. Examples of these providers are provided by all sorts of associations including advocacy
groups and the media. The latter are particularly worth noting from the viewpoint of linguistics
because discourse is the axis of their activity: the modern concept of advocacy. Associations can also
include groups of citizens willing to fill the void when traditional security providers are absent:
paramilitias.1048

Authors in the linguistics literature warn against the discouragement of civil societal actors in
partaking in security provision. Instead they welcome their participation in the multiples stages of
the security provision policy making process (including formulation, conveyance, implementation,
examining, restructuring). Specifically they warn against the increasing tendency of governments to
view the third sector as a source of human insecurity and uncivil society in the wake of terrorist
attacks. The paper discusses the means governments use to control third sector activity that they
view as potentially linked to terrorism, the need for comparative analysis of these measures, and the
role of the third sector and scholars in recognising the responsibilities of governments to prevent
third sector organisations being used in terrorism while preserving the independence and vitality of
the third sector.1049

This people-centred approach strives towards the empowerment of populations - associations as


well as individuals - and is linked with a greater and more sustainable degree of security:

6.3.2.1.27.3 Human integrity, independence and autonomy


Human integrity is singled out as another source of security through the concept of independence.
The reasoning is that the more independent an individual is, the greater its ability to ensure its own

1047
Vicedo, M., Mothers, machines, and morals: Harry Harlow's work on primate love from lab to legend,
Journal of the History of the Behavioural Sciences, Vol. 45(3), 193218, Summer 2009
1048
Valasek, K., Gender and Security Sector Reform: An Analytical Framework, UN-INSTRAW, 2007
1049
Sidel, M., The Third Sector, Human Security, and Anti-Terrorism: The United States and Beyond, Voluntas,
2006

291
security. Economic independence and education are instrumental in bringing this about. As Goucha
and Crowley assert: the relationship between education and human security has been recognised
ever since the concept of human security originated and evolved towards greater inclusion and
leadership for individuals.1050 In conclusion, an empowered, independent, educated, equal
individual is safe.

6.3.2.1.28 Solutions in Linguistics


Certainly in comparison to other disciplines, the linguistics literature elaborates on a variety of ways
in which to increase security.

It puts forth two key ideas:

Solutions should be targeted at the individuals and their communities, both through communication
and through direct interventions. It is thus argued that one of the most vital steps to ensure the
day-to-day security of all is to transform the institutions, policies and people who are responsible for
the security of communities and individuals.1051

Traditional and conventional security strategies are ineffective and inappropriate, and should
therefore be complemented or even replaced by alternative approaches that are above all
multilateral in nature and focus on increasing the expansion of human freedom and dignity (Sen,
2000: 7).1052

Within the overall context of these three ideas, a number of other solutions are identified, which
may, at times, in be in contradiction to one another.

6.3.2.1.28.1 A holistic approach


Authors in this literature contend that a holistic approach that takes on hard and soft security
issues in a multidisciplinary manner. An integrated, holistic human security policy framework analysis
has the following advantages, compared to traditional policy frameworks:

It strengthens policy, reduces risks and enhances opportunities across all policy spheres and at all
levels from the species to the individual level. It allows for systematic comparisons by establishing an
integrated prioritisation of human security policy across all policy spheres and potentially at different
policy levels. It facilitates resource allocation through comprehensive analysis and prioritisation
across all policy spheres and at different policy levels. It creates the possibility of integrated policy
actions at different levels and in different spheres in the operational, as well as the planning, stages.
It permits greater sensitivities to trade-offs between policy priorities. It focuses attention on how
much to invest in low-risk policy contingencies that would have catastrophic consequences. It
advances human security through establishing a network of interconnected formal and institutional
networks to bring together key decision-makers. It reaffirms that one size fits all policies do not

1050
Goucha, M., and Crowley, J. (eds.), Rethinking Human Security, International Social Science Journal
Monograph Series. 1, October 2008
1051
Sidel, M., The Third Sector, Human Security, and Anti-Terrorism: The United States and Beyond, Voluntas,
2006
1052
Bigo, D., Carrera, S., Guild, E., and Walker, R.B.J., The Changing Landscape of European Liberty and
Security, 2007

292
work and that the human security framework requires case-based analysis that includes policy,
institutional and cultural dimensions.1053

6.3.2.1.28.2 Security through democratic discourse


Various authors argue that the implementation and execution of these ideas ultimately depends on
vibrant democracies and the input of a multiplicity of voices and discursive patterns. To quote one
author at length:

Security policy has been assumed to be at least partly beyond the reach of democratic participation.
Hence, for example, the crucial role of the principle of the rule of law and formal declarations of war
in the limitation of arbitrary decision under extreme conditions. Serious long-standing questions
about the character of modern political life are at stake. Yet while generalised claims about security
as the first freedom may remind us of a broader heritage of liberal achievements and their limits,
they also suggest important changes in the way coercive and restrictive policies are now justified,
both domestically and internationally. viewing public argument as a constitutive dimension of
security policy. Such public argument-driven security studies might be enriched by interdisciplinary
dialogue that turns overlapping concepts into productive points of theoretical synergy.1054

6.3.2.1.28.3 Evidence-based policy making


It is also argued in addition to adopting a holistic approach, policy-makers should base their policies
on evidence-based analysis, in order to go beyond the hype of the moment: Effective policy needs
more than extra resources and greater political commitment: it also requires a better understanding
of global and regional security trends. The first Human Security Report 2005 produced by the Human
Security Centre at the University of British Columbia, present a comprehensive and evidence-based
portrait of global security. . . . It poses major challenges to conventional wisdom.1055

6.3.2.1.28.4 Networks and human centric security


Going beyond the state, it is argued that humans should be the alpha and omega of security policies,
which move beyond the narrow national economic growth concepts of development to broader
people-centred concepts such as sustainable human development and human security.1056 These
take the capabilities of citizens rather than their governments as the unit of analysis. Authors for
instance point towards Mongolia and Japan who recognise that they have no real military defence
and that their only defence lies in networks of human security internally, subregionally, regionally
and internationally.1057

6.3.2.1.28.5 Non-state actors are vital


Governments alone cannot be responsible for security but should rely on third sector actors.

1053
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal.
Volume 59, Issue Supplement s1, pages 101112, September 2008
1054
Public argument-driven security studies. - Argumentation and Advocacy - Nbr. 391 - Author: Mitchell,
Gordon R.
1055
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal.
Volume 59, Issue Supplement s1, pages 101112, September 2008
1056
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal.
Volume 59, Issue Supplement s1, pages 101112, September 2008
1057
Oquist, P., Basic elements of a policy framework for human security, International Social Science Journal.
Volume 59, Issue Supplement s1, pages 101112, September 2008

293
It is observed that recent events have made it even more starkly clear that the third sector is crucial
to the worlds efforts to enhance human security. One need only look at the response to the tsunami
in Asia and hurricane Katrina in the United States, the role of NGOs in Darfur and throughout the
world, and events in all regions of the globe to understand the importance of the role that the third
sector plays in survival, a key element of human security.1058

Medicine with a focus on Health Science

6.3.2.1.29 Meta-analysis
Our set contains 61 papers published between 1993 and 2012, including 43 papers selected through
EBSO, and 18 papers particularly focusing on health science.1059 The documents tackle a variety of
issues. In recent years, there seems to be an increased focus on drugs (Schindler et al., 2007;
Schindler et al., 2009; Summers and Goel, 2011), or food insecurity and malnutrition (Hamms and
Bellows, 2003; Carter et al., 2010; Gallegos, 2011; Hill et al., 2011; Sharkey et al., 2011). On the other
hand, family relationships and maternal needs, attachment, chronic diseases (e.g., leukaemia,
Berter and Ek, 1993), social security, insurance and clinical infrastructures are themes the selected
papers seem to consistently focus on over time.

6.3.2.1.30 Text mining results

6.3.2.1.30.1 Themes and Concepts


Security is connected to the following concepts: social, systems, retirement, support,
contribution, pension, benefits, needs, risk, change, elderly and future. This
suggests an important focus on social systems, including pension systems and retirement.
Attachment (connectivity: 85%) refers to relationships, mother, children, family,
parents. This is similar to what has been observed in psychology, where attachment security
represents a major area of focus for academics and experts.
Unsurprisingly, health (76%) emerge as a very connected theme. It refers to infectious,
diseases, HIV, pandemic, influenza, AIDS. Concepts such as information, national,
global, programs, public, government suggest that health is a public matter, and knows
no border. They seem to indicate that informing the public is a major task of a government.
These observations corroborate a number of our findings based on the analysis of health
science.
Other interesting themes identified by the text mining software are resistance (22%) and
patients (8%). Resistance refers to antibiotic resistance, over which there have been

1058
Sidel, M., The Third Sector, Human Security, and Anti-Terrorism: The United States and Beyond, Voluntas,
2006
1059
Selected papers related to health science in the following analysis: Cassell, G.H., and Mekalanos, J.,
Development of Antimicrobial Agents in the Era of New and Reemerging Infectious Diseases and Increasing
Antibiotic Resistance, 2001; Basile, G., Health Science and National Security, 2002; Chen, L., and
Narasimhan, V., Global Health Challenges for Human Security, 2003; Cecchine, G., and Moore, M., Infectious
Disease and National Security: Strategic Information Needs, 2006; Coupland, R., Security, Insecurity and
Health, 2007; Task Force Japan on Challenges in Global Health and Japans Contribution, Global Health as a
Human Security Challenge, 2008; Enemark, C., Is Pandemic Flu a Security Threat?, 2009; Kamradt-Scott, A.,
Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012.

294
growing concerns. Access and rights, although much less connected, suggest the presence
of the socio-political dimension of health security across the selected papers.

6.3.2.1.30.2 Concepts
Rights (74%), safety (63%), possession(62%), international (61%), threats (57%), political
(52%), national (51%), human (49%), AIDS or HIV (respectively 48 and 41%) are concepts that
are likely to co-occur with security across the selected academic documents.

6.3.2.1.31 Definitions of Security in Medicine


Originally, diseases such as pandemics were perceived as meteorological phenomena or even as
signs of condemnation by the gods.1060 Centuries, later, the 1918 influenza has been closely
associated with war, even referred to as a war disease.1061

In spite of the 1918 Spanish flu, the 1958 pandemic and the 1967 Hong Kong flu pandemic, the
attention of policy makers remained focused on hard security issues until the eighties (e.g., nuclear
proliferation, conflicts in the Middle East). These issues were viewed as having more consequences
on international and national security than pandemics.1062 In the beginning of the years 2000, a
number of diseases have become perceived and openly discussed as a threat to national and
international peace and security.1063 A number of factors have led to the re-examination of
traditional approaches to national security, health and human development:

Leading causes of death in Western societies are related to infectious diseases, including
pneumonia, chronic liver disease, chronic obstructive lung disease, and cancer. Cassell and
Mekalanos (2001)1064 also emphasise the fact that we have entered an era of new and
reemerging infectious diseases, with increasing antibiotic resistance. Basile (2002)1065
identifies infectious diseases as one of the major threats to health and stability in
developing nations, and thus the world. In particular, the emergence of new diseases, in
particular the rise of the HIV/AIDS pandemics which, beyond bio-terrorism, has been
recognised as one of the greatest human security threat of our times by the WHO.1066 The
HIV/AIDS pandemic has thus become a major driver linking health and (human) security.
More generally, the most feared security threat described by the WHO is pandemic
influenza. The selected literature often uses infectious diseases as an example of health as a
security threat.
Another factor emphasised by Chen and Narasimhan (2003)1067 is the improved knowledge of
health insecurities, with the growing recognition of silent, neglected, or orphaned
diseases like malaria and tuberculosis.
In addition, Western societies have become more risk averse, and health issues are by nature
closely related to uncertainty.

1060
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.95
1061
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.95
1062
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.93
1063
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.94
1064
Cassell, G.H., and Mekalanos, J., Development of Antimicrobial Agents in the Era of New and Reemerging
Infectious Diseases and Increasing Antibiotic Resistance, 2001, p.601
1065
Basile, G., Health Science and National Security, 2002, p.2015
1066
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.187
1067
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.189

295
Public awareness has been heightened by the 2003 SARS outbreak , the 2001 anthrax letter
attacks in the US, and the 2009 H1N1 pandemic, but also given the devastating impacts of
recent epidemics such as the mad cow disease in Europe (bovine spongiform
encephalitisthe), cholera in Peru, plague in India, dengue fever in Asia, West Nile Fever in the
South of the US, etc.1068
In particular, the anthrax bio-terrorist attacks in the US showed that even developed nations
could be vulnerable to the use of bacteria and viruses as weapons.1069

Next to conventional health insecurities, a number of new challenges such as bio-terrorism,


biological warfare but also pandemics have become apparent during the nineties and particularly
into the current decade; these challenges have led to higher global insecurity. Many authors agree
that a number of factors - e.g., political, economic and social developments - have changed the way
we perceive and think about global health, marking a shift in approaches to global diseases and their
relation to human security. As a result, the concept of security has evolved since the nineties, and
even more so in the years 2000, as health security has risen on the global agenda,1070 and human
health has become one of the bases of the new understandings of security.

Human security, which is perceived to be affected by and to consist of many different dimensions, is
the dominant security concept in the literature.

6.3.2.1.31.1 Human security


In recent years, and particularly since the publication of the 1994 UNDPs Human Development
Report (cited by many authors, also in the other literatures), the concept of human security has
emerged in the nineties. Promulgated by the United Nations, it has broadened and has gained
ground, and now includes health security.1071 This interest in human security reflects an attempt to
broaden security thinking from national security and military defence of national borders to a
people-centred approach.1072 It also reflects a willingness to integrate concerns for peoples
security.1073

6.3.2.1.31.2 Physical, political, economic, societal, military security


Interestingly, the dimensions of security in health science have broadened; beyond physical, human
or economic security, they include political, societal, natural resource and even military aspects.
These dimensions will be further developed in the Dimensions section.

6.3.2.1.32 Dimensions of Security in Medicine

6.3.2.1.32.1 Health security

1068
Task Force Japan on Challenges in Global Health and Japans Contribution, Global Health as a Human
Security Challenge, 2008
1069
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.186
1070
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.186
1071
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.181; Enemark, C., Is
Pandemic Flu a Security Threat?, 2009, p.195
1072
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003
1073
Coupland, R., Security, Insecurity and Health, 2007, p.181

296
The objective of human security as defined in the literature is to concentrate on the vital core of
human lives and protect these from critical pervasive threats without compromising long-term
human flourishing.1074Obviously, health is a central element of this endeavour:

the ethos and mission of global health to prevent and treat unnecessary health insecurities (i.e.,
premature loss of life) situates health in the mainstream of human security.1075 As a result, the
authors agree that health is an indispensable component of human security. It is also pointed out
that priorities with respect to this health dimension are dependent on the threat: threats to health
posed by pandemics have currently been elevated above other health concerns.

Human, physical vulnerability is an important element of health security, as humans have little to no
immunity to pathogens,1076 and viruses are not always familiar to physicians. Features of health
security threats are also : their speed, their lethality, their targets (highest fatality rates were for
people in the prime of life1077). In addition, as viruses repeatedly infect humans, this leads to
potential mutation opportunities.1078

6.3.2.1.32.2 Transnational dimensions


Due to globalisation, the geographic occurrence and spread has enlarged. Health security has taken
on a transnational dimension. Health threats are inherently transnational in scope1079 and this has
only become more considerable within the era of globalisation.

An invigorated pursuit of health safety could lead to an approach to health science treating local
symptoms and not global diseases.1080 Not focusing on the basic health needs of developing nations
may lead to increasingly desperate acts by the victims, thereby impacting developed nations.

6.3.2.1.32.3 Political dimension


The concept of health security has gained ground within contemporary international politics.

The new paradigm described earlier (i.e., health as a security issue) reflects a number of profound
changes in global and national (health) governance structures, with an effect on national and
international public policies and a new role of governments. Since the nineties, global agenda-setters
have been linking various health challenges and diseases to security and go. Since 2000, HIV/AIDS
pandemics have been officially framed as an international security concern by the UN. Some
Western governments (e.g., France in 2008, the Netherlands in 2007, the UK and the US) have
started to frame pandemic influenza as a threat to national security.1081 The 2005 pandemic plan of
the United States compares the impact of a severe pandemic to that of war or a widespread
economic crisis than a hurricane, earthquake, or act of terrorism.1082 It should be noted that the
outbreak of diverse health threats as well as the increased public visibility with regard to new or

1074
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.182, citing Alkire
(2002)
1075
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.183
1076
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.90
1077
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.92
1078
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.192
1079
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.204
1080
Basile, G., Health Science and National Security, 2002, p.2015
1081
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.191
1082
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.197

297
resurgent diseases are likely to undermine trust in the government, thereby discrediting or paralysing
policy makers.1083 According to some, this also exposes the ill-preparedness of governments and lack
of investment in national public health infrastructure to the public. For Coupland, who defines
security, insecurity and health as a nexus, security is a prerequisite for health and insecurity is bad
for health,1084 in the sense that in a context of poor security, public health intervention and
healthcare delivery are more difficult to perform and likely unsuccessful. Multiple actors are
responsible for this; Coupland particularly emphasises the influence of ministries responsible for
health, defence and internal affairs on security, and even the foreign policy of other countries.

6.3.2.1.32.4 The economic dimension of health security


There is also an economic dimension to health security. Put simply: an unhealthy society is less
productive. Consider for instance the tremendous costs generated by the victims of chronic
diseases...1085 In addition, the financial sustainability of modern health care systems has become a
major concern in a number of countries, due to demographic trends (e.g., ageing), the rise of chronic
diseases due to ageing and unhealthy lifestyles.

In recent years, an additional economic aspect has emerged with regard to health security. Health
threats such as pandemics pose the problem of the current and future scarcity of human and
material resources, i.e., medical scarcity. Enemark (2008)1086 also suggests that they may lead to
economic disruption; the economic impact can be massive, from the driving away of foreign
tourists to the cessation of exports.1087 In a number of countries severely hit by HIV/AIDS, the
epidemics also undermine economic development, as the phenomenon results in the decline of the
overall size of the labour force, the decrease of productivity, the increase of imports and therefore,
slows the economic growth rates.1088 What is more, the danger of new and re-emerging infections is
compounded by the increase in antimicrobial resistance, which has a global scope and may have
substantial economic impact.

6.3.2.1.32.5 The military dimension


The same Enemark (2008) claims that infectious diseases have long been highly relevant to military
operations.1089 This is a traditional yet not often publicised key military concern. The author also
underlines the effect HIV/AIDS has on UN peacekeeping missions, thereby undermining the military
capabilities of these missions. In addition, an enormous challenge for biomedical science is the fact
that a broader scope of issues have to be addressed - e.g., the battle against bioterrorism and
biological warfare, whose objectives are destruction, fear, and self-perpetuating disease.1090 A
number of authors emphasise that new and emerging infectious diseases and the potential of

1083
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.186
1084
Coupland, R., Security, Insecurity and Health, 2007, p.182
1085
See for example the Economic Impact of Cancer, published on the website of the American Cancer
Society: http://www.cancer.org/Cancer/CancerBasics/economic-impact-of-cancer
1086
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.208
1087
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.186
1088
Dixon, S., McDonald, S., and Roberts, J., The impact of HIV and AIDS on Africas economic development
(University of Sheffield, 2002), http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1122139/.
1089
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.195
1090
Basile, G., Health Science and National Security, 2002, p.2015

298
bioterrorist attack will pose a rising global health threat and will complicate national and global
security for the coming decades.1091

6.3.2.1.32.6 Societal dimension


Health plays also a key role in the vitality of societies, most certainly if their effects impose or
threaten to impose an intolerable burden on society.1092 Health security issues potentially have
severe societal consequences indeed. For example, HIV/AIDS is impoverishing millions and
destroying social structures vital to internal state security.1093 Bio-terrorist attacks (e.g., the anthrax
letter attacks in 2001), in addition, generate new fears. Public fear, increased sense of
vulnerability,1094 distress and anxiety due to the invisibility, unfamiliarity of viruses, the involuntary
exposure, and fears about other infectious agents may well lead to social disruption, breakdowns in
public orders, and national hysteria. Enemark (2008)1095 argues that the societal effect of pandemics
(societal burden as cited earlier), can be measured in terms of morbidity and mortality, as well as
the perception of those fearing infection.

Galasso and Profeta (2003), in particular, comment on the potential societal, political, and economic
costs generated by demographic trends, thereby connecting three dimensions of health security.
According to these authors, ageing population patterns are not being reversed; as a result, society
experiences the conflict between a range of citizens who require ever-increasing social security
benefits and younger populations on whom it falls to bear the responsibility of sustaining the social
security system. An increasing need for social services from the old generation reverberates in an
increasing fiscal encumbrance for the younger generation.1096

6.3.2.1.33 Sources of Security in Medicine


Authors in the health literature identify a number of sources of health security that can be traced
back to science and technology and international governance mechanisms, as well as a number of
modern sources of insecurity.

6.3.2.1.33.1 Science and technology as a source of security


According to Cassell and Mekalanos (2001), further pharmaceutical research is an opportunity to
counter new threats to health security. The authors emphasise the risk of widespread over-
confidence in existing antibiotics which has already resulted in a lag in production of new classes of
antimicrobial agents, and increased antibiotic resistance. A new age of antibiotic discovery is

1091
Cassell, G.H., and Mekalanos, J., Development of Antimicrobial Agents in the Era of New and Reemerging
Infectious Diseases and Increasing Antibiotic Resistance, 2001, p.604
1092
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.191
1093
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.195
1094
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.186
1095
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.191
1096
Galasso, V. and Profeta, P., Lessons for an ageing society: the political sustainability of social security
systems, October 2003: Current PAYG systems will soon become financially unsustainable, since the amount
of revenue will not be sufficient to cover the pension benefits awarded under the current rules. Unless
productivity increases fast enough to compensate for the negative demographics, the burden of ageing will
have to be sustained by some generations, through either higher contribution taxes or lower pension benefits.
The political process will hence have to reconcile the opposite interests of these subsequent generations. In
fact, as argued by Cremer and Pestieau (2000), the effect of ageing on the PAYG social security system, and its
possible reforms, depends on political factors.

299
expected to emerge through revolutionary developments in chemistry, genetics, structural biology,
bioinformatics and engineering, but also advances in synthetic chemistry, genomics and
bioinformatics, bacterial functional genomics, and integrative infectious disease biology.1097

6.3.2.1.33.2 International governance as a source of security


According to Enemark,1098 defining health threats as a security risk can have negative effects: two
risks emerge: firstly, that emergency responses implemented at the domestic level might do more
harm than good; and secondly, that placing too much emphasis on the health and security
interests of individual states might detract from the need for long-term international cooperation on
resisting pandemic influenza. Indeed, the very nature of health threats i.e., their transnational reach
and the interdependence of states, the greater part of the solution must lie in international
cooperation and openness, enhancing public health and security in the long-term.1099 This means
the nations should share health information, collectively improve local public-health capacity, and
expand the global supply of adequate medicine. Coupland1100 suggests the documentation of the
health impact of peoples insecurity should be placed on the global agenda e.g., by gathering,
investigating and publishing data describing the health impact of insecurity using various health
indicators, and enforcement of international human rights law. Coupland also argues that
collaboration between policy makers and the health community is key in providing the security that
is a prerequisite to health.

As previously mentioned, addressing the basic health needs of developing nations is a necessity in
the views of Basile (2002).1101 This is an issue of global importance that should be elevated to the
policy agenda of developed nations. Developed nations should get involved in tackling global health
issues as antibiotic-resistant tuberculosis and staphylococcus show that we have not wiped all
diseases out. In addition, such involvement is the most effective means for battling biowarfare.1102

6.3.2.1.33.3 Modern sources of insecurity


A number of authors (in particular Cassell and Mekalanos, 20011103), have identified elements
accounting for the increase of health risks, and in particular the incidence of infectious diseases:

Globalisation, i.e. processes ignoring national borders and socioeconomic distinction,1104


leading to the erosion of geospatial boundaries.1105 increased human
interconnectedness, which facilitates the global spread of diseases:1106 globalisation,
including greater economic integration, is cited by many authors as constituting the cause of
emerging health threats, as it leads to a number of social, economic and political changes

1097
Cassell, G.H., and Mekalanos, J., Development of Antimicrobial Agents in the Era of New and Reemerging
Infectious Diseases and Increasing Antibiotic Resistance, 2001, p.603-604
1098
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.192
1099
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.205, 209
1100
Coupland, R., Security, Insecurity and Health, 2007, p.181
1101
Basile, G., Health Science and National Security, 2002
1102
Basile, G., Health Science and National Security, 2002
1103
Cassell, G.H., and Mekalanos, J., Development of Antimicrobial Agents in the Era of New and Reemerging
Infectious Diseases and Increasing Antibiotic Resistance, 2001, p.601
1104
Task Force Japan on Challenges in Global Health and Japans Contribution, Global Health as a Human
Security Challenge, 2008
1105
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.97
1106
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.192

300
(e.g., increasing international travel, commerce population distribution and movement,
social and economic inequality, or new political tensions) and as a result of such increased
interactions, bacteria flows1107 and the accelerated transmission of diseases.1108 The
emergence of health challenges takes place within rather than among countries; as a result,
borders and their military control do no longer protect citizens against health insecurity.1109
Some authors also emphasise globalisation as also being an opportunity to deal with
increased insecurity.1110
Changes in human demographics and behaviour (e.g., increasing use of day care facilities);

Technology and industry;

Economic development and land use (possibly accounting for an increase in zoonotic
diseases);
Breakdown of public health measures;
The spread of resistance to common antibiotics1111;
The discovery of more than two dozen new viral and bacterial agents;1112
According to Chen and Narasimhan (2003),1113 research (e.g., WHO in 2002) had started to
recognise violence in all forms as a major determinant of population health.

This observation is further emphasised by Coupland (2007),1114 who takes the example of the direct
effects of armed violence: ballistic trauma, and indirect effects including fear, coercion,
displacement and deprivation of essentials such as clean drinking-water, food and health care.

6.3.2.1.34 Solutions in Medicine


Solutions that emerge in this literature relate to investing in anticipatory capabilities, promoting
societal resilience, building governmental response competencies, as well employing an actor-centric
approach.

6.3.2.1.34.1 Anticipation and resilience


Prevention and resilience appear as a major source of security for Enemark (2008)1115, in particular
when considering that past pandemics were all the more damaging because they took the world by

1107
Task Force Japan on Challenges in Global Health and Japans Contribution, Global Health as a Human
Security Challenge, 2008; Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003,
p.182; Cassell, G.H., and Mekalanos, J., Development of Antimicrobial Agents in the Era of New and
Reemerging Infectious Diseases and Increasing Antibiotic Resistance, 2001
1108
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.182
1109
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.189
1110
Cecchine, G., and Moore, M., Infectious Disease and National Security: Strategic Information Needs,
2006, xiii
1111
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.186; Cassell, G.H.,
and Mekalanos, J., Development of Antimicrobial Agents in the Era of New and Reemerging Infectious
Diseases and Increasing Antibiotic Resistance, 2001, p.601; Spellberg, B., Antibiotic Resistance Testimony EC
Subcommittee on Health House, 2010
1112
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.186
1113
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.184
1114
Coupland, R., Security, Insecurity and Health, 2007, p.182
1115
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.192

301
surprise. According to Cecchine and Moore (2006)1116, the emphasis should be on integrated
surveillance of and response to (health) insecurities through, for example, establishing or expanding
early warning systems, centralised information systems and data analysis collection. This may reflect
an evolution towards more resilience and prevention in security and public policy making. The
practice of disease surveillance emerged in the fifties, but it is the 1968 Hong Kong flu pandemic
which validated the critical importance of conducting regular disease surveillance. However
indispensable to control global infections,1117 the existing surveillance and response mechanisms
appear as no longer sufficient to counter those threats.1118

6.3.2.1.34.2 Governmental response competencies


As a result of the integration of health in the national and international security discourse, the
central role of government in mitigating the impacts of these diseases has been re-emphasised.1119
Indeed, in recent years there has been a shift in public policy responses to health insecurity. The
objective has become to securitize the diseases. To protect their populations, governments have
started to become more involved in the prevention and control of infectious disease outbreaks.
Government-led intervention is a relatively recent phenomenon, expected to become increasingly
prevalent.1120 In recent years, these measures were for example:

Procuring and securing ready access to pharmaceuticals and influenza vaccines;


Contingency plans, pandemic planning;
Training critical personnel;
Large-scale public health campaigns for vaccination.

It should be noted that governments tend to focus on non-pharmaceutical responses as the most
immediate response for pandemic mitigation. These responses reflect a strict societal control.
Enemark (2008)1121 enumerates a number of examples:

Recommendations of the US government: isolation in the home; voluntary home quarantine


of members of households with confirmed or probable influenza cases; dismissal of students
from school; encouragement of social, physical distancing between individuals in the
community and workplace (e.g., cancellation of large public gatherings - a measure also
identified in Kamradt-Scott, 20121122).
Other nations such as China, implement stricter regulations; examples include the closure of
intra-state borders and the use of military personnel to assist in enforcing containment
orders; quarantine and isolation, and border protection.

6.3.2.1.34.3 An actor-centric approach

1116
Cecchine, G., and Moore, M., Infectious Disease and National Security: Strategic Information Needs,
2006, xv.
1117
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.189
1118
Chen, 2003, reviewed by Parker, R., p.371
1119
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.94
1120
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.90
1121
Enemark, C., Is Pandemic Flu a Security Threat?, 2009, p.202-203
1122
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.94

302
Kamradt-Scott (2012)1123 emphasises that international organisations, governments, local authorities,
industry, and even individuals all have a role to play in planning and preparing for the next
pandemics. Due to the developments that have emerged, health security, according to Kamradt-
Scott, should be promoted within an actor-centric approach rather than a nation-centric approach,
which is focused on economic growth and treating health as consumption. A number of authors 1124
advocate a human-centred paradigm centred on individuals, as it can complement and strengthen
state security to protect people in an unstable and interconnected world.1125 One of the selected
papers1126 indicates that focusing security efforts on individuals and communities requires an
integrated protection and empowerment approach that also crosses sectors and national
boundaries.

A shift in public policy responses, from responsive government-led measures to resilience and
patient-centric health care can also be adopted through the promotion of healthy lifestyles.

A number of studies (notably foresights) draw attention to the elements of a future patient-focused
health care system. According to the scenario Wellness First of the Economists Report 2030 - The
Future of Health Care in Europe (2011), preventive medicine will take precedence over curative
medicine, shifting its focus from treating the sick to promoting health. Public resources will be
allocated to immunisation (vaccination programs against viral infections) and nutrition information
programs. Prevention campaigns against drug abuse (including alcohol and tobacco) will be
promoted at schools and in the workplace. In these environments, governments, insurances and
employers will support physical exercise programs, medical counselling, diet programs, regular
check-ups for all, healthier food supply (e.g., in canteens). This paradigm shift is also expected to
enhance the role of the private sector. Companies will increasingly take a more central role in
addressing the psycho-social problems of their workers, with attention to such issues as time and
stress management, burn-out, mobbing (emotional abuse in a work environment), and general
work-life-balance.1127

Philosophy

6.3.2.1.35 Meta-analysis
Our subset consists of 25 articles published between 1980 and 2012. The primary focus of the articles
is the definition of security with some, albeit little, attention to dimensions, and even less so to
sources and solutions.

6.3.2.1.36 Text mining results

6.3.2.1.36.1 Themes and Concepts


The most common themes are: security (100%), politics (93%), different and social.

1123
Kamradt-Scott, A., Changing Perceptions of Pandemic Influenza and Public Health Responses, 2012, p.97
1124
Task Force Japan on Challenges in Global Health and Japans Contribution, Global Health as a Human
Security Challenge, 2008, p.6
1125
Chen, L., and Narasimhan, V., Global Health Challenges for Human Security, 2003, p.189
1126
Task Force Japan on Challenges in Global Health and Japans Contribution, Global Health as a Human
Security Challenge, 2008, p.12
1127
According to the German foresight study Zukunftsradar 2030, 2010

303
Security is linked to: concerns, national, issues, world, ethical, traditional, critical,
practices, terms, concept, international, religious, discourse, conflict
Politics: human, questions, thought, life, possibility, freedom, limits,
responsibility, condition, sense, truth, thinking
Different: time, relation, power, order, work, means, place, existence, object,
law, subject
Social: effect, global, individuals, process, community, public, complexity, change,
force, nature, society, economic.

Security is linked to concepts such as traditional, critical and discourse, due to ongoing debates
within the discipline on concepts of security with authors repeatedly referring to traditional and
critical schools of thought. Whereas the traditional school of thought defines security in a narrow
manner, the critical school of thought argues for a broader definition of security. In the view of the
critical school - often represented by the Copenhagen School - the concept of security should be
expanded, going beyond the national focus, and, amongst other things, include an international, local
and human dimension. In addition, philosophical debates concerning the nature of security should
not only concern national issues, but should approach security through an ethical sense.

6.3.2.1.36.2 Concepts
Key concepts related to security:

inter
critical
approach
policy
concept
framework
national
global
notion
threat.

These concepts are in line with our earlier findings. It shows that key concepts often related to
security are for example the critical approach, which discusses very nature or concept of security
and identifies new threats in the post-Cold War international system.

6.3.2.1.37 Definitions of Security in Philosophy


In the philosophy literature many of the authors gear their attention towards the definition of
security. It can hardly be called a surprise that the authors within this particular discipline find it
difficult to agree on a jointly shared definition of the concept, with each author offering another
angle on how to conceptualise security.

6.3.2.1.37.1 Security as a state of mind: the origins of the concept of security


In tracing the original interpretation of security back to the Greeks, Burgess relates the following: In
the old days, the conception of security was primarily bound to the spirit and spirituality. In fact, it
was a theological concept. Security was perceived as a disposition, a worldview, and a spiritual state

304
in both psychological and moral respects. The Greek word antaraxie peace of mind was used to
describe the state of security. Interestingly, this expression had a negative connotation. Security
signified a lack of emotional or spiritual problems, interpreted as lack of concern.1128

6.3.2.1.37.2 Security is a complex concept


One thing that the authors do agree on is that security is a complex concept. It harnesses a number
of inherent paradoxes, it being both a freeing from (danger) and a constraint or limitation imposed
upon it.1129 Its conventional use of the term betrays its fundamental complexity. In fact, it is argued
that whereas it often perceived as a basic concept in policy and academic debates, security is in
reality a quantity that is not basic at any register. The couching of emerging non-traditional
concepts such as environmental security and human security solely on their relationship to potential
or real threats, most often within a topology of power, and the use of language that is inadequate to
the often nuanced and almost always complex dynamics of such emerging identities, imprisons such
concepts within traditional state-centred, national security paradigms.1130

6.3.2.1.37.3 Security is multifaceted


This critical perspective on the traditional, or narrow, definition of the term security in juxtaposition
to a non-traditional, or broader, definition is elaborated upon by Ewan (2007), who observer that
where national security thinking defines security in terms of the threat and use of military force,
proponents of human security seek to broaden the concept of security to include the ways in which
economic, health and environmental factors also contribute to forms of insecurity in the daily lives of
many people around the world.1131 Some authors within this literature argue that one cannot
respond effectively to threats in the 21st century when one continues to adopt the narrow definition.
A comprehensive approach to international and national security must transcend the traditional
emphasis on military power and armed competition.1132

6.3.2.1.37.4 Security as defined through human relations


Another definition of security offered by authors within our subset of articles is that security can be
defined as safety, harmony and the stability of society, of relationships and of self.1133

6.3.2.1.38 Dimensions of Security in Philosophy


The key dimensions identified in the literature are national security and human security

6.3.2.1.38.1 National security

1128
Burgess, J.P, Security as Ethics, 2008
1129
Dillon, M., Politics of Security. Towards a Political Philosophy of Continental Thought, 1996
1130
Liotta, P.H, Through the Looking Glass. Creeping Vulnerabilities and Reordering of Security, Security
Dialogue, vol. 36(1), 2005
1131
Ewan, Deepening the Human Security Debate:Beyond the Politics of Conceptual Clarification, Politics, vol
27(3), 2007
1132
Geoffrey Dabelko, An Uncommon Peace: Environment, development and the global security agenda,
Current, 2008
1133
Myyrya, Empathy, perspective taking and personal values as predictors of moral schemas, Journal of
Moral Education, vol 39(2), 2010

305
National security is defined in relation to those circumstances or events that directly affect the
safety or integrity of a state in its relations with other states.1134 Within this dimension, military
forces will likely continue to play a pre-eminent role.1135

6.3.2.1.38.2 Human security


Other authors discuss human security and proponents of this concept reject the sovereign state as
the paramount moral community of international society; they do not believe that these
communities ought to be the principal referents of security. Rather, the ethic of human security
accords moral priority to the security of individual human beings1136.

Contrary to national security, which focuses on existential threats to the values and territorial
integrity of states, the human security agenda recognises that states often threaten, rather than
protect, their own populations.1137 According to the Human Security Commission, human security
aims at safeguarding the vital core of all human lives from critical pervasive threats, in a way that is
consistent with long-term human fulfilment"1138.

6.3.2.1.39 Sources of Security in Philosophy


Within the articles in our subset, the authors primarily focused on sources of insecurity, which are as
numerous as they are diverse.

6.3.2.1.39.1 From threats to vulnerabilities


With the evolving concept of security, the threat spectrum now has come to encompass natural
hazards. It is asserted that not all security issues involve threats; rather, the notion of
vulnerabilities is as serious to some peoples and some regions as the familiar threat metaphor of
armies massing at the borders or barbarians at the gates.1139 Sources of insecurity include:

the contributions of natural resources to violent conflict and their link to the well-being of
humans and ecosystems1140
[...] climate change, loss of arable land, fisheries, and water [are] factors likely to contribute
to conflict and spur other security-related problems, such as migration and economic
dislocation. It also highlighted poverty, inequality, and lost development opportunities as key
factors in creating insecurity1141
Natural disasters are another kind of threat that humans have to face1142

1134
Brams, National Security Games, Synthese, vol. 76(2), 1988
1135
Liotta, P.H, Through the Looking Glass. Creeping Vulnerabilities and Reordering of Security, Security
Dialogue, vol. 36(1), 2005
1136
Bain, W., Against crusading. The ethic of human Canadian foreign policy, Canadian Foreign Policy Journal,
vol. 6(3), 1999
1137
Ewan, Deepening the Human Security Debate:Beyond the Politics of Conceptual Clarification, Politics, vol
27(3), 2007
1138
Nathan, F, Disaster and Human Security, 2004
1139
Liotta, P.H, Through the Looking Glass. Creeping Vulnerabilities and Reordering of Security, Security
Dialogue, vol. 36(1), 2005
1140
Dabelko, An uncommon peace: environment, development and the global security agenda, Current,
2008, p.23
1141
Dabelko, An uncommon peace: environment, development and the global security agenda, Current,
2008, p.24
1142
Ramel, F., Human Security and Political Philosophy, 2007, p.29

306
a precipitous economic decline that turns into a deep depression may so weaken a state
that it becomes vulnerable to exploitation by its enemies.1143

Liotta (2005) also acknowledges that not all security issues need to be directly linked to violence. She
establish a list of plausible creeping vulnerability scenarios:

different levels of population growth in various regions, particularly between the


developed and the emerging world, including disproportionate population growth (youth
bulges) and historically unprecedented levels of urbanisation;
the outbreak and rapid spread of disease among specific target populations (such as
HIV/AIDS), as well as the spread of new strains of emerging contagion (such as SARS);
significant climate change due to increased temperatures, declines in precipitation, and rising
sea levels;
scarcity of water (in specific regions for drinking and irrigation, and the compounding growth
among populations dependent on trans-boundary water resources) and other natural
resources;
declines in food production and increasing needs for imported goods;
progressing soil erosion and desertification;
increased urbanisation and pollution in megacities (with populations of ten million or more)
around the globe.[...];
the need to develop warning systems for natural disasters and environmental impact from
earthquakes to land erosion.1144

6.3.2.1.39.2 Security as source of insecurity


Finally, Burgess (2008) argues that security may also lead to insecurity. He argues that, insecurity
grows proportionately with the accelerated consideration of, and response to, security. Fighting
various forms of threat most often leads to solutions that remove people and the individual from the
picture. We build walls, construct fences, design detection systems, etc. These types of measures
have many functions, and they prevent danger to some degree. But, they also have the effect of
diminishing trust trust in others, trust in society, trust in oneself. Less trust generates less security,
or more insecurity, something that defeats the purpose of the desired effect.1145

Political Science with a focus on Cyber Space

6.3.2.1.40 Meta-analysis
The types of academic publications selected focus on the concept and the theory of security as
viewed within the sub-disciple of political science with a focus on cyber space. For the manual
analysis the attention has been directed towards identifying the key articles, books and authors that

1143
Brams, National Security Games, Synthese, vol. 76(2), 1988, p.187
1144
Liotta, P.H, Through the Looking Glass. Creeping Vulnerabilities and Reordering of Security, Security
Dialogue, vol. 36(1), 2005, pp.52-53
1145
Burgess, J.P., Security as Ethics, International Peace Research Institute, Oslo (PRIO), Policy Brief 6/2008,
2008

307
have led and shaped the discourse on security in this sub-discipline. These types of academic
publications are indeed most likely to be found in all selected disciplines.1146

In the era of information revolution, states and hierarchical bureaucratic organisations are
heavily challenged by highly decentralised and transnational organisations and communities.
With the emergence of cyberspace, these actors have taken on a virtual component
Cyberspace has altered traditional realities and approaches to international relations with
respect to: Time (Replaces conventional time with near-instantaneity); Space ( Transcends
constraints of geography & physicality); Permeation (Penetrates boundaries & jurisdictions);
Fluidity (Sustains persistent shifts & reconfigurations); Participation (Reduces barriers to
political expression & action); Attribution (Obscures identity of actor & links to action); and
Accountability (Bypasses mechanisms of responsibility)
Potential for the emergence of a new cyber-feudalism, with overlapping communities and
jurisdictions each with claims to multiple layers of citizens' identities and loyalties. This is
similar to the old European Feudalism, which was also characterised by multiple loyalties and
fragmentation (e.g., simultaneous loyalty to a local lord, a duke, the king and the pope)
Within the overall discipline of political science, there is the need for the creation of a new
knowledge domain of cyber international relations that is multidisciplinary, theory-driven,
technically and empirically anchored in order to clarify threats and opportunities in
cyberspace for national security, welfare, and influence;
9/11 represented a wake-up call in relation to security. Since then cyberspace has attracted
more attention and several governments have taken steps to improve IT infrastructures over
the past decade.
Only in the last couple of years the concept of cyberspace has been fully integrated into
traditional security and defence policy. For instance in the US we need to wait for Baracks
administration for a more proactive stand on cyber space. Upon assuming office in 2009,
President Barack Obama declared cyberspace a strategic national asset and requested a
complete Cyberspace Policy Review

1146
The following articles and books have been included in the manual analysis of the disciplines discourse
Adams, James. Virtual Defence. Foreign Affairs 80, no. 3 (2001). Biswas, Niloy Ranjan. Is the Environment a
Security Threat? Environmental Security beyond Securitisation. International Affairs Review 20, no 1 (2011): 1-
22. Der Derian,James. Virtuous War/Virtual Theory. International Affairs 76, no. 4: 771788. Erikssona, Johan,
and Giacomello, Giampiero. The Information Revolution, Security, and International Relations: (IR)relevant
Theory? International Political Science Review 27, no. 3 (2006): 221244. Geers, Kenneth. Strategic Cyber
Security. Tallinn, Estonia: CCD COE Publication, 2011. Nye, Joseph S. The Information Revolution and the
Paradox of American Power. Proceedings of the Annual Meeting 97 (2003): 6775. Pieterse, Jan Nederveen.
Globalisation, Kitsch and Conflict: Technologies of Work, War and Politics. Review of International Political
Economy 9, no. 1 (2002): 136. Sharma, Amit. Cyber Wars: A Paradigm Shift from Means to Ends. Strategic
Analysis 34, no. 1 (2010): 62 73. Sofaer,Abraham D., and Goodman, Seymour E. Cyber Crime and Security The
Transnational Dimension. In The Transnational Dimensions of Cyber Crime and Terrorism. Stanford: Hoover
Institute, 2001. Russett, Bruce. Triangulating the Peace: Democracy, Interdependence and International
Organisations. New York: Norton, 2001. Tikk, Eneken. Global Cyber Security Thinking About The Niche for
NATO. The SAIS Review of International Affairs (2010). Trajtenberg, Manuel. Crafting Defence R&D Policy in
the Anti-Terrorist Era. Innovation Policy and the Economy 4 (2004): 134. Wesley K., Clark, and Peter L. Levin.
Securing the Information Highway How to Enhance the United States Electronic Defences. Foreign Affairs 88,
no. 3 (2009): 310. Steward, Patrick. Weak Links Fragile States, Global Threats, and International Security.
Oxford: Oxford University Press, 2011. Ullman, Richard. Redefining Security. International Security 8, no.1,
(1983): 129-153.

308
A series of high-profile events in 2010 and 2011 highlighted the increasing and multifaceted
threat of cyber attacks. These include the espionage hacks on Google and Western energy
companies (WSJ), the Stuxnet (VanityFair) infiltration of Iranian nuclear sites, and the
targeting of government networks in South Korea (BBC).

6.3.2.1.41 Themes
These are the key themes emerging both from the qualitative analysis of the documents and the text
analysis:

De-centralisation, multi-agents and virtual international community: Although the state


system is still seen as the dominant pattern of international relations, crosscutting
communities and governances are emerging, supported by globalisation, the opening of
internet and digital communication. This adds a new layer of decentralised relations that
sovereign states do not effectively control. Individuals are still seen as participating in these
trans-national communities and governments, both real and virtual, without ceasing to be
loyal to their states. However their perspectives have been broadened by these interactions.
The real issue is not the continued existence of the sovereign state, but how states will
transform, above all in relation to their centrality and functions.
Connectivity, interdependence, vulnerability and greater volatility/uncertainty: The various
and complex transnational connections that globalisation has favoured have resulted in the
emergence of strong interdependence between states and societies. In addition, the growing
interconnectivity of globalisation and, more recently, the information revolution are both
seen as producing a high level of vulnerability within the state and its capacity to protect
national assets (from economic growth to existing information system infrastructures). This is
further exacerbated by the openness of the international cyber space where institutions and
recognised organisations must coexist with people and systems of unknown and
unidentifiable trustworthiness.1147 In addition the many-to-many and one-to-many
characteristics of the Internet is deemed to promote flash movements (e.g., sudden surges
of protest triggered by particular issues or events) so increasing uncertainty and volatility.

From state to system; from physical violence to structural violence; from structural violence
to radical uncertainty: The intellectual debate within the political science discipline has seen
the shift from a mainly internal focus, centred around the security of the state (i.e. national
security) to an external focus on the security of the citizen. This shift has broadened the
security agenda to include both external and structural violence that can significantly impact
the safety of food, health, money and trade systems.1148 Furthermore, more recent
development within the human security framework has expanded the nature of violence
even further to include radical uncertainty. This refers to violence, which is not deliberately
inflicted by an external or internal agent, but can still threaten drastically to degrade the
quality of life for the inhabitants of a state (natural disasters and health emergencies are an

1147
Sofaer, A.D., and Goodman, S.E., Cyber Crime and Security The Transnational Dimension, in The
Transnational Dimensions of Cyber Crime and Terrorism, Stanford, Hoover Institute, 2001, p.3
1148
Tickner, J.A., Re-visioning Security, in Ken Booth and Steve Smith (eds.), International Relations Theory
Today , Pennsylvania State University Press, 1994, p.180

309
example of this radical uncertainty). Although such security concern may employ non-
traditional means and focus, there is, however, a strong tendency within the political science
discipline, at least within the dominant discourse, to see these non-traditional means still
through a state lens since they are employed in order to achieve traditional ends (i.e.
safeguard of the state and its citizen).
From tactical to strategic focus: Initially, cyber space was seen as being a potent force
multiplier and an enhancement of traditional operations. Now, the emphasis is on the
strategic and vital importance of cyber and its key role in achieving grand strategic objectives
in the contemporary world order.1149 It is important to note here that the international
context is still seen for the majority as led by states and the emphasis is still on conventional
objectives (e.g war and state supremacy).

6.3.2.1.42 Themes and Concepts


The general political science academic production focuses on a number of notable features.

Policy appears as the overarching theme, followed by Security, and Social, Government,
Use, Military, and Individual
Policy is associated with concepts such as International, States, Threat, Development,
Power, Economic and National
Security is instead associated with Political, Relations, Important, Issues and Change
The theme Security is strongly associated with the concepts of Human, as well as
Concept, National, Threat and Environmental and Traditional.

6.3.2.1.43 Definitions of Security in Political Science and Cyber Space


The definition can be characterised as follows: Information based, Virtual, Multi-agent and
Networked, State focused, Transnational, Interconnected, Open, Multi-faceted and Asymmetric.

6.3.2.1.43.1 Information based security


The majority of the academic publications underline the importance of Information based security.
Information is taking a central stage in security moving from being regarded as a mere external,
tactical capability (e.g electronic and information warfare) to acquiring an intrinsic core value for
present society. Recent publications make the argument that if modern, economically developed
countries are increasingly becoming "information societies," then, it follows that threats to
information can be seen as threats to the core of these societies.1150

6.3.2.1.43.2 The virtual, multi-agent and networked nature of security


Furthermore, following the importance of transnational multi actors and agents within political
science in general, the sub-discipline of cyber security also recognises the growing role of new virtual
agents/actors, empowered by globalisation and the information revolution. These agents are cutting
across geographies and sovereignties and rage from firms, interest organisations to social
movements, transnational networks, and individuals. It is important to note that in more recent

1149
Sharma, A., Cyber Wars: A Paradigm Shift from Means to Ends, Strategic Analysis, Vol. 34, no. 1, 2010,
p.62
1150
Erikssona, J., and Giampiero, G., The Information Revolution, Security, and International Relations:
(IR)relevant Theory?, International Political Science Review, Vol. 27, no. 3, 2006, p.222

310
discourse the virtual and networked nature of these multi agents/actors has been stressed. Actors
are typically seen as operating in loosely organised networks consisting of relatively independent
nodes of individuals, groups, organisations, or even states, capable of quickly assembling and
dispersing.1151 However, these virtual multi-agent actors are still viewed through a state lens. This
means that they are all important as far as they are competing with the state or requiring a state
response and its transformation. Indeed, even more recent publications underline that the real issue
is not the continued existence of the sovereign state, but how the state will cope with and adapt to
these virtual changes.1152

6.3.2.1.43.3 The transnational, interdependent and open nature of security


The transnational, interdependent and open nature of security is closely related to globalisation and
the emergence of multi agents and networks.1153 This nature of security has been further
exacerbated by the information revolution. Since information infrastructures and Internet are
inherently transnational and open so is security. Open in a cyber context refers to the growing need
for collaboration and sharing of information (see the collaborative dimension for more information
on this concept).

6.3.2.1.43.4 The multi-faceted nature of security


Furthermore, security is multi-faceted since threats could be originated in both the private and public
sphere, among military as well as civilian actors. This view of security has been consistent within
political science and the sub-discipline of cyber security. Within cyber security, the attention to the
virtual world has further expanded the range of potential threats and blurred the virtual and real
thereat divides.

6.3.2.1.43.5 The asymmetric nature of security


Another constant attribute of security, which has been reinforced by the emergence of cyber
discourse, is its asymmetric nature.1154 Asymmetry is not a new concept in political science; however
it has acquired a new level of intensity within the cyber sphere. One paradox of cyberspace is that
both big and small players have advantages. Nations robust in IT exploit superior computing power
and bandwidth; small countries and individuals exploit the amplifying power of the Internet to attack
a stronger conventional foe.

6.3.2.1.43.6 A virtual concept


Finally, as mentioned previously, an interesting development in the security definition brought about
by the information age is the concept of virtual. In this digital environment, security is perceived
happening and developing in a virtual world, sometimes with little association to the real one. In this
virtual environment security breakers tend to underestimate the impact of their actions and
therefore ethical considerations are somehow less constraining on individuals and actors. So far,
there is little perceived human suffering associated with cyber actions.1155

1151
Ibid., p.227
1152
Geers, K., Strategic Cyber Security. CCD COE Publication, Tallinn, Estonia, 2011, p.10-11
1153
Ibid., p.136
1154
Adams, J., Virtual Defence, Foreign Affairs , Vol. 80, No. 3, 2001, p.99
1155
Geers, K., Strategic Cyber Security, p.109

311
6.3.2.1.43.7 Text mining results
The results of the text mining analysis emphasise the information approach. Information has
emerged as one of the concepts associated with Security (27%). In relation to multi-agents and
multi-faceted, the key selected themes of Individual and Social appear to support this complex and
fragmented nature of security. This is further supported by the identification of Actors as an
important concept associated with Security (42%). In addition International, Relations and
Different which are concepts associated respectively with the key themes Policy, Security and
Social, seem to indicate the importance of multi-faced as well as transnational and interdependent
as key determinant of security. The concept of transnational in association with cyberspace has also
been indentified within the selected text fragments. The following fragment has been found in Social
Sciences/Social Sciences def-dim-sou (113): The necessity of protection: transnational networks and
EU security. However, several concepts identified by the text mining software are also suggesting
the importance of the state focus, therefore they appear to affirm state centrality as actor.
Government has been identified as a key theme. Furthermore, State and National show strong
association with the most important theme Policy. Finally, although asymmetry does not appear in
the text results, several text fragments indicate the new nature of soft security after 9/11, which
represented a wake-up call in relation to cyberspace, so possibly referring to the emergence of a
stronger emphasis on the asymmetric nature of security.

6.3.2.1.44 Dimensions of Security in Political Science and Cyber Space


The in-depth analysis of the discourse within the sub-discipline of cyber space within political science
underlines some key guiding principles of security that have remained constant, although evolving in
term of importance. These dimensions can be regarded as key sources of stability too.

6.3.2.1.44.1 Transnational, trans-functional and trans-sector cooperation


Given the interdependence nature of the international system and its transnational and multi-faced
nature, security needs to be based on transnational cooperation that will enable a full range of
integrated responses. This has become even more preeminent within cyber security study. In more
recent article, the scope of this cooperation has enlarged to include both voluntary and legally
mandated cooperation, among private and public and third sector.1156 This implies the need for a
comprehensive and integrative approach to security that cuts across departmental lines and
traditional policy boundaries. It is important to note here that for cyber security the comprehensive
and integrative response has as objective promoting the protection and ownership of the
information infrastructures, therefore any sector or function (e.g., electrical grid, financial system, air
traffic control, etc.) that can positively or negatively impact this key objective should be included into
the security domain.1157 This means that the traditional boundaries between the international and
the domestic, between civil and military spheres, between the private and public, and between
peace and war are dissolved. This approach is not new within the political science discourse since
globalisation and the new nature of violence (i.e. structural and radical uncertainty) have already
required moving away from traditional restrictions and the limited focus on policy. However, a new
development lies in the additional extension to the information dimension, both physical and virtual,
and the consequence expansion of the integrative approach to include IT functions, actors and

1156
Sofaer, A.D., and Goodman, S.E., Cyber Crime and Security, p.2
1157
Geers, K., Strategic Cyber Security, p.26

312
activities. Another important consideration here is that in the case of a state-sponsored cyber attack,
international cooperation is very difficult to achieve, unless within existing alliances. Indeed, at the
moment this type of cooperation is deemed almost non-existent.

6.3.2.1.44.2 Text mining results


The concept Including, which is significantly related to the key theme Government, seems to
indicate this comprehensive and integrative dimension. In addition, the concepts of Organisation
and Support, which are also associated with Government, appear to support the cooperative
nature of security. This is further confirmed by the selection of Cooperation as a concept associated
with security (34%). In relation to transnational, as mentioned previously, the concept of
transnational in association with cyberspace has also been indentified within the selected text
fragments. The following fragment has been found in Hollis (2010): The necessity of protection:
transnational networks and EU security.

6.3.2.1.44.3 International norms/standards, democratic rules and multilateralism


International norms/standards, democratic rules and multilateralism are needed in order to build
consensus and legitimacy, while allowing agreement on the best actions and practices that can help
cope with the increasing interdependence of the international system. The cyber security discourse
also emphasises the importance of rules. In this context the emphasis is on security standards that
can be implemented by key actors, involved in the cyberspace. These security standards will both
protect and control the safety of infrastructures and the flow of information and data.1158
International organisations, such as EU, NATO and UN are seen as leading the way in creating a cyber
regime. This dimension also implies the idea of the rising importance of soft power (i.e. the ability to
get what you want through attraction rather than coercion or payments).1159 Soft power becomes
even more important within the digital age, this is because of the evolving multiple channels of
global communication, which easily transcend sovereign boundaries. It is also important to note here
that these security standards and guidelines should not stop or slow down the positive impact of the
information age (e. g. economic growth and technological development) or reduce the trend toward
resilience (for instance "stiff" or homogenous systems are not resilient because they are not diverse).
The need is to find the right balance between regulation, security, flexibility, resilience and openness
of cyberspace. The same can be said for all the different type of regimes (e.g., economic, human
rights, etc) that have been put forward within the broader discipline of political science. These
regimes should not negatively impact development and growth.

Related to the emergence of international standards, it is important to note here that the
controversial discussion on universal identification, which will solve the issue of attribution (for more
details on attribution see the discussion on source of insecurity), has polarised the debate within the
sub-discipline. The polarisation is between those who believe that international or national agencies
and real-world organisations could provide Internet identity credentials, based on other
identification systems (e.g., passports, national identity cards, driver's licenses, etc), and those who
assert that attempting to build such a system is futile, and will only give criminals and hackers new
ways to hide.

1158
Tikk, E., Global Cyber Security Thinking About The Niche for NATO, The SAIS Review of International
Affairs, 2010
1159
Erikssona, J., and Giampiero, G., The Information Revolution, p.231

313
6.3.2.1.44.4 Text mining results
Several identified concepts support this dimension. Europe, Nato and UN have all been selected
as having a strong relation with Security. An in-depth analysis of the text fragment results also
stress multilateralism. The following fragments have been identified by the software: Beyond
intergovernmentalism: European security...; and Multilateral initiatives for interactional security.
The concept of soft power has also been clearly indicated in the text fragment explaining Power as
associated with the most dominant theme Policy. Reference to Nyes idea of soft power is found in
the fragment: Nye's conceptualisation of "soft" power could be" usually read through a
constructivist interpretation. Democracy has also been identified several times in the text fragments
and clearly associated with security in the following selected texts: Global, Regional and
Organisation, Interdependence, Democracy and Security.

6.3.2.1.44.5 Innovation, resilience and sustainable development


Within the cyber space paradigm, the most powerful weapons are not based on strength, but logic
and innovation.1160 Constant innovation plays a key role within security. However, it is worth noticing
that innovation within the cyber space is now driven by the private sector and therefore innovative
tools (e.g., the newest versions of computers and/or software) are available everywhere and
accessible to everyone at the same time.1161 This indeed creates a dangerous plain field that can be
exploited by several and diverse virtual agents/actors (see the discussion on openness as a source of
instability). Another key concept is the need for resilient systems. It is important to note here that
resilient is also an emerging concept within political science. The need here is directed toward
building resilient state and society that can adapt and cope with highly uncertain risks and the fluidity
of the international context. This is also related with the concept of sustainable development where
development meets the needs of the present without compromising the ability of future generations
to meet their own needs.

Within the cyber sphere, resilience calls from moving out from fixed systems to dynamic, responsive,
infrastructures. In addition to the infrastructure focus, the publications also underline the crucial
need for securing the supply chain for hardware.1162 It is important to note here that the majority of
world hardware is now produced in emerging economies, therefore outside the so called Western
World.

6.3.2.1.44.6 Text mining results


Although innovation does not appear as a key concept Research does. Research has been found to
be related with Security (33%). Research implies innovation. Interesting the concept resilient does
not appear in the text mining result or in any of the text fragments identified by the software. This is
certainly surprising since resilience is strongly associated with the soft dimension of security. On the
contrary development has been found to be associated with Security (34%).

6.3.2.1.44.7 Deterrence

1160
Ibid., 10
1161
Adams, J., Virtual Defence, p.104
1162
Wesley K., Clark, and Peter L. Levin, Securing the Information Highway How to Enhance the United States
Electronic Defences, Foreign Affairs, Vol. 88, No. 3, 2009, p.9

314
Finally, Cyber Deterrence emerges as another key dimension of security, which should be developed
in parallel with the traditional Nuclear Deterrence. This refers to the development of a credible and
well known cyber triad capability, equivalent to a nuclear triad, which will have the ability of
orchestrating a second strike in case of failure of the deterrence. Cyber triad capability can consist of
regular defence/military assets and networks as forming the first section of the triad, the second
section being an isolated conglomerate of air-gapped networks situated across friendly nations as
part of cooperative defence, which can be initiated as a credible second-strike option, and the third
section consisting of a loosely connected network of cyber militia, involving patriotic hackers,
commercial white hats and private contractors, which can be initiated after the initial strike or in case
of early warning of a potential strike. This cyber triad creates a scenario of credible and undisputable
cyber deterrence and second-strike capability, thus assuring mutually assured destruction in cyber
space.1163 However, more recent publication point to the difficulties of proper enforcement of the
punishment, due to poor attribution (see discussion on attribution in the source of instability) and
the asymmetric nature of cyberspace.1164

6.3.2.1.44.8 Text mining results


Surprisingly enough, deterrence does not appear in the text mining results, not even in the text
fragments. However, the general concept of Power, which is closely related with the most
important theme Policy has been identified. Also Nuclear has been found to be associated with
Security (26%). This, to a certain extent, should support the idea of increasing capability for state
protection in the international context, including cyber capability.

6.3.2.1.44.9 Environmental and health security


Considering the environment as a threat to individual, national, or global security has created a new
agenda in the discourse of political security studies. The increasing scope of international security
now readily includes environmental and health degradation, global warming, and climate change.1165

6.3.2.1.44.10 Text mining results


The results of the text analysis seem also to indicate this broadening of the security agenda and the
emergence of an individual focus as opposed to a state focus. The concept Human has been found
showing the strongest association with Security (58%). Society and Individual have also been found
to be related with Security, with an association of 37% and 35% respectively. Environmental (47%),
Economic (32%) and Cultural (29%) have also been identified as being strongly related to Security.
In relation to culture, the text fragments appear to underline the importance of culture clash:
Culture Clash: Assessing the Importance of Ideas in Security. The in-depth analysis of the selected
fragments also reveals the importance of demographic trends and their impact on the environment:
Demography, Environment and Security: An Overview.

6.3.2.1.45 Sources of (In)security in Political Science and Cyber Space


This is a combination of sources of insecurity emerging from the cyber as well as political science
discourse.

1163
Sharma, A., Cyber Wars, p.69
1164
Geers, K., Strategic Cyber Security, p.140
1165
Biswas, N.R., Is the Environment a Security Threat? Environmental Security beyond Securitisation,
International Affairs Review , Vol. 20, No 1, 2011, p.1-22

315
6.3.2.1.45.1 Globalisation and the openness of cyber space
Globalisation and the Openness of Cyber Space, above all Internet, are both viewed as source of
development but also of insecurity. Cyber-threats and other challenges of the information revolution
are seen as a clear and present element of the more general trend of globalisation, which arguably
weakens the sovereignty and security of the state. Non-state actors are deemed to becoming even
more numerous and powerful because of the information revolution so creating opportunities for
increasing threats and destabilising the state. Furthermore, the openness of internet, which was
designed to maximise simplicity of communication, rather than security of communication, is acting
as force multiplier of insecurity that can increase the speed, scale and power of attacks. Indeed an
increasing gap has emerged between connectivity and security, with connectivity well ahead of
security. This gap is also exacerbated by the widespread disparities among states in the legal,
regulatory, or policy environment concerning cyberspace. The lack of common agreement on
standards on cyber security and disparities in the individual state capacity to implement potential
agreements is identified as another source of instability. The digital and security divide is deemed to
be extremely dangerous, given the interconnected nature of the information age. The price for this
has been the increasing opportunity (this is known in the literature as expanded attack surface) for
a plethora of agents, criminals or wrongdoers, to exploit the vulnerabilities of the network for their
own ends.1166 Furthermore, this open cyber space has the potential to increase the impact of
transnational threats such as terrorism, crime and extreme political activists. The trick is to find the
right balance between openness, functionality and security.1167

The results of the text analysis also seem to corroborate the manual analysis. Global and
International are both associated with Security, 39% and 40% of association respectively. The
concept of States appears to be strongly associated with the most dominant theme Policy.
Relations is strongly associated with the key theme Security, therefore indicating the openness
condition. Furthermore, the in-depth analysis of the identified text fragments reveals that several
selected fragments are centred on globalisation: Global and Regional Organisation,
Interdependence, Democracy and Security; and The Global System. The identified text fragments
also make refers to security standard: The security standards define; and security standards were
published on to protect against any reasonably.... Terrorism has been found to be associated with
Security, 36%, and the most dominant theme Policy. In addition the fragment results seem also to
indicate an additional source of insecurity in the impact of counter terrorism measures on society:
Security and Civil Society: The Impact of Counter Terrorism. Crime is also related to Security (29%).
Finally, the issue of state destabilisation and state primacy also emerge from the text fragment: In its
strongest formulation, this position holds that the moral equality of individuals is secondary to the
moral equality of states. We should respect sovereign states because of the shield they construct
around diverse and self-determining communities.

6.3.2.1.45.2 The attribution problem


Following the openness of the Internet, the majority of the publication identifies another key source
of insecurity in the attribution problem. The anonymity, or attribution problem, refers to the
almost impossible task to identify who is responsible for a particular Internet action. This is already
serious enough since it makes deterrence or punishment of the attackers difficult. In addition to that,

1166
Geers, K., Strategic Cyber Security, p.10
1167
Erikssona, J., and Giampiero, G., The Information Revolution, p.225

316
the attribution problem increases the odds that damaging cyber attacks on national critical
infrastructures will take place in the absence of any traditional, real-world warning, during times of
nominal peace.1168

6.3.2.1.45.3 The dependency on technology


Dependency on Technology has been identified, in the cyber literature, as another potential source
of insecurity. This is seen as a potential future threat, emerging from our increasing reliance on
computers and artificial intelligence for our-well being and safety. The Matrix sagas that depict
intelligent and autonomous computers taking over the world are indeed symptomatic of a culturally
broad-based and profound fear of technological development. The idea of depending on machines is
both unnerving and non conducive to social flexibility and resilience.1169

6.3.2.1.45.4 Cyber conflicts


Increased of Low Intensity Conflicts, above all Cyber Conflicts, perpetrated by diverse and disperse
actors ranging from states, virtual organisations and communities to individual hackers. Again the
cyber dimension introduces a new scale and impact for traditional sources of insecurity, identified
within political science. These types of low conflicts can breed instability and reduce, or even
temporary stop, the functioning of states and societies. Low intensity conflicts include:1170

Espionage: The stealing of vast quantities of computer data and network communications,
allowing devastating intelligence-gathering operations, even on highly sensitive political and
military communications, remotely from anywhere in the world.
Propaganda: Cheap and effective, this is often the easiest and the most powerful form of
cyber attack. Propaganda dissemination may not need to incorporate any computer hacking
at all, but simply take advantage of the amplification power of the Internet.
Denial-of-Service (DoS): this refers to the denial of the use of data or a computer resource to
legitimate users. The most common tactic is to flood the target with so much superfluous
data that it cannot respond to real requests for services or information. Other DoS attacks
include the physical destruction of computer hardware and the use of electromagnetic
interference.
Data modification: attacks on the integrity of sensitive data. Such attacks range from website
defacement to the corruption of advanced weapons or commandand- control (C2) systems.
Infrastructure manipulation: ability to manipulate vital infrastructures. This has been
exacerbated by the fact that many critical in frastructures are in private hands, outside of
government protection and oversight and often geographically distributed since outsourcing.
Conflict emerged from the text analysis as strongly associated with the most dominant theme
Policy. Power is also related with Policy indicating the importance of power struggle within the
international context. Following the traditional paradigm in political science, it is power exercised in
an anarchical international system, which leads to conflicts. The vulnerability of the existing
information infrastructure has been stressed in several text fragments. The following text statements
have been extracted by the software: Vulnerability-Based Software The higher the score, the less

1168
Geers, K., Strategic Cyber Security, p.11
1169
Erikssona, J., and Giampiero, G., The Information Revolution, p.225
1170
Geers, K., Strategic Cyber Security, p.134-5

317
secure the product; and NHS and NIST (2009) National Vulnerability Database (NVD), automating
complexity for security professionals and administrators.

High Intensity Conflicts, within states and between states, still remain an important source of
insecurity within political science and an enabler of further transnational threats (e.g., terrorism,
crime, extremism, proliferation of weapon of mass distraction, etc). High intensity conflicts are in
turn triggered by globalisation, failing states, poverty, lack of democracy, changing pattern of power
structure and competition on scare resources. Great power war is still regarded as a possibility, with
China-US and India-China confrontations called out as the most risky ones.1171 Russias regional and
global aspiration might affect European and global stability too. In addition a Islamic Republic of Iran
with nuclear weapons and an Iraqi state that is falling apart are also seen as potentially destabilising
the vital Middle Eastern region. A similar threat is seen in the India-Pakistani and Israel-Palestine
conflict. Within failing states, Somalia, Congo, Haiti, Sudan are still seen as creating numerous
challenges to global stability and safety.1172 Ethnic or sectarian conflict spilling over borders, weapon
and drug smuggling, international terrorism, piracy, and millions of refuges who cannot rely on a
local societal and governmental structure to give them a chance at a decent life are all potentially
interrelated threats. The failing of Pakistan, Afghanistan, North Korea, parts of Mexico, Iraq, and
Yemen will also have far reaching consequences. Cyberspace can both create opportunities and
constrains for these risky scenarios.

6.3.2.1.45.5 Text mining results


As mentioned previously Conflict emerged from the text analysis as strongly associated with the
most dominant theme Policy. Furthermore, War has also been found to be linked with security
(25%), while Power is also related with Policy so supporting the traditional view of power
competition as source of instability and war. China has been identified as related with security as
India, Pakistan, Russia and Iraq. Food, Poverty and Resources are all related to Security,
showing 29%, 26% and 25% of association respectively. In addition another soft theme emerging
from the text analysis is migration, which has been found to be associated with security (29%). The
concept of Rights, which is the base of democracy, has also been identified by the software as
associated with Security (32%). As mentioned previously, the importance of democracy has also been
confirmed by the selection of the text fragments where democracy is directly related with security
and interdependence.

6.3.2.1.45.6 Uncertainty
Uncertain risks of different nature, ranging from economic, social, political, cultural to environmental
have all been included as source of insecurity within the political science discourse. This however
remains a conflicting view within the disciple, which has recently voiced the risk that this process of
securitisation may indeed reduce the effectiveness of security. If security is everything that is
considered 'necessary' for human life, then it would be impossible to establish a trade off between
security and other values. Therefore, policies could only represent choices for one type of security as

1171
Russett, Bruce, Triangulating the Peace: Democracy, Interdependence and International Organisations,
Norton, New York, 2001
1172
Steward, P., Weak Links Fragile States, Global Threats, and International Security, Oxford Universty Press,
Oxford, 2011

318
opposed to another. Notwithstanding this debate within the discipline, events such as economic
crises, floods, earthquakes, food and water insecurity, pandemics are all viewed as threats.1173

6.3.2.1.46 Political Science and Cyber Space: Key takeaway points


Security has taken on a broader meaning in the era of globalisation, information revolution,
growing interdependence and uncertainty
The emphasis is on the global and transnational nature of security, the interconnection and
complexity of threats and risks to security
New recent emphasis on virtual and digital, which emerge as an additional dimension of
security
The concept of security has gradually expanded to include everything that is considered
'necessary' for human life, both real and virtual. This implies the inclusion of the economic,
social, political, cultural, environmental and information dimension into security.
Security requires a fully comprehensive approach where the emphasis is both on the soft
component of security (such as economic, social, environmental, political), hard power
(military, nuclear, etc) and virtual (information, data, infrastructure) as well as the close
integration between domestic and foreign policy, civil and private and among public, private,
and third sectors.
State is competing in its ability to provide security with a plethora of different, diverse and
virtual agents/actors empowered by globalisation and the information revolution and cutting
across geography and sovereignty.
Traditional threats (i.e. low and high intensity conflicts) derived by power competition and
changes in the international power structure, are still important. These are, however,
triggered by transnational trends and virtual agents. Furthermore, an additional layer of new
threats have been added. This includes lack of democracy, crime, terrorism, cultural clash,
poverty, scare resources, environmental degradation, health-related risks, environmental
hazards, climate changes, dependency on technology, cyber security threats and
demographic trends.
Although the security agenda has widened to reflect the new scope of security and has
included diverse issues (e.g., environment, internal conflict, and economic crisis), on the
other hand, it has not deepened (i.e., whose security is being threatened). At least, within
the dominant discourse, the state and its citizens still remain the main objective of security.
What is under discussion it is not the disappearance of the state but how the state will adapt
and transform to cope with the new transnational and virtual challenges.
The cyber dimension takes the traditional sources of insecurity to a new level by intensifying
the scale and impact of these threats
Within the cyber sphere asymmetry is dominant condition so acquiring a new level of
importance in security.
Risks are both traditional and caused by state actors, modern and driven by non-state actors,
post-modern driven by individuals and post-post modern triggered by virtual agents.
Shift towards striking the right balance between openness, functionality, security and
individual rights.

1173
Ullman, R., Redefining Security, International Security, Vol. 8, No.1, 1983, p.153.

319
6.4 Annex 4 Conceptual foundations of security in political sociology and
(critical) security studies
6.4.1 Introduction
At no point in history have the discourses and practices of security taken equal prominence than at
the beginning of the 21st century. Having emerged as a paradigm of world politics only in the 20th
century, security has intensified its presence in the post-Cold war era and in the wake of the 9/11
terror attacks in a colonisation of almost every other sphere of life. A growing perception of
unpredictable threats due to increased circulation, complexity and contingency (Dillon 2005) has
resulted in the securitisation that is, framing in terms of security - of a large number of social
spheres from immigration, climate change and development to public health. To grasp the full scope
of this dominant feature of our time in conceptual terms, this overview will survey the conceptual
history of security, trace its emergence as a norm in the 20th century and summarise the conceptual
criticism of security that has developed since the 1990s It ends with a brief analysis of alternative
security concepts of risk and resilience and their respective epistemic strategies of probability
calculus and scenario planning.

6.4.2 Conceptual history of security


The etymology of the English and Romanic words for security derives from the Roman word securitas
(literal: se = without, cura = worry) which signified a state of mind defined by Cicero as the
absence of distress upon which happy life depends (1971: V. 14, 42/466-7, cited in Wver 2004).
This epicurean/ stoic ideal of securitas underwent a Christian revaluation as careless, hubristic, even
damnable overconfidence (Der Derian 1995: 28) expressing sinful faithlessness, while assurance of
faith [Glaubensgewissheit] was preferably expressed in the Latin translations of the Holy scriptures
by the words certus, certitudo. The Cartesian redefinition of certitudo as epistemic certainty can be
seen both as a continuation and redefinition of the grounds of true belief.
Depicted in female personification on empire coins, securitas was also understood as maintaining the
status quo and peace of the Roman Empire through protective war (Conze 1984), merging the - from
a modern point of view - political and psychological aspects of security into a state of peace of mind
due to imperial power. At the same time the term acquired a legal meaning of security, pledge
similar to cautio in Roman private law that endures relatively unchanged to this day.
From the Roman Empire to the Middle Ages the modern meaning of security as consequence or
purpose of the modern state (Conze 1984: 833) was less associated with securitas than with pax and
libertas. In the medieval princely states security was the end of protective agreements to assure the
security of persons (eg in the oath of fealty), marketplaces and towns. In particular the security of
roads and safe passage became a concrete association of security and assigned to the duty to protect
of the ruling sovereign.
From Bodin and Althusius onwards the term acquired more explicit reference to the state and
commonwealth in international and constitutional law and as the organisation of defence in the 16th
and 17th centuries. It was increasingly used as rationale for a states interest but with the objective
of tranquil peace especially after the 30 year war. In the Holy Roman Empire a distinction between
external security, referring to foreign and military policy and achieved through alliances, third party
guarantees and war, and internal security achieved through policey became common. Internal
security from the beginning carried with it an ambivalence of securing the welfare and happiness of

320
the people as well as securing the political order against rebellion and sedition. In the natural
contract theories of Hobbes and Pufendorf in the 17th century internal security means not only the
preservation but also the welfare/ happiness of the people, both embodied in policey. But based on
Lockes conception of security as a natural right that assumes validity also within the polity of the
state, 19th century liberal thinkers such as Kant and Humboldt argued to reduce policey to (internal)
security [Sicherheitspolicey] and refrain from interference into civil liberty in the name of welfare
[Wohlfahrtspolicey]. The security of the law [Rechtssicherheit] was to provide the legitimation of the
constitutional state [Rechtsstaat] as opposed to the police state [Polizeistaat] (Conze 1986). This
understanding of security as the equivalence of the guarantee of right and civil liberty influenced the
American and French revolutions, the development of human rights and the European understanding
of liberalism. The welfare connotation of security was taken up under somewhat different
circumstances in the 20th century as social security (cf. Kaufmann 2003).
Security received a manipulation (Conze 1986: 857) in totalitarian systems from the French
Revolution terror to national-socialist and socialist dictaturships: the security of the political system
takes precedence over individual rights and legitimates the elimination of dangerous persons and
ideas (eg the GDR Ministerium fuer Staatssicherheit (ibid: 861)) under the name of security
measures.

6.4.3 Emergence of security as a paradigm


Since the 17th century security was established as an abstract concept but it was only in the mid-
20th century that security became the key paradigm of world politics and the organising concept of
the emerging Anglo-Saxon discipline of international relations, in particular its subfields of strategic/
security studies. Before the 1940s the term had no priority over related words/ concepts like war,
raison detat and power (Wver 1997). The increasing centrality of national security was certainly
related to the nuclear confrontation between the Cold War superpowers and the foreign policy-
orientation of strategic studies (in particular the RAND corporation).
It was the experience of the First World War however that significantly contributed to the
predominance of security. Not only did it spark the identity-giving debate of international relations
between liberal internationalists and their goal of collective security and the realist counter-emphasis
on national security under anarchy. The interwar period was also one where the general perception
of lost security triggered a retrospective valuation of a golden age of security that supposedly
characterised the world before 1914, manifest for example in the memoirs of Stefan Zweig (1944).
That is, security as a positive and desirable condition in itself, rather than the means or instrument to
secure another value or positive condition (of peace, life and limb [Leib und Leben], property,
power) was explicitly derived from a newly conceived state of insecurity which had had no previous
historical connotation. It constituted a nostalgic reconstruction of an experience that during its time
was never broached in terms of security (Kaufmann 2003: 88) and this ideal sense of never fully
attaining the condition of security has remained with the concept since (cf. Wver 1995: 56: if one
had complete security it would disappear, or Dillon 1996: 120: security and insecurity are mutually
defining unequal opposites, rather than one overcoming the other). Perhaps related to that, security
not only gained key political relevance from the UN Security Council in 1946 and the Truman 1947
National Security Strategy forward, but a few years earlier another social sphere had been recast in
terms of security when Roosevelt addressed the need for the security of the home, livelihood and
social insurance in the 1935 (first named Economic, then) Social Security Act in reaction to the Great
Depression. Social security became a human right in 1948 (Conze 1984: 858) but the national

321
interest in US foreign policy changed from an economic interpretation in terms of welfare to one of
security (Wolfers 1952).
Security also became a term in the emerging discipline of psychology in the sense of confidence
[Selbstsicherheit] (Kaufmann 1974, 2003). This is not identical to the original Roman concept of
security however: As Wver has pointed out, securitas as a state of mind was a level of reality not
reductively derivative of something more real (2004: 55) while psychological security is today
regarded as a subjective (mis)perception of an objective state of security.
The realist view of security as a strategy of survival of sovereign states in an anarchical international
environment based on military capabilities locates its historical origin in the Peace of Westphalia
(1648) and theoretical foundation in Hobbess Leviathan (1651). A central concern of the discipline
was the security dilemma introduced by Herz in the early 1950s as a structural notion in which the
defensive pursuit of national security of one state tended automatically to lead to rising insecurity of
others in a zero-sum view of security. Strategic studies was significantly influenced by the discipline
of economics not only as model for an objective, scientific discipline with a sophisticated
methodology drawn from the natural sciences to test specific hypotheses, develop general laws and
predict human behaviour (Burchill and Linklater 2005:2). It also provided the epistemological basis
for the model of rational choice under calculable uncertainty in Von Neumann and Morgensterns
(1944) Theory of Games and Economic Behaviour.

6.4.4 Conceptual analysis of security in security studies


Until the 1980s the axiomatic (Der Derian 1995:25) status of security and foundation of the
discipline in the bipolar military threat goes some way to explain the near total lack of conceptual
criticism of security. One exception was Wolfers (1952) article that analysed national security as an
ambiguous symbol. Combining an instrumental with a normative view, security both points to some
degree of protection of values previously required but also is a value of which a nation can have
more or less and which it can aspire to have in greater or lesser measure (484). Wolfers also
introduced the significance of the difference between real and perceived threat: security, in an
objective sense, measures the absence of threats to acquired values, [and] in a subjective sense, the
absence of fear that such values will be attacked (485). Different nations and groups within nations
differ widely in their reaction to one and the same situation (ibid) and their efforts to pursue
security: most sensitive to threats tend to be those nations which have either experienced attacks in
the recent past or, having passed through a prolonged period of an exceptionally high degree of
security, suddenly find themselves thrust in a situation of danger (486). This implied that national
security policy cannot be assigned meaning or moral judgment in general but depended on specific
circumstances which produced different outcomes in the comparison of inevitable sacrifices of other
values with the security they promise to provide (501). Yet Wolfers analysis did not feature in IR
course syllabi and as Baldwin states, it would be an exaggeration to say that conceptual analysis of
security began and ended with Wolfers article but not much of one (1997: 8) much in contrast to
the concept of power on which there existed a well-developed body of theoretical writing by then
(Buzan 1981: 3). Buzan explains this absence partly by the requirements of keeping up with constant
fluctuations of amity and enmity that confined strategic studies to short-term perspectives, leaving
neither much capacity nor inclination to move beyond empirical and policy-oriented horizons (1981:
8).
With the end of the cold war not only did prominent security institutions such as NATO and the
Conference for Security and Cooperation in Europe (CSCE) face a need to redefine their raison detre

322
(Huysmans 2002:17) but the radical transformation of its main empirical references also engulfed the
field of IR/ strategic studies in a crisis of identity. The ensuing widening debate promoted the
redefinition of security both along the axis of referent objects, that is units exposed to threats (adding
individuals, ecological system, cultural identity, community, world society etc to the traditional state-
centric agenda) and across different sectors (adding economic, societal, political and environmental
to the classically dominant military threat). However, this first critical debate fell short on two
important grounds. On the one hand, as Wver (1995, 2004) has pointed out, the widening debate
still assumed the meaning of security itself as self-evident and located the problem in its
specifications such as national security vs. common security vs. human security (Wver
2004:54), to be resolved by a broader or alternative security focus than the state, the major difficulty
of which was deciding where to stop. In other words, the all-inclusive agenda extending to anything
that was good or desirable implied a loss of meaningful signification. Baldwin (1997) similarly holds
that the redefining security literature primarily engaged in redefining policy agendas, not the
concept of security - even if the policy areas could of course be seen to have a historical connection
to security (eg human rights, economics, crime, social injustice Rothschild (1995) also relates the
new pluralist approach to security of the 1990s to historical liberal understandings of security).
Huysmans (1998, 2006) on the other hand has argued that the alternative competing hierarchy of
security referents is formulated in opposition to a clear-cut and uncontested notion of the state,
instead of questioning whether the state really functions as the transcendental given category that
traditional security studies claimed it to be.

6.4.5 Critical security studies


What can be seen as the beginning of critical security literature began to take a closer look at the
epistemic, ontological and political dimensions of the meaning of security (Lipschutz 1995, Campbell
1992, Der Derian 1995, Wver 1995, Dillon 1996, Krause and Williams 1995, Shapiro 1992, Walker
1990, Huysmans 1998). Against a view of the more security the better these approaches pointed to
the interdependence of security and insecurity. Campbell (1992) for example argues that the state
depends on practices of representation and political identity on discourses of danger and threat
construction. A loss of threat, as with the end of the Cold War, also damaged the political identity of
the United States, thus creating the need for a new enemy against which to define its own values.
States are in permanent reproduction and never finished as entities. Were the discrepancy between
the demands of stable identity and the (always lacking) practices that constitute it ever resolved, and
pure security as absence of movement fulfilled, this would mean that the state ceased to exist.
Ironically, then, the inability of the state project of security to succeed is the guarantor of the states
continued success as an impelling entity (12). Dillon (1996: 121) similarly states that it is evident, if
we pause to think about security for a moment, that any discourse of security must always already
be a discourse of danger too. Any appeal to security must entail and promote the fear in opposition
to which it is pursued. Any act of securing enforces a transformation on that which is to be secured
it is only possible on condition that the integrity of the original thing [to be secured] is destroyed
(122).
Critical approaches to security also partly draw on conceptual history or genealogy/ etymology (the
Oxford English Dictionary) in order to put the seeming familiarity of the concept into a perspective
which at a minimum should alert us to the specificity, contingency and political content of
contemporary usage (Wver 2004: 54). They thus problematize the ontotheology of security (Der
Derian 1995), that is, the a priori taking-for-granted of the particular political formula of national

323
security as universal truth and the state as its primary referent (or as Kaufmann (1970) puts it in a
different context, the discovery of the fundamental human property of security after only 6000
years). These approaches however differ from earlier pluralist criticisms in that they take the field of
security studies seriously as an intellectual enterprise as well as historical artefact.
Critical security studies can be very roughly grouped into the three schools of Copenhagen, Paris
and Aberystwyth. For the Frankfurt School- inspired Aberystwyth approach, identified with the term
Critical Security Studies written large, emancipation, not power or order, produces true security.
Emancipation, theoretically, is security (Critical Approaches to Security in Europe A Networked
Manifesto, 2006: 456). This normative agenda endorses a fuller and more inclusive realisation of
security, based on human rights, empowerment of the poor and cessation of violence against
marginalised groups and minorities (This approach is similar to the widening debate).
By contrast, the other two approaches understand security as self-referential, that is, not referring to
an external, objective reality an (in)security condition prior to language but establishing a security
situation by itself. Security is thus a performative rather than descriptive concept. For example, a
security framing of migration changes migrants from economic labour force to a threat to society.
The question that becomes important is not if a security story gives a true or false picture of reality,
but how it orders social relations (Huysmans 1998: 232). Both the Copenhagen and Paris school are
based on the assumption that security does not possess an independent, stable, context-free
meaning that could be added to [any other] stable, independently defined object (Wver 1995: 50)
but indicates a specific historical problematic and field of practice. However, they differ in respect to
a concern with conceptual change or conceptual deconstruction, and an emphasis on the exceptional
or normal logic of security.
The Copenhagen school, represented by Wver and Buzan (Wver 1995, Buzan et al 1997, Wver
2011), departs from the recognition that security and its particular problematic are grounded in the
state and national security. However, while taking the attention to actual security discourse, the
basis the theory lies in conceptual change by defining security as a speech act (usually by state
representatives and elites), that declares an emergency condition and claims the use of extraordinary
measures to handle the threat. If the framing of an issue in terms of security is accepted by the
audience, it takes the issue from an order of ordinary politics to one of exceptional politics, with
depoliticizing effects. This perspective studies processes of securitisation and desecuritisation, that is
the social construction of threats, without legitimizing them but allows for the possibility that
securitisation could be a desirable tactical move to obtain certain effects (86) without however
implying an objective condition of (in)security.
Bigo (2008) and other Foucault-inspired approaches associated with the Paris school contest the
foundational nature of a logic of exception or condition of emergency in which normality is
suspended for security. They stress the normal, everyday management of unease (Bigo) by
professionals of (in)security from the military to the police as well as private security experts. Instead
of analysing security as a (however contested) concept, the Paris school proposes treating security as
a technique of government (Foucault 1994 in C.A.S.E. 2006: 457) and shifts attention from the
intentions behind security policies to their effects. Rather than seeing security and insecurity as
binary opposites, security is always seen to produce insecurity: it excludes in the name of protection
and always discriminates within society (Bigo 2008: 105) and thus means only the security of the
majority akin to the normal distribution of probability analysis. Instead of referent objects, decisions
and speech acts, the focus is on practices of security that for example show the increasing conflation
of external and internal security in the export of policing methods in international affairs and the

324
routinisation of military operations in the domestic arena (C.A.S.E. 2006: 459). Security is also seen as
a technique of governance that seeks to permit, guarantee and ensure circulations: of people, of
goods, of air (Foucault in Bigo 2008: 97). Securing the continuous flow of financial transactions for
example is just as much at the centre of financial surveillance measures as the fight against terrorist
financing.

6.4.6 Alternative security concepts: risk, resilience, societal security


Since the end of the cold war security analysis and practice have predominantly been approached
through a number of alternative concepts, each bringing with them their own frameworks (even if
these have changed in the process). In particular, the concept of risk has been adopted from
sociology (and economics/ finance) and in opposition to it - the concepts of precaution and
resilience have been taken from ecology and economics (Walker and Cooper 2011) as well as
engineering and psychiatry (Comfort et al 2010).
The prominent entry of risk into security studies was based on the different sociological approaches
of Beck, Luhmann and Giddens, the most influential being Becks theory of risk society (1986, 1991).
Some epistemic and ontological reflections are again in order to understand the distinct import of
risk. Game theory had implicitly brought a concept of uncertainty into traditional security studies
that was reducible to the calculated intentions of others (Bernstein, 1996: 232). The catastrophic risk
of nuclear attack in the Cold War was paradoxically insured against by the principle of mutually
assured destruction (MAD) because such an attack was deemed irrational by self-interested actors
(Cooper 2004). This particular ontology of uncertainty as risk was epitomised in the birth of modern
finance theory in the 1970s. Yet while economists such as Knight, Keynes and Hayek had
distinguished uncertainty from risk, with Beck risk was re-interpreted from calculable uncertainty to
refer to incalculable uncertainty (Kaufmann 2003; Boy, Burgess and Leander 2011).
The notion of incalculable uncertainty, found its most influential expression in Rumsfelds famous
unknown unknowns that provided the rationale for the post-9/11 War on Terror. Deep or radical
uncertainty has preoccupied the governance of security in the 21st century since. The increased
interconnection and complexity of technical systems and infrastructure as well as all sorts of traffic
and communication between them be it in the form of credit channels, transportation, natural
catastrophes or the spread of pandemics vastly increases exposure to rare events that exceed
calculability and shatter existing provisions of crisis management and insurance. The attempt to
govern security in spite of the unpredictability of the low probability/ high impact event has sparked
new security logics of pre-emption, precaution and resilience/ preparedness that seek to eliminate
the potential threat prior to its manifestation while preparing a capacity for its inevitable occurrence
(Walker and Cooper 2011).
The concept of resilience is derived from engineering (resilience of materials and technical systems),
ecology (self-reproduction of organisms and life systems) and psychiatry (resilience of individuals and
interactions with social systems) (Comfort et al 2010: 7). One difficulty is to define resilience as after
or before the occurrence of a major shock to the system and whether it implies a state of return or
adaptation to a new equilibrium (ibid 7-8). Overlapping with the notion and use of resilience
predominating in Anglo-saxon countries the concept of societal security is also playing a key role in
the EU and Norway. Moving the focus from the territorial sovereign state to society and culture,
societal security is defined as the ability of society to persist in its essential character under changing
conditions and possible or actual threats (Wver 1993: 23) with particular stress not only on
physical and material aspects but also complex moral and social aspects such as confidence, trust,

325
belonging and loyalty (Burgess 2011) that contribute to the well-being of people and meaningful
existence (ibid). Changing the referent from the state to society and taking social cohesion among
people as the fundamental referent of security (Burgess 2011) societal security is directed at
different vital levels of the survival of society. Rather than a trade-off of core values for security (cf.
Wolfers 1952, Baldwin 1997) society is said to be secure when it maintains its key values. It
connotates a complex lineage of the security/welfare unity of the 17th century as well as the liberal
notion of security as civil liberty and social security (in societies where these have become key
values) but rather than a rights-based definition it takes a functional approach to security (Burgess
2011).
While adjusting security governance to uncertainty, different epistemic alternatives to the classical
actuarial and probabilistic forms of knowledge are also being pursued to optimise epistemic security:
among these political prediction markets (Aitken 2011), threat enactment (Collier, 2008) and most
prolifically, scenario planning (Tellmann 2009). The practice of scenario planning reaches back to the
Cold War (Hermann Kahn at the RAND Corporation already advocated thinking the unthinkable) but
while spreading to the world of business in the 1970s and all the way a part of civil defence and
emergency planning it has acquired unprecedented use in the 21st century. As the proper tool for a
world that is complex and irregular, scenario planning is seen superior to risk with its tyranny of the
past and illusion of certainty. Against the perils of narrow thinking and dominant perceptions, it
seeks to counter the unknown by means of the imagination. Scenarios are not predictions but
plausible narrative accounts of the future and while not claiming the precision of risk assessments
they nonetheless seek to legitimate decision-making on the basis of their emotional salience and an
appropriate number of possible futures (18). To seek a balance between paralysis and denial the
number of scenarios needs to be limited to remain meaningful, the norm being three (Ertel and
Walton 2006, cited in Tellmann, 18). As Tellmann notes, scenario planning itself seems to be prone to
a particular plot line and temporality of the imaginary of the emergency that is, while a view of
the future as unexpected and inevitable threat makes scenarios the most appropriate form of
knowledge production, their narratives reproduce the future as discontinuous sequence of sudden
events (18). The particular conception of the future (re)produced by scenario planning is one that is
not a question of distance in time. The future is what radically differs from the present (Reinsurance
company Swiss Re, cited Tellmann, 19).
The search for epistemic security in security governance pushed the identification of security with
certainty (as already understood by Nietzsche and manifest in the ambivalence of the German word
Sicherheit) to a new level (Burgess 2011). But other historical meanings of security are achieving
new political relevance: whether it is the hubris of securitas that resurges in the masters of the
universe attitude of risk management prior to the 2008 onwards financial crisis, or the confidence
that is sought to be produced in security simulations for humanitarian workers and civil contingency
planning exercises. As Kaufmann (2003:99) also notes, security means the guarantee of values in the
future and the resulting confidence and reassurance. Although security as the possible condition of
the community or system (ibid: 90) has in the 20th century reached a status of norm and paradigm
marked by increasing reflexivity, it has not displaced the instrumental use of security as argued by
Kaufmann, but rather stands in a continuous complex entanglement: security as pledge and
mortgage (the Roman cautio) for example has never been of higher significance as brought home in
the subprime crisis. The challenge of critical security literature therefore lies in the analysis of
conceptual correlation of security concepts, subjects and objects in its empirical scope, actors and
practices (Burgess 2010:3). It also consists in critically examining whether security functions as a

326
technique of governance that seeks to erase the insecurity of society or whether the regulation of
insecurity is an intrinsic part of the overall governance of society (ibid:4).

327
6.5 Annex 5 Bibliography of Textmined Academic Articles
, Australias National Security Statement, Military Technology, Vol. 33, No. 1, January 2009, pp.
397401.
, BI Directory of Risk Management Information Systems, Business Insurance, Vol. 33, No. 49,
December 6, 1999, p. 24.
, Bioavailability Enhancement Technology Shows Promise for Chlorinated Solvent Cleanup,
Hazardous Waste Consultant, Vol. 28, No. 5, October 2010, pp. 1.11.4.
, Book Alert, TIDEE (TERI Information Digest on Energy & Environment), Vol. 8, No. 1, March 2009,
pp. 163165.
, Book Reviews, International Affairs, Vol. 84, No. 6, November 2008, pp. 13031340.
, Books Received, Slavonica, Vol. 11, No. 2, November 2005, pp. 209211.
, Bulgaria, Country Report. Bulgaria, December 2010, pp. 126.
, Challenges to Fragile Democracies in the Americas: Legitimacy and Accountability, Texas
International Law Journal, Vol. 36, No. 2, Spring 2001, p. 319.
, Chapter 2: Empirical Evidence Using Asset Prices, Foundations & Trends in Finance, Vol. 5, Now
Publishers, 2010, pp. 170196.
, Chronology, Middle East Journal, Vol. 64, No. 3, Summer 2010, pp. 447476.
, Cloud Providers Arent Much Concerned with Security, Information Management Journal, Vol.
45, No. 4, August 2011, p. 7.
, Comments of Tax Executives Institute, Inc. On Pending Canadian Income Tax Issues, Tax
Executive, Vol. 59, No. 6, Winter 2007, pp. 515525.
, Configuration Management Database ROI Requires Careful Implementation, Computer
Economics Report, Vol. 30, No. 2, February 2008, pp. 1116.
, Consultation Reports Released on Canada-U.S. Perimeter Security Talks, Canadian Sailings, 2011,
pp. 4243.
, Contributors, International Studies Quarterly, Vol. 51, No. 1, March 2007, pp. 243245.
, Core Financial System Requirements (Exposure Draft): JFMIP-SR-98-4, GAO Reports, November
5, 1998, p. 1.
, Data Centre-as-a-Service, Smart Business Network, Inc., May 2011.
, Dimensions of Disease, Harvard International Review, Summer 2000.
, Economic Insecurity, Future Survey, Vol. 25, No. 10, October 2003, p. 2.
, Economic Report of the President: Strengthening Retirement Security, Population &
Development Review, Vol. 28, No. 1, March 2002, pp. 165171.
, Employee Tenure Trend Lines, 1983-2010, EBRI Notes, Vol. 31, No. 12, December 2010, pp. 2
12.
, ESP Platform Certified for CIS MAC OS X Benchmark V1.02., Computer Security Update, 2006, pp.
13.
, Executive Summaries, Benefits Quarterly, Vol. 21, No. 4, Fourth Quarter 2005, pp. 34.
, Extension for TWIC Port Secure Area Compliance, Florida Shipper, Vol. 32, No. 30, July 23, 2007,
p. 14.
, Federal Register, Federal Register, Vol. 75, No. 229, November 30, 2010, pp. 7393574604.
, Financial Markets, Canadian Economic Observer, Vol. 14, No. 12, 2001, p. 49.
, Forecast 2009: Whats on the Horizon. (cover Story), Information Today, Vol. 25, No. 11,
December 2008, pp. 148.
, Fortify Software Unlocks Benefits of the Cloud with Software Security Solutions; New White
Papers and Product Capabilities from the Market Leader in Software Security Help Providers and
Users Assess Risk and Secure Applications for the Cloud, M2PressWIRE, May 18, 2010.
, Fuel for Thought, Energy & Environment, Vol. 22, No. 8, December 2011, pp. 11151214.
, Growth in Managed Wireless Security, Network World Asia, Vol. 6, No. 1, April 2010, p. 18.
, Highlights, Future Survey, Vol. 25, No. 10, October 2003, p. 2.
, History, Book News, Inc., November 2005.

328
, In Fact.., Nation, Vol. 282, No. 25, June 26, 2006, p. 8.
, Industry Calls for Covered Bond Exemption from Reg AB Disclosure and Reporting Rules,
Euroweek, No. 1168, 2010, p. 4.
, Inoculating the Network, Economist, Vol. 363, No. 8278, June 22, 2002, pp. 3032.
, Introduction, Ankara Papers, Vol. 10, No. 1, March 2004, pp. 143.
, Iran and the Rogues: Americas Nuclear Obsession, Defence Monitor, Vol. 34, No. 5, October
2005, p. 1.
, IT Security Staffing Level Breaks Downward Trend, Computer Economics Report, Vol. 24, No. 4,
April 2011, pp. 1018.
, JFMIP: Core Financial System Requirements: JFMIP-SR-01-02, GAO Reports, June 11, 2001, p. 1.
, Legal Developments, Federal Reserve Bulletin, Vol. 84, No. 3, March 1998, p. 197.
, Lifecycle Funds and Wealth Accumulation for Retirement: Evidence for a More Conservative Asset
Allocation as Retirement Approaches, Financial Services Review, Vol. 19, No. 1, Spring 2010, pp. 59
74.
, Making Allocations to Annuities for Your Clients, Bank Investment Consultant, Vol. 19, No. 12,
December 2011, pp. A3A6.
, Making the World Safe for America, Policy Review, No. 61, Summer 1992, p. 50.
, Measurement Techniques Create Sound 401(k) Plans, Managing 401(k) Plans, Vol. 2007, No. 8,
2007, pp. 115.
, Messaging-security Gateway Defined, Network World, Vol. 24, No. 40, October 15, 2007, p. 48.
, More Than Just Financial Reform, Venulex Legal Summaries, Q3 2010, pp. 193.
, Mutual Fund Sales Expected to Dip in 2009, Money Management Executive, Vol. 17, No. 9,
March 2, 2009, pp. 45.
, Newly Arrived Titles, Survival, Vol. 47, No. 3, 2005, pp. 177178.
, News Digest, Journal of Accountancy, Vol. 209, No. 2, February 2010, pp. 1114.
, Notes on Contributors, Third World Quarterly, Vol. 25, No. 2, March 2004, pp. 277278.
, Part I. Rulings and Decisions Under the Internal Revenue Code, Internal Revenue Bulletin, Vol.
2011, No. 18, May 2, 2011, pp. 730736.
, Part I. Rulings and Decisions Under the Internal Revenue Code of 1986, Internal Revenue
Bulletin, No. 201044, 2010, pp. 558575.
, Part IV. Items of General Interest, Internal Revenue Bulletin, Vol. 2008, No. 19, May 12, 2008, pp.
911944.
, Politics, Social Affairs and Law, International Affairs, Vol. 66, No. 2, April 1990, p. 368.
, Poster Abstracts, Asia Pacific Journal of Clinical Oncology, Vol. 1, 2005, pp. A33A55.
, Poster Presentations, Technology & Health Care, Vol. 9, No. 4, 2001, p. 353.
, Private Pensions: Implications of Conversions to Cash Balance Plans: HEHS-00-185, GAO Reports,
2000, p. 1.
, Proceedings of a Workshop on NATOs Strategic Concept, 15-16 October 2009, Vol. 11, Baltic
Defence College, 2009, pp. 153168.
, Progress Made on Harmonising Policies and Guidance for National Security and Non-National
Security Systems, GAO Reports, 2010, p. 1.
, Recent Developments, Illinois Public Employee Relations Report, Vol. 28, No. 2, Spring 2011, pp.
1112.
, Recommended Security Controls to Protect Information Systems, I-Ways, Vol. 28, No. 2, April
2005, pp. 109116.
, Regulatory Developments 2010, Business Lawyer, Vol. 66, No. 3, May 2011, pp. 665776.
, Report of the Committee of the Whole on Crisis Responses, Documents of the International
Labour Conference, Vol. 98, June 3, 2009, pp. 19.119.71.
, Retirement Security: Women Face Challenges in Ensuring Financial Security in Retirement, GAO
Reports, October 11, 2007, p. i.
, SEC Adopts Large Trader Reporting System, Venulex Legal Summaries, Q3 2011, pp. 16.

329
, Securing Australias Special Intersection, Quadrant Magazine, Vol. 52, No. 5, May 2008, pp. 6
15.
, Securities and Exchange Commission V. Edwards: Certiorari to the United States Court of Appeals
for the Eleventh Circuit, Supreme Court Cases: The Twenty-first Century (2000 - Present), January 4,
2009, p. 1.
, Security Issues Continue To Top CPA Technology Concerns, CPA Technology Advisor, Vol. 16, No.
2, April 2006, pp. 34.
, Security Services Industry Profile: Global, Security Services Industry Profile: Global, July 2011, pp.
129.
, Selected Documents, Environmental Policy & Law, Vol. 37, No. 5, October 2007, pp. 428430.
, Social Security Programs in the United States, 1993, Social Security Bulletin, Vol. 56, No. 4,
Winter 1993, p. 3.
, Social Security Programs in the United States, Social Security Bulletin, Vol. 54, No. 9, 1991, p. 2.
, Summaries, Security & Human Rights, Vol. 19, No. 1, January 2008, pp. 100103.
, Table of Contents, Nation Company, L. P., February 25, 1978.
, Tax Considerations for Investors in Light of the Current Economic Downturn: Ensuring That Where
There Is An Economic Loss, There Is An Attendant Usable Tax Loss, Or At The Very Least, No Taxable
Gain, Venulex Legal Summaries, Q4 2008, pp. 17.
, The Army Chiefs, Military Technology, Vol. 30, No. 6, June 2006, pp. 52106.
, The Economic Status of the Aged, Social Security Bulletin, Vol. 55, No. 3, Fall 1992, p. 3.
, The Many Dimensions of Security, Future Survey, Vol. 25, No. 10, October 2003, p. 2.
, The Mob Today: A Weakened Organisation, Trends in Organised Crime, Vol. 7, No. 2, December
2001, pp. 80107.
, The NZ/US Defence Relationship, Military Technology, Vol. 32, No. 1, January 2008, pp. 394396.
, The Political Scene, Country Report. Bulgaria, December 2010, pp. 1113.
, The Protean Enemy, Future Survey, Vol. 25, No. 10, October 2003, pp. 1213.
, The Role of Lifetime Income Products, Hamilton Project: Discussion Papers, No. 2, June 2, 2008,
pp. 712.
, Top Threat: Workplace Violence Remains No. 1 Nemesis, Security: Solutions for Enterprise
Security Leaders, Vol. 38, No. 6, June 2001, p. 9.
, Topline, Journal of Accountancy, Vol. 203, No. 4, April 2007, pp. 2023.
, Update 2: Summary of Federal Reserves Term Asset-Backed Securities Loan Facility, Venulex
Legal Summaries, Q1 2009, pp. 19.
, Wadi Fukin and the Wells of Peace, Green Futures, No. 81, July 2011, p. 20.
, Washington Legislative Update, Benefits & Compensation Digest, Vol. 43, No. 7, July 2006, p. 8.
, Waterway Woes, Shipping Digest, Vol. 83, No. 4351, July 17, 2006, pp. 8991.
, Working Past 65, Consumer Reports, Vol. 67, No. 8, 2002, p. 56.
, World Futures: All Sorts of Views, Future Survey, Vol. 25, No. 10, October 2003, p. 2.
, World Futures, Future Survey, Vol. 28, No. 6, June 2006, pp. 38.
Background Notes: United Nations, U.S. Department of State Dispatch, Vol. 6, No. 29, July 17, 1995, p.
570.
Concepts and Dilemmas of State Building in Fragile Situations, OECD DAC Journal on Development, Vol.
9, No. 3, October 2008, pp. 61148.
Enhancing the Delivery of Justice and Security, OECD DAC Journal on Development, Vol. 8, No. 3,
October 2007, pp. 107177.
The 2011-2016 Outlook for Security Information Management (SIM) Software in Oceana, Regional
Outlook Reports, January 11, 2011, p. N.PAG.
The 2011-2016 Outlook for Security Software in Asia, Regional Outlook Reports, January 4, 2011, p.
N.PAG.
The 2011-2016 Outlook for Security Software in Latin America, Regional Outlook Reports, January 8,
2011, p. N.PAG.

330
The 2011-2016 Outlook for Security Software in North America & the Caribbean, Regional Outlook
Reports, January 10, 2011, p. N.PAG.
The 2011-2016 Outlook for Security Software in Oceana, Regional Outlook Reports, January 11, 2011, p.
N.PAG.
The 2011-2016 Outlook for Security Software in The Middle East, Regional Outlook Reports, January 13,
2011, p. N.PAG.
The Economic Impact of Cancer, The American Cancer Society, n.d.
http://www.cancer.org/Cancer/CancerBasics/economic-impact-of-cancer.
Vital Speeches of the Day, McMurry Inc., 1947.
Abadi, Martn, and Bogdan Warinschi, Security Analysis of Cryptographically Controlled Access to XML
Documents, Journal of the ACM, Vol. 55, No. 2, May 2008, pp. 129.
Abboud, Samer, The Seige of Nahr Al-Bared and the Palestinian Refugess in Lebanon, Arab Studies
Quarterly, Vol. 31, No. 1/2, Spring 2009, pp. 3148.
Abdulai, Raymond T., Issaka E. Ndekugri, Paul O. Olomolaiye, and David G. Proverbs, Land Registration
and Security of Land Tenure, International Development Planning Review, Vol. 29, No. 4, November
2007, pp. 475502.
Abu-Sharkh, Miriam, and Guy Standing, Work Satisfaction, Trauma and Economic Insecurity: Post-
Tsunami Sri Lanka, Conference Papers American Sociological Association, Annual Meeting 2008, p.
1.
Ackermann, Alice, The OSCE and Transnational Security Challenges, Security & Human Rights, Vol. 20,
No. 3, 2009, pp. 238245.
Ackleson, Jason, Transnational Crime and Public Security, Latin American Politics & Society, Vol. 45, No.
1, Spring 2003, p. 170.
Adaman, Fikret, Oya Pinar Ardic, Burcay Erus, and Didem Tuzemen, Hospital Choice: Survey Evidence
from Istanbul, Turkish Studies, Vol. 10, No. 3, 2009, pp. 443468.
Adams, Jordan, and Karen Galvin, Final Regs. Governing Practice Before the IRS, Tax Adviser, Vol. 42, No.
9, 2011, pp. 589592.
Adamson, Clarissa, Gendered Anxieties: Islam, Womens Rights, and Moral Hierarchy in Java,
Anthropological Quarterly, Vol. 80, No. 1, Winter 2007, pp. 537.
Adamson, lo, and Gintautas Baranauskas, Merging Baltic Stock Exchanges with the NOREX Alliance: Why
it didnt work, Management of Organisations: Systematic Research, No. 25, March 2003, pp. 725.
Afkhami, Mahnaz, Human Security: A Conversation, Social Research, Vol. 69, No. 3, Fall 2002, p. 657.
Agafonow, Alejandro, Human Security and Liberal Peace: Some Rawlsian Considerations, Public Reason,
Vol. 2, No. 1, June 2010, pp. 7784.
Agarwal, SumitBarrett, The Asset-backed Securities Markets, the Crisis, and TALF, Economic Perspectives,
Vol. 34, No. 4, Quarter 2010, p. 101.
Agathangelou, Anna M., and L . H . M. Ling, Power, Borders, Security, Wealth: Lessons of Violence and
Desire from September 11, International Studies Quarterly, Vol. 48, No. 3, 2004, pp. 517538.
Agbonlahor, M. U., S. Momoh, and A. O. Dipeolu, Urban Vegetable Crop Production and Production
Efficiency, International Journal of Vegetable Science, Vol. 13, No. 2, June 2007, p. 63.
Aca, enay, and Sattar A. Mansi, Managerial Ownership, Takeover Defences and Debt Financing,
Journal of Financial Research, Vol. 31, No. 2, Summer 2008, pp. 85112.
Ahmad, Norliza, Joriah Muhammad, and Tajul Ariffin Masron, Factors Influencing Yield Spreads of the
Malaysian Bonds, Asian Academy of Management Journal, Vol. 14, No. 2, July 2009, pp. 95114.
Ahmed, Samina, Security Dilemmas of Nuclear-armed Pakistan, Third World Quarterly, Vol. 21, No. 5,
October 2000, pp. 781793.
Ahtik, M. Bank Lending Channel Reassessed, Our Economy (Nase Gospodarstvo), Vol. 56, No. 5/6,
November 2010, pp. 2128.
Aiken, Alexis, Evaluating Tenant-In-Common Interests in Real Estate, Real Estate Issues, Vol. 31, No. 1,
Summer 2006, pp. 1524.
Aitken, R., Spaces of Individual/National Security: Geopolitics, Citizenship and Cultural Economy., 2005.

331
Aitken, Rob, Notes on the Canadian Exception: Security Certificates in Critical Context, Citizenship
Studies, Vol. 12, No. 4, 2008, pp. 381396.
Akpotor, A. S., and Oromareghake B. Patrick, Proliferation of Small Arms and Light Weapons (SALW) and
Insecurity in the Niger Delta, Proceedings of the Northeast Business & Economics Association,
January 2010, pp. 128133.
Aktas, Elvan, Intraday Stock Returns and Performance of a Simple Market Model, Applied Financial
Economics, Vol. 18, No. 18, October 2008, pp. 14751480.
Al Janabi, Mazin A. M., Internal Regulations and Procedures for Financial Trading Units, Journal of
Banking Regulation, Vol. 9, No. 2, February 2008, pp. 116130.
Alagappa, Muthiah, Regional Institutions, the UN and International Security: a Framework for Analysis,
Third World Quarterly, Vol. 18, No. 3, 1997, pp. 421441.
Alagappa, Muthiah, Regionalism and the Quest for Security: ASEAN and the Cambodian Conflict, Journal
of International Affairs, Vol. 46, No. 2, Winter 1993, p. 439.
Alam, S. M., and M. A. Khan, Food Security and Its Utilisation, Economic Review (05318955), Vol. 41, No.
8, 2010, pp. 2425.
Albert, Mathias, From Defending Borders Towards Managing Geographical Risks? Security in a Globalised
World, Geopolitics, Vol. 5, No. 1, Summer 2000, p. 57.
Albright, Madeleine K., Building a Collective Security System, U.S. Department of State Dispatch, Vol. 4,
No. 19, May 10, 1993, p. 331.
Aldini, Alessandro, Mario Bravetti, and Roberto Gorrieri, A Processalgebraic Approach for the Analysis of
Probabilistic Noninterference, Journal of Computer Security, Vol. 12, No. 2, April 2004, pp. 191245.
Aldis, Anne, and Graeme Herd, Managing Soft Security Threats: Current Progress and Future Prospects,
European Security, Vol. 13, No. 1/2, Summer 2004, pp. 169186.
Aldis, William, Health Security as a Public Health Concept: a Critical Analysis, Revista Gerencia y Polticas
De Salud, Vol. 8, No. 17, December 2009, pp. 1227.
Alexandrov, Elina, Philip Cowan, and Carolyn Pape Cowan, Couple Attachment and the Quality of Marital
Relationships: Method and Concept in the Validation of the New Couple Attachment Interview and
Coding System, Attachment & Human Development, Vol. 7, No. 2, June 2005, pp. 123152.
Al-Krenawi, Alean, John R. Graham, and Mahmud A. Sehwail, Mental Health and Violence/Trauma in
Palestine: Implications for Helping Professional Practice, Journal of Comparative Family Studies, Vol.
35, No. 2, Spring 2004, pp. 185209.
Allen, Joseph P., Kathleen Boykin McElhaney, Gabriel P. Kuperminc, and Kathleen M. Jodl, Stability and
Change in Attachment Security Across Adolescence, Child Development, Vol. 75, No. 6, December
2004, pp. 17921805.
Allison, Roy, Strategic Reassertion in Russias Central Asia Policy, International Affairs, Vol. 80, No. 2,
March 2004, pp. 277293.
Al-Marashi, Ibrahim, Iraqi Intelligence Operations and Objectives in Turkey, Alternatives: Turkish Journal
of International Relations, Vol. 2, No. 1, Spring 2003, pp. 7894.
Aloise, Gene, Better Oversight Needed to Ensure That Security Improvements at Lawrence Livermore
National Laboratory Are Fully Implemented and Sustained, GAO Reports, April 15, 2009, p. 1.
Aly, Anne, and Lelia Green, Fear, Anxiety and the State of Terror, Studies in Conflict & Terrorism, Vol. 33,
No. 3, March 2010, pp. 268281.
Al-Yagon, Michal, Fathers Emotional Resources and Childrens Socioemotional and Behavioural
Adjustment Among Children with Learning Disabilities, Journal of Child & Family Studies, Vol. 20, No.
5, October 2011, pp. 569584.
Amatayakul, Margret, Security: Keeping the Flame Alive, Hfm (Healthcare Financial Management), Vol.
59, No. 2, February 2005, pp. 104105.
Ameer, Rashid, and Rashidah Abdul Rahman, The Impact of Minority Shareholder Watchdog Group
Activism on the Performance of Targeted Firms in Malaysia, Asian Academy of Management Journal
of Accounting & Finance, Vol. 5, No. 1, 2009, pp. 6792.
Amer, Ramses, Conflict Management and Constructive Engagement in ASEANs Expansion, Third World
Quarterly, Vol. 20, No. 5, Special Issue 1999, pp. 10311048.

332
Amerio, Piero, and Michele Roccato, A Predictive Model for Psychological Reactions to Crime in Italy: An
Analysis of Fear of Crime and Concern About Crime as a Social Problem, Journal of Community &
Applied Social Psychology, Vol. 15, No. 1, February 2005, pp. 1728.
Ammann, Manuel, and Ralf Seiz, Pricing and Hedging Mandatory Convertible Bonds, Journal of
Derivatives, Vol. 13, No. 3, Spring 2006, pp. 3046.
Amoore, Louise, and Marieke de Goede, Transactions After 9/11: The Banal Face of the Preemptive
Strike, Transactions of the Institute of British Geographers, Vol. 33, No. 2, April 2008, pp. 173185.
Amr, Mahmoud A., Egypts Quest for Peace, Saturday Evening Post, Vol. 245, No. 6, December 1973, pp.
1215.
Amromin, Gene, Precautionary Savings Motives and Tax Efficiency of Household Portfolios: An Empirical
Analysis, NBER/Tax Policy & the Economy (University of Chicago Press), Vol. 22, July 2008, pp. 541.
Ana-Maria, Marinoiu, Raneti Dan-Radu, and Crgin Andreea Raluca, Achieving Sustainable Security,
Annals of the University of Oradea, Economic Science Series, Vol. 19, No. 2, December 2010, pp. 126
132.
Anand, Dibyesh, The Violence of Security: Hindu Nationalism and the Politics of Representing the
Muslim as a Danger, Round Table, Vol. 94, No. 379, April 2005, p. 203.
Anand, P. B., and Des Gasper, Special Issue on Human Security, Well-being and Sustainability: Rights,
Responsibilities and Priorities, Journal of International Development, Vol. 19, No. 4, May 2007, pp.
449456.
Anderson, Anne-Marie, and Nandu Nayar, Debt Issuance in the Face of Tax Loss Carryforwards, Financial
Review, Vol. 45, No. 1, February 2010, pp. 105127.
Anderson, Donald, A Hasty Kind of Genius: Nol Cowards Hay Fever, Modern Drama, Vol. 54, No. 1,
Spring 2011, pp. 4561.
Anderson, Letitia, Politics by Other Means: When Does Sexual Violence Threaten International Peace and
Security?, International Peacekeeping (13533312), Vol. 17, No. 2, April 2010, pp. 244260.
Andreas, Peter, The Rise of the American Crimefare State, World Policy Journal, Vol. 14, No. 3, Fall 1997,
p. 37.
Andregg, Michael M., A Symposium on Intelligence Ethics, Intelligence & National Security, Vol. 24, No.
3, June 2009, pp. 366386.
Andress, Mandy, Patch Management Products Move Toward Remediation, Network World, December
11, 2006.
Andrus, Ruth, and Eugene L. Horowitz, The Effect of Nursery School Training: Insecurity Feelings, Child
Development, Vol. 9, No. 2, June 1938, p. 169.
Aning, Kwesi, Are There Emerging West African Criminal Networks? The Case of Ghana, Global Crime,
Vol. 8, No. 3, 2007, pp. 193212.
Apergis, Nicholas, Christina Christou, and James Payne, Political and Institutional Factors in the
Convergence of International Equity Markets: Evidence from the Club Convergence and Clustering
Procedure, Atlantic Economic Journal, Vol. 39, No. 1, March 2011, pp. 718.
Appedices, EIU: Economist Intelligence Unit, October 2002.
Appendices, EIU: Economist Intelligence Unit, December 2002.
Applebaum, Benny, Yuval Ishai, and Eyal Kushilevitz, Cryptography in NC, SIAM Journal on Computing,
Vol. 36, No. 4, October 2006, pp. 845888.
Aravena, Francisco Rojas, Chile: Mudana Poltica e Insero Internacional, 1964-1997. (Portuguese),
Revista Brasileira De Poltica Internacional, December 1997, pp. 4975.
Arce, Daniel, and Christos Kollias, Defence and Peace Economics: The Second Decade in Retrospect,
Defence & Peace Economics, Vol. 21, No. 5/6, December 2010, pp. 395407.
Argon, Kemal, Fortifying Pakistan: The Role of U.s. Internal Security Assistance, International Journal on
World Peace, Vol. 25, No. 3, 2008, pp. 120123.
Argyropoulos, Savvas, Dimitrios Tzovaras, Dimosthenis Ioannidis, Yannis Damousis, Michael G. Strintzis,
Martin Braun, and Serge Boverie, Biometric Template Protection in Multimodal Authentication
Systems Based on Error Correcting Codes, Journal of Computer Security, Vol. 18, No. 1, January
2010, pp. 161185.

333
Arif, Mohammad, and Kamlesh Gupta, Post 26/11 Mumbai Attack: Vulnerability of Indias Internal
Security, IUP Journal of Governance & Public Policy, Vol. 5, No. 1/2, March 2010, pp. 719.
Aris, Stephen, The Shanghai Cooperation Organisation: Tackling the Three Evils. A Regional Response to
Non-traditional Security Challenges or an Anti-Western Bloc?, Europe-Asia Studies, Vol. 61, No. 3,
May 2009, pp. 457482.
Arkin, Wiliam M., JO - Bulletin of the Atomic Scientists, Bulletin of the Atomic Scientists, Vol. 43, No. 3,
April 1987, p. 6.
Arnaldi, John, and James Hudson, Teaching the Applied Ethics of War and Peace, Peace & Change, Vol.
34, No. 4, October 2009, pp. 493503.
Arndt, Melanie, From Nuclear to Human Security? Prerequisites and Motives for the German Chernobyl
Commitment in Belarus, Historical Social Research, Vol. 35, No. 4, December 2010, pp. 289308.
Arnot, Chris D., Martin K. Luckert, and Peter C. Boxall, What Is Tenure Security? Conceptual Implications
for Empirical Analysis, Land Economics, Vol. 87, No. 2, May 2011, pp. 297311.
Aronson, Justin, Lessons for the United Kingdom: How Registration And Prospectus Requirements Have
Inhibited Condo-Hotel Investment Offerings, Syracuse Journal of International Law & Commerce,
Vol. 35, No. 1, Fall 2007, pp. 95121.
Arriagada, Irma, Changes and Inequality in Latin American Families, Journal of Comparative Family
Studies, Vol. 37, No. 4, 2006, pp. 511537.
Arya, Avinash, Huey-Lian Sun, Jui-Chin Chang, and Sharon G. Finney, Stock Option Backing at Comverse
Technology, Vol. 17, Special issue 1, 2011, pp. 5564.
Asabere, Paul K., The Pricing of the Emergent Leasehold (Possessory) Estates of Ghana, Real Estate
Economics, Vol. 32, No. 4, Winter 2004, pp. 673694.
Asfaw, Tihut, and Terre Satterfield, Gender Relations in Local-Level Dispute Settlement in Ethiopias
Zeghie Peninsula, Human Ecology Review, Vol. 17, No. 2, Winter 2010, pp. 160174.
Ashiagbor, Diamond, EU Intervention in Domestic Labour Law, Journal of Common Market Studies, Vol.
47, No. 1, January 2009, pp. 202203.
Ashour, Omar, Security, Oil, and Internal Politics: The Causes of the Russo-Chechen Conflicts, Studies in
Conflict & Terrorism, Vol. 27, No. 2, April 2004, pp. 127143.
Askins, Paul, Marine Corps International Education and Training, DISAM Journal of International Security
Assistance Management, Vol. 26, No. 1, Fall 2003, pp. 119123.
Asparuk, Cumhur, Air Power--The Turkish Vision, Military Technology, Vol. 27, No. 10, October 2003, pp.
3541.
Aspin, Les, Unilateral Moves for Stability, Bulletin of the Atomic Scientists, Vol. 43, No. 10, December
1987, pp. 1215.
Association of Records Managers & Administrators, FOIA Celebrates 45 Years; Backlogs Persist,
Information Management Journal, Vol. 45, No. 5, October 2011, p. 18.
Atchley, Robert C., Retirement Income Security: Past, Present, and Future, Generations, Vol. 21, No. 2,
Summer 1997, p. 9.
Atsumi, Masahiro, Japanese Energy Security Revisited, Asia-Pacific Review, Vol. 14, No. 1, May 2007, pp.
2843.
Augenbraun, Barry S., Liability of Accountants Under the Federal Securities Laws, CPA Journal, Vol. 64,
No. 12, December 1994, p. 34.
Autor, David H., and Mark G. Duggan, The Growth in the Social Security Disability Rolls: A Fiscal Crisis
Unfolding, Journal of Economic Perspectives, Vol. 20, No. 3, Summer 2006, pp. 7196.
Avizienis, Algirdas, Jean-Claude Laprie, Brian Randell, and Carl Landwehr, Basic Concepts and Taxonomy
of Dependable Secure Computing, Process for Developing a Common Vocabulary in the Information
Security Area, Vol. 23, No. 1, June 2007, pp. 1051.
Axford, Barrie, Editorial: Borders and Networks in the Global System, Globalisations, Vol. 4, No. 3, 2007,
pp. 321326.
Aydin, Mustafa, Securitisation of History and Geography: Understanding of Security in Turkey, Journal of
Southeast European & Black Sea Studies, Vol. 3, No. 2, May 2003, pp. 163184.

334
Ayoob, Mohammed, Third World Perspectives on Humanitarian Intervention and International
Administration, Global Governance, Vol. 10, No. 1, March 2004, pp. 99118.
Aysa-Lastra, Mara, Liquid Fear, Sociological Inquiry, Vol. 81, No. 1, February 2011, pp. 134136.
Azarbaijani-Moghaddam, Sippi, On Living with Negative Peace and a Half-Built State: Gender and Human
Rights, International Peacekeeping (13533312), Vol. 14, No. 1, March 2007, pp. 127142.
Aziz, Benjamin, Simon N. Foley, John Herbert, and Garret Swart, Configuring Storage-area Networks Using
Mandatory Security, Journal of Computer Security, Vol. 17, No. 2, March 2009, pp. 191210.
Aziz, Sahar, The Laws on Providing Material Support to Terrorist Organisations: The Erosion of
Constitutional Rights or a Legitimate Tool for Preventing Terrorism?, Texas Journal on Civil Liberties
& Civil Rights, Vol. 9, No. 1, Winter 2003, pp. 4592.
Babich, Kristina, and Daniel Bland, Policy Change and the Politics of Ideas: The Emergence of the
Canada/Quebec Pension Plans, Canadian Review of Sociology, Vol. 46, No. 3, 2009, pp. 253271.
Backes, Michael, and Birgit Pfitzmann, Computational Probabilistic Non-interference, International
Journal of Information Security, Vol. 3, No. 1, October 2004, pp. 4260.
Backes, Michael, Birgit Pfitzmann, and Andre Scedrov, Key-dependent Message Security Under Active
Attacks BRSIM/UC-soundness of DolevYao-style Encryption with Key Cycles, Journal of Computer
Security, Vol. 16, No. 5, October 2008, pp. 497530.
Backes, Michael, Birgit Pfitzmann, and Michael Waidner, Reactively Secure Signature Schemes,
International Journal of Information Security, Vol. 4, No. 4, October 2005, pp. 242252.
Backhouse, James, Carol W. Hsu, and Leiser Silva, Circuits of Power in Creating De Jure Standards:
Shaping an International Information Systems Security Standard, MIS Quarterly, Vol. 30, 2006, pp.
413438.
Bckstrm, Martin, and Bjarne M. Holmes, Measuring Attachment Security Directly: A Suggested
Extension to the Two-Factor Adult Attachment Construct, Individual Differences Research, Vol. 5,
No. 2, June 2007, pp. 124149.
Bagnulo, Ryan, How Technology Will Make or Break Banks Integrating Mission-critical Processes as a
Result of a Merger, Journal of Securities Operations & Custody, Vol. 2, No. 2, July 2009, pp. 106119.
Bagoyoko, Niagal, and Marie V. Gibert, The Linkage Between Security, Governance and Development:
The European Union in Africa, Journal of Development Studies, Vol. 45, No. 5, May 2009, pp. 789
814.
Bahgat, Gawdat, Energy Security: The Caspian Sea, Minerals & Energy, Vol. 20, No. 2, June 2005, pp. 3
15.
Bailes, Alyson J. K., The World in the Last 20 Years, Tendencies and Evolution, Anuario Internacional
CIDOB, 2009, pp. 117.
Bailey, Norman A., Neglecting Our Neighbours, National Interest, No. 80, Summer 2005, p. 102.
Baird, Stephen L., Resources in Technology: From Sea to Shining Sea, Technology Teacher, Vol. 63, No. 1,
2003, p. 19.
Baker, Biff, The United States and Mexico Enhanced Military Cooperation, DISAM Journal of
International Security Assistance Management, Vol. 29, No. 3, Summer 2007, pp. 2635.
Balakrishnan, Ravi, Stephan Danninger, Selim Elekdag, and Irina Tytell, The Transmission of Financial
Stress from Advanced to Emerging Economies, Emerging Markets Finance & Trade, Vol. 47, 2011,
pp. 4068.
Bali, Geetanjali, and Frank S. Skinner, The Original Maturity of Corporate Bonds: The Influence of Credit
Rating, Asset Maturity, Security, and Macroeconomic Conditions, Financial Review, Vol. 41, No. 2,
May 2006, pp. 187203.
Balkus, Richard, and Susan Wilschke, Annual Wage Trends for Supplemental Security Income Recipients,
Social Security Bulletin, Vol. 65, No. 2, June 2003, p. 49.
Balkus, RichardSears, Simplifying the Supplemental Security Income Program: Options for Eliminating the
Counting of In-kind Support and Maintenance, Social Security Bulletin, Vol. 68, No. 4, December
2008, p. 15.
Ballaeva, E. A., Gender-Related Aspects of Security, Anthropology & Archaeology of Eurasia, Vol. 45, No.
4, Spring 2007, pp. 5666.

335
Balmaceda, Margarita Mercedes, Twos Company, Threes a Crowd: The Role of Central Europe in
Ukrainian Security, East European Quarterly, Vol. 32, No. 3, 1998, p. 335.
Balzer, Harley, Introduction: Non-traditional Approaches to Russian Politics and Security,
Demokratizatsiya, Vol. 16, No. 3, Summer 2008, pp. 212228.
Balzer, Marjorie Mandelstam, Editors Introduction, Anthropology & Archaeology of Eurasia, Vol. 45, No.
4, Spring 2007, pp. 38.
Barak, Oren, and Gabriel (Gabi) Sheffer, The Study of Civil--Military Relations in Israel: A New
Perspective, Israel Studies, Vol. 12, No. 1, Spring 2007, pp. 127.
Barata, Francese, Retos Pendientes En El Periodismo De Nota Roja. (Spanish), Chasqui (13901079), No.
110, June 2010, pp. 5461.
Barber, Judge Tom, Criminal Enforcement of Floridas Securities Laws, Florida Bar Journal, Vol. 79, No. 2,
February 2005, pp. 819.
Barnas, Mary Valaik, and Leslee Pollina, Life-span Attachment: Relations Between Attachment and
Socioemotional Functioning in Adult Women, Genetic, Social & General Psychology Monographs,
Vol. 117, No. 2, May 1991, p. 177.
Barnes, Annmarie, Displacing Danger: Managing Crime Through Deportation, Journal of International
Migration & Integration, Vol. 10, No. 4, October 2009, pp. 431445.
Barnet, Richard J., JO - Nation, Nation, Vol. 241, No. 21, December 21, 1985, p. 688.
Barnett, Michael N., Regional Security After the Gulf War, Political Science Quarterly, Vol. 111, No. 4,
Winter 1996, p. 597.
Barnett, Michael N., and Martha Finnemore, The Politics, Power, and Pathologies of International
Organisations, International Organisation, Vol. 53, No. 4, 1999, pp. 699732.
Barnutz, Sebastian, The EUs Logic of Security: Politics Through Institutionalised Discourses, European
Security, Vol. 19, No. 3, 2010, pp. 377394.
Barringer, Terry A., Commonwealth Bookshelf, Round Table, Vol. 96, No. 388, February 2007, pp. 9598.
Barron, Jacob, Oregon Passes New Data Security Law, Business Credit, Vol. 109, No. 9, October 2007, p.
19.
Barros, Andrew, Disarmament as a Weapon: Anglo-French Relations and the Problems of Enforcing
German Disarmament, 191928, Journal of Strategic Studies, Vol. 29, No. 2, April 2006, pp. 301
321.
Bar-Tal, Daniel, and Dan Jacobson, A Psychological Perspective on Security, Applied Psychology: An
International Review, Vol. 47, No. 1, January 1998, pp. 5971.
Barteisman, Eric, Stefano Scarpetta, and Fabiano Schivardi, Comparative Analysis of Firm Demographics
and Survival: Evidence from Micro-level Sources in OECD Countries, Industrial & Corporate Change,
Vol. 14, No. 3, June 2005, pp. 365391.
Bartmann, Barry, Meeting the Needs of Microstate Security, Round Table, Vol. 91, No. 365, July 2002, p.
361.
Bartkova, udmila, Portfolio Investments in the Selected European Transition Economies, Journal of
Advanced Studies in Finance, Vol. 1, No. 3, July 2011, pp. 417.
Barzun, Charles L., Politics or Principle? Zechariah Chafee and the Social Interest in Free Speech, Brigham
Young University Law Review, Vol. 2007, No. 2, March 2007, pp. 259325.
Baskerville, Richard L., and Jan Stage, Controlling Prototype Development Through Risk Analysis, MIS
Quarterly, Vol. 20, No. 4, December 1996, pp. 481504.
Basu, Anustup, The State of Security and Warfare of Demons, Critical Quarterly, Vol. 45, No. 1/2,
Summer 2003, p. 11.
Batory, Agnes, The Politics of EU Accession: Ideology, Party Strategy and the European Question in
Hungary, Journal of Common Market Studies, Vol. 47, No. 1, January 2009, p. 210.
Bauman, W. Scott, Investment Research Analysis in an Emerging Market: Singapore and Malaysia,
Financial Analysts Journal, Vol. 45, No. 6, November 1989, pp. 6067.
Bayley, David H., The Morphing of Peacekeeping: Competing Approaches to Public Safety, International
Peacekeeping (13533312), Vol. 18, No. 1, February 2011, pp. 5263.

336
Baylis, John, The Continuing Relevance of Strategic Studies in the Post-Cold War Era, Defence Studies,
Vol. 1, No. 2, Summer 2001, p. 1.
Bayoumi, Tamim, and Andrew Swiston, The Ties That Bind: Measuring International Bond Spillovers Using
Inflation-Indexed Bond Yields, IMF Staff Papers, Vol. 57, No. 2, June 2010, pp. 366406.
Beaver, William H., The Time Series Behaviour of Earnings, Journal of Accounting Research, Vol. 8, No. 3,
Supplement 1970, pp. 6299.
Beck, Lisa, and Elizabeth A. Madresh, Romantic Partners and Four-Legged Friends: An Extension of
Attachment Theory to Relationships with Pets, Anthrozoos, Vol. 21, No. 1, March 2008, pp. 4356.
Becker, Brandon, Paul R. Eckert, Bruce H. Newman, Todd E. Wiench, and Christie Farris berg, NASD
Amends Proposed Debt Mark-Up Policy to Exclude Certain Transactions with Institutional
Customers, Banking & Financial Services Policy Report, Vol. 26, No. 2, February 2007, pp. 38.
Beggan, D., and R. Indurthy, Explaining Why the Good Friday Accord Is Likely to Bring a Lasting Peace in
Northern Ireland, Peace & Change, Vol. 27, No. 3, July 2002, pp. 331356.
Begoyan, Anush, National Concepts of Security and the Problem Of Integration in Transcaucasia, Iran &
The Caucasus, Vol. 10, No. 2, December 2006, pp. 287301.
Begoyan, Anush, United States Policy in the South Caucasus: Securitisation of the BakuCeyhan Project,
Iran & The Caucasus, Vol. 8, No. 1, April 2004, pp. 141155.
Behr, Christopher, Marcos A. Pedlowski, Eduardo Fuentes, Subhes C. Bhattacharyya, Jacob J. Burke, and Ira
Sohn, Book Reviews, Natural Resources Forum, Vol. 28, No. 3, 2004, pp. 239247.
Beier, J. Marshall, and Samantha L. Arnold, Becoming Undisciplined: Toward the Supradisciplinary Study
of Security, International Studies Review, Vol. 7, No. 1, March 2005, pp. 4161.
Beimel, Amos, Mike Burmester, Yvo Desmedt, and Eyal Kushilevitz, Computing Functions of a Shared
Secret, SIAM Journal on Discrete Mathematics, Vol. 13, No. 3, 2000, pp. 324345.
Bland, Daniel, Ideas and Institutional Change in Social Security: Conversion, Layering, and Policy Drift,
Social Science Quarterly (Blackwell Publishing Limited), Vol. 88, No. 1, March 2007, pp. 2038.
Bland, Daniel, Insecurity and Politics: A Framework, Canadian Journal of Sociology, Vol. 32, No. 3,
Summer 2007, pp. 317340.
Bland, Daniel, Insecurity, Citizenship, and Globalisation: The Multiple Faces of State Protection,
Sociological Theory, Vol. 23, No. 1, March 2005, pp. 2541.
Bell, Colleen, Subject to Exception: Security Certificates, National Security and Canadas Role in the War
on Terror., Canadian Journal of Law & Society/Revue Canadienne Droit Et Socit, Vol. 21, No. 1,
June 2006, pp. 6383.
Bell, Rachel, Estate of Pew V. Cardarelli, New York Law School Law Review, Vol. 54, No. 1, July 2009, pp.
383393.
Bellamy, Alex J., and Matt McDonald, Securing International Society: Towards an English School Discourse
of Security, Australian Journal of Political Science, Vol. 39, No. 2, July 2004, pp. 307330.
Bellamy, Alex, and Matt Mcdonald, The Insecurities of an English School Gatekeeper: A Reply to
Makinda, Australian Journal of Political Science, Vol. 40, No. 3, 2005, pp. 411417.
Bellow, J. G., R. F. Hudson, and P. K. R. Nair, Adoption Potential of Fruit-tree-based Agroforestry on Small
Farms in the Subtropical Highlands, Agroforestry Systems, Vol. 73, No. 1, April 2008, pp. 2336.
Bellows, Anne C., and Michael W. Hamm, International Effects on and Inspiration for Community Food
Security Policies and Practices in the USA, Critical Public Health, Vol. 13, No. 2, June 2003, p. 107.
Belsky, Jay, and R. M. Pasco Fearon, Early Attachment Security, Subsequent Maternal Sensitivity, and
Later Child Development: Does Continuity in Development Depend Upon Continuity of Caregiving?,
Attachment & Human Development, Vol. 4, No. 3, December 2002, pp. 361387.
Belton, Kristy A., and Waltraud Q. Morales, The Multi-Faceted Debate on Human Migration, Latin
Americanist, Vol. 53, No. 1, March 2009, pp. 187210.
Belyi, Andrei V., New Dimensions of Energy Security of the Enlarging Eu and Their Impact on Relations
with Russia, Journal of European Integration, Vol. 25, No. 4, December 2003, pp. 351369.
Benbow, Tim, Talking Bout Our Generation? Assessing the Concept of Fourth-Generation Warfare,
Comparative Strategy, Vol. 27, No. 2, April 2008, pp. 148163.

337
Bengtson, Jesper, Karthikeyan Bhargavan, Cdric Fournet, Andrew D. Gordon, and Sergio Maffeis,
Refinement Types for Secure Implementations, ACM Transactions on Programming Languages &
Systems, Vol. 33, No. 2, March 2011, pp. 88:45.
Bengtsson, Rikard, Constructing Interfaces: The Neighbourhood Discourse in EU External Policy, Journal
of European Integration, Vol. 30, No. 5, December 2008, pp. 597616.
Bennett, John T., Under Secretary Building United States Public Diplomacy Team, DISAM Journal of
International Security Assistance Management, Vol. 31, No. 3, November 2009, pp. 9192.
Benzoni, Luca, and Robert Goldstein, Lifecycle Investment Decisions and Labour Income Risk, FRBSF
Economic Letter, Vol. 2010, No. 21, July 9, 2010, pp. 14.
Berg, Peter, and Ann C. Frost, Dignity at Work for Low Wage, Low Skill Service Workers, Relations
Industrielles / Industrial Relations, Vol. 60, No. 4, Fall 2005, pp. 657682.
Bergoffen, Debra B., From Genocide to Justice: Womens Bodies as a Legal Writing Pad, Feminist Studies,
April 15, 2006.
Bernard Jr., Prosper, Canada and Human Security: From the Axworthy Doctrine to Middle Power
Internationalism, American Review of Canadian Studies, Vol. 36, No. 2, Summer 2006, pp. 233261.
Bernardi, Laura, Andreas Klrner, and Holger von der Lippe, Job Insecurity and the Timing of Parenthood:
A Comparison Between Eastern and Western Germany, European Journal of Population, Vol. 24, No.
3, 2008, pp. 287313.
Berninger, Ina, Bernd Wei, and Michael Wagner, On the Links Between Employment, Partnership
Quality, and the Intention to Have a First Child: The Case of West Germany, Demographic Research,
Vol. 24, June 2011, pp. 579610.
Bernstein, Paul I., John P. Caves Jr., and John F. Reichart, Shaping the Nuclear Landscape, JFQ: Joint Force
Quarterly, No. 46, Summer 2007, pp. 104110.
Bertaut, Carol C.Pounder, The Financial Crisis and U.S. Cross-Border Financial Flows, Federal Reserve
Bulletin, 2009, p. A147.
Berter, Carina, and Anna-Christina Ek, Quality of Life of Adults with Acute Leukaemia, Journal of
Advanced Nursing, Vol. 18, No. 9, 1993, pp. 13461353.
Bertine, Herbert, Igor Faynberg, and Hui-Lan Lu, Overview of Data and Telecommunications Security
Standardisation Efforts in ISO, IEC, ITU, and IETF, Bell Labs Technical Journal, Vol. 8, No. 4, Winter
2004, pp. 203229.
Bertomeu, Jeremy, Anne Beyer, and Ronald A. Dye, Capital Structure, Cost of Capital, and Voluntary
Disclosures, Accounting Review, Vol. 86, No. 3, April 2011, pp. 857886.
Besteman, Catherine, Beware of Those Bearing Gifts. An Anthropologists View of AFRICOM,
Anthropology Today, Vol. 24, No. 5, October 2008, p. 20.
Beswick, Danielle, The Challenge of Warlordism to Post-Conflict State-Building: The Case of Laurent
Nkunda in Eastern Congo, Round Table, Vol. 98, No. 402, June 2009, p. 333.
Betancourt, Theresa S., Mary K. S. Fawzi, Claude Bruderlein, Chris Desmond, and Jim Y. Kim, Children
Affected by HIV/AIDS: SAFE, a Model for Promoting Their Security, Health, and Development,
Psychology, Health & Medicine, Vol. 15, No. 3, May 2010, pp. 243265.
Bhagwan-Rolls, Sharon, Strengthening Womens Media Networks for Peace, Media Development, Vol.
57, No. 1, February 2010, pp. 1316.
Bhargavan, Karthikeyan, Cdric Fournet, Andrew D. Gordon, and Stephen Tse, Verified Interoperable
Implementations of Security Protocols, ACM Transactions on Programming Languages & Systems,
Vol. 31, No. 1, January 2009, pp. 5:15:61.
Bialas, Andrzej, Common Criteria Related Security Design Patterns--Validation on the Intelligent Sensor
Example Designed for Mine Environment, Sensors (14248220), Vol. 10, No. 5, May 2010, pp. 4456
4496.
Bialas, Andrzej, Intelligent Sensors Security, Sensors (14248220), Vol. 10, No. 1, January 2010, pp. 822
859.
Bibi, Sami, and Jean-Yves Duclos, A Comparison of the Poverty Impact of Transfers, Taxes and Market
Income Across Five OECD Countries, Bulletin of Economic Research, Vol. 62, No. 4, October 2010, pp.
387406.

338
Bieber, P., J. Cazin, P. Girard, J.-L. Lanet, V. Wiels, and G. Zanon, Checking Secure Interactions of Smart
Card Applets: Extended Version, Journal of Computer Security, Vol. 10, No. 4, December 2002, p.
369.
Biederman, David, On Shaky Ground, Journal of Commerce (15307557), Vol. 6, No. 39, 2005, pp. 2224.
Biederman, David, Waterway Woes: Katrinas Destructive Wrath Demonstrated Weakness of System,
Florida Shipper, Vol. 31, No. 37, 2006, pp. 1112.
Biederman, David, Weakened Waterways, Gulf Shipper, Vol. 17, No. 33, 2006, pp. 6061.
Bigo, Didier, Internal and External Aspects of Security, European Security, Vol. 15, No. 4, December 2006,
pp. 385404.
Bigo, Didier, Sergio Carrera, Elspeth Guild, and R.B.J. Walker, The Changing Landscape of European
Liberty and Security: The Mid-term Report of the Challenge Project, International Social Science
Journal, Vol. 59, No. 192, June 2008, pp. 283308.
Bilgin, Pinar, A Return to Civilisational Geopolitics in the Mediterranean? Changing Geopolitical Images
of the European Union and Turkey in the Post-Cold War Era, Geopolitics, Vol. 9, No. 2, Summer
2004, pp. 269291.
Bilgin, Pinar, Individual and Societal Dimensions of Security, International Studies Review, Vol. 5, No. 2,
Summer 2003, pp. 203222.
Bilgin, Pnar, Making Turkeys Transformation Possible: Claiming Security- Speak - Not Desecuritisation!,
Journal of Southeast European & Black Sea Studies, Vol. 7, No. 4, December 2007, pp. 555571.
Bilgin, Pinar, Turkeys Changing Security Discourses: The Challenge of Globalisation, European Journal of
Political Research, Vol. 44, No. 1, January 2005, pp. 175201.
Bilgin, PinarMorton, Historicising Representations of Failed States: Beyond the Cold-war Annexation of
the Social Sciences?, Third World Quarterly, Vol. 23, No. 1, February 2002, p. 55.
Binuomoyo, Olayinka K., The Nigerian Pension System: Reform and Expectations, Pensions: An
International Journal, Vol. 15, No. 1, February 2010, pp. 310.
Bishop, Keith Paul, Californias Blue Sky Law Problems for Foreign Issues and Foreign Issuers, Insights:
The Corporate & Securities Law Advisor, Vol. 23, No. 7, July 2009, pp. 2839.
Bishop, Keith Paul, Mike Neue, Jennifer Portnoff, and Todd Lesko, Securities Law Issues Arising in Chapter
11 Plans, Insights: The Corporate & Securities Law Advisor, Vol. 16, No. 1, January 2002, p. 19.
Bisley, Nick, The Japan-Australia Security Declaration and the Changing Regional Security Setting: Wheels,
Webs and Beyond?, Australian Journal of International Affairs, Vol. 62, No. 1, March 2008, pp. 38
52.
Blackwell, Ron, and Bill Patterson, Knocking Down the Boardroom Door, New Labour Forum (Routledge),
Vol. 12, No. 2, Summer 2003, pp. 4960.
Blackwell, Terry L.Autry, Ethical Issues in Disclosure of Test Data, Rehabilitation Counseling Bulletin, Vol.
44, No. 3, Spring 2001, p. 161.
Blake, Ian F., and Vladimir Kolesnikov, One-round Secure Comparison of Integers, Journal of
Mathematical Cryptology, Vol. 3, No. 1, April 2009, pp. 3768.
Blaney Jr., Gerald, Alice Hills, Janine Natalya Clark, Georgina Sinclair, T. O. Smith, Jamie Khalil, and
Christoph Bluth, Book Reviews, Civil Wars, Vol. 9, No. 3, 2007, pp. 297312.
Blank, Stephen J., US Interests in Central Asia and the Challenges to Them, Military Technology, Vol. 31,
No. 1, January 2007, pp. 2430.
Blank, Stephen, 8.5 Pipelines as Strategic Investments, Russian Foreign Energy Policy: An Analytical
Compendium (Volume 1), Blue Ibex Ltd., 2007, pp. 533574.
Blank, Stephen, The Mediterranean and Its Security Agenda, Mediterranean Quarterly, Vol. 11, No. 1,
Winter 2000, p. 24.
Blank, Stephen, U.S. Interests in Central Asia and Their Challenges, Demokratizatsiya, Vol. 15, No. 3,
Summer 2007, pp. 312334.
Blank, Yoshai, Legalizing the Barrier: The Legality and Materiality of the Israel/Palestine Separation
Barrier, Texas International Law Journal, Vol. 46, No. 2, Spring 2011, pp. 309343.
Blaylock, James R., and W. Noel Blisard, Food Security and Health Status in the United States, Applied
Economics, Vol. 27, No. 10, October 1995, p. 961.

339
Bleiker, Roland, Art After 9/11, Alternatives: Global, Local, Political, Vol. 31, No. 1, March 2006, pp. 77
99.
Bletzacker, Kandace M., David H. Holben, and JR. Holcomb, Poverty and Proximity to Food Assistance
Programs Are Inversely Related to Community Food Security in an Appalachian Ohio Region, Journal
of Hunger & Environmental Nutrition, Vol. 4, No. 2, April 2009, pp. 172184.
Blight, James G.Weiss, Must the Grass Still Suffer? Some Thoughts on Third World Conflicts After the Cold
War, Third World Quarterly, Vol. 13, No. 2, June 1992, p. 229.
Blumenthal, Dan, Red Alert, Foreign Policy, June 2010.
Bodie, Zvi, Common Stocks as a Hedge Against Inflation, Journal of Finance, Vol. 31, No. 2, May 1976, pp.
459470.
Boehm, Steven B., Cynthia M. Krus, Owen J. Pinkerton, and Carol W. Khalil, Beating the Market by Staying
Out, Investment Lawyer, Vol. 16, No. 4, April 2009, pp. 1520.
Boin, Arjen, Magnus Ekengren, and Mark Rhinard, Protecting the Union: Analysing an Emerging Policy
Space, Journal of European Integration, Vol. 28, No. 5, December 2006, pp. 405421.
Bolton, John R., United States Policy on United Nations Peacekeeping, World Affairs, Vol. 163, No. 3,
Winter 2001, p. 129.
Bonner, Michelle D., Applying the Concept of Human Security in Latin America, Canadian Journal of
Latin American & Caribbean Studies, Vol. 33, No. 65, May 2008, pp. 731.
Bonner, Michelle D., Critical Debates Law and Injustice in Latin America, Latin American Politics &
Society, Vol. 50, No. 1, Spring 2008, p. 169.
Bononi, Luciano, and Carlo Tacconi, Intrusion Detection for Secure Clustering and Routing in Mobile
Multi-hop Wireless Networks, International Journal of Information Security, Vol. 6, No. 6, October
2007, pp. 379392.
Booncharoen, Charlotte, The Data Security Issue, Mortgage Banking, Vol. 66, No. 7, April 2006, pp. 38
42.
Borgulya, Agnes, and Judit Hahn, Work Related Values and Attitudes in Central and Eastern Europe,
Journal for East European Management Studies, Vol. 13, No. 3, 2008, pp. 216238.
Borzutzky, Silvia, Social Security and Health Policies in Latin America: The Changing Roles of the State and
the Private Sector., Latin American Studies Association, April 1993.
Boutros-Ghali, Boutros, and Carolyn Reynolds, Setting a New Agenda for the United Nations, Journal of
International Affairs, Vol. 46, No. 2, Winter 1993, p. 289.
Boutros-Ghali, BoutrosReynolds, Setting a New Agenda for the United Nations, Journal of International
Affairs, Vol. 46, No. 2, Winter 1993, p. 289.
Bovbjerg, Barbara D., Federal Thrift Savings Plan: Customer Service Practices Adopted by Private Sector
Plan Managers Should Be Considered: GAO-05-38, U.S. Government Accountability Office, January
18, 2005.
Bowles, Paul, and Fiona MacPhail, Introduction to the Special Issue on Pathways from Casual Work to
Economic Security: Canadian and International Perspectives, Social Indicators Research, Vol. 88, No.
1, 2008, pp. 113.
Boyd, Colin, and Wenbo Mao, Preface to the Special Issue on ISC 2003, International Journal of
Information Security, Vol. 4, No. 4, October 2005, p. 227.
Braithwaite, Valerie, and Russell Blamey, Consensus, Stability and Meaning in Abstract Social Values,
Australian Journal of Political Science, Vol. 33, No. 3, November 1998, p. 363.
Bram, Jason, and James Orr, Can New York City Bank on Wall Street? (cover Story), Current Issues in
Economics & Finance, Vol. 5, No. 11, July 1999, p. 1.
Brant, David, and Royce Griffin, Functional Regulation in the 21st Century, Journal of Investment
Compliance (Euromoney), Vol. 3, No. 4, Spring 2003, p. 44.
Bratt, Duane, Blue Condoms: The Use of International Peacekeepers in the Fight Against Aids,
International Peacekeeping (13533312), Vol. 9, No. 3, Fall 2002, pp. 6786.
Breeding, Marshall, Wireless Network Configuration and Security Strategies, Library Technology Reports,
Vol. 41, No. 5, October 2005, p. 21.

340
Breen, William, and James Savage, Portofolio Distributions and Tests of Security Selection Models,
Journal of Finance, Vol. 23, No. 5, December 1968, pp. 805819.
Bremer, Ronald, and Zhaohui Zhang, Extensions of the Standardised Cross-Sectional Approach to Short-
Horizon Event Studies, Journal of Financial Research, Vol. 30, No. 4, Winter 2007, pp. 495513.
Brenner, Michael R., and Musa R. Unmehopa, Service-oriented Architecture and Web Services
Penetration in Next-generation Networks, Bell Labs Technical Journal, Vol. 12, No. 2, Summer 2007,
pp. 147159.
Breuilly, John, Nations Matter: Culture, History, and the Cosmopolitan Dream, British Journal of
Sociology, Vol. 59, No. 1, March 2008, pp. 165167.
BRFSS coordinators, Self-Reported Concern About Food Security--Eight States, 1996-1998, MMWR:
Morbidity & Mortality Weekly Report, Vol. 49, No. 41, October 20, 2000, p. 933.
Brick, Ivan E., and Lawrence Fisher, Effects of Classifying Equity or Debt on the Value of the Firm Under
Tax Asymmetry, Journal of Financial & Quantitative Analysis, Vol. 22, No. 4, December 1987, pp.
383399.
Bridge, Michael, Security Financial Collateral Transfers and Prime Broker Insolvency, Law & Financial
Markets Review, Vol. 4, No. 2, March 2010, pp. 189193.
Bridgers, Heather E., Commercial Eviction and Landlords Liens, Real Estate Finance (Aspen Publishers
Inc.), Vol. 26, No. 1, June 2009, pp. 1325.
Bringel Filho, Jos, and Herv Martin, Towards Awareness of Privacy and Quality of Context in Context-
Based Access Control for Ubiquitous Applications, Journal of Digital Information Management, Vol.
7, No. 4, 2009, pp. 219226.
Brock, Gillian, Egalitarianism, Ideals and Cosmopolitan Justice, Philosophical Forum, Vol. 36, No. 1, Spring
2005, pp. 130.
Broegaard, Rikke J., Land Tenure Insecurity and Inequality in Nicaragua, Development & Change, Vol. 36,
No. 5, 2005, pp. 845864.
Bromberg, Alan R., Commodities Law and Securities Law: Overlaps and Preemptions, Journal of
Corporation Law, Vol. 1, No. 2, Winter 1976, p. 217.
Bromberg, Alan R., Curing Securities Violations: Rescission offers and other techniques, Journal of
Corporation Law, Vol. 1, No. 1, Fall 1975, p. 1.
Brostoff, Steven, ACLI Will Focus On Enacting Its Retirement Security Agenda, National Underwriter / Life
& Health Financial Services, Vol. 103, No. 47, November 22, 1999, p. 3.
Brower, Nate, Raising Capital: Overview of Securities Laws, Enterprise/Salt Lake City, Vol. 40, No. 50, July
11, 2011, p. 7.
Brown, Jeffrey R., Financial Education and Annuities, OECD Journal: General Papers, Vol. 8, No. 3,
February 2009, pp. 173215.
Brown, Kay E., Complex System Benefits Millions, but Additional Efforts Could Address Potential
Inefficiency and Overlap Among Smaller Programs, GAO Reports, April 15, 2010, pp. 173.
Brown, Stephen J., and Mark I. Weinstein, A New Approach to Testing Asset Pricing Models: The Bilinear
Paradigm, Journal of Finance, Vol. 38, No. 3, June 1983, pp. 711743.
Browning, Christopher S., The Internal/External Security Paradox and the Reconstruction of Boundaries in
the Baltic: The Case of Kaliningrad, Alternatives: Global, Local, Political, Vol. 28, No. 5, December
2003, p. 545.
Broxmeyer, Eric, The Problems of Security and Freedom: Procedural Due Process and The Designation of
Foreign Terrorist Organisations Under the Anti-Terrorism and Effective Death Penalty Act, Berkeley
Journal of International Law, Vol. 22, No. 3, 2004, pp. 439488.
Bruce, Ellen A., Rethinking Retirement Policy in Massachusetts, New England Journal of Public Policy,
Vol. 22, No. 1/2, Special Issue: Women 2007, pp. 99112.
Brck, Tilman, An Economic Analysis of Security Policies, Defence & Peace Economics, Vol. 16, No. 5,
October 2005, pp. 375389.
Bruderlein, Claude, and Pierre Gassmann, Managing Security Risks in Hazardous Missions: The Challenges
of Securing United Nations Access to Vulnerable Groups, Harvard Human Rights Journal, Vol. 19,
Spring 2006, pp. 6393.

341
Bryce, Ciaran, and Winfried Kuhnhauser, CWASAR: A European Infrastructure for Secure Electronic
Commerce, Journal of Computer Security, Vol. 5, No. 3, 1997, p. 225.
Brzezinski, Zbigniew, Selective Global Commiment, Foreign Affairs, Vol. 70, No. 4, Fall 1991, p. 1.
Buchan, Bruce, Dying for Securitya, Melbourne University Publishing, March 2011.
Buchanan, Paul G., Lilliputian in Fluid Times: New Zealand Foreign Policy After the Cold War, Political
Science Quarterly, Vol. 125, No. 2, Summer 2010, pp. 255279.
Buchholz, Gregory J., Alberto Coustasse, Patricio Silva, and Peter Hilsenrath, The Chilean Pension System
at 25 Years: The Evolution of a Revolution, Journal of Economic Issues (Association for Evolutionary
Economics), Vol. 42, No. 3, 2008, pp. 633647.
Buchsbaum, S. J., Networked Computer Security, McMurry Inc., December 15, 1991.
Bugliesi, Michele, and Sabina Rossi, Noninterference Proof Techniques for the Analysis of Cryptographic
Protocols, Journal of Computer Security, Vol. 13, No. 1, March 2005, pp. 87113.
Bullitt, Georgia, Thomas Harman, Christopher Menconi, Bill Zimmerman, and Christopher Jackson, Legal
Considerations for Registered Investment Companies Investing in Derivatives: Part 1, Investment
Lawyer, Vol. 17, No. 8, 2010, pp. 1227.
Burant, Stephen R., After NATO Enlargement, Problems of Post-Communism, Vol. 48, No. 2, April 2001,
p. 25.
Burgess, J. Peter, and Shahrbanou Tadjbakhsh, The Human Security Tale of Two Europes, Global Society:
Journal of Interdisciplinary International Relations, Vol. 24, No. 4, October 2010, pp. 447465.
Burgoon, Brian, Janice Fine, Wade Jacoby, and Daniel Tichenor, Immigration and the Transformation of
American Unionism, International Migration Review, Vol. 44, No. 4, Winter 2010, pp. 933973.
Burke, Redmond P., Anthony F. Rossi, Bryan R. Wilner, Robert L. Hannan, Jennifer A. Zabinsky, and Jeffrey
A. White, Transforming Patient and Family Access to Medical Information: Utilisation Patterns of a
Patient-accessible Electronic Health Record, Cardiology in the Young, Vol. 20, No. 5, July 2010, pp.
477484.
Burkhard, Hans-Dieter, Gabriela Lindemann, Peter Starke, Ludwik Czaja, Nicolette De Francesco, Antonella
Santone, and Luca Tesei, Abstract Interpretation and Model Checking for Checking Secure
Information Flow in Concurrent Systems, Fundamenta Informaticae, Vol. 54, No. 2/3, February
2003, p. 195.
Burkhart, Ann M., Third-Party Defences to Mortgages, Brigham Young University Law Review, Vol. 1998,
No. 3, 1998, p. 1003.
Burnley, Clementine Ewokolo, Nathalie Stephenne, and Merc Aguera Cabo, Gender Dimensions in Geo-
spatial Security Research: Disciplinary Confrontations, Journal of International Womens Studies,
Vol. 9, No. 3, May 2008, pp. 4662.
Burrell, Robert, and Michael Handler, The PPSA and Registered Trade Marks: When Bureaucratic Systems
Collide, University of New South Wales Law Journal, Vol. 34, No. 2, 2011, pp. 600627.
Burtescu, Emil, Reliability and Security - Convergence or Divergence, Informatica Economica, Vol. 14, No.
4, December 2010, pp. 6877.
Bush, George W., Remarks in Brussels, Belgium, Superintendent of Documents, February 28, 2005.
Bush, George W., Remarks to the United Nations General Assembly in New York City, Weekly
Compilation of Presidential Documents, Vol. 40, No. 39, 2004, pp. 20752080.
Butler, Eamonn, Hungary and the European Union: The Political Implications of Societal Security
Promotion, Europe-Asia Studies, Vol. 59, No. 7, November 2007, p. 1115.
Butrica, Barbara A., David B. Cashin, and Cori E. Uccello, Projections of Economic Well-Being for Social
Security Beneficiaries in 2022 and 2062, Social Security Bulletin, Vol. 66, No. 4, December 2005, pp.
119.
Butrica, Barbara A., Howard M. Iams, and Karen E. Smith, The Changing Impact of Social Security on
Retirement Income in the United States, Social Security Bulletin, Vol. 65, No. 3, 2003 2003, pp. 113.
Buttigieg, Donna M., Stephen J. Deery, and Roderick D. Iverson, Union Mobilisation: A Consideration of
the Factors Affecting the Willingness of Union Members to Take Industrial Action, British Journal of
Industrial Relations, Vol. 46, No. 2, June 2008, pp. 248267.

342
Buxbaum, Hannah L., Personal Jurisdiction over Foreign Directors in Cross-Border Securities Litigation,
Journal of Corporation Law, Vol. 35, No. 1, Fall 2009, pp. 7195.
Byun, Hyunghae, and Sierk Ybema, Japanese Business in the Dutch Polder: The Experience of Cultural
Differences in Asymmetric Power Relations, Asia Pacific Business Review, Vol. 11, No. 4, December
2005, pp. 535552.
Cabo, Francisco, and Ana Garca-Gonzlez, Public Versus Private Retirement Pensions: A Stackelberg
Differential Game, Infor, Vol. 47, No. 2, May 2009, pp. 151163.
Cabral, Sandro, and Paulo F. Azevedo, The Modes of Provision of Prison Services in a Comparative
Perspective, Brazilian Administration Review (BAR), Vol. 5, No. 1, March 2008, pp. 5369.
Cain, Mead T., Widows, Sons, and Old-Age Security in Rural Maharashtra: A Comment on Vlassoff,
Population Studies, Vol. 45, No. 3, November 1991, pp. 519528.
Cain, Mead, Fertility as an Adjustment to Risk, Population & Development Review, Vol. 9, No. 4,
December 1983, pp. 688702.
Cain, Mead, Risk and Insurance: Perspectives on Fertility and Agrarian Change in India and Bangladesh,
Population & Development Review, Vol. 7, No. 3, 1981, pp. 435474.
Calheiros, Rodrigo, Tiago Ferreto, and Csar A. F. De Rose, Scheduling and Management of Virtual
Resources in Grid Sites: The Site Resource Scheduler, Parallel Processing Letters, Vol. 19, No. 1,
March 2009, pp. 318.
Callaway, Rhonda, and Julie Harrelson-Stephens, Toward a Theory of Terrorism: Human Security as a
Determinant of Terrorism, Studies in Conflict & Terrorism, Vol. 29, No. 7, October 2006, pp. 679
702.
Calloway, Colin G., Restoring the Chain of Friendship: British Policy and the Indians of the Great Lakes,
1783-1815, American Historical Review, Vol. 114, No. 2, April 2009, p. 435.
Calme, James A., and Richard P. Ejzak, A Common SIP Profile for Next-generation Networks, Bell Labs
Technical Journal, Vol. 11, No. 1, Spring 2006, pp. 107122.
Calopreanu, Gheorghe, A View on the Black Sea Regional Cooperation, Revista Academiei Fortelor
Terestre, Vol. 16, No. 4, December 2011, pp. 341347.
Campbell, David, Alan Carruth, Andrew Dickerson, and Francis Green, Job Insecurity and Wages,
Economic Journal, Vol. 117, No. 518, March 2007, pp. 544566.
Candas, Aysen, and Ayse Bugra, Solidarity Among Strangers:A Problem of Coexistence in Turkey,
Constellations: An International Journal of Critical & Democratic Theory, Vol. 17, No. 2, June 2010, pp.
293311.
Candebat, Thibault, and David Gray, Secure Pseudonym Management Using Mediated Identity-based
Encryption, Journal of Computer Security, Vol. 14, No. 3, June 2006, pp. 249267.
Capjon, Hilde, and Ida Torunn Bjrk, Ambulant Children with Spastic Cerebral Palsy and Their Parents
Perceptions and Expectations Prior to Multilevel Surgery, Developmental Neurorehabilitation, Vol.
13, No. 2, April 2010, pp. 8087.
Carbonell-Nicolau, Oriol, The Existence of Perfect Equilibrium in Discontinuous Games, Games
(20734336), Vol. 2, No. 3, 2011, pp. 235256.
Cardullo, Robert J., Death Wish, Childs Whim, Auteurist Will: Boyer and Clments Forbidden Games
Replayed, Literature Film Quarterly, Vol. 39, No. 3, July 2011, pp. 190200.
Carlarne, Cinnamon, Risky Business: The Ups and Downs of Mixing Economics, Security and Climate
Change, Melbourne Journal of International Law, Vol. 10, No. 2, October 2009, pp. 439469.
Carlson, David G., Critique of Money Judgement Part 1, St. Johns Law Review, Vol. 82, No. 4, Fall 2008,
pp. 12911408.
Carlson, Robert, The Changing Economics of DNA Synthesis, Nature Biotechnology, Vol. 27, No. 12,
December 2009, pp. 10911094.
Carroll, Katherine Blue, Tribal Law and Reconciliation in the New Iraq, Middle East Journal, Vol. 65, No. 1,
Winter 2011, pp. 1129.
Carter, Kristie N, Tolotea Lanumata, Kerri Kruse, and Delvina Gorton, What Are the Determinants of Food
Insecurity in New Zealand and Does This Differ for Males and Females?, Australian And New Zealand
Journal Of Public Health, Vol. 34, No. 6, December 2010, pp. 602608.

343
Casas, Ferrn, Cristina Figuer, Mnica Gonzlez, and Sara Malo, The Values Adolescents Aspire to, Their
Well-being and the Values Parents Aspire too for Their Children, Social Indicators Research, Vol. 84,
No. 3, December 2007, pp. 271290.
Casati, Fabio, and Silvana Castano, Enforcing Workflow Authorisation Constraints Using Triggers, Journal
of Computer Security, Vol. 6, No. 4, December 1998, p. 257.
Casey, Brian T., and Thomas D. Sherman, Are Life Settlements a Security?, Journal of Structured Finance,
Vol. 12, No. 4, Winter 2007, pp. 5560.
Cashmore, Judy, and Marina Paxman, Predicting After-care Outcomes: The Importance of felt Security,
Child & Family Social Work, Vol. 11, No. 3, 2006, pp. 232241.
Caton, Gary L., Chiraphol N. Chiyachantana, Choong-Tze Chua, and Jeremy Goh, Earnings Management
Surrounding Seasoned Bond Offerings: Do Managers Mislead Ratings Agencies and the Bond
Market?, Journal of Financial & Quantitative Analysis, Vol. 46, No. 3, June 2011, pp. 687708.
Caudle, Sharon, Homeland Security, Public Performance & Management Review, Vol. 28, No. 3, March
2005, pp. 352375.
Chaitman, Helen Davis, Federal Court Denies Motion by Bank of New York Mellon to Remand Proposed
$8.5 Billion Settlement, Lender Liability Law Report, Vol. 26, No. 1, January 2012, pp. 14.
Chakraborty, Archishman, and Bilge Yilmaz, Adverse Selection and Convertible Bonds, Review of
Economic Studies, Vol. 78, No. 1, January 2011, pp. 148175.
Chalk, Peter, Toward Responsibility in the New World Disorder: Challenges and Lessons of Peace
Operations (Book), Studies in Conflict & Terrorism, Vol. 22, No. 2, April 1999, pp. 171175.
Chalker, James, Energy Security, Managing Risk in a Dynamic Legal and Regulatory Environment, Energy
Journal, Vol. 26, No. 3, July 2005, pp. 117119.
Chambers, Matthew A., Sequel to the Definition of Investment Company: A Riddle Wrapped in a Mystery
Within an Enigma, Investment Lawyer, Vol. 14, No. 7, July 2007, pp. 115.
Chambers, Paul, Edgy Amity Along the Mekong: Thai-Lao Relations in a Transforming Regional
Equilibrium, Asian Journal of Political Science, Vol. 17, No. 1, April 2009, pp. 89118.
Chao-Lin Yang, Chuan-Ming Li, and Tzonelih Hwang, Subliminal Channels in the Identity-based Threshold
Ring Signature, International Journal of Computer Mathematics, Vol. 86, No. 5, May 2009, pp. 753
770.
Chapple, Bryan, Are the Securities Laws Secure?, Chartered Accountants Journal, Vol. 89, No. 7, 2010,
pp. 4849.
Chaudhuri, Tamal Datta, The Indian Corporate Debt Market: Prescription for Revival, ICFAI Journal of
Financial Economics, Vol. 6, No. 2, June 2008, pp. 6169.
Cheeseman, Graeme, Asian-Pacific Security Discourse in the Wake of the Asian Economic Crisis, Pacific
Review, Vol. 12, No. 3, 1999, p. 333.
Cheng, Joseph Y. S., Broadening the Concept of Security in East and Southeast Asia: The Impact of the
Asian Financial Crisis and the September 11 Incident, Journal of Contemporary China, Vol. 15, No.
46, February 2006, pp. 89111.
Cheremisinoff, Nicholas P., Environmental Security: The Need for International Policies, Pollution
Engineering, Vol. 34, No. 5, May 2002, p. 40.
Cheterian, Vicken, Environmental Pressure, Neoliberal Reforms, and Geopolitical Competition in the
Maghreb, Journal of North African Studies, Vol. 15, No. 2, June 2010, pp. 255264.
Ching Yu Ng, Willy Susilo, Yi Mu, and Rei Safavi-Naini, Practical RFID Ownership Transfer Scheme, Journal
of Computer Security, Vol. 19, No. 2, February 2011, pp. 319341.
Choo, Kim-Kwang Raymond, On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000)
Key Exchange / Agreement Protocols, Informatica, Vol. 17, No. 4, December 2006, pp. 467480.
Chou, I-hsin, and Chin-Feng Fan, An Object Oriented Security Knowledge Framework for the Nuclear
Safety System Protect, International Journal of Software Engineering & Knowledge Engineering, Vol.
20, No. 3, May 2010, pp. 347365.
Choucri, Nazli, Migration and Security: Some Key Linkages, Journal of International Affairs, Vol. 56, No. 1,
Fall 2002, p. 97.

344
Chow, Esther Ngan-ling, Gendered Migration, Human Security, and Citizenship: The Case of Factory
Workers in South China, American Sociological Association, 2003, pp. 139.
Choy, Siu-Kai, and Hua Zhang, Trading Costs and Price Discovery, Review of Quantitative Finance &
Accounting, Vol. 34, No. 1, January 2010, pp. 3757.
Christou, GeorgeCroft, European Union Security Governance: Putting the Security Back In, European
Security, Vol. 19, No. 3, 2010, pp. 341359.
Chubin, Shahram, The Eye of the Transitional Storm, Washington Quarterly, Vol. 24, No. 1, Winter 2001,
pp. 155165.
Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, and Sherman S. M. Chow, An Efficient
Signcryption Scheme with Key Privacy and Its Extension to Ring Signcryption, Journal of Computer
Security, Vol. 18, No. 3, April 2010, pp. 451473.
Chung Min Lee, Nuclear Sisyphus: The Myth of Denuclearising North Korea, Australian Journal of
International Affairs, Vol. 61, No. 1, March 2007, pp. 1522.
Chung, Chien-Peng, Chinas Approaches to the Institutionalisation of Regional Multilateralism, Journal of
Contemporary China, Vol. 17, No. 57, November 2008, pp. 747764.
Chunlin, Li, and Li Layuan, Two-layer Optimisation Policy for Improvement of Application Performance
and Resource Utilisation in Grid Environments, International Journal of Systems Science, Vol. 40, No.
6, June 2009, pp. 601613.
Cicek, Ozgur, Review of a Perspective: Subaltern Realism, Review of International Affairs, Vol. 3, No. 3,
Spring 2004, pp. 495501.
Ciobanu, Ceslav, Political Economy of Frozen Conflicts in Ex-Soviet States, Virginia Social Science
Journal, Vol. 43, Winter 2008, pp. 3855.
Cirincione, Joseph, Republicans Do It Better, Bulletin of the Atomic Scientists, Vol. 56, No. 5, October
2000, p. 17.
Ciut, Felix, Region? Why Region? Security, Hermeneutics, and the Making of the Black Sea Region,
Geopolitics, Vol. 13, No. 1, Spring 2008, pp. 120147.
Clark, Bob, Done Deal: Even Without a Fiduciary Duty for All, the Cats Out of the Bag, Investment
Advisor, Vol. 30, No. 7, July 2010, pp. 6567.
Clark, Mark T., The Dangers of Trendy Strategies, Orbis, Vol. 44, No. 1, Winter 2000, p. 157.
Clark, Mark T., The Trouble with Collective Security, Orbis, Vol. 39, No. 2, Spring95 1995, p. 237.
Clarke, Michael, Strategy and Fortune, RUSI Journal: Royal United Services Institute for Defence Studies,
Vol. 152, No. 5, October 2007, pp. 612.
Clarke, Susan E., and Erica Chenoweth, The Politics of Vulnerability: Constructing Local Performance
Regimes for Homeland Security, Review of Policy Research, Vol. 23, No. 1, January 2006, pp. 95114.
Clarkson, Michael R., and Fred B. Schneider, Hyperproperties, Journal of Computer Security, Vol. 18, No.
6, October 2010, pp. 11571210.
Clayton, John, Gill Crozier, and Diane Reay, Home and Away: Risk, Familiarity and the Multiple
Geographies of the Higher Education Experience, International Studies in Sociology of Education,
Vol. 19, No. 3/4, December 2009, pp. 157174.
Clmenon, Stphan, and Skander Slim, On Portfolio Selection Under Extreme Risk Measure,
International Journal of Theoretical & Applied Finance, Vol. 10, No. 3, May 2007, pp. 449474.
Clemmesen, Michael H., The 1918-20 International Intervention in the Baltic Region, Baltic Security &
Defence Review, Vol. 13, No. 2, July 2011, pp. 183204.
Cline, Lawrence, Counterterrorism Strategy in the Sahel, Studies in Conflict & Terrorism, Vol. 30, No. 10,
October 2007, pp. 889899.
Clinton, Bill, A Democrat Lays Out His Plan, Harvard International Review, Vol. 14, No. 4, Summer 1992,
p. 26.
Clubb, Colin, and Mounir Naffi, The Usefulness of Book-to-Market and ROE Expectations for Explaining UK
Stock Returns, Journal of Business Finance & Accounting, Vol. 34, No. 1/2, March 2007, pp. 132.
Cockayne, James, Winning Haitis Protection Competition: Organised Crime and Peace Operations Past,
Present and Future, International Peacekeeping (13533312), Vol. 16, No. 1, February 2009, pp. 77
99.

345
Cocorad, Elena, and Aurel Ion Clinciu, Climate Connected to Assessment in Secondary Education,
Cognitie, Creier, Comportament/Cognition, Brain, Behaviour, Vol. 13, No. 3, 2009, pp. 341362.
Coffee, Peter, Security Is a Moving Target, eWeek, Vol. 21, No. 50, December 13, 2004, pp. D1D8.
Cohen, Dara Kay, Mariano-Florentino Culler, and Barry R. Weingast, Crisis Bureaucracy: Homeland
Security and the Political Design of Legal Mandates, Stanford Law Review, Vol. 59, No. 3, December
2006, pp. 673759.
Cohen, Kalman J., Steven F. Maier, Robert A. Schwartz, and David K. Whitcomb, Market Makers and the
Market Spread, Journal of Financial & Quantitative Analysis, Vol. 14, No. 4, November 1979, pp.
813835.
Cohen, Stephen P., Approaching Indias Military and Security Policy, with a Detour Through Disaster
Studies, India Review, Vol. 7, No. 4, October 2008, pp. 295319.
Coile, Courtney, and Kevin Milligan, How Household Portfolios Evolve After Retirement, Review of
Income & Wealth, Vol. 55, No. 2, June 2009, pp. 226248.
Colabella, Patrick, Adrina P. Fitzsimons, and Victoria Shoaf, SEC Sets Stage for Credit Default Swap
Oversight, Bank Accounting & Finance (08943958), Vol. 22, No. 4, July 2009, pp. 4552.
Colak, Alexandra Abello, and Jenny Pearce, Security from Below, IDS Bulletin, Vol. 40, No. 2, March
2009, pp. 1119.
Cole, Jennifer, Security Our Future, RUSI Journal: Royal United Services Institute for Defence Studies, Vol.
155, No. 2, May 2010, pp. 4651.
Colella, Rocco, Monitor You IP Rights, Euromoney Institutional Investor PLC, December 2008.
Coleman, Roy, and Joe Sim, From the Dockyards to the Disney Store: Surveillance, Risk and Security in
Liverpool City Centre, International Review of Law, Computers & Technology, Vol. 12, No. 1, March
1998, pp. 2745.
Colic-Peisker, Val, and Guy Johnson, Security and Anxiety of Homeownership: Perceptions of Middle-class
Australians at Different Stages of Their Housing Careers, Housing, Theory & Society, Vol. 27, No. 4,
December 2010, pp. 351371.
Collier, Berna, Paul Von Nessen, and Alan Collier, The PPSA: Continuing the Reconceptualisation of
Retention of Title (Romalpa) Security, University of New South Wales Law Journal, Vol. 34, No. 2,
2011, pp. 567599.
Collinson, Sarah, Samir Elhawary, and Robert Muggah, States of Fragility: Stabilisation and Its Implications
for Humanitarian Action, Disasters, Vol. 34, 2010, pp. S275S296.
Collogan, David, Battling for BARR, Business & Commercial Aviation, Vol. 107, No. 7, July 2011, p. 59.
Colomer, Nora, Appreciating Esoterics, Asset Securitisation Report, Vol. 11, No. 5, May 2011, pp. 813.
Comfort, Louise K., Rethinking Security: Organisational Fragility in Extreme Events, Public Administration
Review, Vol. 62, No. 4, 2002, pp. 98107.
Committee of Experts on the Application of Conventions and Recommendations, Third Item on the
Agenda: Information and Reports on the Application of Conventions and Recommendations,
Documents of the International Labour Conference, Vol. 98, June 3, 2009, pp. 1166.
Commonwealth Secretariat, Proliferation of Small Arms and Light Weapons: Working Towards an Arms
Trade Treaty, Journal of Commonwealth Law & Legal Education, Vol. 6, No. 2, October 2008, pp.
187208.
Communications of the ACM staff, In the Virtual Extension, Communications of the ACM, Vol. 54, No. 5,
May 2011, p. 9.
Cone, Stacey, The Pentagons Propaganda Windmills, Journalism History, Vol. 33, No. 1, Spring 2007, pp.
2441.
Conesa, Juan Carlos, Sagiri Kitao, and Dirk Krueger, Taxing Capital? Not a Bad Idea After All!, American
Economic Review, Vol. 99, No. 1, March 2009, pp. 2548.
Conway, Gordon, Food for All in the 21st Century, Social Research, Vol. 66, No. 1, Spring99 1999, p. 251.
Cook, Fay Lomax, Jason Barabas, and Benjamin I. Page, Invoking Public Opinion: Policy Elites and Social
Security, Public Opinion Quarterly, Vol. 66, No. 2, Summer 2002, pp. 235264.
Cook, Michael, Joseph Parkinson, Anna Porter, John Montgomery, Steve Isham, and Paul Kelly, Letters,
Quadrant Magazine Co Inc., March 2009.

346
Cooper, Brian P., A Not Unreasonable Panic: Character, Confidence, and Credit in Harriet Martineaus
Berkeley the Banker, Routledge, December 2010.
Cooper, Marianne, The Inequality of Security: An Emerging Division in Work and Family Life, Conference
Papers -- American Sociological Association, Annual Meeting 2007, p. 1.
Cooter, Maxwell, Scott Kriens, Questex Media Group, December 2001.
Costa, Peter da, Keeping the Peace, Africa Report, Vol. 40, No. 3, May 1995, p. 26.
Costantini, Valeria, Riccardo Crescenzi, Fabrizio De Filippis, and Luca Salvatici, Bargaining Coalitions in the
WTO Agricultural Negotiations, World Economy, Vol. 30, No. 5, May 2007, pp. 863891.
Cottey, Andrew, The Kosovo War in Perspective, International Affairs, Vol. 85, No. 3, May 2009, pp. 593
608.
Cotton, James, Bilateral Accomplishments and Multilateral Tasks in Northeast Asian Security,
Contemporary Southeast Asia: A Journal of International & Strategic Affairs, Vol. 20, No. 2, 1998, p.
137.
Couture, Wendy Gerwick, White Collar Crimes Gray Area, Albany Law Review, Vol. 72, No. 1, February
2009, pp. 155.
Cowman, Seamus, and Len Bowers, Safety and Security in Acute Admission Psychiatric Wards in Ireland
and London: a Comparative Study., Journal of Clinical Nursing, Vol. 18, No. 9, May 2009, pp. 1346
1353.
Cox, Jason, Regulation of Foreign Direct Investment After the Dubai Ports Controversy: Has the U.S.
Government Finally Figured Out How to Balance Foreign Threats to National Security Without
Alienating Foreign Companies?, Journal of Corporation Law, Vol. 34, No. 1, Fall 2008, pp. 293315.
Cox, John, What Summer Break?, Network World, Vol. 22, No. 34, 2005, p. 1.
Crciun, Iulia Ctlina, Internal Responsibility of States in Ensuring Human Security, Buletin Stiintific, Vol.
15, No. 1, June 2010, pp. 1218.
Craciun, Iulia Catalina, Specific Aspects of the Human Development 0 Human Security Relation in Central
and Eastern Europe, Revista Academiei Fortelor Terestre, Vol. 15, No. 1, March 2010, pp. 108120.
Cragun, Ryan T., and Ronald Lawson, The Secular Transition: The Worldwide Growth of Mormons,
Jehovahs Witnesses, and Seventh-day Adventists*, Sociology of Religion, Vol. 71, No. 3, Fall 2010,
pp. 349373.
Crain, Marion, Managing Identity: Buying Into the Brand at Work, Iowa Law Review, Vol. 95, No. 4, May
2010, pp. 11791258.
Crawford, Neta C., The Slippery Slope to Preventive War, Ethics & International Affairs, Vol. 17, No. 1,
April 2003, p. 30.
Creeger, Mache, The Theft of Business Innovation: An ACM-BCS Roundtable on Threats to Global
Competitiveness, Vol. 53, Association for Computing Machinery, 2010, pp. 4855.
Crepeau, Raymond G., Connie W. Crook, Martin D. Goslar, and Mark E. McMurtrey, Career Anchors of
Information Systems Personnel, Journal of Management Information Systems, Vol. 9, No. 2, Fall
1992, pp. 145160.
Crichton, John H. M., Defining High, Medium, and Low Security in Forensic Mental Healthcare: The
Development of the Matrix of Security in Scotland, Journal of Forensic Psychiatry & Psychology, Vol.
20, No. 3, June 2009, pp. 333353.
Crisp, Jeff, A State of Insecurity: The Political Economy of Violency in Kenyas Refugee Camps, African
Affairs, Vol. 99, No. 397, October 2000, p. 601.
Crisp, Jeff, Africas Refugees: Patterns, Problems and Policy Challenges, Journal of Contemporary African
Studies, Vol. 18, No. 2, July 2000, pp. 157178.
Crocker, Chester A., A Dubious Template for US Foreign Policy, Survival (00396338), Vol. 47, No. 1,
Spring 2005, pp. 5170.
Croissant, Aurel, Changing Welfare Regimes in East and Southeast Asia: Crisis, Change and Challenge,
Social Policy & Administration, Vol. 38, No. 5, October 2004, pp. 504524.
Croissant, Aurel, Riding the Tiger: Civilian Control and the Military in Democratizing Korea, Armed Forces
& Society, Vol. 30, No. 3, Spring 2004, pp. 357381.

347
Cromer, Cory Taylor, Consumer E-Commerce Dissonance: Innovating Without Alienating Before
Information Overload, Journal of Marketing Development & Competitiveness, Vol. 5, No. 4,
December 2011, pp. 1120.
Crow, Jeffrey J., The Paradox and the Dilemma: Gordon Gray and the J. Robert Oppenheimer Security
Clearance Hearing, North Carolina Historical Review, Vol. 85, No. 2, April 2008, pp. 163190.
Cudd, Mike, Marcelo Eduardo, and Lloyd Roberts, Short-cuts in Issuance Decisions and Subsequent Small
Firm Performance, Journal of Economics & Finance, Vol. 32, No. 3, July 2008, pp. 260270.
Cudworth, Erika, and Stephen Hobden, Beyond Environmental Security: Complex Systems, Multiple
Inequalities and Environmental Risks, Environmental Politics, Vol. 20, No. 1, February 2011, pp. 42
59.
Cullar, Mariano-Florentino, Securing the Nation: Law, Politics, and Organisation at the Federal Security
Agency, 1939-1953, University of Chicago Law Review, Vol. 76, No. 2, Spring 2009, pp. 587717.
Culbreath, Gray T., The Class Action Fairness Act of 2005: Jurisdictional and Removal Provisions, FDCC
Quarterly, Vol. 57, No. 2, Winter 2007, pp. 135152.
Cullen, Kimberly A., and Louise C. Ivers, Human Rights Assessment in Parc Jean Marie Vincent, Port-Au-
Prince, Haiti, Health & Human Rights: An International Journal, Vol. 12, No. 2, December 2010, pp.
6172.
Cullen, Paul, and Daniel Pinti, Effect of the Personal Property Securities Act on Australian Businesses,
Keeping Good Companies (14447614), No. 3, April 2011, pp. 136137.
Culnan, Mary J., Protecting Privacy Online: Is Self-Regulation Working?, Journal of Public Policy &
Marketing, Vol. 19, No. 1, Spring 2000, pp. 2026.
Culnan, Mary J., and Cynthia Clark Williams, How Ethics Can Enhance Organisational Privacy, MIS
Quarterly, Vol. 33, No. 4, December 2009, pp. 673687.
Culp, Christopher L., Contingent Capital Vs. Contingent Reverse Convertibles for Banks and Insurance
Companies, Journal of Applied Corporate Finance, Vol. 21, No. 4, 2009, pp. 1727.
Cummings, E. Mark, Christine E. Merrilees, Alice C. Schermerhorn, Marcie C. Goeke-Morey, Peter Shirlow,
and Ed Cairns, Longitudinal Pathways Between Political Violence and Child Adjustment: The Role of
Emotional Security About the Community in Northern Ireland, Journal Of Abnormal Child
Psychology, Vol. 39, No. 2, February 2011, pp. 213224.
Cutler, A. Claire, The Legitimacy of Private Transnational Governance: Experts and the Transnational
Market for Force, Socio-Economic Review, Vol. 8, No. 1, January 2010, pp. 157185.
DAgostino, Debra, British Telecoms Tech Transformation, CIO Insight, No. 78, February 2007, pp. 17
18.
DAmours, Martine, Non-Standard Employment After Age 50: How Precarious Is It?, Relations
Industrielles / Industrial Relations, Vol. 64, No. 2, Spring 2009, pp. 209229.
DAquila, Jill M., and Kim Capriotti, The SECs Case Against California Micro Devices: A Lesson in Using
Professional Skepticism and Obtaining Sufficient Appropriate Evidence, Issues in Accounting
Education, Vol. 26, No. 1, February 2011, pp. 145154.
DSouza, Deepak, Raveendra Holla, K. R. Raghavendra, and Barbara Sprick, Model-checking Trace-based
Information Flow Properties, Journal of Computer Security, Vol. 19, No. 1, January 2011, pp. 101
138.
Daase, Christopher, National, Societal, and Human Security: On the Transformation of Political
Language, Historical Social Research, Vol. 35, No. 4, December 2010, pp. 2237.
Dabelko, Geoffrey D., An uncommon peace: Environment, Development and the Global Security Agenda,
Environment, Vol. 50, No. 3, May 2008, p. 32.
Dabelko, Geoffrey D., An Uncommon Peace, Current, No. 503, June 2008, pp. 2329.
Dabelko, Geoffrey D., The Environmental Factor, Wilson Quarterly, Vol. 23, No. 4, 1999, p. 14.
Dacey, Robert F., Federal Information System Controls Audit Manual (Fiscam): Exposure Draft, GAO
Reports, July 31, 2008, pp. 1611.
Dagi, Ihsan D., Human Rights and International Security: The Challenge for NATO in the Mediterranean,
Mediterranean Quarterly, Vol. 13, No. 3, Summer 2002, p. 119.

348
Dahlman, Carl T., and Stanley D. Brunn, Reading Geopolitics Beyond the State: Organisational Discourse in
Response to 11 September, Geopolitics, Vol. 8, No. 3, 2003, pp. 253280.
Dailey, Rene, and Beth Le Poire, Exploring the Relationship Between Hurtful Messages and Partner
Attachment, International Communication Association, 2003, pp. 129.
Dandeker, Christopher, National Security and Democracy: The United Kingdom Experience, Armed
Forces & Society (0095327X), Vol. 20, No. 3, Spring94 1994, pp. 353374.
Daniel, Mare Marius, and Mare Valerica, Excellence in Business Through New IT Technologies, Annals
of the University of Oradea, Economic Science Series, Vol. 17, No. 4, December 2008, pp. 14201429.
Darmstadter, Howard, Investment Securities, Business Lawyer, Vol. 64, No. 4, 2009, pp. 12371244.
Das, Runa, Postcolonial (in)securities, the BJP and the Politics of Hindutva: Broadening the Security
Paradigm Between the Realist and Anti-nuclear/peace Groups in India, Third World Quarterly, Vol.
24, No. 1, February 2003, pp. 7796.
Das, Runa, State, Identity, and Representations of Danger: Competing World Views on Indian
Nuclearisation, Commonwealth & Comparative Politics, Vol. 46, No. 1, March 2008, pp. 228.
Das, Runa, Strategic Culture, Representations of Nuclear (In)Securities, and the Government of India: A
Critical Constructivist Perspective, Asian Journal of Political Science, Vol. 17, No. 2, 2009, pp. 123
144.
Das, Runa, The Prism of Strategic Culture and South Asian Nuclearisation, Contemporary Politics, Vol. 15,
No. 4, December 2009, pp. 395411.
Davidson, Douglas, The Relevance and Effectiveness of the Concept of Cooperative Security in the 21st
Century, Security & Human Rights, Vol. 21, No. 1, March 2010, pp. 1820.
Davidson, Jonathan A., Lo M. Grpin, and Charlotte M. Hogg, Remaking Market Making, McKinsey
Quarterly, No. 3, 2001, pp. 142153.
Davies, Patrick T., and Meredith J. Woitach, Childrens Emotional Security in the Interparental
Relationship, Current Directions in Psychological Science (Wiley-Blackwell), Vol. 17, No. 4, 2008, pp.
269274.
Davies, Patrick T., Gordon T. Harold, Marcie C. Goeke-Morey, E. Mark Cummings, Katherine Shelton and
Jennifer A. Rasi, Parental Conflict and Child Security in the Family System, Monographs of the
Society for Research in Child Development, Vol. 67, No. 3, June 2002, p. 63.
Davies, Paul S., Minh Huynh, Chad Newcomb, Paul OLeary, Kalman Rupp, and Jim Sears, Modeling SSI
Financial Eligibility and Simulating the Effect of Policy Options, Social Security Bulletin, Vol. 64, No. 2,
June 2001, p. 16.
Davies, Sara E., Securitizing Infectious Disease, International Affairs, Vol. 84, No. 2, March 2008, pp. 295
313.
Davis, E. Philip, Is There a Pensions Crisis in the U.K.?, Geneva Papers on Risk & Insurance - Issues &
Practice, Vol. 29, No. 3, July 2004, pp. 343370.
Daza, Vanesa, Javier Herranz, and Germn Sez, Protocols Useful on the Internet from Distributed
Signature Schemes, International Journal of Information Security, Vol. 3, No. 2, November 2004, pp.
6169.
de Brichambaut, Marc Perrin, Mid-Life Crisis?, National Interest, No. 88, April 2007, p. 37.
De Carmo, Linden, and Adam Morstad, Checkered Flag, EMedia -- The Digital Studio Magazine, Vol. 16,
No. 5, May 2003, p. 34.
De Giorgi, Alessandro, Toward a Political Economy of post-Fordist Punishment, Critical Criminology, Vol.
15, No. 3, December 2007, pp. 243265.
de Haas, Marcel, Medvedevs Alternative European Security Architecture, Security & Human Rights, Vol.
21, No. 1, March 2010, pp. 4548.
De Haas, Marcel, The Shanghai Cooperation and the OSCE: Two of a Kind?, Helsinki Monitor, Vol. 18, No.
3, July 2007, pp. 246259.
de la Rupelle, Malys, Deng Quheng, Li Shi, and Thomas Vendryes, Land Rights and Rural-urban Migration
in China, China Perspectives, Vol. 2008, No. 2, June 2008, pp. 2535.
De Nardi, Mariacristina, Eric French, and John B. Jones, Why Do the Elderly Save? The Role of Medical
Expenses, Journal of Political Economy, Vol. 118, No. 1, February 2010, pp. 3975.

349
de Ville, Graud, Climate Change Bad News for Environmental Security, Environmental Law Review,
Vol. 10, No. 3, 2008, pp. 175180.
De Vries, Leonie Ansems, and Jorg Spieker, Hobbes, War, Movement, Global Society: Journal of
Interdisciplinary International Relations, Vol. 23, No. 4, October 2009, pp. 453474.
De Wet, H. F., Economics and Security Studies: Is the South African Military Academy Still on Track?,
Defence & Security Analysis, Vol. 23, No. 4, December 2007, pp. 441447.
Dehez, Dustin, Finally at Certain Crossroads? Three Critical Challenges to NATO, American Foreign Policy
Interests, Vol. 31, No. 2, April 2009, pp. 120130.
Deighton, A., The European Security and Defence Policy, Journal of Common Market Studies, Vol. 40, No.
4, November 2002, pp. 719741.
Dekker, Martijn, and Mient Jan Faber, Human Security from Below in a Hobbesian Environment, Security
& Human Rights, Vol. 19, No. 1, January 2008, pp. 3744.
Dekker, S., and H. Stevens, Maritime Security in the European Union - Empirical Findings on Financial
Implications for Port Facilities, Maritime Policy & Management, Vol. 34, No. 5, October 2007, pp.
485499.
DeMarzo, Peter M., Ilan Kremer, and Andrzej Skrzypacz, Bidding with Securities: Auctions and Security
Design, American Economic Review, Vol. 95, No. 4, 2005, pp. 936959.
Demurjian, S.A., and T.C. Ting, Towards a Definitive Paradigm for Security In Object-Oriented Systems and
Applications, Journal of Computer Security, Vol. 5, No. 4, December 1997, p. 341.
Deng, Yong, Hegemon on the Offensive: Chinese Perspectives on U.S. Global Strategy, Political Science
Quarterly, Vol. 116, No. 3, Fall 2001, p. 343.
Denov, Myriam, and Christine Gervais, Negotiating (In)Security: Agency, Resistance, and Resourcefulness
Among Girls Formerly Associated with Sierra Leones Revolutionary United Front, Signs: Journal of
Women in Culture & Society, Vol. 32, No. 4, Summer 2007, pp. 885910.
Deprez, Annelore, and Karin Raeymaeckers, Bottlenecks in the Coverage of the Israeli-Palestinian Conflict:
The Coverage of the First and Second Intifada in the Flemish Press, Media, War & Conflict, Vol. 4,
No. 2, 2011, pp. 185202.
Desai, Seiju, Turkey in the European Union: A Security Perspective Risk or Opportunity?, Defence
Studies, Vol. 5, No. 3, November 2005, pp. 366393.
Desch, Michael C., Statement from the New Editor-in-Chief Michael C. Desch, Security Studies, Vol. 15,
No. 4, October 2006, pp. 529532.
Desch, Michael C., The Roman Predicament: How the Rules of International Order Create the Politics of
Empire, Independent Review, Vol. 12, No. 3, Winter 2008, p. 459.
Despard, Lucy EdwardsMorse, JO - Foreign Affairs, Foreign Affairs, Vol. 56, No. 3, April 1978, p. 666.
Desrosiers, Simon Pierre, Entropic Security in Quantum Cryptography, Quantum Information Processing,
Vol. 8, No. 4, 2009, pp. 331345.
Detraz, Nicole, Environmental Security and Gender: Necessary Shifts in an Evolving Debate, Security
Studies, Vol. 18, No. 2, June 2009, pp. 345369.
Detraz, Nicole, and Michele M. Betsill, Climate Change and Environmental Security: For Whom the
Discourse Shifts, International Studies Perspectives, Vol. 10, No. 3, 2009, pp. 303320.
Devault, Annie, Marie-Pierre Milcent, Francine Ouellet, Isabelle Laurin, Marika Jauron, and Carl Lacharit,
Life Stories of Young Fathers in Contexts of Vulnerability, Fathering: A Journal of Theory, Research,
& Practice About Men as Fathers, Vol. 6, No. 3, Fall 2008, pp. 226248.
Devereux, Michael B., and James Yetman, Leverage Constraints and the International Transmission of
Shocks, Journal of Money, Credit & Banking (Wiley-Blackwell), Vol. 42, 2010, pp. 71105.
Devetak, Richard, An Australian Outlook on International Affairs? The Evolution of International Relations
Theory in Australia, Australian Journal of Politics & History, Vol. 55, No. 3, 2009, pp. 335359.
Devetak, Richard, and Jacqui True, Diplomatic Divergence in the Antipodes: Globalisation, Foreign Policy
and State Identity in Australia and New Zealand, Australian Journal of Political Science, Vol. 41, No.
2, June 2006, pp. 241256.
Devlin, Steven J., and Lowell Arye, The Social Security Debate: A Financial Crisis or a New Retirement
Paradigm?, Generations, Vol. 21, No. 2, Summer 1997, p. 27.

350
DeWitt, Larry, The Development of Social Security in America, Social Security Bulletin, Vol. 70, No. 3,
2010, p. 1.
Dhaliwal, Dan, Chris Hogan, Robert Trezevant, and Michael Wilkins, Internal Control Disclosures,
Monitoring, and the Cost of Debt, Accounting Review, Vol. 86, No. 4, July 2011, pp. 11311156.
Diamond, Peter A., The Public Pension Reform Debate in the United States and International Experience,
Risk Management & Insurance Review, Vol. 9, No. 1, Spring 2006, pp. 935.
Daz, Hctor Luis, Community Capacity and Micro-economic Development: a Study from Peru,
International Journal of Social Welfare, Vol. 16, No. 4, October 2007, pp. 339348.
Dietrich, John W., The Politics of PEPFAR: The Presidents Emergency Plan for AIDS Relief, Ethics &
International Affairs, Vol. 21, No. 3, 2007, pp. 277292.
Diffie, Whitfield, Information Security: 50 Years Behind, 50 Years Ahead, Communications of the ACM,
Vol. 51, No. 1, January 2008, pp. 5557.
DiFilippo, Anthony, Opposing Positions in Japans Security Policy, East Asia: An International Quarterly,
Vol. 20, No. 1, Spring 2002, p. 107.
Dimitrov, Radoslav S., Water, Conflict, and Security: A Conceptual Minefield, Society & Natural
Resources, Vol. 15, No. 8, 2002, pp. 677691.
Diprose, Rachael, Physical Safety and Security: A Proposal for Internationally Comparable Indicators of
Violence, Oxford Development Studies, Vol. 35, No. 4, December 2007, pp. 431458.
Dixon, John, A Global Perspective on Statutory Social Security Programs for the Sick, Journal of Health &
Social Policy, Vol. 13, No. 3, July 15, 2001, pp. 1740.
Djinis, Stephanie A., Highlights of This Issue, Investment Lawyer, Vol. 18, No. 6, June 2011, p. 2.
Dobbins, James, Occupying Iraq: A Short History of the CPA, Survival (00396338), Vol. 51, No. 3, July
2009, pp. 131162.
Dodds, Klaus, Gender, Geopolitics, and Geosurveillance in Teh Bourne Ultimatum, Geographical Review,
Vol. 101, No. 1, January 2011, p. 88.
Dodge, Toby, The Causes of US Failure in Iraq, Survival (00396338), Vol. 49, No. 1, Spring 2007, pp. 85
106.
Dodis, Yevgeniy, Rafail Ostrovsky, Leonid Reysin, and Adam Smith, Fuzzy Extractors: How to Generate
Strong Keys from Biometrics and the Noisy Data, SIAM Journal on Computing, Vol. 38, No. 1, January
2008, pp. 97139.
Dokubo, Charles, and Abiodun Joseph Oluwadare, Nigerias Role in Conflict Resolution: A New Paradigm,
Journal of Alternative Perspectives in the Social Sciences, Vol. 3, No. 3, December 2011, pp. 551580.
Dolghi, Dorin I., Geopolitics and Security in the European Neighbourhood, Eurolimes, Vol. 10, 2010, pp.
181190.
Dong, Changyu, Giovanni Russello, and Naranker Dulay, Shared and Searchable Encrypted Data for
Untrusted Servers, Journal of Computer Security, Vol. 19, No. 3, April 2011, pp. 367397.
Dong-Hee Shin, The Dynamic User Activities in Massive Multiplayer Online Role-Playing Games,
International Journal of Human-Computer Interaction, Vol. 26, No. 4, April 2010, pp. 317344.
Dorin, Dolghi, The Culture of Security: Perceptions and Preferences Formation in the European Union,
Eurolimes, supplement 2011, pp. 319328.
Dorussen, Han, Emil J. Kirchner, and James Sperling, Sharing the Burden of Collective Security in the
European Union, International Organisation, Vol. 63, No. 4, Fall 2009, pp. 789810.
Dotson, Daniel S., Information Security Resources: A Selected Annotated Bibliography, Science &
Technology Libraries, Vol. 27, No. 3, March 2007, pp. 2951.
Doupi, Persephone, Pekka Ruotsalainen, and Hanna Pohjonen, Implementing Interoperable Secure Health
Information Systems, Studies In Health Technology And Informatics, Vol. 115, 2005, pp. 187214.
Dourish, Paul, and Ken Anderson, Collective Information Practice: Exploring Privacy and Security as Social
and Cultural Phenomena, Human-Computer Interaction, Vol. 21, No. 3, 2006, pp. 319342.
Downes, Paul, Homeland Insecurity, Early American Literature, Vol. 45, No. 3, November 2010, pp. 699
713.
Downey, Jennifer I., and Richard C. Friedman, Homosexuality: Psychotherapeutic Issues, British Journal
of Psychotherapy, Vol. 24, No. 4, November 2008, pp. 429468.

351
Drorian, Sevgi, Rethinking European Security: The Inter-regional Dimension and the Turkish Nexus,
European Security, Vol. 14, No. 4, December 2005, pp. 421441.
Drorian, Sevgi, Turkey: Security, State and Society in Troubled Times, European Security, Vol. 14, No. 2,
Summer 2005, pp. 255275.
Duan, Chang-Wen, William T. Lin, and Cheng Few Lee, Sequential Capital Budgeting as Real Options: The
Case of a New DRAM Chipmaker in Taiwan, Review of Pacific Basin Financial Markets & Policies, Vol.
6, No. 1, March 2003, p. 87.
Dubil, Robert, Economic Derivatives Markets--New Opportunities for Individual Investors: A Research
Agenda, Financial Services Review, Vol. 16, No. 2, Summer 2007, pp. 89104.
Dubil, Robert, You Want to Diversify Risk? Consider Economic Derivatives, Journal of Wealth
Management, Vol. 9, No. 4, Spring 2007, pp. 3743.
Dubois, Eric, and Haralambos Mouratidis, Guest Editorial: Security Requirements Engineering: Past,
Present and Future, Requirements Engineering, March 2010.
DuBridge, L. A., Bulletin of the Atomic Scientists, Bulletin of the Atomic Scientists, Vol. 11, No. 4, April
1955, p. 163.
Duggan, Anthony, and Jacob Ziegel, Justice Iacobucci and the Canadian Law of Deemed Trusts and Chattel
Security, University of Toronto Law Journal, Vol. 57, No. 2, Spring 2007, pp. 227249.
Duke, Simon, and Hanna Ojanen, Bridging Internal and External Security: Lessons from the European
Security and Defence Policy, Journal of European Integration, Vol. 28, No. 5, December 2006, pp.
477494.
Dungel, Joakim, Defining Victims of Crimes Against Humanity: Marti and the International Criminal
Court, Leiden Journal of International Law, Vol. 22, No. 4, December 2009, pp. 727752.
Dunn, Stephen, The Modern Food Industry and Public Health: a Galbraithian Perspective, Journal of Post
Keynesian Economics, Vol. 33, No. 3, Spring 2011, pp. 491516.
Dunne, J. Paul, Eftychia Nikolaidou, and Nikolaos Mylonidis, The Demand for Military Spending in
Developing Countries: a Dynamic Panel Analysis, Defence & Peace Economics, Vol. 14, No. 6,
December 2003, pp. 461474.
Dunne, Peter G., Michael J. Moore, and Richard Portes, Benchmark Status in Fixed-Income Asset
Markets, Journal of Business Finance & Accounting, Vol. 34, No. 9/10, December 2007, pp. 1615
1634.
Dupont, Benot, and Jennifer Wood, Urban Security, from Nodes to Networks: On the Value of
Connecting Disciplines, Canadian Journal of Law & Society/Revue Canadienne Droit Et Societe, Vol.
22, No. 2, December 2007, pp. 95112.
Dynkin, Lev, Yuri Greenfield, and Dev Joneja, The Lehman Brothers Swap Indexes, Journal of Fixed
Income, Vol. 12, No. 2, 2002, p. 28.
Eadie, Pauline, Poverty, Security and the Janus-Faced State, British Journal of Politics & International
Relations, Vol. 9, No. 4, November 2007, pp. 636653.
Eaton, Sarah, and Richard Stubbs, Is ASEAN Powerful? Neo-realist Versus Constructivist Approaches to
Power in Southeast Asia 1, Pacific Review, Vol. 19, No. 2, June 2006, pp. 135155.
Eberlein, Ernst, and Nataliya Koval, A Cross-currency Lvy Market Model, Quantitative Finance, Vol. 6,
No. 6, December 2006, pp. 465480.
Ebert, Michael, Ilona Ostner, Uschi Brand, and Steffen Khnel, Social Quality in Germany, European
Journal of Social Quality, Vol. 5, No. 1/2, January 2005, pp. 103117.
Eckersley, Robyn, Ecological Intervention: Prospects and Limits, Ethics & International Affairs, Vol. 21,
No. 3, 2007, pp. 293316.
Eckes, Christina, Immigration, Integration and Security America and Europe in Comparative Perspective
Edited by A.C. dAppollonia and S. Reich, Journal of Common Market Studies, Vol. 47, No. 1,
January 2009, p. 217.
Economides, Spyros, Balkan Security: What Security? Whose Security?, Journal of Southeast European &
Black Sea Studies, Vol. 3, No. 3, 2003, pp. 105129.

352
Eddy, Albert R., and H. Gene Swanson, Innovation in Teaching Investment Analysis: Integrating
Information Sources and Security Valuation, Financial Practice & Education, Vol. 5, No. 2, Fall 1995,
pp. 9098.
Edmunds, Timothy, What Are Armed Forces for? The Changing Nature of Military Roles in Europe,
International Affairs, Vol. 82, No. 6, November 2006, pp. 10591075.
Edwards, Adam, and Pete Gill, The Politics of Transnational Organised Crime: Discourse, Reflexivity and
the Narration of threat, British Journal of Politics & International Relations, Vol. 4, No. 2, June
2002, p. 245.
Edwards, Adam, and Peter Gill, Current and Prospective Responses: After Transnational Organised
Crime?, Transnational Organised Crime, Taylor & Francis Ltd / Books, 2003, pp. 264281.
Edwards, Ferne, and David Mercer, Gleaning from Gluttony: An Australian Youth Subculture Confronts
the Ethics of Waste, Australian Geographer, Vol. 38, No. 3, November 2007, pp. 279296.
Ehrhardt, Michael C., James V. Jordan, and Ralph A. Walkling, An Application of Arbitrage Pricing Theory
to Futures Markets: Tests of Normal Backwardation, Journal of Futures Markets, Vol. 7, No. 1,
February 1987, pp. 2134.
Ehteshami, Anoushiravan, Iran-Iraq Relations After Saddam, Washington Quarterly, Vol. 26, No. 4,
October 2003, p. 115.
Eizenstat, Stuart E., John Edward Porter, and Jeremy M. Weinstein, Rebuilding Weak States, Foreign
Affairs, Vol. 84, No. 1, February 2005, pp. 134146.
Ekblom, Paul, and Aiden Sidebottom, What Do You Mean, Is It Secure? Redesigning Language to Be Fit
for the Task of Assessing the Security of Domestic and Personal Electronic Goods, European Journal
on Criminal Policy & Research, Vol. 14, No. 1, March 2008, pp. 6187.
Ekengren, Magnus, New Security Challenges and the Need for New Forms of EU Cooperation: The
Solidarity Declaration Against Terrorism and the Open Method of Coordination, European Security,
Vol. 15, No. 1, March 2006, pp. 89111.
Eklund, K., U. Sonn, P. Nystedt, and S. Dahlin-Ivanoff, A Cost-effectiveness Analysis of a Health Education
Programme for Elderly Persons with Age-related Macular Degeneration: A Longitudinal Study,
Disability & Rehabilitation, Vol. 27, No. 20, October 30, 2005, pp. 12031212.
Elder, Andrew, The GP Surgery as a Secure Base? Patterns of Attachment in Primary Care,
Psychodynamic Practice, Vol. 15, No. 1, February 2009, pp. 5770.
Elegba, Shamsideen, Transport of Radioactive Sources in Africa: The Nigerian Experience, Packaging,
Transport, Storage & Security of Radioactive Materials, Vol. 21, No. 4, December 2010, pp. 191192.
Elijah, Obayelu Abiodun, Global Food Price Increases and Nutritional Status of Nigerians, Journal of
Agricultural & Biological Science, Vol. 5, No. 2, March 2010, pp. 6780.
Ellin, Nan, Fear and City Building, Hedgehog Review, Fall 2003.
Elliot-Meisel, Elizabeth, Politics, Pride, and Precedent: The United States and Canada in the Northwest
Passage, Ocean Development & International Law, Vol. 40, No. 2, June 2009, pp. 204232.
Elliott, Liz, Security, Without Care: Challenges for Restorative Values in Prison, Contemporary Justice
Review, Vol. 10, No. 2, June 2007, pp. 193208.
Elliott, Lorraine, Environmental Protection and US--Asia Relations: a Policy of Disconnect, Pacific Review,
Vol. 17, No. 2, June 2004, pp. 291314.
Ellner, Andrea, The European Security Strategy: Multilateral Security with Teeth?, Defence & Security
Analysis, Vol. 21, No. 3, 2005, pp. 223242.
Emmers, Ralf, ASEAN and the Securitisation of Transnational Crime in Southeast Asia, Pacific Review,
Vol. 16, No. 3, 2003, p. 419.
Emmers, Ralph, Comprehensive Security and Resilience in Southeast Asia: ASEANs Approach to
Terrorism, Pacific Review, Vol. 22, No. 2, May 2009, pp. 159177.
Emmerson, Donald, What Do the Blind-sided See? Reapproaching Regionalism in Southeast Asia, Pacific
Review, Vol. 18, No. 1, March 2005, pp. 121.
Energy Security and Competition Policy, OECD Journal of Competition Law & Policy, Vol. 11, No. 1, January
2009, pp. 790.

353
Engen, Eric M., William G. Gale and Cori E. Uccello, The Adequacy of Household Saving, Brookings Papers
on Economic Activity, No. 2, December 1999, p. 65.
Engen, Eric M., William G. Gale, and Cori E. Uccello, Effects of Stock Market Fluctuations on the Adequacy
of Retirement Wealth Accumulation, Review of Income & Wealth, Vol. 51, No. 3, 2005, pp. 397418.
Engvall, Johan, Kyrgysstan: Anatomy of a State, Problems of Post-Communism, Vol. 54, No. 4, August
2007, p. 33.
Entessar, Nader, Irans Security Challenges, Muslim World, Vol. 94, No. 4, October 2004, pp. 537554.
Environment Canada, Fisheries and Oceans Canada and Indian and Northern Affairs Canada, Land-Based
Pollution in the Arctic Ocean: Canadian Actions in a Regional and Global Context, Arctic, Vol. 61,
2008, pp. 111121.
Epstein, Kate, and Kurt Iveson, Locking Down the City (Well, Not Quite): APEC 2007 and Urban Citizenship
in Sydney, Australian Geographer, Vol. 40, No. 3, 2009, pp. 271295.
Erickson, Tamara J., and Lynda Gratton, What It Means to Work Here, Harvard Business Review, Vol. 85,
No. 3, March 2007, pp. 104112.
Ericson, Richard V., Ten Uncertainties of Risk-Management Approaches to Security, Canadian Journal of
Criminology & Criminal Justice, Vol. 48, No. 3, June 2006, pp. 345357.
Eriksson, Johan, Cyberplagues, IT, and Security: Threat Politics in the Information Age, Journal of
Contingencies & Crisis Management, Vol. 9, No. 4, December 2001, p. 200.
Errunza, Vihang, and Etienne Losq, International Asset Pricing Under Mild Segmentation: Theory and
Test, Journal of Finance, Vol. 40, No. 1, March 1985, pp. 105124.
Escobar, Roberto, Fear on the March, Iris: European Journal of Philosophy & Public Debate, Vol. 1, No. 2,
October 2009, pp. 301307.
Esteves, Paulo, Peace Operations and the Government of Humanitarian Spaces, International
Peacekeeping (13533312), Vol. 17, No. 5, November 2010, pp. 613628.
Evans, Martin, and Susan Harkness, Social Protection in Vietnam and Obstacles to Progressivity, Asian
Social Work & Policy Review, Vol. 2, No. 1, February 2008, pp. 3052.
Evans, Michael, From Kadesh to Kandahar, Naval War College Review, Vol. 56, No. 3, Summer 2003, pp.
132150.
Evans, Michael, Securing, Stabalizing and Rebuilding Iraq: Iraqi Government Has Not Met Most
Legislative, Security, and Economic Benchmarks, GAO Reports, 2007, p. i.
Evans, Michael, The Case for a National Security Strategy, Quadrant Magazine, Vol. 52, No. 4, April 2008,
pp. 3643.
Evans, Paul, Consumer Behaviour in the United States: Implications for Social Security Reform, Economic
Inquiry, Vol. 39, No. 4, October 2001, pp. 568582.
Ewan, Pauline, Deepening the Human Security Debate: Beyond the Politics of Conceptual Clarification,
Politics, Vol. 27, No. 3, October 2007, pp. 182189.
Fabian, Benjamin, Seda Grses, Maritta Heisel, Thomas Santen, and Holger Schmidt, A Comparison of
Security Requirements Engineering Methods, Requirements Engineering, Vol. 15, No. 1, March 2010,
pp. 740.
Facciolo, Francis J., The Revolution in Investment Adviser Regulation, Investment Lawyer, Vol. 18, No. 10,
October 2011, pp. 2131.
Faia, Tiago, Africa and Fortress Europe: Threats and Opportunities Edited by B. Gebrewold, Journal of
Common Market Studies, Vol. 47, No. 1, January 2009, p. 218.
Farrell, Alexander E., Hisham Zerriffi, and Hadi Dowlatabadi, Energy Infrastructure and Security, Annual
Review of Environment & Resources, Vol. 29, No. 1, November 2004, pp. 421469.
Fazzino II, David V., Whose Food Security? Confronting Expanding Commodity Production and the Obesity
and Diabete Epidemics, Drake Journal of Agricultural Law, Vol. 15, No. 3, Fall 2010, pp. 393417.
Feil, Scott, Building Better Foundations: Security in Postconflict Reconstruction, Washington Quarterly,
Vol. 25, No. 4, November 2002, pp. 97109.
Feinstein, Lee Slaughter, A Duty to Prevent, Foreign Affairs, Vol. 83, No. 1, February 2004, pp. 136150.
Feld, Bernard T., Secrecy and Security, Bulletin of the Atomic Scientists, February 1976.

354
Fenrich, Kim, Securing Your Control System, Power Engineering, Vol. 112, No. 2, February 2008, pp. 44
51.
Ferenc, Irk, Globalised Criminality, Local Crime Control and Prevention, Sociologija: Mintis Ir Veiksmas,
Vol. 2007, No. 2, December 2007, pp. 1131.
Ferguson, Charles D.Lubenau, Securing U.S. Radioactive Sources, Issues in Science & Technology, Vol. 20,
No. 1, Fall 2003, p. 67.
Ferguson, Yale H., and Richard W. Mansbach, Global Politics at the Turn of the Millennium: Changing
Bases of Us and Them, International Studies Review, Vol. 1, No. 2, Summer 1999, p. 77.
Fernstrom, Stephen C., Final Participant-Directed Regulations Under ERISA 404(c), Benefits Quarterly,
Vol. 9, No. 1, First Quarter 1993, pp. 6370.
Field, Erica, Entitled to Work: Urban Property Rights and Labour Supply in Peru, Quarterly Journal of
Economics, Vol. 122, No. 4, November 2007, pp. 15611602.
Filho, Joo R. Martins, and Daniel Zirker, Nationalism, National Security, and Amaznia: Military
Perceptions and Attitudes in Contemporary Brazil, Armed Forces & Society (0095327X), Vol. 27, No.
1, Fall 2000, pp. 105129.
Financial Audit: IRSs Fiscal Years 2004 and 2003 Financial Statements: GAO-05-103, U.S. Government
Accountability Office, November 10, 2004.
Finger, Matthias, Gearid . Tuathail, Simon Dalby, and Paul Routledge, Part 4: Environmental
Geopolitics: Chapter 28: The Military, the Nation State and the Environment., Geopolitics Reader,
Taylor & Francis Ltd / Books, 1997, pp. 223230.
Finkelstein, Amy, and Kathleen McGarry, Multiple Dimensions of Private Information: Evidence from the
Long-Term Care Insurance Market, American Economic Review, Vol. 96, No. 4, 2006, pp. 938958.
Fishback, Price V., Operations of `unfettered Labour Markets: Exit and Voice in American Labour Markets
at the Turn of the Century, Journal of Economic Literature, Vol. 36, No. 2, June 1998, p. 722.
Fitch, J. Samuel, The Decline of US Military Influence in Latin America, Journal of Interamerican Studies &
World Affairs, Vol. 35, No. 2, Summer 1993, p. 1.
Fitz-Gerald, Ann M., A UK National Security: Institutional and Cultural Challenges, Defence Studies, Vol.
8, No. 1, March 2008, pp. 425.
Fitzpatrick, Daniel, Best Practice Options for the Legal Recognition of Customary Tenure, Development
& Change, Vol. 36, No. 3, May 2005, pp. 449475.
Fitzsimmons, Cleo, and Sarah L. Manning, Factors Affecting Farm Family Security, Rural Sociology, Vol.
26, No. 3, 1961, pp. 290297.
Flannery, Mark J., Commentary, Economic Policy Review (19320426), 2004.
Floridis, George, Security for the 2004 Athens Olympic Games, Mediterranean Quarterly, Vol. 15, No. 2,
Spring 2004, pp. 15.
Fluri, Jennifer, Foreign Passports Only: Geographies of (Post)Conflict Work in Kabul, Afghanistan,
Annals of the Association of American Geographers, Vol. 99, No. 5, December 2009, pp. 986994.
Flynt, Bill, Threat Kingdom, Military Review, Vol. 80, No. 4, August 2000, p. 12.
Focardi, Riccardo, and Sabina Rossi, Information Flow Security in Dynamic Contexts, Journal of Computer
Security, Vol. 14, No. 1, February 2006, pp. 65110.
Fohn, Dick, and Marc J. Minker, Tax Advice or Investment Advice?: Where Is the Line?, Tax Adviser, Vol.
37, No. 7, July 2006, pp. 420423.
Food Security: Factors That Could Affect Progress Toward Meeting World Food Summit Goals: NSIAD-99-
15, U.S. Government Accountability Office, March 22, 1999.
Foot, Rosemary, Human Rights and Counterterrorism in Global Governance: Reputation and Resistance,
Global Governance, Vol. 11, No. 3, September 2005, pp. 291310.
Foot, Rosemary, Human Rights in Conflict, Survival, Vol. 48, No. 3, 2006, pp. 109126.
Forcht, Karen A., Daphyne Thomas, and Karen Wigginton, Computer Crime: Assessing the Lawyers
Perspective, Journal of Business Ethics, Vol. 8, No. 4, April 1989, pp. 243251.
Foreign Relations, Superintendent of Documents, June 2006.
Forest, James, Educational Challenges of Homeland Security in an Open Society, Conference Papers -
Northeastern Political Science Association, January 2009, p. 1.

355
Forman, E. M., and P. T. Davies, Family Instability and Young Adolescent Maladjustment: The Mediating
Effects of Parenting Quality and Adolescent Appraisals of Family Security, Journal of Clinical Child &
Adolescent Psychology, Vol. 32, No. 1, February 2003, p. 94.
Forman, Evan M., and Patrick T. Davies, Assessing Childrens Appraisals of Security in the Family System:
The Development of the Security in the Family System (SIFS) Scales, Journal of Child Psychology &
Psychiatry, Vol. 46, No. 8, 2005, pp. 900916.
Forman, Johanna Mendelson, Can Reform Save the United Nations? Opportunities for Creating an
Effective Multilateral Body for the Twenty-First Century, American Foreign Policy Interests, Vol. 27,
No. 5, October 2005, pp. 349363.
Forrest, Dan, Security at Western Kentucky University Libraries: A Case Study and Overview, Library &
Archival Security, Vol. 20, No. 1/2, January 2005, pp. 8997.
Fortuna, Keren, and Glenn I Roisman, Insecurity, Stress, and Symptoms of Psychopathology: Contrasting
Results from Self-reports Versus Interviews of Adult Attachment, Attachment & Human
Development, Vol. 10, No. 1, March 2008, pp. 1128.
Foster, Gregory D., Environmental Security: The Search for Strategic Legitimacy, Armed Forces & Society
(0095327X), Vol. 27, No. 3, Spring 2001, pp. 373395.
Fowler, Alan, and Kasturi Sen, Embedding the War on Terror: State and Civil Society Relations,
Development & Change, Vol. 41, No. 1, January 2010, pp. 127.
Fowler, David J., C. Harvey Rorke, and Vijay M. Jog, Heteroscedasticity, R2 and Thin Trading on the
Toronto Stock Exchange, Journal of Finance, Vol. 34, No. 5, December 1979, pp. 12011210.
Fox, Frederick V., and Barry M. Staw, The Trapped Administrator: Effects of Job Insecurity and Policy
Resistance Upon Commitment to a Course of Action, Administrative Science Quarterly, Vol. 24, No.
3, 1979, pp. 449471.
Frame, W. ScottWhite, Technological Change, Financial Innovation, and Diffusion in Banking, Federal
Reserve Bank of Atlanta, March 6, 2009.
Francesco, Nicoletta, and Luca Martini, Instruction-level Security Typing by Abstract Interpretation,
International Journal of Information Security, Vol. 6, No. 2/3, March 2007, pp. 85106.
Fraser, Duncan, Give Me the Child and Ill Give You the Leader. What Can Attachment Theory Teach Us
About Leadership?, International Journal of Leadership in Public Services, Vol. 3, No. 3, October
2007, pp. 4248.
Fraser, Orlaith N., Gabriele Schino, and Filippo Aureli, Components of Relationship Quality in
Chimpanzees, Ethology, Vol. 114, No. 9, 2008, pp. 834843.
Fravel, M. Taylor, International Relations Theory and Chinas Rise: Assessing Chinas Potential for
Territorial Expansion, International Studies Review, Vol. 12, No. 4, December 2010, pp. 505532.
Fravel, M. Taylor, Regime Insecurity and International Cooperation: Explaining Chinas Compromises in
Territorial Disputes, International Security, Vol. 30, No. 2, Fall 2005, pp. 4683.
Freedman, Lawrence, International Security: Changing Targets, Foreign Policy, No. 110, Spring 1998, p.
48.
Freeman Jr., David F., Kevin A. Zambrowicz, and EuniceyY. Kang, The SECs Proposed Regulation NMS,
Banking & Financial Services Policy Report, Vol. 23, No. 6, June 2004, pp. 111.
Freeman, Christopher, Introduction: Security, Governance and Statebuilding in Afghanistan,
International Peacekeeping (13533312), Vol. 14, No. 1, March 2007, pp. 17.
Freistein, Katja, ASEAN After the Bali Summit 2003: From Paralysis to New Life?, European Journal of
East Asian Studies, Vol. 4, No. 2, 2005, pp. 177203.
Friedman, Ariella, and Ayala M. Pines, Increase in Arab Womens Perceived Power in the Second Half of
Life, Sex Roles, Vol. 26, No. 1/2, January 1992, pp. 19.
Friedman, Sarah L., and D. Ellen Boyle, Attachment in US Children Experiencing Nonmaternal Care in the
Early 1990s, Attachment & Human Development, Vol. 10, No. 3, 2008, pp. 225261.
Friesendorf, Cornelius, Paramilitarisation and Security Sector Reform: The Afghan National Police,
International Peacekeeping (13533312), Vol. 18, No. 1, February 2011, pp. 7995.
Frosh, Paul, Penetrating Markets, Fortifying Fences: Advertising, Consumption, and Violent National
Conflict, Public Culture, Vol. 19, No. 3, Fall 2007, pp. 461482.

356
Fry, Maxwell J., Harmonisation of Social Security in the EC Revisited, Journal of Common Market Studies,
Vol. 29, No. 5, 1991, p. 505.
Fukuda-Parr, Sakiko, Gender, Globalisation and New Threats to Human Security, Peace Review, Vol. 16,
No. 1, March 2004, pp. 3542.
Fuller, Elizabeth, TSA Defends Searches of Children, Elderly, Amid Fresh Complaints, Christian Science
Monitor, June 27, 2011, p. N.PAG.
Furmonavicius, Darius, Security Threats to the Baltic Sea Region and to Europe as a Whole Related to the
Kaliningrad Military Base, Conference Papers -- International Studies Association, Annual Meeting
2007, p. 1.
Furnell, Steven, Cybercrime: The Transformation of Crime in the Information Age, British Journal of
Sociology, Vol. 59, No. 1, March 2008, pp. 177179.
Fuster, Luisa, Aye mrohorolu, and Selahattin mrohorolu, A Welfare Analysis of Social Security in a
Dynastic Framework*, International Economic Review, Vol. 44, No. 4, November 2003, p. 1247.
Gabaix, Xavier, Arvind Krishnamurthy, and Oliver Vigneron, Limits of Arbitrage: Theory and Evidence from
the Mortgage-Backed Securities Market, Journal of Finance, Vol. 62, No. 2, April 2007, pp. 557595.
Gabaldon, Theresa A., A Sense of a Security: An Empirical Study, Journal of Corporation Law, Vol. 25, No.
2, Winter 2000, p. 307.
Gabay, Nadav, Peace Begins at Home: Toleration, Identity Politics and the Changing Conception of
Peacemaking in Israel After Yitzhak Rabins Assassination, Social Identities, Vol. 12, No. 3, May 2006,
pp. 345375.
Gable, Kelly A., Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism and Using Universal
Jurisdiction as a Deterrent, Vanderbilt Journal of Transnational Law, Vol. 43, No. 1, January 2010,
pp. 57118.
Gaess, Roger, Interview: Israeli New Historian Avi Shlaim, Middle East Policy, Vol. 16, No. 3, Fall 2009,
pp. 96105.
Galante, Victoria, Practical Role-Based Access Control, Information Security Journal: A Global
Perspective, Vol. 18, No. 2, March 2009, pp. 6473.
Galasso, Vincenzo, Social Security: A Financial Appraisal for the Median Voter, Social Security Bulletin,
Vol. 64, No. 2, June 2001, p. 57.
Galati, Gabriele, and Philip Wooldridge, The Euro as a Reserve Currency: a Challenge to the Pre-eminence
of the US Dollar?, International Journal of Finance & Economics, Vol. 14, No. 1, January 2009, pp. 1
23.
Galbreath, David J., Putting the Colour into Revolutions? The OSCE and Civil Society in the Post-Soviet
Region, Journal of Communist Studies & Transition Politics, Vol. 25, No. 2/3, June 2009, pp. 161180.
Galbreath, David, EU Enlargement and the Transatlantic Alliance: A Security Relationship in Flux Edited
by S. Biscop and J. Lembke, Journal of Common Market Studies, Vol. 47, No. 1, January 2009, p. 211.
Gale, William G., J. Mark Iwry, David C. John, and Lina Walker, Increasing Annuitisation in 401(k) Plans
with Automatic Trial Income, Hamilton Project: Discussion Papers, No. 2, June 2, 2008, pp. 128.
Gallegos, Danielle, Food Security For Refugees, Nutridate, Vol. 22, No. 1, March 2011, pp. 24.
Gallegos, Danielle, and Kai Ong, Are University Students Going Hungry?, Nutridate, Vol. 21, No. 4, 2010,
pp. 79.
Gallegos, Danielle, Pernilla Ellies, and Janine Wright, Still Theres No Food! Food Insecurity in a Refugee
Population in Perth, Western Australia, Nutrition & Dietetics, Vol. 65, No. 1, March 2008, pp. 7883.
Gallie, Duncan, Work Pressure in Europe 19962001: Trends and Determinants, British Journal of
Industrial Relations, Vol. 43, No. 3, 2005, pp. 351375.
Gandesha, Samir, Vancouver, British Columbia, Art Papers, December 2003.
Gao, Yuhui, and Frank Bradley, Engendering a Market Orientation: Exploring the Invisible Role of Leaders
Personal Values, Journal of Strategic Marketing, Vol. 15, No. 2/3, May 2007, pp. 7989.
Garfinkle, Adam, The Present Opportunity, National Interest, No. 65, Fall 2001, p. 153.
Garnett, Richard A., A System by Any Other Name, Peace & Change, Vol. 21, No. 2, April 1996, p. 228.
Garrison, Michael J., and Terry W. Knoepfle, Limited Liability Company Interests as Securities: A Proposed
Framework for Analysis, American Business Law Journal, Vol. 33, No. 4, Summer 1996, p. 577.

357
Garver, Eugene, Machiavellis The Prince: A Neglected Rhetorical Classic, Philosophy & Rhetoric, Vol. 13,
No. 2, Spring 1980, pp. 99120.
Garver, John W., The Security Dilemma in Sino-Indian Relations, India Review, Vol. 1, No. 4, October
2002, pp. 138.
Gayde, Ruth S., Stinson S. Mathai, and Kevin Wang, Aspects of Network Security for VoIP Solutions Using
IMS Core Network and Wi-Fi Access, Bell Labs Technical Journal, Vol. 12, No. 3, Fall 2007, pp. 167
185.
Gebhard, Carmen, and Per Martin Norheim-Martinsen, Making Sense of EU Comprehensive Security
Towards Conceptual and Analytical Clarity, European Security, Vol. 20, No. 2, June 2011, pp. 221
241.
Gecelovsky, Paul, Northern Enigma: American Images of Canada, American Review of Canadian Studies,
Winter 2007.
Geddes, Cameron G. R., David L. Bruhwiler, John R. Cary, Eric H. Esarey, Anthony J. Gonsalves, Chen Lin,
Estelle Cormier-Michel, et al., Development of High Gradient Laser Wakefield Accelerators Towards
Nuclear Detection Applications at LBNL, AIP Conference Proceedings, Vol. 1099, No. 1, March 15,
2009, pp. 666669.
Gedye, Mike, The Development of New Zealands Secured Transactions Jurisprudence, University of New
South Wales Law Journal, Vol. 34, No. 2, 2011, pp. 696733.
Geffert, Brian T., Incorporating HIPAA Security Requirements into an Enterprise Security Program,
Information Systems Security, Vol. 13, No. 5, December 2004, pp. 2128.
George, Ranjan, and Stewart R. Clegg, An Inside Story: Tales From the Field--Doing Organisational
Research in a State of Insecurity, Organisation Studies (Walter De Gruyter GmbH & Co. KG.), Vol. 18,
No. 6, November 1997, p. 1015.
Ghebali, Victor-Yves, The 14 Session of the OSCE Ministerial Council: Still Addressing the Visible Tips of
Political Icebergs, Helsinki Monitor, Vol. 18, No. 1, January 2007, pp. 1645.
Gheciu, Alexandra, and Jennifer Welsh, The Imperative to Rebuild: Assessing the Normative Case for
Postconflict Reconstruction, Ethics & International Affairs, Vol. 23, No. 2, June 2009, pp. 121146.
Ghica-Radu, Dan, The Effects of Globalisation on Security in the 21st Century, Buletin Stiintific, Vol. 13,
No. 2, December 2008, pp. 916.
Ghilarducci, Teresa, If This Isnt the Time for a Guaranteed Retirement Account, When Is It?, Journal of
Pension Benefits: Issues in Administration, Vol. 16, No. 3, Spring 2009, pp. 2128.
Ghilarducci, Teresa, When Bad Things Happen to Good Pensions, Dollars & Sense, No. 259, June 2005,
pp. 1025.
Ghosh, Arvin, The Rise and Fall and the Rise Again of the United States IPOS, Global Journal of Business
Research (GJBR), Vol. 1, No. 1, January 2007, pp. 1123.
Gil, David G., The United States Versus Child Abuse, Journal of Clinical Child Psychology, Vol. 12, No. 3,
Winter 1983, p. 300.
Gill, Peter, Securing the Globe: Intelligence and the Post-9/11 Shift from Liddism to Drainism,
Intelligence & National Security, Vol. 19, No. 3, 2004, pp. 467489.
Gillath, Omri, and Joshua Hart, The Effects of Psychological Security and Insecurity on Political Attitudes
and Leadership Preferences, European Journal of Social Psychology, Vol. 40, No. 1, February 2010,
pp. 122134.
Gillath, Omri, Phillip R. Shaver, Mario Mikulincer, Rachel E. Nitzberg, Ayelet Erez, and Marinus H. Van
Ijzendoorn, Attachment, Caregiving, and Volunteering: Placing Volunteerism in an Attachment-
Theoretical Framework, Personal Relationships, Vol. 12, No. 4, December 2005, pp. 425446.
Gillen, Mark, A Comparison of Business Income Trust Governance and Corporate Governance: Is There a
Need for Legislation or Further Regulation?, McGill Law Journal, Vol. 51, No. 2, July 2006, pp. 327
383.
Gillespie, Stuart, and Suneetha Kadiyala, HIV/AIDS and Food and Nutrition Security: Interactions and
Response, American Journal of Agricultural Economics, Vol. 87, No. 5, December 2005, pp. 1282
1288.

358
Gilligan, Daniel O., John Hoddinott, and Alemayehu S. Taffesse, The Impact of Ethiopias Productive Safety
Net Programme and Its Linkages, Journal of Development Studies, Vol. 45, No. 10, November 2009,
pp. 16841706.
Gillis, John G., Codes of Ethics for Investment Companies, Financial Analysts Journal, Vol. 37, No. 2,
March 1981, p. 14.
Gillis, John G., Securities Law and Regulation, Financial Analysts Journal, Vol. 33, No. 6, November 1977,
pp. 1370.
Ginneken, Wouter Van, Extending Social Security: Policies for Developing Countries, International Labour
Review, Vol. 142, No. 3, 2003, pp. 277294.
Gleick, Peter H., Environment and Security: The Clear Connections, Bulletin of the Atomic Scientists, Vol.
47, No. 3, April 1991, p. 16.
Glen, Carol M., The United Nations Charter System and the Iraq Wars, Public Integrity, Vol. 11, No. 4, Fall
2009, pp. 309326.
Glister, Jamie, The Role of Trusts in the PPSA, University of New South Wales Law Journal, Vol. 34, No. 2,
2011, pp. 628645.
Glosny, Michael A., Phillip C. Saunders, and Robert S. Ross, Debating Chinas Naval Nationalism, MIT
Press, Fall 2010.
Godecki, Anita, Human Security and Managing Financial Crises: Can Human Security Be Effectively
Managed?, Chinese Journal of International Law, Vol. 6, No. 1, March 2007, pp. 135155.
Goldewijk, Berma K., Why Human? The Interlinkages Between Security, Rights and Development,
Security & Human Rights, Vol. 19, No. 1, January 2008, pp. 2436.
Goldmark, Daniel, and Utz McKnight, Locating America: Revisiting Disneys Lady and the Tramp, Social
Identities, Vol. 14, No. 1, January 2008, pp. 101120.
Goldreich, Oded, Cryptography and Cryptographic Protocols, Distributed Computing, Vol. 16, No. 2/3,
2003, pp. 177199.
Goldring, Natalie J., Toward Restraint, Harvard International Review, Vol. 17, No. 1, Winter 1994, p. 34.
Goldsmith, Benjamin E., Arms Racing in Space: Spatial Modelling of Military Spending Around the
World, Australian Journal of Political Science, Vol. 42, No. 3, 2007, pp. 419440.
Goldstein, Daniel M., Toward a Critical Anthropology of Security, Current Anthropology, Vol. 51, No. 4,
2010, pp. 487517.
Goldstein, Daniel M., Gloria Ach, Eric Hinojosa, and Theo Roncken, La Mano Dura and the Violence of
Civil Society in Bolivia, Social Analysis, Vol. 51, No. 2, Summer 2007, pp. 4363.
Goldstein, Jonathan, The Republic of China and Israel, 1911-2003, Israel Affairs, Vol. 10, No. 1/2, Autumn
2003, pp. 223253.
Goldstein, Mark L., Actions Needed to Improve Security Practices at National Icons and Parks, GAO
Reports, 2009, pp. 147.
Goldsworthy, Heather, Microfinance, Human Security, and Millennium Development Goal No. 7,
Perspectives on Global Development & Technology, Vol. 9, No. 3/4, May 2010, pp. 449472.
Golonka, Marta, The European Union and the United States: Competition and Convergence in the Global
Arena By S. McGuire and M. Smith, Journal of Common Market Studies, Vol. 47, No. 1, January
2009, pp. 215216.
Gomiero, Tiziano, David Pimentel, and Maurizio G. Paoletti, Is There a Need for a More Sustainable
Agriculture?, Critical Reviews in Plant Sciences, Vol. 30, No. 1/2, April 2011, pp. 623.
Gong, Guan, and Anthony Webb, Mortality Heterogeneity and the Distributional Consequences of
Mandatory Annuitisation, Journal of Risk & Insurance, Vol. 75, No. 4, December 2008, pp. 1055
1079.
Goodby, James E., Europe Undivided, Washington Quarterly, Vol. 21, No. 3, Summer 1998, p. 191.
Goodhand, Jonathan, From War Economy to Peace Economy? Reconstruction and State Building in
Afghanistan, Journal of International Affairs, Vol. 58, No. 1, Fall 2004, pp. 155173.
Goodhand, Jonathan, and Mark Sedra, Bribes or Bargains? Peace Conditionalities and Post-Conflict
Reconstruction in Afghanistan, International Peacekeeping (13533312), Vol. 14, No. 1, March 2007,
pp. 4161.

359
Goodrich, Michael T., Roberto Tamassia, and Danfeng (Daphne) Yao, Notarised Federated ID
Management and Authentication, Journal of Computer Security, Vol. 16, No. 4, 2008, pp. 399418.
Gordon, Myron J., Insecurity, Growth, and the Rise of Capitalism, Journal of Post Keynesian Economics,
Vol. 9, No. 4, Summer 1987, p. 529.
Gordon, Richard L., Hicks, Hayek, Hotelling, Hubbert, and Hysteria or Energy, Exhaustion,
Environmentalism, and Etatism in the 21st Century, Energy Journal, Vol. 30, No. 2, April 2009, pp. 1
16.
Gordon-Giles, Nitsan, and Wafa Zidan, Assessing the Beyond Words Educational Model for Empowering
Women, Decreasing Prejudice and Enhancing Empathy, American Journal of Dance Therapy, Vol. 31,
No. 1, June 2009, pp. 2052.
Gorenburg, Dmitry, Marlene Laruelle, Myra A. Waterbury, Oleh Protsyk, Matthew H. Ciscel, Theodore R.
Weeks, Irina Culic, Jeffrey Stevenson Murer, and Grant Amyot, Book Reviews, Nationalities Papers,
Vol. 37, No. 6, November 2009, pp. 953972.
Gorgos, Diana, Dermatology Nursing News, Dermatology Nursing, Vol. 15, No. 1, February 2003, p. 69.
Gorman, Siobhan, A Cautionary Tale, National Journal, Vol. 37, No. 6, February 5, 2005, pp. 350354.
Gorrieri, Roberto, Roberto Lucchi, and Gianluigi Zavattaro, Supporting Secure Coordination in SecSpaces,
Fundamenta Informaticae, Vol. 73, No. 4, November 15, 2006, pp. 479506.
Gorton, Gary, The Subprime Panic, European Financial Management, Vol. 15, No. 1, January 2009, pp.
1046.
Gotbaum, Joshua, Proposal Will Strengthen Corporate DB Plans, Pensions & Investments, Vol. 39, No. 14,
July 11, 2011, p. 10.
Goure, DanielMurphy, This One Will Be Different, Sea Power, Vol. 44, No. 4, April 2001, p. 95.
Gourevitch, Alex, Environmentalism - Long Live the Politics of Fear, Public Culture, Vol. 22, No. 3, Fall
2010, pp. 411424.
Graebner, Ivete TeresinhaSouza, Action-research and Food and Nutrition Security: A School Experience
Mediated by Conceptual Graphic Representation Tool, International Journal of Science Education,
Vol. 31, No. 6, April 2009, pp. 809827.
Graf, Rdiger, Between National and Human Security: Energy Security in the United States and Western
Europe in the 1970s, Historical Social Research, Vol. 35, No. 4, December 2010, pp. 329348.
Graham, Avy D., Coordinating Private Pension Benefits with Social Security, Monthly Labour Review, Vol.
117, No. 3, March 1994, p. 35.
Graham, Stephen, [image omitted]Cities as Battlespace: The New Military Urbanism, City, Vol. 13, No. 4,
December 2009, pp. 383402.
Graham, Steven, Human Security in the Asia Pacific Region: Security Challenges, Regional Integration, and
Representative Case Studies, Journal of Asia Pacific Studies, Vol. 1, No. 3, December 2010, pp. 657
665.
Grand, Noah, Quotability, Newsworthiness, and Agenda Setting in Presidential Press Conferences,
Conference Papers -- American Sociological Association, Annual Meeting 2008, p. 1.
Grattan, Alan, Reflexive Modernisation, Existential Anxiety and Sense of Identity: An Exploration of
Perceived Identity in Crisis, International Journal of Diversity in Organisations, Communities &
Nations, Vol. 7, No. 4, November 15, 2007, pp. 93102.
Gray III, James W., Kin Fai Epsilon Ip, and King-Shan Lui, Provable Security for Cryptographic Protocols-
exact Analysis and Engineering Applications, Journal of Computer Security, Vol. 6, No. 1/2, March
1998, p. 23.
Gray, John A., Reforms to Improve Client Protection and Compensation Against Personal Financial
PlannersUnethical Business, American Business Law Journal, Vol. 32, No. 2, 1994, p. 245.
Green, Danielle M., Steller V. Pennsylvania Securities Commission the Security of Death: The Viatical
Industry and Protection of Investors, Widener Law Journal, Vol. 15, No. 2, February 2006, pp. 347
357.
Green, Michael J., and Daniel Twining, Democracy and American Grand Strategy in Asia: The Realist
Principles Behind an Enduring Idealism, Contemporary Southeast Asia: A Journal of International &
Strategic Affairs, Vol. 30, No. 1, April 2008, pp. 128.

360
Green, Michael, The United States and East Asia in the Unipolar Era, Journal of Strategic Studies, Vol. 24,
No. 4, December 2001, p. 21.
Greene, Tim, Extreme Road Map Plots Broader View of Mobility, Network World, Vol. 28, No. 5, March 7,
2011, p. 12.
Gregory, Frank, and James Sheptycki, Private Criminality as a Matter of International Concern, Issues in
Transnational Policing, Taylor & Francis Ltd / Books, 2000, pp. 100134.
Grey, David, and Claudia W. Sadoff, Sink or Swim? Water Security for Growth and Development, Water
Policy, Vol. 9, No. 6, November 2007, pp. 545571.
Griffin, C. E., The Imperatives of Regional Governance: Security the Tourism Sector and Enhancing Human
Security, Social & Economic Studies, Vol. 54, No. 4, December 2005, pp. 1341.
Griffin, Clifford E., Economic Restructuring, Human Rights, State Security and Democratic Viability in
Trinidad and Tobago, Round Table, Vol. 335, No. 1, July 1995, p. 297.
Griffin, J. M., Transportation Safety Risk for Source Recovery Versus Consequence of Leaving Radioactive
Sources in Place and Vulnerable Due to Limited Transport Options or Denial of Shipment, Packaging,
Transport, Storage & Security of Radioactive Materials, Vol. 21, No. 3, 2010, pp. 147151.
Grimes, Richard P., Consumer-focused Approach Fuels Assisted Living Growth, Long-Term Living: For the
Continuing Care Professional, Vol. 57, No. 10, October 2008, pp. 7879.
Gropas, Ruby, Functional Borders, Sustainable Security and EU-Balkan Relations, Journal of Southeast
European & Black Sea Studies, Vol. 4, No. 1, January 2004, pp. 4976.
Grove, Kevin J., Insuring Our Common Future? Dangerous Climate Change and the Biopolitics of
Environmental Security, Geopolitics, Vol. 15, No. 3, July 2010, pp. 536563.
GROVES, Gabrielle Eva Carol, Bernadette P. RESURRECCION, and Philippe DONEYS, Keeping the Peace Is
Not Enough: Human Security and Gender-based Violence During the Transitional Period of Timor-
Leste, SOJOURN: Journal of Social Issues in Southeast Asia, Vol. 24, No. 2, October 2009, pp. 186
210.
Gruber, Jonathan, and Peter Orszag, Does the Social Security Earnings Test Affect Labour Supply and
Benefits Receipt?, National Tax Journal, Vol. 56, No. 4, December 2003, pp. 755773.
Grubisa, Damir, The Europeanisation of Croatias Security Discourse, Politicka Misao: Croatian Political
Science Review, Vol. 46, No. 5, November 2009, pp. 3953.
Gruiters, Jan, Human Security and Development: An Ambivalent Relationship, Security & Human Rights,
Vol. 19, No. 1, January 2008, pp. 5463.
Gruska, Damas P., Network Information Flow, Fundamenta Informaticae, Vol. 72, No. 1/3, July 15, 2006,
pp. 167180.
Gruska, Damas P., Process Algebra Contexts and Security Properties, Fundamenta Informaticae, Vol.
102, No. 1, December 20, 2010, pp. 6376.
Gruska, Damas P., Quantifying Security for Timed Process Algebras, Fundamenta Informaticae, Vol. 93,
No. 1/3, December 2009, pp. 155169.
Gu Tian-yang, Shi Yin-sheng, and Fang You-yuan, Research on Software Security Testing, World Academy
of Science, Engineering & Technology, Vol. 69, 2010, pp. 647651.
Guney, Nursin Atesoglu, The Region-Building Practices of the EU in the Mediterranean: The EMP and ENP,
What Is Next?, European Security, Vol. 17, No. 1, March 2008, pp. 123139.
Gunluk-Senesen, Gulay, Budgetary Trade-Offs of Security Expenditures in Turkey, Defence & Peace
Economics, Vol. 13, No. 5, October 2002, p. 385.
Gupta, Bindu, Sarika Singh, and Navneet Singh, Self-Monitoring and Perceived Job Security and Use of
Sanctioned and Non-sanctioned Political Tactics, Vilakshan: The XIMB Journal of Management, Vol.
5, No. 2, 2008, pp. 1532.
Gr, Sengl ymen, Modernity Vs. Postmodernity in Architectural Education, Journal of Architectural
and Planning Research, July 15, 2007.
Guthrie, Joanne F., and Biing-Hwan Lin, Overview of the Diets of Lower- and Higher-Income Elderly and
Their Food Assistance Options, Journal of Nutrition Education & Behaviour, Vol. 34, No. 2, 2002, p.
S31.

361
Guthrie, JoanneNewman, USDA School Meal Programs Face New Challenges, Choices: The Magazine of
Food, Farm & Resource Issues, Vol. 24, No. 3, Quarter 2009, p. 36.
Gutirrez, Carlos, Eduardo Fernndez-Medina, and Mario Piattini, Web Services Security: Is the Problem
Solved?, Information Systems Security, Vol. 13, No. 3, August 2004, pp. 2231.
Guttman, Joshua D., Amy L. Herzog, John D. Ramsdell, and Clement W. Skorupka, Verifying Information
Flow Goals in SecurityEnhanced Linux, Journal of Computer Security, Vol. 13, No. 1, March 2005, pp.
115134.
Haacke, Jrgen, and Paul D. Williams, Conclusions: Security Culture and Transnational Challenges -
ECOWAS in Comparative Perspective, Journal of Contemporary African Studies, Vol. 26, No. 2, April
2008, pp. 213222.
Haacke, Jrgen, and Paul D. Williams, Regional Arrangements, Securitisation, and Transnational Security
Challenges: The African Union and the Association of Southeast Asian Nations Compared, Security
Studies, Vol. 17, No. 4, December 2008, pp. 775809.
Habibov, Nazim N., and Lida Fan, Comparison of Inequality Reduction and Income Security in Canada
from a Mixed to Neo-liberal Welfare Regime: Micro-data Simulations and Policy Implications,
Journal of Comparative Social Welfare, Vol. 24, No. 1, April 2008, pp. 3347.
Haerpfer, Christian, Cezary Milosinski, and Claire Wallace, Old and New Security Issues in Post-
Communist Eastern Europe: Results of an 11 Nation Study, Europe-Asia Studies, Vol. 51, No. 6, 1999,
pp. 9891011.
Haidar, Ali, and Keri Spooner, Community Not the Councillors: A Study of Commitment of Australian
Senior Council Officers Working Under a Politicised Employment Relationship, Australian Journal of
Public Administration, Vol. 68, No. 2, June 2009, pp. 139151.
Hairault, Jean-Olivier, Franois Langot, and Thepthida Sopraseuth, Quantifying the Laffer Curve on the
Continued Activity Tax in a Dynastic Framework, International Economic Review, Vol. 49, No. 3,
2008, pp. 755797.
Hakkio, Craig S., and Elisha J. Wiseman, Social Security and Medicare: The Impending Fiscal Challenge,
Economic Review (01612387), Vol. 91, No. 1, Quarter 2006, pp. 741.
Hall, Rachel, Of Ziploc Bags and Black Holes: The Aesthetics of Transparency in the War on Terror,
Communication Review, Vol. 10, No. 4, December 2007, pp. 319346.
Hallier, Jerry, Security Abeyance: Coping with the Erosion of Job Conditions and Treatment, British
Journal of Management, Vol. 11, No. 1, March 2000, pp. 7189.
Halpern, Joseph Y., and Kevin R. ONeill, Anonymity and Information Hiding in Multiagent Systems,
Journal of Computer Security, Vol. 13, No. 3, June 2005, pp. 483514.
Hameiri, Shahar, Risk Management, Neo-liberalism and the Securitisation of the Australian Aid Program,
Australian Journal of International Affairs, Vol. 62, No. 3, 2008, pp. 357371.
Hamilton-Hart, Natasha, War and Other Insecurities in East Asia: What the Security Studies Field Does
and Does Not Tell Us, Pacific Review, Vol. 22, No. 1, March 2009, pp. 4971.
Hamm, Michael W, and Anne C Bellows, Community Food Security: Background and Future Directions,
Journal Of Nutrition Education And Behaviour, Vol. 35, No. 1, February 2003, pp. 3743.
Hamm, Michael W., and Anne C. Bellows, Community Food Security and Nutrition Educators, Journal of
Nutrition Education & Behaviour, Vol. 35, No. 1, February 2003, pp. 3743.
Hammer, Viva, Dealer Mark-to-market Rules-new Guidance from the Internal Revenue Service, CPA
Journal, Vol. 67, No. 5, May 1997, p. 83.
Hanggi, Heiner, and Vincenza Scherrer, Towards an Integrated Security Sector Reform Approach in UN
Peace Operations, International Peacekeeping (13533312), Vol. 15, No. 4, October 2008, pp. 486
500.
Hanks Jr., James J., Control Share Acquisition Statutes, Section 18(i) and Closed-End Funds. (cover Story),
Investment Lawyer, Vol. 18, No. 5, May 2011, pp. 119.
Hanmer, Robert S.McBride, Comparing Reliability and Security: Concepts, Requirements, and
Techniques, Bell Labs Technical Journal, Vol. 12, No. 3, Fall 2007, p. 65.
Hans Lindahl, Border Crossings by Immigrants: Legality, Illegality, and Alegality, Res Publica (13564765),
Vol. 14, No. 2, June 2008, pp. 117135.

362
Hanson, Matthew, and Lynn Hume, FSA Case Could Raise Premiums, Bond Buyer, Vol. 361, No. 32717,
2007, pp. 17.
Hanson, Scott, The Retirement Paycheck, Advisor Today, Vol. 105, No. 5, May 2010, pp. 1618.
Haque, M. Shamsul, Environmental Security in East Asia: A Critical View, Journal of Strategic Studies, Vol.
24, No. 4, December 2001, p. 203.
Harders, Cilja, Gender and Security in the Mediterranean, Mediterranean Politics, Vol. 8, No. 2/3,
Autumn 2003, pp. 5472.
Hardt, Heidi, Rapid Response or Evasive Action? Regional Organisation Responses to Peace Operation
Demands, European Security, Vol. 18, No. 4, December 2009, pp. 383415.
Harer, John B., Revisiting Information Delivery in the Evolving Electronic Library: The Information Cycle
Network (ICN) Then and Now, Journal of Access Services, Vol. 7, No. 2, June 2010, pp. 97108.
Harnik, Danny, and Moni Naor, On the Compressibility of NP Instances and Cryptograhpic Applications,
SIAM Journal on Control & Optimisation, Vol. 48, No. 5, January 2010, pp. 16671713.
Harris, Charles B., Todd Andrews, Ontological Insecurity, and The Floating Opera, Critique, Vol. 18, No. 2,
December 1976, p. 34.
Harris, Grant T., The Era of Multilateral Occupation, Berkeley Journal of International Law, Vol. 24, No. 1,
March 2006, pp. 178.
Harris, Stuart, Global and Regional Orders and the Changing Geopolitics of Energy, Australian Journal of
International Affairs, Vol. 64, No. 2, April 2010, pp. 166185.
Harrison, William L., and James Hook, Achieving Information Flow Security Through Monadic Control of
Effects, Journal of Computer Security, Vol. 17, No. 5, October 2009, pp. 599653.
Hart, Gary, The Shield and the Cloak, Issues in Science & Technology, Vol. 23, No. 1, Fall 2006, p. 37.
Hartley, Keith, The Case for Defence, Defence & Peace Economics, Vol. 21, No. 5/6, December 2010, pp.
409426.
Hartung, William D., Needed: A New Security Plan, Nation, Vol. 283, No. 14, October 30, 2006, p. 24.
Harty, Mari-Anne, Jenny Shaw, Stuart Thomas, Mairead Dolan, Lisa Davies, Graham Thornicroft, Julie
Carlisle, et al., The Security, Clinical and Social Needs of Patients in High Security Psychiatric
Hospitals in England, Journal of Forensic Psychiatry & Psychology, Vol. 15, No. 2, June 2004, pp. 208
221.
Hartzell, Caroline, Matthew Hoddie, and Donald Rothchild, Stabilizing the Peace After Civil War: An
Investigation of Some Key Variables, International Organisation, Vol. 55, No. 1, Winter 2001, pp.
183208.
Harvey, Frank P., Canadas Addiction to American Security: The Illusion of Choice in the War on
Terrorism, American Review of Canadian Studies, Vol. 35, No. 2, Summer 2005, pp. 265294.
Hashim, Ahmed S., Military Power and State Formation in Modern Iraq, Middle East Policy, Vol. 10, No.
4, December 2003, pp. 2947.
Hasnat, Syed Farooq, Pakistan - U.S. Relations on Slippery Grounds: An Account of Trust and Its Deficit,
Pakistan Vision, Vol. 12, No. 1, June 2011, pp. 2369.
Hatcher, Charles B., A Life-Course Approach to Measuring Household Wealth, Journal of Consumer
Affairs, Vol. 33, No. 2, Winter 1999, p. 358.
Haughton, Suzette A., The US-Caribbean Border: An Important Security Border in the 21st Century,
Journal of Borderlands Studies, Vol. 24, No. 3, 2009, pp. 120.
Hawkins, Penelope, South Africas Financial Sector Ten Years on: Performance Since Democracy,
Development Southern Africa, Vol. 21, No. 1, March 2004, pp. 179204.
Hayajneh, Adnan M., Arab Middle East Governments: Security Concerns, Priorities and Policies,
Alternatives: Turkish Journal of International Relations, Vol. 5, No. 4, Winter 2006, pp. 7792.
Hayden, Patrick, Constraining War: Human Security and the Human Right to Peace, Human Rights
Review, Vol. 6, No. 1, December 2004, pp. 3555.
Hayes, Michael, Promises to Keep, Journal of Accountancy, Vol. 200, No. 1, July 2005, pp. 4144.
Haynes, Wendy, Seeing Around Corners: Crafting the New Department of Homeland Security, Review of
Policy Research, Vol. 21, No. 3, May 2004, pp. 369395.

363
Hyrynen, Nina, Environmental Security: The Case of the Kursk, Environmental Politics, Vol. 12, No. 3,
2003, pp. 6582.
Hazbun, Waleed, US Policy and the Geopolitics of Insecurity in the Arab World, Geopolitics, Vol. 15, No.
2, April 2010, pp. 239262.
He, Kai, and Huiyun Feng, If Not Soft Balancing, Then What? Reconsidering Soft Balancing and U.S. Policy
Toward China, Security Studies, Vol. 17, No. 2, June 2008, pp. 363395.
Head, Richard G., General: Military, Technological, and Scientific, Foreign Affairs, Vol. 56, No. 3, April
1978, pp. 668670.
Heathers, Glen, Child Development, Child Development, Vol. 25, No. 2, June 1954, p. 147.
Heenan, Tom, Robert Mannes Wilfred Burchett: The Uses and Abuses of Biography, Australian Journal
of Politics & History, Vol. 56, No. 2, June 2010, pp. 208224.
Hegghammer, Thomas, Islamist Violence and Regime Stability in Saudi Arabia, International Affairs, Vol.
84, No. 4, July 2008, pp. 701715.
Hein, Jay, John Clark, Robert Ebel, and Dong Hyung Cha, Changing Geopolitics of Oil in Asia & the USA,
New England Journal of Public Policy, Summer 2007.
Heinig, Peter, Social Service and Public Expenditure in Sweden: Recent Developments and Problems,
Industrial & Labour Relations Review, Vol. 13, No. 4, July 1960, pp. 533549.
Heininen, Lassi, and Heather N. Nicol, The Importance of Northern Dimension Foreign Policies in the
Geopolitics of the Circumpolar North, Geopolitics, Vol. 12, No. 1, Spring 2007, pp. 133165.
Heisbourg, Franois, A New Security Landscape: The End of the Post-Cold War Era, Asia-Pacific Review,
Vol. 10, No. 1, May 2003, p. 52.
Helfat, Jonathan N., Legal Notes, Secured Lender, Vol. 63, No. 4, 2007, p. 85.
Heller, Dominik, The Relevance of the ASEAN Regional Forum (ARF) for Regional Security in the Asia-
Pacific, Contemporary Southeast Asia: A Journal of International & Strategic Affairs, Vol. 27, No. 1,
April 2005, pp. 123145.
Helm, Robert W., David M. Geffen, and Stephanie A. Capistron, Mutual Funds Use of Credit Default
Swaps--Part I, Investment Lawyer, Vol. 16, No. 12, December 2009, pp. 39.
Hemmeter, Jeffrey, Health-Related Unmet Needs of Supplemental Security Income Youth After the Age-
18 Redetermination, Health Services Research, Vol. 46, No. 4, 2011, pp. 12241242.
Hemphill, Thomas A., Sovereign Wealth Funds: National Security Risks in a Global Free Trade
Environment, Thunderbird International Business Review, Vol. 51, No. 6, December 2009, pp. 551
566.
Hendricks, Charles W., Offering Tort Victims Some Solace: Why States Should Incorporate a 20% Set-Aside
Into Their Versions of article 9, Commercial Law Journal, Vol. 104, No. 3, Fall 1999, p. 265.
Hendriks, Bob, The Social and Economic Impacts of Peri-urban Access to Land and Secure Tenure for the
Poor: The Case of Nairobi, Kenya, International Development Planning Review, Vol. 30, No. 1,
February 2008, pp. 2766.
Hentz, James J., Peadar Kirby, Remonda Bensebat Kleinberg, Sam Kongwa, Geoffry R. Martin, and Rebecca
Tiessen, Book Reviews, European Journal of Development Research, Vol. 16, No. 2, June 2004, pp.
433443.
Herbauts, I. M., S. Bettelli, H. Hbel, and M. Peev, On the Optimality of Individual Entangling-probe
Attacks Against BB84 Quantum Key Distribution, European Physical Journal D -- Atoms, Molecules,
Clusters & Optical Physics, Vol. 47, No. 3, May 2008, pp. 395406.
Herman, Chaya, Managerialism, Fundamentalism and the Restructureing of Faith-Based Community
Schools, Educational Theory, Vol. 56, No. 2, May 2006, pp. 137158.
Herman, Paul F., and Gregory F. Treverton, The Political Consequences of Climate Change, Survival
(00396338), Vol. 51, No. 2, May 2009, pp. 137148.
Herz, Monica, Concepts of Security in South America, International Peacekeeping (13533312), Vol. 17,
No. 5, November 2010, pp. 598612.
Hetherington, Alastair, A British View of American Security Policy, Bulletin of the Atomic Scientists, Vol.
11, No. 4, April 1955, p. 161.

364
Heumbach-Steins, Marianne, Education for World Citizens in the Face of Dependency, Insecurity and Loss
of Control, Studies in Christian Ethics, Vol. 19, No. 1, April 2006, pp. 6380.
Hewitt, Steve, Information Believed True: RCMP Security Intelligence Activities on Canadian University.
Campuses and the Controversy Surrounding Them, 1961-71, Canadian Historical Review, Vol. 81,
No. 2, June 2000, p. 191.
Hicks, Alex, Insecurity and Welfare Regimes in Asia, Africa and Latin America: Social Policy in
Development Contexts, Governance, Vol. 20, No. 2, April 2007, pp. 359366.
Hierman, Brent, Eurasias New Frontiers: Young States, Old Societies, Open Futures, Central Asian
Survey, Vol. 28, No. 3, 2009, pp. 343345.
Higate, Paul, and Marsha Henry, Space, Performance and Everyday Security in the Peacekeeping
Context, International Peacekeeping (13533312), Vol. 17, No. 1, February 2010, pp. 3248.
Hill, Brittany, Ashley Moloney, Terry Mize, Tom Himelick, and Jodie Guest, Prevalence and Predictors of
Food Insecurity in Migrant Farmworkers in Georgia, American Journal of Public Health, Vol. 101, No.
5, May 2011, pp. 831833.
Hill, Dave, Globalisation and Its Educational Discontents: Neoliberalisation and Its Impacts on Education
Workers Rights, Pay and Conditions, International Studies in Sociology of Education, Vol. 15, No. 3,
December 2005, pp. 257288.
Hillman, Susanne, Russia as a Great Power: Dimensions of Security Under Putin, Australian Slavonic &
East European Studies, Vol. 20, No. 1/2, December 2006, pp. 236239.
Hills, Alice, The Rationalities of European Border Security, European Security, Vol. 15, No. 1, March 2006,
pp. 6788.
Himmelgreen, David, Nancy Romero Daza, Elizabeth Cooper, and Dinorah Martinez, I Dont Make the
Soups Anymore: Pre- to Post-Migration Dietary and Lifestyle Changes Among Latinos Living in West-
Central Florida, Ecology of Food & Nutrition, Vol. 46, No. 5/6, 2007, pp. 427444.
Hinckfuss, Ian, The Australian Armed Forces, Australian Defence and the Dibb Report, Social
Alternatives, April 1987.
Hinkkanen, Reea, Womens Infertility at the Crossroads of Modernity and Tradition, Suomen
Antropologi: Journal of the Finnish Anthropological Society, Vol. 34, No. 3, Fall 2009, pp. 7779.
Hirata, Keiko, Who Shapes the National Security Debate? Divergent Interpretations of Japans Security
Role, Asian Affairs: An American Review, Vol. 35, No. 3, 2008, p. 123.
Hirsch, Barry T., David A. MacPherson, and Melissa A. Hardy, Occupational Age Structure and Access for
Older Workers, Industrial & Labour Relations Review, Vol. 53, No. 3, April 2000, pp. 401418.
Hirst, Christian, The Paradigm Shift: 11 September and Australias Strategic Reformation, Australian
Journal of International Affairs, Vol. 61, No. 2, June 2007, pp. 175192.
Hitchcock, Yvonne, Paul Montague, Gary Carter, and Ed Dawson, The Efficiency of Solving Multiple
Discrete Logarithm Problems and the Implications for the Security of Fixed Elliptic Curves,
International Journal of Information Security, Vol. 3, No. 2, November 2004, pp. 8698.
Hite, Randolph C., Elections: All Levels of Government Are Needed to Address Electronic Voting System
Challenges: GAO-07-576T, GAO Reports, March 7, 2007, p. 1.
Ho, Christina, Responding to Oriental Feminism, Australian Feminist Studies, Vol. 25, No. 66, December
2010, p. 433.
Hodge, Tom C., The Treatment of Employees as Stakeholders in the European Union, Syracuse Journal of
International Law & Commerce, Vol. 38, No. 1, Fall 2010, pp. 91171.
Hoepman, Jaap-Henk, and Bart Jacobs, Increased Security: Through Open Source, Communications of
the ACM, Vol. 50, No. 1, January 2007, pp. 7983.
Hoepman, Jaap-Henk, and Bart Jacobs, To Ensure Security, Improve Software Quality, 2007.
Hoffman, Lonny Sheinkopf, Burdens of Jurisdictional Proof, Alabama Law Review, Vol. 59, No. 2, April
2008, pp. 409452.
Hoffman, Stanley, Not Like Us: How Europeans Have Loved, Hated, and Transformed American Culture
Since World War II (Book), Foreign Affairs, Vol. 76, No. 6, November 1997, p. 163.
Hoffmann, Richard, Choosing Your China Structure: Joint Ventures, Beijing Review, Vol. 52, No. 51,
December 24, 2009, p. 38.

365
Hofheinz, Dennis, Jrn Mller-Quade, and Dominique Unruh, Polynomial Runtime in Simulatability
Definitions, Journal of Computer Security, Vol. 17, No. 5, October 2009, pp. 703735.
Hofmeister, John, How the U.S. Can Ensure Energy Supply for the Future, McMurry Inc., April 2007.
Hlbl, Marko, Tatjana Welzer, and Botjan Brumen, An Improved Two-party Identity-based Authenticated
Key Agreement Protocol Using Pairings, Journal of Computer & System Sciences, Vol. 78, No. 1,
January 2012, pp. 142150.
Holdsworth, Robert B., Securing Aerial Approaches to Joint Airfield, JFQ: Joint Force Quarterly, No. 62,
Quarter 2011, pp. 135138.
Holladay, Sherry, and Kim Crutcher, Older Adults Motives for Mediated Interpersonal Communication:
An Examination of Telephone Communication and Loneliness, Communication Reports, Vol. 10, No.
2, Spring97 1997, pp. 173183.
Holmes, Bjarne M., and Karlen Lyons-Ruth, The Relationship Questionnaire-clinical Version (RQ-CV):
Introducing a Profoundly-distrustful Attachment Style, Infant Mental Health Journal, Vol. 27, No. 3,
June 2006, pp. 310325.
Holmes, Kim R., New World Disorder: A Critique of the United Nations, Journal of International Affairs,
Vol. 46, No. 2, Winter 1993, p. 323.
Holsti, Kal J., Politics in Command: Foreign Trade as National Security Policy, International Organisation,
Vol. 40, No. 3, Summer 1986, p. 643.
Holt, Thomas J., and Heith Copes, Transferring Subcultural Knowledge On-Line: Practices and Beliefs of
Persistent Digital Pirates, Deviant Behaviour, Vol. 31, No. 7, October 2010, pp. 625654.
Homan, Kees, The Military and Human Security, Security & Human Rights, Vol. 19, No. 1, January 2008,
pp. 7381.
Hoogensen, Gunhild, Bottoms Up! A Toast to Regional Security?, International Studies Review, Vol. 7,
No. 2, June 2005, pp. 269274.
Hooper, Tomoko I., Gary D. Gackstetter, Cynthia A. LeardMann, Edward J. Boyko, Lisa A. Pearse, Besa
Smith, Paul J. Amoroso, and Tyler C. Smith, Early Mortality Experience in a Large Military Cohort and
a Comparison of Mortality Data Sources, Population Health Metrics, Vol. 8, January 2010, pp. 1527.
Hopf, Ted, The Promise of Constructivism in International Relations Theory, International Security, Vol.
23, No. 1, Summer 1998, p. 171.
Hore-Lacy, Ian, Nuclear Power and Energy Sustainability, Science & Christian Belief, Vol. 23, No. 2,
October 2011, pp. 159176.
Horn, Bernie, Progressive Values 101, Nation, Vol. 282, No. 25, June 26, 2006, pp. 78.
Hrnqvist, Magnus, Risk Assessments and Public Order Disturbances: New European Guidelines for the
Use of Force?, Journal of Scandinavian Studies in Criminology & Crime Prevention, Vol. 5, No. 1, June
2004, pp. 426.
Houmb, Siv Hilde, Shareeful Islam, Eric Knauss, Jan Jrjens, and Kurt Schneider, Eliciting Security
Requirements and Tracing Them to Design: An Integration of Common Criteria, Heuristics, and
UMLsec, Requirements Engineering, Vol. 15, No. 1, March 2010, pp. 6393.
Hout, Wil, Between Development and Security: The European Union, Governance and Fragile States,
Third World Quarterly, Vol. 31, No. 1, February 2010, pp. 141157.
Hovakimian, Armen, Tim Opler, and Sheridan Titman, The Debt-Equity Choice, Journal of Financial &
Quantitative Analysis, Vol. 36, No. 1, March 2001, pp. 124.
Hovav, Anat, and John DArcy, The Impact of Denial-of-Service Attack Announcements on the Market
Value of Firms, Risk Management & Insurance Review, Vol. 6, No. 2, Fall 2003, pp. 97121.
Howard, Courtney E., Top Secrets: Securing Sensitive Data, Military & Aerospace Electronics, Vol. 8, No.
12, December 2007, p. 24.
Howat, John, and Linda Reid, Compensation Practices for Retail Sale of Mutual Funds: The Need for
Transparancy and Disclosure, Fordham Journal of Corporate & Financial Law, Vol. 12, No. 4, May
2007, pp. 685716.
Howe, Paul, and Stephen Devereux, Famine Intensity and Magnitude Scales: A Proposal for an
Instrumental Definition of Famine, Disasters, Vol. 28, No. 4, December 2004, pp. 353372.

366
Howes, Dustin Ells, When States Choose to Die: Reassessing Assumptions About What States Want,
International Studies Quarterly, Vol. 47, No. 4, December 2003, p. 669.
Hu, Joseph, Housing and the Mortgage Securities Markets: Review, Outlook, and Policy
Recommendations, Journal of Real Estate Finance & Economics, Vol. 5, No. 2, June 1992, pp. 167
179.
Hua, Guangying, An Experimental Investigation of Online Banking Adoption in China, Journal of Internet
Banking & Commerce, Vol. 14, No. 1, April 2009, pp. 112.
Huang, Kevin X. D., and Jan Werner, Implementing Arrow-Debreu Equilibria by Trading Infinitely-lived
Securities, Economic Theory, Vol. 24, No. 3, October 2004, pp. 603622.
Hudson, Graham, Whither International Law? Security Certificates, the Supreme Court, and the Rights of
Non-Citizens in Canada, Refuge, Vol. 26, No. 1, Winter 2009, pp. 172186.
Hudson, Natalie Florea, Securitizing Womens Rights and Gender Equality, Journal of Human Rights, Vol.
8, No. 1, March 2009, pp. 5370.
Hudson, Robert B., The Role of Government in `A Society for All Ages, Health & Social Work, Vol. 24, No.
2, May 1999, p. 155.
Huffman, Sonya Kostova, and Helen H. Jensen, Food Assistance Programs and Outcomes in the Context of
Welfare Reform, Social Science Quarterly (Blackwell Publishing Limited), Vol. 89, No. 1, March 2008,
pp. 95115.
Huggett, Mark, and Juan Carlos Parra, How Well Does the U.S. Social Insurance System Provide Social
Insurance?, Journal of Political Economy, Vol. 118, No. 1, February 2010, pp. 76112.
Hughes, Christopher W., Not Quite the Great Britain of the Far East: Japans Security, the US-Japan
Alliance and the War on Terror in East Asia, Cambridge Review of International Affairs, Vol. 20, No.
2, June 2007, pp. 325338.
Hughes, Dominic, and Vitaly Shmatikov, Information Hiding, Anonymity and Privacy: a Modular
Approach, Journal of Computer Security, Vol. 12, No. 1, February 2004, pp. 336.
Hui, Tak-Kee, and David Wan, Factors Affecting Internet Shopping Behaviour in Singapore: Gender and
Educational Issues, International Journal of Consumer Studies, Vol. 31, No. 3, May 2007, pp. 310
316.
Hukill, Traci, Reunited Nations?, National Journal, Vol. 37, No. 11, March 12, 2005, pp. 771775.
Humphreys, Jasper, and M.L.R. Smith, War and Wildlife: The Clausewitz Connection, International
Affairs, Vol. 87, No. 1, January 2011, pp. 121142.
Hung, Chi-Hsiou, Return Predictability of Higher-Moment CAPM Market Models, Journal of Business
Finance & Accounting, Vol. 35, No. 7/8, October 2008, pp. 9981022.
Hung, Patrick C. K., and Guang-Sha Qiu, Implementing Conflict of Interest Assertions in WS-policy with
Separation of Duties for Web Services Matchmaking Process, Information Systems & e-Business
Management, Vol. 2, No. 1, April 2004, pp. 127148.
Hung, Szu-Yin, and John Glascock, Momentum Profitability and Market Trend: Evidence from REITs,
Journal of Real Estate Finance & Economics, Vol. 37, No. 1, July 2008, pp. 5169.
Hung-Yu Chien, and Tzu-Hang Hsu, Secure Fast WLAN Handoff Using Time-bound Delegated
Authentication, International Journal of Communication Systems, Vol. 22, No. 5, May 2009, pp. 565
584.
Hunt, Swanee, Let Women Rule, Foreign Affairs, Vol. 86, No. 3, June 2007, pp. 109120.
Hunter, Robert E., NATOs Strategic Focus: Satisfying All of the Allies, American Foreign Policy Interests,
Vol. 31, No. 2, April 2009, pp. 7889.
Hunter, Robert E., and Seth G. Jones, An Independent Palestine: The Security Dimension, International
Affairs, Vol. 80, No. 2, March 2004, pp. 203219.
Hurrell, Andrew, Book Reviews: International Relations and Organisations, International Affairs, Vol. 76,
No. 1, January 2000, pp. 148149.
Hursoy, Siret, The European Union Foreign and Security Actions and the Western Balkans, Alternatives:
Turkish Journal of International Relations, Vol. 9, No. 1, Spring 2010, pp. 92111.
Huysmans, Jef, Defining Social Constructivism in Security Studies: The Normative Dilemma of Writing
Security, Alternatives: Global, Local, Political, Vol. 27, No. 1, 2002, p. 41.

367
Iams, Howard M.Sandell, Projecting Social Security Earnings: Past Is Prologue, Social Security Bulletin,
Vol. 60, No. 2, June 1997, p. 3.
Ibrahim, Nagwa, The Origins of Muslim Radicalisation in US Law, UCLA Journal of Islamic & Near Eastern
Law, Vol. 7, No. 1, March 2008, pp. 121155.
Icener, Erhan, Understanding Romania and Turkeys Integration with the European Union: Conditionality,
Security Considerations and Identity, Perspectives on European Politics & Society, Vol. 10, No. 2,
June 2009, pp. 225239.
Ihne, Robert W., Seeking a Meaning for Meaningful Residual Value and the Reality of Economic
Realities--An Alternative Roadmap for Distinguishing True Leases from Security Interests, Business
Lawyer, Vol. 62, No. 4, 2007, pp. 14391465.
Ilitchev, Aleksandr, One Korea Again?: When, If and How?, Journal of International Affairs, Vol. 60, No. 1,
Winter 2006, pp. 231237.
Imhoff, Eugene A., and Paul V. Par, Analysis and Comparison of Earnings Forecast Agents, Journal of
Accounting Research, Vol. 20, No. 2, Autumn82 Part1 1982, pp. 429439.
Inamori, H., N. Ltkenhaus, and D. Mayers, Unconditional Security of Practical Quantum Key
Distribution, European Physical Journal D -- Atoms, Molecules, Clusters & Optical Physics, Vol. 41,
No. 3, March 2007, pp. 599627.
Ingram, Robert W., A Descriptive Analysis of Municipal Bond Price Data for Use in Accounting Research,
Journal of Accounting Research, Vol. 23, No. 2, 1985, pp. 595618.
Inverarity, Lani, Immigration Bill 2007: Special Advocates and the Right to Be Heard, Victoria University
of Wellington Law Review, Vol. 40, No. 2, October 2009, pp. 471506.
Ioan, Nistor, Ulici (Ciupac-Ulici) Maria, and Schiau (Macavei) Laura Liana, Impact of Financial Crisis on
Construction Firms Cost of Capital, Annals of the University of Oradea, Economic Science Series, Vol.
19, No. 2, December 2010, pp. 616622.
Isaac, Peter, The Dirty Dozen, Chartered Accountants Journal, Vol. 88, No. 11, December 2009, pp. 61
62.
Ishai, Yuval, Jonathan Katz, Eyal Kushilevitz, Yehuda Lindell and Erez Petrank,, On Achieving the Best of
Both Worlds in Secure Multiparty Computation, SIAM Journal on Computing, Vol. 40, No. 1, January
2011, pp. 122141.
Ispas, Lucian, The Influence of Information on Human Security, Revista Academiei Fortelor Terestre, Vol.
15, No. 3, 2010, pp. 347352.
Ivan, Ion, Marius Popa, Drago Palaghita, Bogdan Vintil, and Mihai Doinea, The Particularities of the
Economic Crisis in the Knowledge-Based Society, Theoretical & Applied Economics, Vol. 18, No. 2,
February 2011, pp. 1332.
Ivanova, Antonina, Sustainability and Security: Timber Certification in Asia-Pacific Region, Portes: Revista
Mexicana De Estudios Sobre La Cuenca Del Pacifico, Vol. 2, No. 3, June 2008, pp. 3587.
Jabri, Vivienne, Critical Approaches to International Security, British Journal of Sociology, Vol. 59, No. 1,
March 2008, pp. 168169.
Jackson, Ashley, Global Insurgency and the New Foreign Policy, Defence Studies, Vol. 10, No. 1/2, June
2010, pp. 7587.
Jackson, Donna R., The Carter Administration and Somalia, Diplomatic History, Vol. 31, No. 4, 2007, pp.
703721.
Jackson, Peter, Editorial: Facing up to the Global Food Crisis, Geography, Vol. 95, No. 2, Summer 2010,
pp. 5859.
Jackson, Richard, The Core Commitments of Critical Terrorism Studies, European Political Science, Vol. 6,
No. 3, 2007, pp. 244251.
Jacobs, Susie, Land Reform: Still a Goal Worth Pursuing for Rural Women?, Journal of International
Development, Vol. 14, No. 6, 2002, pp. 887898.
Jain, B. M., India-China Relations: Issues and Emerging Trends, Round Table, Vol. 93, No. 374, April 2004,
pp. 253269.

368
Jamal, Amal, The Contradictions of State-Minority Relations in Israel: The Search for Clarifications,
Constellations: An International Journal of Critical & Democratic Theory, Vol. 16, No. 3, 2009, pp.
493508.
James Bishop, Phyllis Schumacher, and Katie Heeder, Comparison of Retirement Benefit Plans in a
Changing Economy, Proceedings for the Northeast Region Decision Sciences Institute (NEDSI), March
2010, pp. 349354.
James, John Alan, A Critical Choice: Bottom-up or Top-down Government?, Westchester County Business
Journal, Vol. 47, No. 25, June 20, 2011, p. 4.
Janssen, C. G. C., C. Schuengel, and J. Stolk, Understanding Challenging Behaviour in People with Severe
and Profound Intellectual Disability: a Stress-attachment Model, Journal of Intellectual Disability
Research, Vol. 46, No. 6, 2002, pp. 445453.
Jarrow, Robert A., Philip Protter, and K. Shimbso, Asset Price Bubbles in Incomplete Markets,
Mathematical Finance, Vol. 20, No. 2, April 2010, pp. 145185.
Jawad, Pamela, Conflict Resolution Through Democracy Promotion? The Role of the OSCE in Georgia,
Democratisation, Vol. 15, No. 3, June 2008, pp. 611629.
Jaye, Thomas, The Security Culture of the ECOWAS: Origins, Development and the Challenge of Child
Trafficking, Journal of Contemporary African Studies, Vol. 26, No. 2, April 2008, pp. 151168.
Jean, Carlo, Security in the Mediterranean and Italys Role, Mediterranean Quarterly, Vol. 8, No. 2,
Spring 1997, p. 129.
Jean, Stphane, Security-Sector Reform and Development: An African Perspective, Security Dialogue,
Vol. 36, No. 2, June 2005, pp. 249253.
Jeater, Diana, No Place for a Woman: Gwelo Town, Southern Rhodesia, 1894-1920, Journal of Southern
African Studies, Vol. 26, No. 1, March 2000, pp. 2942.
Jenkins Jr., William O., Emergency Preparedness and Response: Some Issues and Challenges Associated
with Major Emergency Incidents: GAO-06-467T, GAO Reports, February 23, 2006, p. 1.
Jenkins, Jr., Homeland Security: DHS Efforts to Enhance First Responders All-Hazards Capabilities Continue
to Evolve: GAO-05-652, U.S. Government Accountability Office, July 11, 2005.
Jennings, Kathleen M., Unclear Ends, Unclear Means: Reintegration in Postwar Societies-The Case of
Liberia, Global Governance, Vol. 14, No. 3, September 2008, pp. 327345.
Jennings, Marianne M., and Philip M. Recker, A Source of Insecurity: A Discussion and an Empirical
Examination of Standards of Disclosure and Levels of Materiality in Financial Statements, Journal of
Corporation Law, Vol. 10, No. 3, Spring 1985, p. 639.
Jennings, William W., and William Reichenstein, The Extended Portfolio in Private Wealth Management,
Journal of Wealth Management, Vol. 11, No. 1, Summer 2008, pp. 3645.
Jiguo Li, Xinyi Huang, Yi Mu, Willy Susilo, and Qianhong Wu, Constructions of Certificate-based Signature
Secure Against Key Replacement Attacks, Journal of Computer Security, Vol. 18, No. 3, April 2010,
pp. 421449.
Jimenez, Jimena, Changing Notions of Security in the Americas and the Concept of North American
Hemispheric Security, Conference Papers -- International Studies Association, Annual Meeting 2008,
p. 1.
Jobst, Andreas A., Islamic Securitisation After the Subprime Crisis, Journal of Structured Finance, Vol. 14,
No. 4, Winter 2009, pp. 4157.
Johnson, M. Eric, Information Risk of Inadvertent Disclosure: An Analysis of File-Sharing Risk in the
Financial Supply Chain, Journal of Management Information Systems, Vol. 25, No. 2, Fall 2008, pp.
97123.
Johnson, Nancy Brown, Philip Bobko, and Linda S. Hartenian, Union Influence on Local Union Leaders
Perceptions of Job Insecurity: An Empirical Test, British Journal of Industrial Relations, Vol. 30, No. 1,
March 1992, pp. 4560.
Johnson, Richard W., and Cori E. Uccello, Cash Balance Plans: What Do They Mean for Retirement
Security?, National Tax Journal, Vol. 57, No. 2, June 2004, pp. 315328.
Johnston, Les, Rethinking the Global Dynamics of Crime, Money and Power, Crime, Law & Social Change,
Vol. 50, No. 45, December 2008, pp. 411415.

369
Johnstone, Ian, Security Council Deliberations: The Power of the Better Argument, European Journal of
International Law, Vol. 14, No. 3, June 2003, pp. 437480.
Jolly, Richard, and Deepayan Basu Ray, Human Securitynational Perspectives and Global Agendas:
Insights from National Human Development Reports, Journal of International Development, Vol. 19,
No. 4, May 2007, pp. 457472.
Jones, Anwen, Marja Elsinga, Deborah Quilgars, and Janneke Toussaint, Home Owners Perceptions of
and Responses to Risk, European Journal of Housing Policy, Vol. 7, No. 2, June 2007, pp. 129150.
Jones, Seth G.Roy, Book Reviews, Survival (00396338), Vol. 49, No. 1, Spring 2007, pp. 235246.
Joseph, Jonathan, Governmentality of What? Populations, States and International Organisations, Global
Society: Journal of Interdisciplinary International Relations, Vol. 23, No. 4, October 2009, pp. 413
427.
Joshi, Vidya, Personality Profiles in Industrial and Preindustrial Cultures: A TAT Study, The Journal of
Social Psychology, Vol. 66, No. 1, 1965, pp. 101111.
Ju An Wang, Michael M. Guo, and Jairo Camargo, An Ontological Approach to Computer System
Security, Information Security Journal: A Global Perspective, Vol. 19, No. 2, January 15, 2010, pp. 61
73.
Jnemann, Annette, Repercussions of the Emerging European Security and Defence Policy on the Civil
Character of the Euro-Mediterranean Partnership, Mediterranean Politics, Vol. 8, No. 2/3, Autumn
2003, pp. 3753.
Juozaitien, Liongina, and Skaidr Zickien, Collective Investment Undertakings and Their Place in
Financial Market of Lithuania, Socialiniai Tyrimai, Vol. 2007, No. 1, January 2007, pp. 8897.
Justino, Patricia, Social Security in Developing Countries: MYTH or Necessity? Evidence from India,
Journal of International Development, Vol. 19, No. 3, April 2007, pp. 367382.
Kacowicz, Arie M., Rashomon in Jerusalem: Mapping the Israeli Negotiators Positions on the Israeli
Palestinian Peace Process, 19932001, International Studies Perspectives, Vol. 6, No. 2, May 2005,
pp. 252273.
Kahler, Christine, Foreign M&A in China Face Security Review, China Business Review, Vol. 38, No. 2,
June 2011, p. 14.
Kahler, Miles, Economic Security in an Era of Globalisation: Definition and Provision, Pacific Review, Vol.
17, No. 4, December 2004, pp. 485502.
Kahrs, Tuva, Regional Security Complex Theory and Chinese Policy Towards North Korea, East Asia: An
International Quarterly, Vol. 21, No. 4, Winter 2004, pp. 6482.
Kaim, Anthony N., Classifying the Right to Rental Payment Streams Stripped Off a Lease: An Examination
of the Issues Not Discussed in Commercial Money Centre, Texas Law Review, Vol. 86, No. 4, March
2008, pp. 857887.
Kalpakian, Jack, and Volkan Ipek, The Turkish-Armenian Rapprochment Processes: A Case Study
Approach, DOMES: Digest of Middle East Studies, Vol. 20, No. 2, Fall 2011, pp. 291321.
Kalven, Jamie, Security and Secrecy, Bulletin of the Atomic Scientists, Vol. 38, No. 8, October 1982, pp.
1617.
Kanaparo, Peter Balone, and Jerry Jacka, Papua New Guineas Participation in a Pacific Islands Regional
Security Force - Perspectives on Security Issues in the South Pacific, Contemporary PNG Studies, Vol.
10, May 2009, pp. 6380.
Kantner, Cathleen, and Angela Liberatore, Security and Democracy in the European Union: An
Introductory Framework, European Security, Vol. 15, No. 4, December 2006, pp. 363383.
Kaplow, Louis, Taxation and Social Security, American Law & Economics Association Papers, No. 40,
January 2007, pp. 128.
Karjoth, Gunter, Authorisation in CORBA Security, Journal of Computer Security, Vol. 8, No. 2/3, June
2000, p. 89.
Karpishpan, Yakov, Ozgur Turel, and Alexander Hasha, Introducing the Citi LMM Term Structure Model for
Mortgages, Journal of Fixed Income, Vol. 20, No. 1, Summer 2010, pp. 4458.
Karpman, Ben, Insecurity in Search of Security, American Journal of Psychotherapy, Vol. 50, No. 4, Fall
1996, p. 437.

370
Karyotis, Georgios, European Migration Policy in the Aftermath of September 11, Innovation: The
European Journal of Social Sciences, Vol. 20, No. 1, March 2007, pp. 117.
Kaschula, S., Wild Foods and Household Food Security Responses to AIDS: Evidence from South Africa,
Population & Environment, Vol. 29, No. 35, May 2008, pp. 162185.
Kashdan, Todd B., and William E. Breen, Materialism and Diminished Well-Being: Experiential Avoidance
as a Mediating Mechanism, Journal of Social & Clinical Psychology, Vol. 26, No. 5, May 2007, pp.
521539.
Kassenova, Nargis, Kazakhstans National Security: Conceptual and Operational Aspects, Central Asian
Survey, Vol. 24, No. 2, June 2005, pp. 151164.
Kastenberg, Joshua E., Analysing the Constitutional Tensions and Applicability of Military Rule of Evidence
505 in Court-Martials over United States Service Members, Air Force Law Review, Vol. 55, June
2004, pp. 233267.
Ktay, Gbor, Downward Wage Rigidity in Hungary, MNB Working Papers, Vol. 2011, No. 9, 2011, pp. 1
23.
Katila, Riitta, Jeff D. Rosenberger, and Kathleen M. Eisenhardt, Swimming with Sharks: Technology
Ventures, Defence Mechanisms and Corporate Relationships, Administrative Science Quarterly, Vol.
53, No. 2, June 2008, pp. 295332.
Katsimi, Margarita, Training, Job Security and Incentive Wages, Scottish Journal of Political Economy, Vol.
55, No. 1, February 2008, pp. 6778.
Katz, Jonathan, Rafail Ostrovsky, and Moti Yung, Efficient and Secure Authenticated Key Exchange Using
Weak Passwords, Journal of the ACM, Vol. 57, No. 1, November 2009, pp. 33:39.
Katzenstein, Peter J., and Nobuo Okawara, Japan, Asian-Pacific Security, and the Case for Analytical
Eclecticism, International Security, Vol. 26, No. 3, December 2001, pp. 153185.
Kavalski, Emilian, The Complexity of Global Security Governance: An Analytical Overview, Global Society:
Journal of Interdisciplinary International Relations, Vol. 22, No. 4, October 2008, pp. 423443.
Kavalski, Emilian, Timescapes of Security: Clocks, Clouds, and the Complexity of Security Governance,
World Futures: The Journal of General Evolution, Vol. 65, No. 7, October 2009, pp. 527551.
Kay, Sean, Global Security in the Twenty-First Century: The Quest for Power and the Search for Peace,
Future Survey, Vol. 29, No. 5, May 2007, pp. 56.
Keeley, Jared, Consumerism, Activism, Intrinsic Motivation, and Balance: An Interview With Tim Kasser,
Teaching of Psychology, Vol. 37, No. 2, June 2010, pp. 146152.
Keisidou, Ellisavet, Lazaros Sarigiannidis, and Dimitrios Maditinos, Consumer Characteristics and Their
Effect on Accepting Online Shopping, in the Context of Different Product Types, International
Journal of Business Science & Applied Management, Vol. 6, No. 2, April 2011, pp. 3151.
Keling, Mohamad Faisol, Md. Shukri Shuib, and Mohd Naeim Ajis, The Growth of Military Development in
Southeast Asia: An Arms Race Phenomenon or a Normal Development?, International Journal of the
Humanities, Vol. 7, No. 7, October 2009, pp. 4959.
Keller, Peggy, and Mona El-Sheikh, Childrens Emotional Security and Sleep: Longitudinal Relations and
Directions of Effects, Journal of Child Psychology & Psychiatry, Vol. 52, No. 1, 2011, pp. 6471.
Kelly III, Patrick, Defining Homeland Security, Military Intelligence Professional Bulletin, Vol. 28, No. 3,
September 2002, p. 10.
Kelly, Henry, Science Policy in the United States: A Commentary on the State of the Art, Social Research,
Fall 2006.
Kelly, Robert E., Security Theory in the New Regionalism, International Studies Review, Vol. 9, No. 2,
June 2007, pp. 197229.
Kendall, Patrick, and Marco Petracco, The Current State and Future of Caribbean Agriculture, Journal of
Sustainable Agriculture, Vol. 33, No. 7, November 2009, pp. 780797.
Kennedy, Joseph C., U.S. and African Relations, McMurry Inc., 1997.
Kennedy, Ross A., Woodrow Wilson, World War I, and American National Security, Diplomatic History,
Vol. 25, No. 1, Winter 2001.

371
Ker-Lindsay, James, The European Union and Border Conflicts: The Power of Integration and Association
Edited by T. Diez, M. Albert and S. Stetter, Journal of Common Market Studies, Vol. 47, No. 1,
January 2009, pp. 214215.
Kernic, Franz, European Security After 9/11, European Political Science, Vol. 6, No. 4, December 2007,
pp. 377388.
Kerr, Rachel Bezner, Food Security in Northern Malawi: Gender, Kinship Relations and Entitlements in
Historical Context, Journal of Southern African Studies, Vol. 31, No. 1, March 2005, pp. 5374.
Kesa, Katerina, Latvian and Lithuanian Policy in the Eastern Neighbourhood: Between Solidarity and Self
Promotion, Perspectives: Central European Review of International Affairs, Vol. 19, No. 2, Winter
2011, pp. 81100.
Kessler, Clive S., Robert H. Taylor, Hongwei Bao, Tori Sanderson, Dia Da Costa, Andrew McGarrity, Rachel
Sturman, et al., Book Reviews, Asian Studies Review, Vol. 35, No. 1, March 2011, pp. 115147.
Khagram, Sanjeev, William Clark, and Dana Firas Raad, From the Environment and Human Security to
Sustainable Security and Development, Journal of Human Development, Vol. 4, No. 2, July 2003, p.
289.
Khalafallah, Ahmed, and Khaled El-Rayes, Minimising Construction-Related Security Risks During Airport
Expansion Projects, Journal of Construction Engineering & Management, Vol. 134, No. 1, January
2008, pp. 4048.
Khattak, Saba Gul, In/Security Afghan Refugees and Politics in Pakistan, Critical Asian Studies, Vol. 35,
No. 2, June 2003, p. 195.
Kho, Bong-Chan, Ren M. Stulz, and Francis E. Warnock, Financial Globalisation, Governance, and the
Evolution of the Home Bias, Journal of Accounting Research, Vol. 47, No. 2, May 2009, pp. 597635.
Khripunov, Igor, Nuclear Security: Attitude Check, Bulletin of the Atomic Scientists, Vol. 61, No. 1,
February 2005, pp. 5864.
Khripunov, Igor, Nikolay Ischenko, and James Holmes, NATO Advanced Research Workshop Proceedings,
Nuclear Security Culture: From National Best Practices to International Standards, Vol. 28, No. 1,
2007, pp. 83108.
Kienzle, Benjamin, Crafting EU Security Policy: In Pursuit of a European Identity By S.B. Anderson,
Journal of Common Market Studies, Vol. 47, No. 1, January 2009, p. 214.
Kim, Daeshik, and Susan Y. Kim, QUESC: An Instrument for Assessing the Service Quality of Sport Centres
in Korea, Journal of Sport Management, Vol. 9, No. 2, May 1995, pp. 208220.
Kim, James W., Saving Our Future: Why Voluntary Contribution to Retirement Accounts Are Reasonable
Expenses, Emory Bankruptcy Developments Journal, Vol. 26, No. 2, January 2010, pp. 341380.
Kim, Seung-young, Japanese Diplomacy Towards Korea in Multipolarity: History and Trend, Cambridge
Review of International Affairs, Vol. 20, No. 1, March 2007, pp. 159178.
Kimmerling, Baruch, and Dahlia Moore, Collective Identity as Agency and Structuration of Society: The
Israeli Example, International Review of Sociology, Vol. 7, No. 1, March 1997, pp. 2549.
Kincaid, A. Douglas, Demilitarisation and Security in El Salvador and Guatemala: Convergences of Success
and Crisis, Journal of Interamerican Studies & World Affairs, Vol. 42, No. 4, Winter 2000, p. 39.
King, Gary, and Christopher J. L. Murray, Rethinking Human Security, Political Science Quarterly, Vol.
116, No. 4, Winter 2001, p. 585.
Kinnvall, Catarina, Globalisation and Religious Nationalism: Self, Identity, and the Search for Ontological
Security, Political Psychology, Vol. 25, No. 5, October 2004, pp. 741767.
Kins, Evie, Bart Soenens, and Wim Beyers, Why Do They Have to Grow Up So Fast? Parental Separation
Anxiety and Emerging Adults Pathology of Separation-Individuation, Journal of Clinical Psychology,
Vol. 67, No. 7, July 2011, pp. 647664.
Kinsella, David, Rivalry, Reaction, and Weapons Proliferation: A Time-Series Analysis of Global Arms
Transfers, International Studies Quarterly, Vol. 46, No. 2, June 2002, p. 209.
Kirn, Roman, Needed: A More Open-minded Interpretation, UN Chronicle, Vol. 39, No. 4, February 2003,
p. 16.
Kishindo, Paul, Customary Land Tenure and the New Land Policy in Malawi, Journal of Contemporary
African Studies, Vol. 22, No. 2, May 2004, pp. 213225.

372
Kitchen, Veronica M., NATOs Out-of-area Norm from Suez to Afghanistan, Journal of Transatlantic
Studies (Routledge), Vol. 8, No. 2, Summer 2010, pp. 105117.
Kjaerland, Maria, A Classification of Computer Security Incidents Based on Reported Attack Data, Journal
of Investigative Psychology & Offender Profiling, Vol. 2, No. 2, June 2005, pp. 105120.
Klein, Bruce W., Food Security and Hunger Measures: Promising Future for State and Local Household
Surveys, Family Economics & Nutrition Review, Vol. 9, No. 4, December 1996, p. 31.
Klijn, Hugo, European Security La Russe, Security & Human Rights, Vol. 21, No. 3, July 2010, pp. 156
159.
Knee, C. Raymond, Heather Patrick, and Cynthia Lonsbary, Implicit Theories of Relationships: Orientations
Toward Evaluation and Cultivation, Personality & Social Psychology Review (Lawrence Erlbaum
Associates), Vol. 7, No. 1, February 2003, pp. 4155.
Knight, John, and Sai Ding, Why Does China Invest So Much?, Asian Economic Papers, Vol. 9, No. 3, Fall
2010, pp. 87117.
Knight, W. Andy, and Randolph B. Persaud, Subsidiarity, Regional Governance, and Caribbean Security,
Latin American Politics & Society, Vol. 43, No. 1, Spring 2001, p. 29.
Knowles, Vanda, Security and Defence in the New Europe: Franco-Polish Relations--Victim of Neglect?,
Defence Studies, Vol. 2, No. 2, Summer 2002, pp. 87104.
Knutsen, Bjrn Olav, and Elisabeth Pettersen, The Arts of Michael Moore and American Soft Power,
TAMARA: Journal of Critical Postmodern Organisation Science, Vol. 7, No. 3/4, March 2009, pp. 107
126.
Knutson, Andie L., The Concept of Personal Security, Journal of Social Psychology, Vol. 40, No. 2,
November 1954, pp. 219236.
Kochumkulova, Elmira, Religion Is Not so Strong Here: Muslim Religious Life in Khorezm After Socialism,
Central Asian Survey, Vol. 28, No. 3, 2009, pp. 337339.
Koeng, Bonnie, JO - Nation, Nation, Vol. 223, No. 2, July 17, 1976, p. 39.
Koivusalo, Meri, and Maureen Mackintosh, Global Public Health Security: Inequality, Vulnerability and
Public Health System Capabilities, Development & Change, Vol. 39, No. 6, November 2008, pp.
11631169.
Kojima, J. Christopher, Product-based Solutions to Financial Innovation: The Promise and Danger of
Applying the Federal Securities Laws to OTC Derivatives., American Business Law Journal, Vol. 33,
No. 2, Winter 1995, pp. 259339.
Kolossov, Vladimir, Border Studies: Changing Perspectives and Theoretical Approaches, Geopolitics, Vol.
10, No. 4, Winter 2005, pp. 606632.
Kong, Jun, Dianxiang Xu, and Xiaoqin Zeng, UML-Based Modelling and Analysis of Security Threats,
International Journal of Software Engineering & Knowledge Engineering, Vol. 20, No. 6, 2010, pp.
875897.
Kono, Daniel Y., and Greg Love, Who Rides the Storm? Political Institutions and Trade Adjustment,
Business & Politics, Vol. 9, No. 1, April 2007, pp. 126.
Koo, Katrina Lee, Confronting a Disciplinary Blindness: Women, War and Rape in the International Politics
of Security, Australian Journal of Political Science, Vol. 37, No. 3, November 2002, pp. 525536.
Koonitz, Linda D., and David A. Powner, Health Information Technology: Early Efforts Initiated but
Comprehensive Privacy Approach Needed for National Strategy: GAO-07-400T, GAO Reports,
February 2, 2007, p. 1.
Koonitz, Linda D.Powner, Health Information Technology: Early Efforts Initiated but Comprehensive
Privacy Approach Needed for National Strategy: GAO-07-400T, GAO Reports, February 2, 2007, p. 1.
Koontz, Linda D., and Valerie C. Melvin, Health Information Technology: Efforts Continue but
Comprehensive Privacy Approach Needed for National Strategy: GAO-07-988T, GAO Reports, June
19, 2007, p. 1.
Koontz, Linda D., Data Mining: Agencies Have Taken Key Steps to Protect Privacy in Selected Efforts, but
Significant Compliance Issues Remain: GAO-05-866, U.S. Government Accountability Office, 2005.

373
Koops, Joachim, Managing a Multilevel Foreign Policy: The EU in International Affairs Edited by P.
Foradori, P. Rosa and R. Scartezzini, Journal of Common Market Studies, Vol. 47, No. 1, January
2009, p. 213.
Koppele, Jeffrey H., The SEC Jefferson County Swaps Action, Derivatives Week, June 30, 2008, p. 1.
Koppenol, Bonnie B., David H. Mangan, and Sheryl L. Vander Baan, Information Reporting Requirements
Affect Corporations and Transferors of Securities, Tax Adviser, Vol. 42, No. 9, 2011, pp. 592596.
Koppenol, Bonnie B.Mangan, Information Reporting Requirements Affect Corporations and Transferors of
Securities, Tax Adviser, Vol. 42, No. 9, 2011, p. 592.
Korkmaz, Visne, Constructing the Mediterranean in the Face of New Threats: Are the EUs Words Really
New?, European Security, Vol. 17, No. 1, March 2008, pp. 141160.
Kosi, Tanja, and tefan Bojnec, Level and Progressivity of Labour Income Taxation in Slovenia, Our
Economy (Nase Gospodarstvo), Vol. 55, No. 3/4, June 2009, pp. 313.
Kostakopoulou, Theodora, The Protective Union: Change and Continuity in Migration Law and Policy in
Post-Amsterdam Europe*, Journal of Common Market Studies, Vol. 38, No. 3, 2000, p. 497.
Kozak, Barry, The Cash Balance Plan: Still a Good Program, Journal of Pension Benefits: Issues in
Administration, Vol. 11, No. 2, Winter 2004, pp. 2936.
Krahmann, Elke, American Hegemony or Global Governance? Competing Visions of International
Security, International Studies Review, Vol. 7, No. 4, December 2005, pp. 531545.
Kraig, Michael, Assessing Alternative Security Frameworks For the Persian Gulf, Middle East Policy, Vol.
11, No. 3, Fall 2004, pp. 139156.
Krl, David, Information Security in Small and Medium-Sised Companies, Economic Studies & Analyses /
Acta VSFS, Vol. 5, No. 1, June 2011, pp. 6173.
Krauchuk, Natallia, Estate of Pew V. Cardarelli, New York Law School Law Review, Vol. 54, No. 4,
December 15, 2009, pp. 11591169.
Krause, Keith, Multilateral Diplomacy, Norm Building, and UN Conferences: The Case of Small Arms and
Light Weapons, Global Governance, Vol. 8, No. 2, June 2002, p. 247.
Krieger, Zanvyl, and Ariel Ilan Roth, Nuclear Weapons in Neo-Realist Theory, International Studies
Review, Vol. 9, No. 3, 2007, pp. 369384.
Kripke, Homer, Some Reactions and Some Down-to-Earth Reflections on Accountants LiabilityA
General Discussion, Journal of Accounting, Auditing & Finance, Vol. 3, No. 4, Fall 1988, pp. 359367.
Krippner, Leo, A Theoretically Consistent Version of the Nelson and Siegel Class of Yield Curve Models,
Applied Mathematical Finance, Vol. 13, No. 1, March 2006, pp. 3959.
Krotoszynski, Jr., and Clint A. Carpenter, The Return of Seditious Libel, UCLA Law Review, Vol. 55, No. 5,
June 2008, pp. 12391319.
Kuhn, Sarah, and Paula Rayman, Software and Internet Industry Workers, New England Journal of Public
Policy, Vol. 21, No. 1, Fall 2006, pp. 3954.
Khnhardt, Ludger, Global Society and Its Enemies: 9/11 and the Future of Atlantic Civilisation,
Totalitarian Movements & Political Religions, Vol. 4, No. 2, 2003, pp. 157172.
Kumar, Sameer, and Janis Verruso, Risk Assessment for the Security of Inbound Containers at U.S. Ports:
A Failure, Mode, Effects, and Criticality Analysis Approach, Transportation Journal (American Society
of Transportation & Logistics Inc), Vol. 47, No. 4, Fall 2008, pp. 2641.
Kmmel, Gerhard, The Winds of Change: The Transition from Armed Forces for Peace to New Missions
for the Bundeswehr and Its Impact on Civil-Military Relations, Journal of Strategic Studies, Vol. 26,
No. 2, June 2003, pp. 728.
Kuriansky, Judy, Youth Participation and Perceptions at the United Nations DPI/NGO Conference on
Reaffirming Human Rights for All, Counselling Psychology Quarterly, Vol. 22, No. 1, March 2009, pp.
4867.
Kurowska, Xymena, and Patryk Pawlak, Introduction: The Politics of European Security Policies,
Perspectives on European Politics & Society, Vol. 10, No. 4, December 2009, pp. 474485.
Kushilevitz, Eyal, Yehuda Lindell, and Tal Rabin, Information-Theoretically Secure Protocols and Security
Under Composition, SIAM Journal on Control & Optimisation, Vol. 48, No. 4, 2009, pp. 20902112.

374
Ktting, Gabriela, Environment, Development, and the Global Perspective: From Critical Security to
Critical Globalisation, Nature & Culture, Vol. 2, No. 1, March 2007, pp. 4966.
Kwek Choon Ling, Lau Teck Chai, and Tan Hoi Piew, The Effects of Shopping Orientations, Online Trust and
Prior Online Purchase Experience Toward Customers Online Purchase Intention, International
Business Research, Vol. 3, No. 3, July 2010, pp. 6376.
Kyriakopoulos, Grigorios L., Power as Resource-Power as Discourse: An Overview Evaluation of the Key-
Factors of Wind Farms and Riparian Rights as Sources of Power, Engineering, Vol. 3, No. 1,
January 2011, pp. 6372.
La Porta, Rafael, Florencio Lopez de Silanes, and Andrei Shleifer, What Works in Securities Laws?, Journal
of Finance, Vol. 61, No. 1, February 2006, pp. 132.
Labadarios, Demetre, Nelia Patricia Steyn, and Johanna Nel, How Diverse Is the Diet of Adult South
Africans?, Nutrition Journal, Vol. 10, No. 1, January 2011, pp. 3343.
Labban, Mazen, The Struggle for the Heartland: Hybrid Geopolitics in the Transcaspian, Geopolitics, Vol.
14, No. 1, Spring 2009, pp. 125.
Lader, Philip, 21st Century Security, McMurry Inc., December 12, 1999.
Ladrech, Robert, Europeanisation: New Research Agendas Edited by P. Graziano and M. Vink, Journal
of Common Market Studies, Vol. 47, No. 1, January 2009, pp. 201202.
Laitinen, Kari, Geopolitics of the Northern Dimension: A Critical View on Security Borders, Geopolitics,
Vol. 8, No. 1, Spring 2003, pp. 2044.
Lake, David A., Escape from the State of Nature, International Security, Vol. 32, No. 1, Summer 2007, pp.
4779.
Lamarche, Lucie, Le Pacte International Relatif Aux Droits &eactue;conomiques, Sociaux Et Culturels, Les
Femmes Et Le Droit La Scurit: Des Considrations Et Des Propositions Pour Un Droit
<<universel>> La Scurit sociale (French), Canadian Journal of Women & the Law, Vol. 14, No. 1,
June 2002, pp. 5397.
Lane, Ann, Modernising the Management of British Diplomacy: Towards a Foreign Office Policy on Policy-
making?, Cambridge Review of International Affairs, Vol. 20, No. 1, March 2007, pp. 179193.
Lang, Anthony F., The Violence of Rules? Rethinking the 2003 War Against Iraq, Contemporary Politics,
Vol. 13, No. 3, 2007, pp. 257276.
Lang, Hazel, and Anita Knudsen, Your Subject of Protection Is a Dangerous One: Protracted Internal
Conflict and the Challenges for Humanitarian Agencies, Norwegian Journal of Geography, Vol. 63,
No. 1, March 2009, pp. 3545.
Langetieg, Terence C., Stochastic Control of Corporate Investment When Output Affects Future Prices,
Journal of Financial & Quantitative Analysis, Vol. 21, No. 3, 1986, pp. 239263.
Lantry, Terry L., Defined Contribution: Is It Right for Public Pension Plans?, Employee Benefits Journal,
Vol. 22, No. 4, December 1997, p. 17.
LaPadula, Leonard J., and D. Elliott Bell, MITRE Technical Report 2547, Volume II, Journal of Computer
Security, Vol. 4, No. 2/3, June 1996, p. 239.
Larose, Simon, Michel Boivin, and Anna Beth Doyle, Parental Representations and Attachment Style as
Predictors of Support-seeking Behaviours and Perceptions of Support in an Academic Counseling
Relationship, Personal Relationships, Vol. 8, No. 1, March 2001, pp. 93113.
Larsen, Henrik, Concepts of Security in the European Union After the Cold War, Australian Journal of
International Affairs, Vol. 54, No. 3, November 2000, pp. 337355.
Larsen, Kasper, Continuity of Utility-Maximisation with Respect to Preferences, Mathematical Finance,
Vol. 19, No. 2, April 2009, pp. 237250.
Lautsch, Brenda A., Uncovering and Explaining Variance in the Features and Outcome of Contingent
Work, Industrial & Labour Relations Review, Vol. 56, No. 1, October 2002, pp. 2343.
Lawrence, Shari, John Lajaunie, and Shawn Mauldin, Advising the Participant Regarding Double Dipping
and Social Security, Journal of Retirement Planning, Vol. 12, No. 2, March 2009, pp. 1945.
Lawson, ColinSaltmarshe, Security and Economic Transition: Evidence from North Albania, Europe-Asia
Studies, Vol. 52, No. 1, January 2000, p. 133.

375
Lazarus, Eli Martin, Viatical and Life Settlement Securitisation: Risks and Proposed Regulation, Yale Law
& Policy Review, Vol. 29, No. 1, Fall 2010, pp. 253294.
Lebl, Leslie S., Security Beyond Borders, Policy Review, No. 130, May 2005, pp. 2343.
Leduka, Resetselemang C., Recycled Fable or Immutable Truth? Reflections on the 1973 Land-Tenure
Reform Project in Lesotho and Lessons for the Future, Africa Today, Vol. 53, No. 3, Spring 2007, pp.
91111.
Lee Koo, Katrina, Debate, Australian Journal of Political Science, Vol. 38, No. 2, July 2003, p. 329.
Lee, Jik-Joen, The Best Years of Life: A Study of Older Hong Kong Chinese, Social Indicators Research, Vol.
100, No. 3, February 2011, pp. 539562.
Lee, Karen, As the World Turns, Employee Benefit News, Vol. 15, No. 12, 2001, p. 33.
Leets, Laura, and Peggy J. Bowers, Loud and Angry Voices: The Insidious Influence, Communication
Monographs, Vol. 66, No. 4, December 1999, p. 325.
Lei, Wu, and Liu Xuejun, China or the United States: Which Threatens Energy Security?, OPEC Review:
Energy Economics & Related Issues, Vol. 31, No. 3, 2007, pp. 215234.
Leitch, Evan J., The Antifraud Savings Clause of the National Securities Markets Improvement Act of
1996, Iowa Law Review, Vol. 94, No. 5, 2009, pp. 17691791.
Lele, Ajey, Indian Armed Forces and Space Technology, India Review, Vol. 10, No. 4, December 2011, pp.
379393.
Leroy, Stephen F., Expectations Models of Asset Prices: A Survey of Theory, Journal of Finance, Vol. 37,
No. 1, March 1982, pp. 185217.
Levi, Francesca, A Typed Encoding of Boxed into Safe Ambients, Acta Informatica, Vol. 42, No. 6/7,
March 2006, pp. 429500.
Levin, Timothy W., and Philip T. Masterson, Implications of Hedge Funds as Activist Investors: No Longer
Flying Under the Radar, Investment Lawyer, Vol. 13, No. 10, October 2006, pp. 1926.
Levinson, Mark, Worse Than You Thought, Dissent (00123846), Vol. 52, No. 2, Spring 2005, pp. 3034.
Levy, Jason K., and Chennat Gopalakrishnan, President Obamas Offshore Drilling Policy and Energy
Security: A Game-Theoretic Policy Analysis, Journal of Natural Resources Policy Research, Vol. 2, No.
3, July 2010, pp. 195212.
Lewin, Alisa C., Haya Stier, and DafnaCaspi Dror, The Effect of Intermittent Work Histories on Poverty: The
Case of the Working Poor in Israel, Conference Papers -- American Sociological Association, Annual
Meeting 2008, p. 1.
Lewis, Kenneth A., and Laurence S. Seidman, The Transition in a Life-Cycle Growth Model, Eastern
Economic Journal, Vol. 28, No. 2, Spring 2002, p. 159.
Li, Ninghui, Wenliang Du, and Dan Boneh, Oblivious Signature-based Envelope, Distributed Computing,
Vol. 17, No. 4, May 2005, pp. 293302.
Liang-Min Wang, Yuan-Bo Guo, and Yong-Zhao Zhan, Security Topology Control Method for Wireless
Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration, EURASIP Journal on
Wireless Communications & Networking, January 2010, pp. 111.
Liberatore, Angela, Balancing Security and Democracy, and the Role of Expertise: Biometrics Politics in
the European Union, European Journal on Criminal Policy & Research, Vol. 13, No. 1/2, March 2007,
pp. 109137.
Liebman, Benjamin L., and Curtis J. Milhaupt, Reputational Sanctions in Chinas Securities Market,
Columbia Law Review, May 2008.
Ligatti, Jay, Lujo Bauer, and David Walker, Edit Automata: Enforcement Mechanisms for Run-time
Security Policies, International Journal of Information Security, Vol. 4, No. 1/2, February 2005, pp. 2
16.
Light, Jennifer S., Urban Planning and Defence Planning, Past and Future, Journal of the American
Planning Association, Vol. 70, No. 4, 2004, pp. 399410.
Lihua Han, Network Security Policy, Modern Applied Science, Vol. 4, No. 7, July 2010, pp. 201203.
Likoti, Fako Johnson, The 1998 Military Intervention in Lesotho: SADC Peace Mission or Resource War?,
International Peacekeeping (13533312), Vol. 14, No. 2, June 2007, pp. 251263.

376
Lim Ying San, Wong Wan Jun, Tan Nya Ling, and Ng Tuan Hock, Customers Perceive Online Shopping
Service Quality: The Perspective of Generation Y, European Journal of Economics, Finance &
Administrative Sciences, No. 25, October 2010, pp. 8393.
Lim, Robyn, Australian Security After the Cold War, Orbis, Vol. 42, No. 1, Winter 1998, p. 91.
Lin, Carol, and Yu-Chen Wei, The Role of Business Ethics in Merger and Acquisition Success: An Empirical
Study, Journal of Business Ethics, Vol. 69, No. 1, November 15, 2006, pp. 95109.
Lindell, Yehuda, Anna Lysyanskaya, and Tal Rabin, On the Composition of Authenticated Bysantine
Agreement, Journal of the ACM, Vol. 53, No. 6, November 2006, pp. 881917.
Litzerfelner, PatPetr, Case of Advocacy in Child Welfare, Social Work, Vol. 42, No. 4, July 1997, p. 392.
Liu Yongtao, Constructing an Open and Inclusive Regional Order in Northeast Asia, Japan Studies
Association Journal, Vol. 7, January 2009, pp. 97114.
Liu, Joseph K., and Duncan S. Wong, Enhanced Security Models and a Generic Construction Approach for
Linkable Ring Signature, International Journal of Foundations of Computer Science, Vol. 17, No. 6,
December 2006, pp. 14031422.
Liu, Lillian, Income Security in Transition for the Aged and Children in the Soviet Union and in the Russian
Federation, Social Security Bulletin, Vol. 56, No. 1, Spring93 1993, p. 60.
Liu, Serena, Social Citizenship in China: Continuity and Change, Citizenship Studies, Vol. 11, No. 5,
November 2007, pp. 465479.
Livermore, Gina A.Roche, Longitudinal Outcomes of an Early Cohort of Ticket to Work Participants, Social
Security Bulletin, Vol. 71, No. 3, 2011, p. 105.
Lloyd, Cathie, Sandra Dudley, and Frances Stewart, The Global and the Local; The Cultural Interfaces of
Self-determination Movements, Oxford Development Studies, Vol. 30, No. 2, June 2002, pp. 133
136.
Lloyd, Richmond M., The Shield and the Cloak: The Security of the Commons, Naval War College Review,
Vol. 59, No. 4, 2006, pp. 141142.
Lo, Mbaye, Muslim Marriage Goes Online: The Use of Internet Matchmaking by American Muslims,
Journal of Religion & Popular Culture, Vol. 21, No. 3, Fall 2009, pp. 120.
Loescher, Gil, and James Milner, Understanding the Challenge, Forced Migration Review, No. 33,
October 2009, pp. 911.
Lofgren, Mark, Integrating Security into Small MPO Planning Activities, , 76 139173, 2009.
Lombardo, Rosetta, and Giovanni Passarelli, Graduates Job Quality After a Higher Education Reform:
Evidence Regarding Second Level Graduates from a University in Southern Italy, Research in Applied
Economics, Vol. 3, No. 2, December 2011, pp. 119.
Lopez, George A., Why the Generals Wage War on the People, Bulletin of the Atomic Scientists, Vol. 46,
No. 4, May 1990, p. 30.
Lopez, George A.Smith, The Global Tide, Bulletin of the Atomic Scientists, Vol. 51, No. 4, August 1995, p.
32.
Lotz, Volkmar, Threat Scenarios as a Means to Formally Develop Secure Systems, Journal of Computer
Security, Vol. 5, No. 1, March 1997, p. 31.
Love, David A., The Effects of Marital Status and Children on Savings and Portfolio Choice, Review of
Financial Studies, Vol. 23, No. 1, January 2010, pp. 385432.
Loveman, Brian, Book Reviews, Journal of Interamerican Studies & World Affairs, Vol. 40, No. 1, Spring98
1998, p. 110.
Loveman, Brian,Protected Democracies and Military Guardianship: Political Transitions in Latin America,
1978-1993, Journal of Interamerican Studies & World Affairs, Vol. 36, No. 2, Summer 1994, p. 105.
Low, Georgiana, and Kurt C. Organista, Latinas and Sexual Assault: Towards Culturally Sensitive
Assessment and Intervention, Journal of Multicultural Social Work, Vol. 8, No. 1/2, January 2000, pp.
131157.
Lowe, E. A., and R. W. Shaw, An Analysis of Managerial Biasing: Evidence from a Companys Budgeting
Process, Journal of Management Studies, Vol. 5, No. 3, October 1968, pp. 304315.
Loxton, Diccon, One Flaw Over The Cuckoos Nest, University of New South Wales Law Journal, Vol. 34,
No. 2, 2011, pp. 472523.

377
Lu, Chin-Shan, Chih-Ching Chang, Yung-Hao Hsu, and Prakash Metaparti, Introduction to the Special Issue
on Maritime Security, Maritime Policy & Management, Vol. 37, No. 7, December 2010, pp. 663665.
Lu, Rongxing, Zhenfu Cao, and Xiaolei Dong, A New Practical Limited Identity-Based Encryption Scheme,
Fundamenta Informaticae, Vol. 80, No. 4, October 2007, pp. 461474.
Luckhaus, Linda, Equal Treatment, Social Protection and Income Security for Women, International
Labour Review, Vol. 139, No. 2, June 2000, p. 149.
Luna-Reyes, Luis Felipe, Book Review, Information Polity: The International Journal of Government &
Democracy in the Information Age, Vol. 14, No. 1/2, March 2009, pp. 147150.
Lund Petersen, Karen, Terrorism: When Risk Meets Security, Alternatives: Global, Local, Political, Vol. 33,
No. 2, June 2008, pp. 173190.
Lybecker, Martin E., and Matthew A. Chambers, Definition of Investment Company: A Riddle Wrapped in
a Mystery Within an Enigma. (cover Story), Investment Lawyer, Vol. 10, No. 1, January 2003, p. 1.
Lymer, Kenneth, The Prehistory of the Silk Route, Central Asian Survey, Vol. 28, No. 3, 2009, pp. 339
341.
Lynn-Jones, Sean M., Realism and Americas Rise, International Security, Vol. 23, No. 2, Fall 1998, p. 157.
Lysandrou, Photis, Global Inequality, Wealth Concentration and the Subprime Crisis: A Marxian
Commodity Theory Analysis, Development & Change, Vol. 42, No. 1, January 2011, pp. 183208.
Ma, Huiqun, Ling Liu, and Tao Chen, Water Security Assessment in Haihe River Basin Using Principal
Component Analysis Based on Kendall Tau, Environmental Monitoring And Assessment, Vol. 163,
No. 14, April 2010, pp. 539544.
Mabee, Bryan, Human Rights and Security in International Relations, International Journal of Human
Rights, Vol. 7, No. 2, Summer 2003, pp. 164178.
MacAuslan, Ian, Hunger, Discourse and the Policy Process: How Do Conceptualisations of the Problem of
Hunger Affect Its Measurement and Solution?, European Journal of Development Research, Vol. 21,
No. 3, July 2009, pp. 397418.
Macchiarola, Michael C., Securities Linked to the Preformance of Tiger Woods? Not Such a Long Shot,
Creighton Law Review, Vol. 42, No. 1, December 2008, pp. 2982.
Macey, Jonathan, Geoffrey Miller, Maureen OHara, and Gabriel D. Rosenberg, Helping Law Catch Up to
Markets: Applying Broker-Dealer Law to Subprime Mortgages, Journal of Corporation Law, Vol. 34,
No. 3, Spring 2009, pp. 789842.
MacFarlane, S. Neil, and Thomas Weiss, The United Nations, Regional Organisations and Human Security:
Building Theory in Central America, Third World Quarterly, Vol. 15, No. 2, June 1994, p. 277.
MacFarlane, S. Neil, Carolin J. Thieking, and Thomas G. Weiss, The Responsibility to Protect: Is Anyone
Interested in Humanitarian Intervention?, Third World Quarterly, Vol. 25, No. 5, July 2004, pp. 977
992.
Mackenzie, Gordon, and Alfred Tran, Risk as a Measure in Taxing Financial Arrangements, Australian Tax
Forum, Vol. 26, No. 4, October 2011, pp. 665691.
MacKenzie, Megan, Securitisation and Desecuritisation: Female Soldiers and the Reconstruction of
Women in Post-Conflict Sierra Leone, Security Studies, Vol. 18, No. 2, June 2009, pp. 241261.
MacKenzie, Megan, Securitizing Sex?, International Feminist Journal of Politics, Vol. 12, No. 2, June 2010,
pp. 202221.
MacKenzie, Philip and Michael K. Reiter, Two-party Generation of DSA Signatures, International Journal
of Information Security, Vol. 2, No. 3/4, 2004, pp. 218239.
MacKenzie, Philip, and Michael K. Reiter, Delegation of Cryptographic Servers for Capture-resilient
Devices, Distributed Computing, Vol. 16, No. 4, December 2003, pp. 307327.
MacKenzie, Philip, and Michael K. Reiter, Networked Cryptographic Devices Resilient to Capture,
International Journal of Information Security, Vol. 2, No. 1, November 2003, p. 1.
Mackinlay, Jock D., Technical Perspective: Finding and Telling Stories with Data, Communications of the
ACM, Vol. 52, No. 1, January 2009, p. 86.
MacKinnon, Joanne L., and James E. Marcia, Concurring Patterns of Womens Identity Status, Styles, and
Understanding of Childrens Development, International Journal of Behavioural Development, Vol.
26, No. 1, January 2002, pp. 7080.

378
Maclean, Leonard C., William T. Ziemba, and Yuming Li, Time to Wealth Goals in Capital Accumulation,
Quantitative Finance, Vol. 5, No. 4, 2005, pp. 343355.
MaClean, Sandra J., Peacebuilding and the New Regionalism in Southern Africa, Third World Quarterly,
Vol. 20, No. 5, Special Issue 1999, pp. 943956.
MacNeil, Leah, Securing the Afghan People? Canadian Foreign Aid Policy and the Perils of Human
Security, Undercurrent, Vol. 8, No. 1, Summer 2011, pp. 616.
MacPhail, Fiona, and Paul Bowles, From Casual Work to Economic Security: The Case of British Columbia,
Social Indicators Research, Vol. 88, No. 1, 2008, pp. 97114.
MacQueen, Norrie, Introduction - The Dimensions of European Security: From Iraq to . . . Iraq,
Perspectives on European Politics & Society, Vol. 5, No. 3, December 2004, pp. 385393.
Macrae, Carl, Risk in Social Science.Beyond the Risk Society: Critical Reflections on Risk and Human
Security, British Journal of Sociology, Vol. 59, No. 1, March 2008, pp. 175177.
Macrae, Joanna, Understanding Integration from Rwanda to Iraq, Ethics & International Affairs, Vol. 18,
No. 2, October 2004, pp. 2935.
Maged N Kamel Boulos, Andrew J Curtis, and Philip Abdel Malik, Musings on Privacy Issues in Health
Research Involving Disaggregate Geographic Data About Individuals, International Journal of Health
Geographics, Vol. 8, January 2009, pp. 4653.
Maggs, John, Grover Norquists Crystal Ball, National Journal Group, Inc., October 15, 2005.
Maher, Brendan S., The Benefits of Opt-In Federalism, Boston College Law Review, Vol. 52, No. 5,
November 2011, pp. 17331793.
Maier, Steven F., David W. Peterson, and James H. Vander Weide, A Monte Carlo Investigation of
Characteristics of Optimal Geometric Mean Portfolios, Journal of Financial & Quantitative Analysis,
Vol. 12, No. 2, June 1977, pp. 215233.
Majolo, Bonaventura, Raffaella Ventura, and Nicola F. Koyama, A Statistical Modelling Approach to the
Occurrence and Timing of Reconciliation in Wild Japanese Macaques, Ethology, Vol. 115, No. 2,
February 2009, pp. 152166.
Makinda, Samuel M., International Law and Security: Exploring a Symbiotic Relationship, Australian
Journal of International Affairs, Vol. 51, No. 3, November 1997, p. 325.
Makinda, Samuel M., The United Nations and State Sovereignty: Mechanism for Managing International
Security, Australian Journal of Political Science, Vol. 33, No. 1, March 1998, p. 101.
Makinda, Samuel, Security in International Society: A Comment on Alex J. Bellamy and Matt McDonald,
Australian Journal of Political Science, Vol. 40, No. 2, June 2005, pp. 275287.
Malacaria, Pasquale, Risk Assessment of Security Threats for Looping Constructs, Journal of Computer
Security, Vol. 18, No. 2, February 2010, pp. 191228.
Malcolm, Andrew, Clarity at Last, International Financial Law Review, Vol. 29, No. 6, August 2010, pp.
3436.
Malesic, Marjan, Katarina Mahutova, John J. Barich III, and Ronald A. Kreizenbeck, Environmental
Security: A Case of Slovenia, Defence & the Environment: Effective Scientific Communication,
Springer Science & Business Media B.V. / Books, 2004, pp. 139152.
Malkawi, Bashar H., and Haitham A. Haloush, Reflections on the Securities Law of Jordan, American
University International Law Review, Vol. 23, No. 4, 2008, pp. 763805.
Malmvig, Helle, Security Through Intercultural Dialogue? Implications of the Securitisation of Euro-
Mediterranean Dialogue Between Cultures, Mediterranean Politics, Vol. 10, No. 3, November 2005,
pp. 349364.
Mamun, ArifOLeary, Employment Among Social Security Disability Programme Beneficiaries, 1996-2007,
Social Security Bulletin, Vol. 71, No. 3, 2011, p. 11.
Mancuso, Peter A., The Independen Jurist: An Analysis of Judge Robert S. Smiths Dissenting Opinions,
Albany Law Review, Vol. 73, No. 3, 2010, pp. 10191080.
Mandel, Robert, Perceived Security Threat and the Global Refugee Crisis, Armed Forces & Society
(0095327X), Vol. 24, No. 1, Fall 1997, pp. 77103.
Mankiewicz, Frank F., John K. Mangum, and Graham B. Moody Jr., The Federal Loyalty-Security Program:
A Proposed Statute, California Law Review, Vol. 44, No. 1, March 1956, p. 72.

379
Mankoff, Jeffrey, Reforming the Euro-Atlantic Security Architecture: An Opportunity for U.S. Leadership,
Washington Quarterly, Vol. 33, No. 2, Spring 2010, pp. 6583.
Mannes, George, Goals, Money, Vol. 37, No. 4, April 2008, pp. 7884.
Manning, Erin, Beyond Accommodation: National Space and Recalcitrant Bodies, Alternatives: Global,
Local, Political, Vol. 25, No. 1, March 2000, p. 51.
Mantel, Heiko, and Andrei Sabelfeld, A Unifying Approach to the Security of Distributed and
Multithreaded Programs, Journal of Computer Security, Vol. 11, No. 4, December 2003, pp. 615
676.
Mantin, Benny, and Asher Tishler, The Structure of the Defence Industry and the Security Needs of the
Country: a Differentiated Products Model, Defence & Peace Economics, Vol. 15, No. 5, October
2004, pp. 397419.
Mantle, D. R., What Foreign Students Fear: Homeland Security Measures and Closed Deportation
Meetings, Brigham Young University Education & Law Journal, No. 2, June 2003, p. 815.
Mao, James C.T., Essentials of Portfolio Diversification Strategy, Journal of Finance, Vol. 25, No. 5,
December 1970, pp. 11091121.
Maoz, Zeev, Domestic Politics of Regional Security: Theoretical Perspectives and Middle East Patterns,
Journal of Strategic Studies, Vol. 26, No. 3, 2003, pp. 1948.
Maqueira-Marin, Juan Manuel, Sebastin Bruque-Cmara, and Jose Moyano-Fuentes, What Does Grid
Information Technology Really Mean? Definitions, Taxonomy and Implications in the Organisational
Field, Technology Analysis & Strategic Management, Vol. 21, No. 4, May 2009, pp. 491513.
Marenin, Otwin, The Futures of Policing African States, Police Practice & Research, Vol. 10, No. 4, 2009,
pp. 349363.
Marginson, Simon, Heres How We Can End the Threats to International Students, Chronicle of Higher
Education, Vol. 56, No. 39, July 2, 2010, pp. A23A24.
Marien, Michael, Security, Future Survey, Vol. 28, No. 12, December 2006, pp. 310.
Marino, Kenneth E., Richard M. Castaldi, and Marc J. Dollinger, Content Analysis in Entrepreneurship
Research: The Case of Initial Public Offerings, Entrepreneurship: Theory & Practice, Vol. 14, No. 1,
Fall 1989, pp. 5166.
Mark, Gideon, Confidential Witnesses in Securities Litigation, Journal of Corporation Law, Vol. 36, No. 3,
Spring 2011, pp. 551605.
Markiewicz, Dorothy, Heather Lawford, Anna Beth Doyle, and Natalie Haggart, Developmental
Differences in Adolescents and Young Adults Use of Mothers, Fathers, Best Friends, and Romantic
Partners to Fulfill Attachment Needs, Journal of Youth & Adolescence, Vol. 35, No. 1, February 2006,
pp. 121134.
Marmor, Theodore R., and Jerry L. Mashaw, Understanding Social Insurance: Fairness, Affordability, And
The Modernisation Of Social Security And Medicare, Health Affairs, Vol. 25, Web Exclusives
Supplement 2006, pp. W114W134.
Marques, Rosa Maria, and Mariana Batich, The Labour Market and Social Security in Brazil, International
Journal of Political Economy, Vol. 30, No. 4, Winter 2000, pp. 4967.
Marrin, Stephen, Intelligence Analysis Theory: Explaining and Predicting Analytic Responsibilities,
Intelligence & National Security, Vol. 22, No. 6, December 2007, pp. 821846.
Marshall, Alex, Eduard Mark, P. M. H. Bell, William J. Daugherty, Sara E. Berndt, Richard A. Moss, Elena
Korosteleva-Polgase, et al., Book Reviews, Intelligence & National Security, Vol. 25, No. 1, February
2010, pp. 98122.
Martin, John D., and Arthur J. Keown, Interest Rate Sensitivity and Portfolio Risk, Journal of Financial &
Quantitative Analysis, Vol. 12, No. 2, June 1977, pp. 181195.
Martin, Lauren, and Stephanie Simon, A Formula for Disaster: The Department of Homeland Securitys
Virtual Ontology, Space & Polity, Vol. 12, No. 3, December 2008, pp. 281296.
Martin, Lenore, Turkey and Gulf Cooperation Council Security, Turkish Studies, Vol. 10, No. 1, March
2009, pp. 7593.
Martin, Leo J., Integrating Forces for an International Community, American Catholic Sociological
Review, Vol. 4, No. 4, December 1943, pp. 194104.

380
Martn, Mara Paz Martn, Questioning The Employment System: The European Flexicurity Approach, Is,
Guc: The Journal of Industrial Relations & Human Resources, Vol. 11, No. 4, October 2009, pp. 95
114.
Martin, Patricia P.Weaver, Social Security: A Programme and Policy History, Social Security Bulletin, Vol.
66, No. 1, March 2005, p. 1.
Martinicky, John, Show Me the Money, Security: Solutions for Enterprise Security Leaders, Vol. 46, No.
11, November 2009, p. 64.
Marvel, Howard P., An Economic Analysis of the Operation of Social Security Disability Insurance, Journal
of Human Resources, Vol. 17, No. 3, Summer 1982, pp. 393412.
Masco, Joseph, Lie Detectors: On Secrets and Hypersecurity in Los Alamos, Public Culture, Vol. 14, No. 3,
2002, p. 441.
Maslow, A. H., The Dynamics of Psychological Security-Insecurity, Character & Personality, Vol. 10, No. 4,
June 1942, pp. 331344.
Mason, Ann, La Reconfiguracin Del Estado: El Nexo Entre La Globalizacin y El Cambio Internacional.
(Spanish), Revista De Estudios Sociales, No. 9, June 2001, pp. 4957.
Mastny, Vojtech, The New History of Cold War Alliances, Journal of Cold War Studies, Vol. 4, No. 2,
Spring 2002, pp. 5584.
Mastroianni, Fabio C., and Ana Regina Noto, Newsmaking on Drugs: A Qualitative Study with Journalism
Professionals, Journal of Psychoactive Drugs, Vol. 40, No. 3, 2008, pp. 293300.
Masuda, Manabu, Nuclear Security Culture: The Need for Universal Standards, Nuclear Security Culture:
From National Best Practices to International Standards, Vol. 28, No. 1, 2007, pp. 3142.
Mata, Maria Eugenia, Portuguese Public Debt and Financial Business Before WWI, Business & Economic
Horizons, Vol. 3, No. 3, October 2010, pp. 1027.
Matheson, John H., Corporate Disclosure Obligations and the Parameters of Rule 10b-5: Basic Inc. V.
Levinson and Beyond, Journal of Corporation Law, Vol. 14, No. 1, Fall 1988, p. 1.
Mathias, Craig J., The Evolution Of Wireless LAN Infrastructure, Business Communications Review, Vol.
33, No. 3, March 2003, p. 48.
Matthews, Benjamin, Jonathan R. Sylvie, Sang-Hoon Lee, Stephen R. Thomas, Robert E. Chapman, and G.
Edward Gibson, Addressing Security in Early Stages of Project Life Cycle, Journal of Management in
Engineering, Vol. 22, No. 4, October 2006, pp. 196202.
Matthews, Gray, Return to Sources, Holy Insecurity and Life in a Tiny House: 2005 Bibliographic Essay,
Merton Annual, Vol. 19, November 2006, pp. 369396.
Matwyshyn, Andrea, CSR and the Corporate Cyborg: Ethical Corporate Information Security Practices,
Journal of Business Ethics, Vol. 88, 2009, pp. 579594.
Maue, Brian E. A., Why We Should End the Aviator Continuation Pay Bonus Program, Air & Space Power
Journal, Vol. 22, No. 4, Winter 2008, pp. 95104.
Mauldin, Elaine, and Vairam Arunachalam, An Experimental Examination of Alternative Forms of Web
Assurance for Business-to-Consumer e-Commerce, Journal of Information Systems, Vol. 16, No. 1,
2002, pp. 3354.
Maurer, David V., Banking Law: A.G. Becker V. Board of Governors of the Federal Reserve System:
Commercial Paper Is Not a Security Under the Glass-Steagall Act, Journal of Corporation Law, Vol. 9,
No. 2, Winter 1984, p. 321.
Mawdsley, Jocelyn, European Defence Policy: Beyond the Nation State By F. Mrand, Journal of
Common Market Studies, Vol. 47, No. 1, January 2009, p. 209.
Maybee, Sean C., National Security and Global Climate Change, JFQ: Joint Force Quarterly, No. 49, Spring
2008, pp. 98102.
Mayer, Matthew J.Leone, School Violence and Disruption Revisited: Equity and Safety in the School
House, Focus on Exceptional Children, Vol. 40, No. 1, 2007, p. 1.
Mayroz, Eyal, Ever Again? The United States, Genocide Suppression, and the Crisis in Darfur, Journal of
Genocide Research, Vol. 10, No. 3, 2008, pp. 359388.
Mayseless, Ofra, and Micha Popper, Reliance on Leaders and Social Institutions: An Attachment
Perspective, Attachment & Human Development, Vol. 9, No. 1, March 2007, pp. 7393.

381
McAuley, James F., and Richard A. White, Florida Financial Reform After Madoff, Florida Bar Journal, Vol.
84, No. 9, November 2010, pp. 2231.
McCain, John, An Enduring Peace Built on Freedom, Foreign Affairs, Vol. 86, No. 6, December 2007, p.
19.
McCauley, Robert N., Panel: Implications of Declining Treasury Debt, Journal of Money, Credit & Banking
(Ohio State University Press), Vol. 34, No. 3, 2002, pp. 952966.
McClure, David L., Revisions to OMBs Circular A-130: AIMD-00-183R, U.S. Government Accountability
Office, May 23, 2000.
McCormack, Tara, Power and Agency in the Human Security Framework, Cambridge Review of
International Affairs, Vol. 21, No. 1, March 2008, pp. 113128.
McCown, Sean, Keeping Data Confidential, InfoWorld, Vol. 26, No. 32, 2004, pp. 4145.
McCue, Michael J.Peterman, What Is the Hospital Industrys Exposure from the ARS Collapse?, Hfm
(Healthcare Financial Management), Vol. 63, No. 10, October 2009, p. 80.
McCune, Jenny C., How Safe Is Your Data?, Management Review, Vol. 87, No. 9, October 1998, p. 17.
McDougal III, Serie, African Foreign Policy: A Question of Methodology, Journal of Pan African Studies,
Vol. 2, No. 8, March 2009, pp. 6476.
McDougall, Derek, Insecurity in Oceania: An Australian Perspective, Round Table, Vol. 96, No. 391, 2007,
p. 415.
McDuie-Ra, Duncan, Civil Society Organisations and Human Security: Transcending Constricted Space in
Meghalaya, Contemporary South Asia, Vol. 15, No. 1, March 2006, pp. 3553.
McFarland, Brendan, Gaobo Pang, and Mark Warshawsky, Does Freezing a Defined-Benefit Pension Plan
Increase Company Value? Empirical Evidence, Financial Analysts Journal, Vol. 65, No. 4, August
2009, pp. 4759.
McGill, Christa, Educational Debt and Law Student Failure to Enter Public Service Careers: Bringing
Empirical Data to Bear, Law & Social Inquiry, Vol. 31, No. 3, Summer 2006, pp. 677708.
McInerney, Paul-Brian, Exploiting the Tension Between Coexisting Values in Organisations as a Source of
Innovation: How Social Entrepreneurial Firms Internalise Efficiency and Altruism, American
Sociological Association, 2006, p. 1.
McKay, Kieryn, and Kylie Brass, Hired Hands: Casualised Technology and Labour in the Teaching of
Cultural Studies, Cultural Studies Review, Vol. 17, No. 2, 2011, pp. 140164.
McKenzie, Patrick, Weapons of Mass Assignment, Communications of the ACM, Vol. 54, No. 5, May
2011, pp. 5459.
McKinley, R.D., and R. Little, The US Aid Relationship: A Test of the Recipient Need and the Donor Interest
Models, Political Studies, Vol. 27, No. 2, June 1979, pp. 236250.
McKissack, Jeremy, Val Hooper, and Beverley Hope, An Organisational Model for Information Security
Assessment, Proceedings of the International Conference on Information Management & Evaluation,
January 2010, pp. 218227.
McMichael, Celia, and Sandra Gifford, It Is Good to Know Now... Before Its Too Late: Promoting Sexual
Health Literacy Amongst Resettled Young People With Refugee Backgrounds, Sexuality & Culture,
Vol. 13, No. 4, December 2009, pp. 218236.
McNamara, Michael J., The OASDI Early Retirement-Medicare Gap, Benefits Quarterly, Vol. 3, No. 2,
Second Quarter 1987, pp. 817.
McWhorter, John, Regrets Only, National Review, Vol. 53, No. 8, April 30, 2001, p. 14.
Mearns, Robin, Sustaining Livelihoods on Mongolias Pastoral Commons: Insights from a Participatory
Poverty Assessment, Development & Change, Vol. 35, No. 1, January 2004, pp. 107139.
Mechlem, Kerstin, Food Security and the Right to Food in the Discourse of the United Nations, European
Law Journal, Vol. 10, No. 5, 2004, pp. 631648.
Meech, Gary, Risk Complexities - Lessons for Everyone, Security: Solutions for Enterprise Security
Leaders, Vol. 43, No. 8, 2006, p. 31.
Meernik, James, A Supply and Demand Theory of US Military Policy, Conflict Management & Peace
Science (Routledge), Vol. 25, No. 1, Spring 2008, pp. 3348.

382
Mehfuz, Shabana, and M. N. Doja, Swarm Intelligent Power-Aware Detection of Unauthorised and
Compromised Nodes in MANETs, Journal of Artificial Evolution & Applications, January 2008, pp. 1
16.
Mehran, Hamid, and Stavros Peristiani, Financial Visibility and the Decision to Go Private, Review of
Financial Studies, Vol. 23, No. 2, February 2010, pp. 519547.
Meini, Bruno, HIV/AIDS, Crime and Security in Southern Africa, African Journal of Criminology & Justice
Studies, Vol. 3, No. 2, Spring 2008, pp. 3584.
Melakopides, Costas, Turkeys Political Culture as a Necessary Condition for Decoding Its Policies Toward
Cyprus, Greece and the European Union, Journal of Political & Military Sociology, Vol. 34, No. 2,
Winter 2006, pp. 301317.
Melzer, David, Brian D.M. Tom, Traolach Brugha, Tom Fryers, Rebecca Gatward, Adrian Grounds, Tony
Johnson, and Howard Meltzer, Access to Medium Secure Psychiatric Care in England and Wales. 1: A
National Survey of Admission Assessments, Journal of Forensic Psychiatry & Psychology, Vol. 15, No.
1, March 2004, pp. 731.
Menahem, Georges, The Decommodified Security Ratio: A Tool for Assessing European Social Protection
Systems, International Social Security Review, Vol. 60, No. 4, December 2007, pp. 69103.
Mendelson, Sarah E., Anatomy of Ambivalence: The International Community and Human Rights Abuse in
the North Caucasus, Problems of Post-Communism, Vol. 53, No. 6, December 2006, pp. 315.
Mendenhall, Richard R., William D. Nichols, and Krishna G. Palepu, Bad News and Differential Market
Reactions to Announcements of Earlier-Quarters Versus Fourth-Quarter Earnings, Journal of
Accounting Research, Vol. 26, No. 3, Supplement 1988, pp. 6386.
Menkhaus, Ken, Governance Without Government in Somalia, International Security, Vol. 31, No. 3,
Winter 2006, pp. 74106.
Menkhaus, Ken, Somalia: Too big a problem to fail?, RUSI Journal: Royal United Services Institute for
Defence Studies, Vol. 154, No. 4, 2009, pp. 612.
Menkhaus, Ken, Stabilisation and Humanitarian Access in a Collapsed State: The Somali Case, Disasters,
Vol. 34, 2010, pp. S320S341.
Menon, Anand, and Ulrich Sedelmeier, Instruments and Intentionality: Civilian Crisis Management and
Enlargement Conditionality in EU Security Policy, West European Politics, Vol. 33, No. 1, January
2010, pp. 7592.
Menon, Rajan, The End of Alliances, World Policy Journal, Vol. 20, No. 2, Summer 2003, p. 1.
Merrett, Christopher, A Tale of Two Paradoxes: Media Censorship in South Africa, Pre-Liberation and
Post-Apartheid, Critical Arts: A South-North Journal of Cultural & Media Studies, Vol. 15, No. 1/2,
May 2001, p. 50.
Metz, Robert E., Laurence D. Kay, Michael D. Bartell, Milton O. Wordal, Robert M. Mallano, and Alan J.
Barton, Notes and Recent Decisions, California Law Review, Vol. 50, No. 1, March 1962, p. 131.
Mica, Adriana, Reply to Disclosure Scandals in Romania Political Parties and the Romanian Orthodox
Church, Polish Sociological Review, No. 165, February 2009, pp. 3961.
Micciancio, Daniele, and Bogdan Warinschi, Completeness Theorems for the AbadiRogaway Language of
Encrypted Expressions, Journal of Computer Security, Vol. 12, No. 1, February 2004, pp. 99129.
Michael, Kobi, Who Really Dictates What an Existential Threat Is? The Israeli Experience, Journal of
Strategic Studies, Vol. 32, No. 5, October 2009, pp. 687713.
Michello, Franklin A.Ford, The Unemployment Effects of Proposed Changes in Social Securitys Normal
Retirement Age., Business Economics, Vol. 41, No. 2, April 2006, p. 38.
Mickiewicz, Ellen, The Social Construction of Russias Resurgence: Aspirations, Identity, and Security
Interests By Anne L. Clunan, Political Psychology, Vol. 31, No. 2, April 2010, pp. 305307.
Micklitz, Hans W., Amr Shalakany, Enrico Al Mureden, Nigel Evans, Peter H. Sand, Ralph Folsom, Philippe
Deschamps, et al., Book Reviews, European Journal of International Law, Vol. 9, No. 3, 1998, pp.
574594.
Middlemass, Keesha M., and Christian R. Grose, Congressional Representation andPosition-Taking, 2004,
pp. 137.

383
Middlemass, Keesha M.Grose, The Three Presidencies? Legislative Position Taking in Support of the
President on Domestic, Foreign, and Homeland Security Policies in the 107th Congress (2001-02),
Congress & the Presidency, Vol. 34, No. 2, 2007, p. 57.
Mikulincer, Mario, and Phillip R. Shaver, Boosting Attachment Security to Promote Mental Health,
Prosocial Values, and Inter-Group Tolerance, Psychological Inquiry, Vol. 18, No. 3, July 2007, pp.
139156.
Mikulincer, Mario, Omri Gillath, Yael Sapir-Lavid, Erez Yaakobi, Keren Arias, Liron Tal-Aloni, and Gili Bor,
Attachment Theory and Concern for OthersWelfare: Evidence That Activation of the Sense of
Secure Base Promotes Endorsement of Self-Transcendence Values, Basic & Applied Social
Psychology, Vol. 25, No. 4, December 2003, p. 299.
Miley, G. H., B. Ulmen, G. Amadio, H. Leon, P. J. Shrestha, and H. Hora, Cylindrical IEC Neutron Source
Design for Driven Research Reactor Operation, Journal of Radioanalytical & Nuclear Chemistry, Vol.
282, No. 1, October 2009, pp. 193197.
Miley, G.H., L. Wu, and H.J. Kim, Nuclear Techniques in National Security Studies on Contraband
Detection, Journal of Radioanalytical & Nuclear Chemistry, Vol. 263, No. 1, January 2005, pp. 159
164.
Miller, Amalia R., and Catherine E. Tucker, Encryption and the Loss of Patient Data, Journal of Policy
Analysis & Management, Vol. 30, No. 3, Summer 2011, pp. 534556.
Miller, Darius P., and John J. Puthenpurackal, Security Fungibility and the Cost of Capital: Evidence from
Global Bonds, Journal of Financial & Quantitative Analysis, Vol. 40, No. 4, December 2005, pp. 849
872.
Miller, Eugene, Trends in Private Pension Funds, Journal of Finance, Vol. 16, No. 2, May 1961, pp. 313
327.
Miller, Susan, The Market to the Rescue? The Promise -and the Price- of the New Social Security
Investment Proposals, Current Issues in Economics & Finance, Vol. 3, No. 10, 1997, p. 1.
Millon, David, Worker Ownership Through 401(K) Retirement Plans, St. Johns Law Review, Vol. 76, No.
4, Fall 2002, p. 835.
Mills, Greg, Africas New Strategic Significance, Washington Quarterly, Vol. 27, No. 4, October 2004, pp.
157169.
Milner, Eileen M., Tension and Paradox, Managing Information & Knowledge in the Public Sector, Taylor
& Francis Ltd / Books, 2000, pp. 125144.
Milton, Martin, Linda Charles, Dale Judd, Michael OBrien, Annie Tipney, and Amanda Turner, The
Existential-Phenomenological Paradigm, Existential Analysis: Journal of the Society for Existential
Analysis, Vol. 14, No. 1, January 2003, p. 112.
Ming Yee Wang, Multiple-Benchmark and Multiple-Portfolio Optimisation, Financial Analysts Journal,
Vol. 55, No. 1, January 1999, p. 63.
Ming-Yi Hsu, and George Kernohan, Dimensions of Hospital Nurses Quality of Working Life, Journal of
Advanced Nursing, Vol. 54, No. 1, April 2006, pp. 120131.
Minoli, Daniel, Needed: An Enterprise Security Architecture, Network World, Vol. 23, No. 18, May 8,
2006, p. 31.
Miranda, Paolo, Risk Sharing, International Business & Economics Research Journal, Vol. 9, No. 5, May
2010, pp. 8593.
Mirela, Gheorghe, and Boldeanu Dana Maria, Information Security Management Systems, Annals of the
University of Oradea, Economic Science Series, Vol. 17, No. 4, December 2008, pp. 13581363.
Mitchell, Derek I., U.S. Security Strategy for the Asia-Pacific Region, Asian Affairs: An American Review,
Vol. 28, No. 3, 2001, p. 159.
Mitchell, Donna, Investing for Retirement, SourceMedia, Inc., February 2011.
Mitchell, Gordon R., Public Argument Driven Security Studies, Argumentation & Advocacy, Vol. 39, No. 1,
Summer 2002, p. 57.
Mitchell, Ronald K., Evolutionary Biology Research, Entrepreneurship, and the Morality of Security-
Seeking Bahaviour in an Imperfect Economy, Ruffin Series in Business Ethics, Vol. 4, January 2004,
pp. 263287.

384
Mitrakas, Andreas, Information Security and Law in Europe: Risks Checked?, Information &
Communications Technology Law, Vol. 15, No. 1, March 2006, pp. 3353.
Mittelstaedt, H. Fred, Research and Ethical Issues Related to Retirement Plans, Journal of Business
Ethics, Vol. 52, No. 2, 2004, pp. 153159.
Mizikovsky, Semyon, Zhibi Wang, and Hongru Zhu, CDMA 1x Ev-DO Security, Bell Labs Technical Journal,
Vol. 11, No. 4, Winter 2007, pp. 291305.
Mizuta, Ichiro, Carolyn Zahn-Waxler, Pamela M. Cole, and Noriko Hiruma, Cross-cultural Study of
Preschoolers Attachment: Security and Sensitivity in Japanese and US Dyads, International Journal
of Behavioural Development, Vol. 19, No. 1, March 1996, pp. 141160.
Mobekk, Eirin, Gender, Women and Security Sector Reform, International Peacekeeping (13533312),
Vol. 17, No. 2, April 2010, pp. 278291.
Moi, Asgjerd Litler, Hallvard Andreas Vindenes, and Eva Gjengedal, The Experience of Life After Burn
Injury: a New Bodily Awareness, Journal of Advanced Nursing, Vol. 64, No. 3, November 2008, pp.
278286.
Mokuolu, J.O., V.G. Afolabi, and O.O. Olayemi, Personal Security: An Important Incentive to Investors,
IFE PsychologIA, May 2, 2011, pp. 352362.
Mllers, Thomas M. J., Sources of Law in European Securities Regulation - Effective Regulation, Soft Law
and Legal Taxonomy from Lamfalussy to De Larosire, European Business Organisation Law Review,
Vol. 11, No. 3, 2010, pp. 379407.
Moloney, Michael, and Shane Whelan, Pension Insecurity in Ireland, Journal of the Statistical & Social
Inquiry Society of Ireland, Vol. 38, January 2009, pp. 75104.
Molotkov, S. N., Some Conservative Estimates in Quantum Cryptography, Journal of Experimental &
Theoretical Physics, Vol. 103, No. 2, 2006, pp. 198205.
Moltz, James Clay, The Past, Present, and Future of Space Security, Brown Journal of World Affairs, Vol.
14, No. 1, Winter 2007, pp. 187195.
Molyneux, Maxine, Mothers at the Service of the New Poverty Agenda: Progresa/Oportunidades,
Mexicos Conditional Transfer Programme, Social Policy & Administration, Vol. 40, No. 4, 2006, pp.
425449.
Molyneux, Maxine, The Neoliberal Turn and the New Social Policy in Latin America: How Neoliberal,
How New?, Development & Change, Vol. 39, No. 5, 2008, pp. 775797.
Monaghan, Peter, Beyond Borders and Bullets, Chronicle of Higher Education, Vol. 54, No. 42, June 27,
2008, pp. B8B11.
Monar, Jrg, Cooperation in the Justice and Home Affairs Domain: Characteristics, Constraints and
Progress, Journal of European Integration, Vol. 28, No. 5, December 2006, pp. 495509.
Monshipouri, Mahmood, NGOs and Peacebuilding in Afghanistan, International Peacekeeping
(13533312), Vol. 10, No. 1, Spring 2003, pp. 138155.
Monteleone, Carla, The New Transatlantic Agenda: Transatlantic Security Relations Between Post-
Hegemonic Cooperation and Interdependency, Journal of Transatlantic Studies (Edinburgh
University Press), Vol. 1, No. 1, Spring 2003, p. 87.
Moore, Dahlia, Gender Identity, Nationalism, and Social Action Among Jewish and Arab Women in Israel:
Redefining the Social Order?, Gender Issues, Vol. 18, No. 2, Spring 2000, p. 3.
Moore, David, David Sogge, Timothy M. Shaw, Aart van de Laar, Wil Hout, Maxine Molyneux, Cristbal
Kay, et al., Book Reviews, Development & Change, Vol. 33, No. 4, 2002, p. 733.
Moore, John D., and Nick-Anthony Buford, In the Ascendancy, International Financial Law Review, Vol.
25, No. 9, 2006, pp. 2630.
Moore, Mike, The Once and Future Superpower, Bulletin of the Atomic Scientists, Vol. 53, No. 1,
February 1997, pp. 2934.
Mora, Frank O., Military Business, Problems of Post-Communism, Vol. 51, No. 6, December 2004, pp. 44
63.
Morales, Waltraud Queise, US Intervention and the New World Order: Lessons from Cold War and post-
Cold War Cases, Third World Quarterly, Vol. 15, No. 1, March 1994, p. 77.
Morea, Gary J., From Enduring Strife to Enduring Peace in the Philippines, Military Review, 2008, p. 192.

385
Morgan, Brian, Fostering Conceptual Roles for Change, Kritika Kultura, No. 15, 2010, pp. 3455.
Morgan, Julian, Employment Security and the Demand for Labour in Europe, Applied Economics, Vol. 33,
No. 14, November 15, 2001, pp. 17631774.
Morgan, Patrick, The Dangers of Ethnic Nationalism, Quadrant Magazine, Vol. 52, No. 6, June 2008, pp.
5457.
Morgan-Warren, E. J., Security in Transport of Radioactive Material, Packaging, Transport, Storage &
Security of Radioactive Materials, Vol. 17, No. 2, June 2006, pp. 6569.
Morozova, Natalia, Geopolitics, Eurasianism and Russian Foreign Policy Under Putin, Geopolitics, Vol. 14,
No. 4, Winter 2009, pp. 667686.
Morrison, Greg, and Joseph Airey, Special Events Safety and Security, FBI Law Enforcement Bulletin, Vol.
71, No. 4, April 2002, p. 1.
Morrison, Thomas L.Goodlin-Jones, Attachment and the Representation of Intimate relationships in
adulthood, Journal of Psychology, Vol. 131, No. 1, January 1997, p. 57.
Morton, Katherine, China and Environmental Security in the Age of Consequences, Asia-Pacific Review,
Vol. 15, No. 2, November 2008, pp. 5267.
Morton, Katherine, Climate Change and Security at the Third Pole, Survival, Vol. 53, No. 1, March 2011,
pp. 121132.
Mounier, Gregory, Civilian Crisis Management and the External Dimension of JHA: Inceptive, Functional
and Institutional Similarities, Journal of European Integration, Vol. 31, No. 1, January 2009, pp. 45
64.
Moussa, Ghada, Gender Aspects of Human Security, International Social Science Journal, Vol. 59, No.
193, 2008, pp. 81100.
Moustakis, Fotios, and Petros Violakis, European Security and Defence Policy Deceleration: An
Assessment of the ESDP Strategy, European Security, Vol. 17, No. 4, December 2008, pp. 421433.
Moyer, R. Charles, and Harold Handerson, A Critique of the Rationales for Present U.S. Maritime
Programs, Transportation Journal (American Society of Transportation & Logistics Inc), Vol. 14, No.
2, Winter 1974, pp. 516.
Mpedi, L. George, Impact of the Global Economic Crisis on Social Security Systems in Africa, Journal of
Social Development in Africa, Vol. 24, No. 2, December 2009, pp. 123138.
Mubareka, Sarah, Delilah Al Khudhairy, Ferdinand Bonn, and Sami Aoun, Standardising and Mapping
Open-source Information for Crisis Regions: The Case of Post-conflict Iraq, Disasters, Vol. 29, No. 3,
2005, pp. 237254.
Muga, Geoffrey O., and Washington Onyango-Ouma, Changing Household Composition and Food
Security Among the Elderly Caretakers in Rural Western Kenya, Journal of Cross-Cultural
Gerontology, Vol. 24, No. 3, 2009, pp. 259272.
Muhwezi, Wilson W., Eugene Kinyanda, Margaret Mungherera, Patrick Onyango, Emmanuel Ngabirano,
Julius Muron, Johnson Kagugube and Rehema Kajungu, Vulnerability to High Risk Sexual Behaviour
(HRSB) Following Exposure to War Trauma as Seen in Post-conflict Communities in Eastern Uganda: a
Qualitative Study, Conflict & Health, Vol. 5, No. 1, January 2011, pp. 2236.
Muir, Dana M., The Dichotomy Between Investment Advice and Investment Education: Is No Advice
Really the Best Advice?, Berkeley Journal of Employment & Labour Law, Vol. 23, No. 1, January 2002,
p. 1.
Muller, Kenneth, and Seth Chertok, The Impact of the Dodd-Frank Wall Street Reform and Consumer
Protection Act on Real Estate Advisers and Real Estate Funds Exemptions: Part 1 of 2, Investment
Lawyer, Vol. 18, No. 2, February 2011, pp. 114.
Muller, Marie, South African Diplomacy and Security Complex Theory, Round Table, Vol. 88, No. 352,
October 1999, p. 585.
Mulvey, Gareth, When Policy Creates Politics: The Problematizing of Immigration and the Consequences
for Refugee Integration in the UK, Journal of Refugee Studies, Vol. 23, No. 4, December 2010, pp.
437462.
Mundhra, D. D., Intrinsic Motivational Canvass in the Indian Service Sector, Vision (09722629), Vol. 14,
No. 4, December 2010, pp. 275284.

386
Munnell, Alicia H., A Reappraisal of Social Security Financingrevisited, Journal of Economics &
Finance, Vol. 32, No. 4, October 2008, pp. 394408.
Munoz, Jose L., Jordi Forne, Oscar Esparza, and Miguel Soriano, Certificate Revocation System
Implementation Based on the Merkle Hash Tree, International Journal of Information Security, Vol.
2, No. 2, January 2004, pp. 110124.
Muoz, Jose, Oscar Esparza, Jordi Forn, and Esteve Pallares, A Protocol to Reduce the Processing Burden
in Online Certificate Status Validation, Electronic Commerce Research, Vol. 8, No. 4, October 2008,
pp. 255273.
Murcott, Susan, Co-evolutionary Design for Development: Influences Shaping Engineering Design and
Implementation in Nepal and the Global Village, Journal of International Development, Vol. 19, No.
1, January 2007, pp. 123144.
Murphy, Elizabeth M., Self-Regulatory Organisations; Financial Industry Regulatory Authority, Inc.; Notice
of Filing and Immediate Effectiveness of Proposed Rule Change To Amend Rule 7730 Regarding
TRACE Reporting Fees For Transactions in Agency Pass-Through Mortgage-Backed Securities Traded
To Be Announced, Federal Register, Vol. 76, No. 203, October 20, 2011, pp. 6531365315.
Murphy, Kevin M. and Robert H. Topel, The Value of Health and Longevity, Journal of Political Economy,
Vol. 114, No. 5, October 2006, pp. 871904.
Murphy, Thrse, and Noel Whitty, Is Human Rights Prepared? Risk, Rights and Public Health
Emergencies, Medical Law Review, Vol. 17, No. 2, Summer 2009, pp. 219244.
Murray, Paula C., and Beverly L. Hadaway, Mortgage-Backed Securities: An Investigation of Legal and
Financial Issues, Journal of Corporation Law, Vol. 11, No. 2, Winter 1986, p. 203.
Mu-Sheng Chang, and Mary A. Weiss, Characteristics of U.S. Self-Insurers for Workers Compensation
Losses, Journal of Insurance Regulation, Vol. 30, Winter 2011, pp. 139170.
Muto, Ichiyo, Redefine and Practice Our Peace, Our Security, If They Do Theirs, Social Justice, Vol. 27,
No. 4, December 2000, pp. 133142.
Mwadime, Robert K. N., Implications and Impact: Changes in Environmental Conditions: Their Potential as
Indicators for Monitoring Household Food Security, Grassroots Indicators for Desertification:
Experience & Perspectives from Eastern & Southern Africa, International Development Research
Centre, 1996, pp. 8594.
Myers, Andrew C., Andrei Sabelfeld, and Steve Zdancewic, Enforcing Robust Declassification and Qualified
Robustness, Journal of Computer Security, Vol. 14, No. 2, April 2006, pp. 157196.
Myers, Andrew, Technical Perspective: Reframing Security for the Web, Communications of the ACM,
Vol. 52, No. 6, June 2009, p. 82.
Myyrya, LiisaJuujrvi, Empathy, Perspective Taking and Personal Values as Predictors of Moral Schemas,
Journal of Moral Education, Vol. 39, No. 2, June 2010, pp. 213233.
NACLA, Introduction Golpistas! Coups and Democracy in the 21st Century, NACLA Report on the
Americas, Vol. 44, No. 1, February 2011, pp. 1415.
Nadarajah, Yaso, A Community in Constant Transition: Propagating a Yield of Conflict and Violence?, At
the Interface / Probing the Boundaries, Vol. 75, June 2011, pp. 103119.
Nader, Ralph, Corporate Supremacy & the Erosion of Democracy, Humanist, Vol. 64, No. 2, April 2004,
pp. 79.
Nadig, Aninia, Human Smuggling, National Security, and Refugee Protection, Journal of Refugee Studies,
Vol. 15, No. 1, March 2002, pp. 125.
Naor, Arye, CivilMilitary Relations and Strategic Goal Setting in the Six Day War, Israel Affairs, Vol. 12,
No. 3, July 2006, pp. 395411.
Nara, Koichi, Susumu Yamashiro, and Jun Hasegawa, On-line Contingency Selection Algorithm for Voltage
and Overload Security Analysis, Electrical Engineering in Japan, Vol. 107, No. 4, August 1987, pp. 60
67.
Narramore, Terry, Coming to Terms with Asia in Discourses of Asia-Pacific Regional Security, Australian
Journal of Political Science, Vol. 33, No. 2, July 1998, p. 253.
Nasser, Alan G., Saving Social Security: A Neoliberal Recapitulation of Primitive Accumulation, Monthly
Review: An Independent Socialist Magazine, Vol. 52, No. 7, December 2000, p. 42.

387
Nathan, K.S., Australia and South-East Asia, Round Table, Vol. 319, No. 1, July 1991, p. 335.
Nathan, Laurie, SADCs Uncommon Approach to Common Security, 19922003, Journal of Southern
African Studies, Vol. 32, No. 3, 2006, pp. 605622.
National Underwriter, 6 Ways The Industry Can Respond, National Underwriter / Life & Health Financial
Services, Vol. 111, No. 5, February 5, 2007, pp. 1337.
Naughton-Travers, Joseph P., Here Comes the Latest HIPAA Deadline, Behavioural Health Management,
Vol. 24, No. 6, December 2004, pp. 5358.
Nazare, Vasile, Romanian Naval Forces Role in Crisis Management Next to the Black Sea, Eurolimes, Vol.
7, March 2009, pp. 160166.
Ndahinda, Felix Mukwiza, Victimisation of African Indigenous Peoples: Appraisal of Violations of
Collective Rights Under Victimological and International Law Lenses, International Journal on
Minority & Group Rights, Vol. 14, No. 1, March 2007, pp. 123.
Neal, Andrew, Securitisation and Risk at the EU Border: The Origins of FRONTEX, Journal of Common
Market Studies, Vol. 47, No. 2, March 2009, pp. 333356.
Nedelisky, Anna, and Miriam Steele, Attachment to People and to Objects in Obsessive-compulsive
Disorder: An Exploratory Comparison of Hoarders and Non-hoarders, Attachment & Human
Development, Vol. 11, No. 4, July 2009, pp. 365383.
Nelson, Mark W., Susan D. Krische, and Robert J. Bloomfield, Confidence and Investors Reliance on
Disciplined Trading Strategies, Journal of Accounting Research, Vol. 41, No. 3, June 2003, pp. 503
523.
Nesadurai, Helen E. S., Introduction: Economic Security, Globalisation and Governance, Pacific Review,
Vol. 17, No. 4, December 2004, pp. 459484.
Netto, Marcelo dos Santos, Lessons from Nauru: A Securitizing Move on Climate Change, Meridiano 47 -
Boletim De Anlise De Conjuntura Em Relaes Internacionais, No. 127, October 2011, pp. 1017.
Neuman, Stephanie, Security Assistance and the New World Order, American Foreign Policy Interests,
Vol. 23, No. 5, October 2001, p. 299.
Neumann, Fred, The Auditing Standard of Consistency, Journal of Accounting Research, Vol. 6, No. 3,
Supplement 1968, pp. 117.
Neumann, Thomas, Israel, India, And The United States, Vital Speeches of the Day, Vol. 69, No. 24, 2003,
pp. 759761.
Nevins, Joseph, Resource Conflicts in a New World Order, Geopolitics, Vol. 9, No. 1, Winter 2004, pp.
255263.
Newman, Edward, Human Security and Constructivism, International Studies Perspectives, Vol. 2, No. 3,
2001, p. 239.
Newmann, William W., Reorganising for National Security and Homeland Security, Public Administration
Review, Vol. 62, No. 4, 2002, pp. 126137.
Ng, Mark, Economic Impact of the Photovoltaic Industry in China After the Financial Crisis of 2009,
Chinese Economy, Vol. 44, No. 3, June 2011, pp. 2244.
Nicol, Heather, Resiliency or Change? The Contemporary CanadaUS Border, Geopolitics, Vol. 10, No. 4,
Winter 2005, pp. 767790.
Niemi, Tapio, Miika Tuisku, Ari-pekka Hameri, and Tamara Curtin, Server-Based Computing Solution
Based on Open Source Software, Information Systems Management, Vol. 26, No. 1, Winter 2009,
pp. 7786.
Nieves Jr., Enrique, Caitlin Shockey, and Erik Knudsen, Prerequisites for Assessing Whether to Engage in
Collaborative Software Development in a Government Setting, Journal of Information Technology &
Politics, Vol. 8, No. 1, January 2011, pp. 8392.
Nilsson, Fredrik Olof Laurentius, Knut Per Hasund, Ing-Marie Gren, and Yves Surry, Multifunctional
Agriculture What Does the Economic Literature Tell Us?, International Review of Environmental &
Resource Economics, Vol. 2, No. 4, December 2008, pp. 281319.
Ninghui Li, John C. Mitchell, and William H. Winsborough, Beyond Proof-of-Compliance: Security Analysis
in Trust Management, Journal of the ACM, Vol. 52, No. 3, May 2005, pp. 474514.

388
Ninkovich, F., Where Have All the Realists Gone?, Diplomatic History, Vol. 26, No. 1, Winter 2002, pp.
137142.
Noetzel, Timo, and Benjamin Schreer, All the Way? The Evolution of German Military Power,
International Affairs, Vol. 84, No. 2, March 2008, pp. 211221.
Nonis, SarathSwift, Personal Value Profiles and Ethical Business Decisions, Journal of Education for
Business, Vol. 76, No. 5, June 2001, p. 251.
Nonneman, Gerd, Book Reviews: Middle East and North Africa, International Affairs, Vol. 74, No. 2, April
1998, p. 471.
Noriega, Roger F., Cooperative Hemispheric Security Architecture for the 21st Century, DISAM Journal of
International Security Assistance Management, Vol. 25, No. 1/2, Fall 2002, p. 27.
Novak, Justin P., Whos Guiding South-Carolinas Securities Jurisprudence?, South Carolina Law Review,
Vol. 60, No. 5, Summer 2009, pp. 10751099.
Novit, Mitchell S., Right-to-Work: Before and After, Business Horizons, Vol. 12, No. 5, October 1969, p.
61.
Nuruzzaman, Mohammed, Beyond the Realist Theories: Neo-Conservative Realism and the American
Invasion of Iraq, International Studies Perspectives, Vol. 7, No. 3, 2006, pp. 239253.
Nyanchama, Matunda, and Paul Sop, Enterprise Security Management: Managing Complexity,
Information Systems Security, Vol. 9, No. 6, February 2001, p. 37.
Nye Jr., Joseph S., JO - Foreign Affairs, Foreign Affairs, Vol. 53, No. 1, October 1974, p. 153.
OBrennan, John, Bringing Geopolitics Back In: Exploring the Security Dimension of the 2004 Eastern
Enlargement of the European Union, Cambridge Review of International Affairs, Vol. 19, No. 1,
March 2006, pp. 155169.
OBrien, Terence, America in Todays World, New Zealand International Review, Vol. 33, No. 6,
November 2008, pp. 1216.
OMahoney, Joseph, Hugo Dobson, Philip Gabriel, Penelope Francks, Peter Selman, and Julie Gilson, A
Reviews of: Chad J. Mitcham, Chinas Economic Relations with the West and Japan, 1949-79: Grain,
Trade and Diplomacy, Japan Forum, Vol. 19, No. 1, March 2007, pp. 135145.
ONeil, Don, Competitiveness Versus Security, Journal of the Quality Assurance Institute, Vol. 19, No. 1,
January 2005, pp. 2128.
ONeill, P. E., The European Union and Migration: Security Versus Identity?, Defence Studies, Vol. 6, No.
3, November 2006, pp. 322350.
Oberleitner, Gerd, Human Security: A Challenge to International Law?, Global Governance, Vol. 11, No.
2, June 2005, pp. 185203.
Obidziski, Piotr, On the Need for Prevention in the Pension System on the Example of the Demographic
Reserve Fund, Folia Oeconomica Stetinensia, July 2010, pp. 179189.
Ofreneo, Rene E., Neo-liberalism and the Working People of Southeast Asia, Asian Journal of Social
Science, Vol. 36, No. 2, May 2008, pp. 170186.
Ogden, Chris, Post-Colonial, Pre-BJP: The Normative Parameters of Indias Security Identity, 1947-1998,
Asian Journal of Political Science, Vol. 17, No. 2, 2009, pp. 215237.
Ouzlu, Tarik, Soft Power in Turkish Foreign Policy, Australian Journal of International Affairs, Vol. 61,
No. 1, March 2007, pp. 8197.
Ojame, Liis, Making Choices in the Housing Market: A Social Construction of Housing Values, Research
in Economics & Business: Central & Eastern Europe, Vol. 1, No. 2, November 2009, pp. 4158.
Okafor, Chinwuba, Performance Evaluation Model Used in Nigerian Quoted Companies: Empirical
Research Findings, Journal of Financial Management & Analysis, Vol. 19, No. 2, December 2006, pp.
19.
Okazawa-Rey, Margo, and Gwyn Kirk, Maximum Security, Social Justice, Vol. 27, No. 3, 2000, pp. 120
132.
Oktav, zden Zeynep, The Gulf States and Iran: A Turkis h Perspective, Middle East Policy, Vol. 18, No. 2,
Summer 2011, pp. 136147.

389
Olang, Beheshteh, Khalil Farivar, Abtin Heidarzadeh, Birgitta Strandvik1, and Agneta Yngve, Breastfeeding
in Iran: Prevalence, Duration and Current Recommendations, International Breastfeeding Journal,
Vol. 4, January 2009, pp. 817.
Olimat, Muhamad, The Political Economy of the Sino-Middle Eastern Relations, Journal of Chinese
Political Science, Vol. 15, No. 3, 2010, pp. 307335.
Oliver, Kelly, Bodies Against the Law: Abu Ghraib and the War on Terror, Continental Philosophy Review,
Vol. 42, No. 1, March 2009, pp. 6380.
Olsen, H., The Forgotten Entitlements, Policy Review, No. 153, March 2009, p. 41.
Ong, Russell, Peaceful Evolution, Regime Change and Chinas Political Security, Journal of
Contemporary China, Vol. 16, No. 53, November 2007, pp. 717727.
Onuoha, Freedom C., Why the Poor Pay with Their Lives: Oil Pipeline Vandalisation, Fires and Human
Security in Nigeria, Disasters, Vol. 33, No. 3, July 2009, pp. 369389.
Oquist, Paul, Basic Elements of a Policy Framework for Human Security, International Social Science
Journal, Vol. 59, No. 193, 2008, pp. 101112.
Orcutt Duleep, Harriet, Incorporating Longitudinal Aspects into Mortality Research Using Social Security
Administrative Record Data, Journal of Economic & Social Measurement, Vol. 14, No. 2, July 1986,
pp. 121133.
Oren, Ami, and David Newman, Competing Land Uses: The Territorial Dimension of CivilMilitary
Relations in Israel, Israel Affairs, Vol. 12, No. 3, July 2006, pp. 561577.
Organisation of American States, Superintendent of Documents, 2000.
Oros, Andrew, and Steven Clemens, Japans Leadership Struggle to Create a New Normal., Harvard Asia
Quarterly, Vol. 11, No. 2/3, Summer 2008, pp. 5765.
Orr, Alastair, Blessings Mwale, and Donata Saiti, Market Liberalisation, Household Food Security and the
Rural Poor of Malawi, European Journal of Development Research, Vol. 13, No. 1, June 2001, p. 47.
Orr, Allan, The Artful Dodger: On Pakistan, Reality Bites, Defence & Security Analysis, Vol. 26, No. 3,
2010, pp. 243260.
Orr, David W., The Events of 9-11: a View from the Margin, Conservation Biology, Vol. 16, No. 2, April
2002, pp. 288290.
Orsini, Dominique, Africa After the Cold War (Book Review), Africa (Edinburgh University Press), Vol. 69,
No. 4, December 1999, p. 638.
Ortiz, Antonio, Neither Fox nor Hedgehog: NATOs Comprehensive Approach and the OSCEs Concept of
Security, Security & Human Rights, Vol. 19, No. 4, October 2008, pp. 284297.
OSCE-ODIHR, Astana Commemorative Declaration Towards a Security Community, Security & Human
Rights, Vol. 21, No. 4, December 2010, pp. 265268.
Osgood, Eugenta V., JO - Bulletin of the Atomic Scientists, Bulletin of the Atomic Scientists, Vol. 39, No.
10, December 1983, p. 13.
Osipian, Ararat L., Corruption and Coercion: University Autonomy Versus State Control, European
Education, Vol. 40, No. 3, Fall 2008, pp. 2748.
Ostergard Jr., Robert L., Politics in the Hot Zone: AIDS and National Security in Africa, Third World
Quarterly, Vol. 23, No. 2, April 2002, p. 333.
Ottaway, David, The King and Us, Foreign Affairs, Vol. 88, No. 3, June 2009, p. 121.
Ottaway, Martin, Rebuilding State Institutions in Collapsed States, Development & Change, Vol. 33, No.
5, November 2002, p. 1001.
Otting, Albrecht, International Labour Standards: A Framework for Social Security, International Labour
Review, Vol. 132, No. 2, March 1993, p. 163.
Owen, Taylor, The Uncertain Future of Human Security in the UN, International Social Science Journal,
Vol. 59, No. 193, 2008, pp. 113127.
Owens, Richard N., What Is a Security?, Accounting Review, Vol. 17, No. 3, July 1942, p. 303.
Ozawa, Martha N., The Economic Status of Vulnerable Older Women, Social Work, Vol. 40, No. 3, May
1995, p. 323.

390
Ozerdem, Alpaslan, Sukanya Podder, and Eddie L. Quitoriano, Identity, Ideology and Child Soldiering:
Community and Youth Participation in Civil Conflict - A Study on the Moro Islamic Liberation Front in
Mindanao, Philippines, Civil Wars, Vol. 12, No. 3, 2010, pp. 304325.
P. Fraser, Steve, William W. Jennings, and David R. King, Strategic Asset Allocation for Individual
Investors: The Impact of the Present Value of Social Security Benefits, Financial Services Review, Vol.
9, No. 4, Winter 2000, p. 295.
Pace, Michelle, The Euro-Mediterranean Partnership and the Common Mediterranean Strategy?
European Union Policy from a Discursive Perspective, Geopolitics, Vol. 9, No. 2, Summer 2004, pp.
292309.
Pace, Michelle, The Ugly Duckling of Europe: The Mediterranean in the Foreign Policy of the European
Union, Journal of European Area Studies, Vol. 10, No. 2, November 2002, pp. 189210.
Page, Edward, Theorizing the Link Between Environmental Change and Security, Review of European
Community & International Environmental Law, Vol. 9, No. 1, March 2000, p. 33.
Pak Shun, NG, Why Not a Volunteer Army? Reexamining the Impact of Military Conscription on
Economic Growth for Singapore, Singapore Economic Review, Vol. 50, No. 1, April 2005, pp. 4767.
Palfrey, Terry, The Hidden Legacy of Scott: Weapons of Mass Destruction and the UK Government
Proposals to Control, International Review of Law, Computers & Technology, Vol. 13, No. 2, 1999, p.
163.
Paliotta, Allan R., Beyond the Maginot-Line Mentality: A Total-Process View of Information Security Risk
Management, Information Systems Security, Vol. 10, No. 3, August 2001, p. 21.
Palmer, Adrian, and Damian Gallagher, Religiosity, Relationships and Consumption: A Study of Church
Going in Ireland, Consumption, Markets & Culture, Vol. 10, No. 1, March 2007, pp. 3149.
Palmer, David Scott, Addicted to Failure: U.S. Security Policy in Latin America and the Andean Region,
Hispanic American Historical Review, Vol. 88, No. 2, May 2008, pp. 345346.
Paltridge, Toby, Susan Mayson, and Jan Schapper, The Contribution of University Accommodation to
International Student Security, Journal of Higher Education Policy & Management, Vol. 32, No. 4,
2010, pp. 353364.
Pan, Bertrand, and Jennifer Taylor, Sustaining Power, Emory Bankruptcy Developments Journal, Vol. 22,
No. 2, January 2006, pp. 371399.
Pan, Leon, Chang N. Zhang, and Cungang yang, A Role Based Multilevel Security Access Control Model,
Journal of Computer Information Systems, Vol. 46, No. 3, Spring 2006, pp. 110.
Papa, Mihaela, Rethinking Conflict Prevention in South Eastern Europe: An Emerging Environmental
Security Agenda?, Journal of Southeast European & Black Sea Studies, Vol. 6, No. 3, 2006, pp. 315
333.
Parakkattu, Sindhuja, and Anand. S. Kunnathur, A Framework for Research in Information Security
Management, Proceedings for the Northeast Region Decision Sciences Institute (NEDSI), March 2010,
pp. 318323.
Parida, S. K., S. N. Singh, and S. C. Srivastava, A Hybrid Approach Toward Security-constrained Reactive
Power Planning in Electricity Markets, Electric Power Components & Systems, Vol. 36, No. 6, June
2008, pp. 649663.
Parker Jr., Frederick R.Vines, Inflation-Indexed Debt Instruments, Tax Adviser, Vol. 34, No. 7, July 2003,
p. 414.
Parker, Philip M., The 2009-2014 Outlook for Security Software in Africa & the Middle East, Regional
Outlook Reports, January 9, 2010.
Parker, Philip M., The 2009-2014 Outlook for Security Software in Europe, Regional Outlook Reports,
January 7, 2010.
Parker, Philip M., The 2009-2014 Outlook for Security Software in Latin America, Regional Outlook
Reports, January 8, 2010.
Parker, Philip M., The 2009-2014 Outlook for Security Software in North America & the Caribbean,
Regional Outlook Reports, January 8, 2010.
Parker, Philip M., The 2009-2014 Outlook for Security Software in Oceana, Regional Outlook Reports,
January 9, 2010.

391
Parker, Philip M., The 2010-2015 Outlook for Security Information Management (SIM) Software in North
America & the Caribbean, Regional Outlook Reports, January 3, 2010.
Parker, Philip M., The 2010-2015 Outlook for Security Information Management (SIM) Software in
Oceana, Regional Outlook Reports, January 3, 2010.
Parker, Philip M., The 2011-2016 Outlook for Security Information Management (SIM) Software in Asia,
Regional Outlook Reports, January 4, 2011, p. N.PAG.
Parker, Philip M., 2006-2011 World Outlook for Security Systems Services, ICON Group International, Inc.,
April 2005.
Parthasarathy, D., Social and Environmental Insecurities in Mumbai: Towards a Sociological Perspective
on Vulnerability, South African Review of Sociology, Vol. 40, No. 1, June 2009, pp. 109126.
Paruchuri, Praveen, Jonathan P. Pearce, Janusz Marecki, Milind Tambe, Fernando Ordez, and Sarit
Kraus, Coordinating Randomised Policies for Increasing Security of Agent Systems, Information
Technology & Management, Vol. 10, No. 1, March 2009, pp. 6779.
Pass, Rafael, and Alon Rosen, New and Improved Constructions of Nonmalleable Cryptographic
Protocols, SIAM Journal on Computing, Vol. 38, No. 2, February 2008, pp. 702752.
Patterson, David S., A Historical View of American Security, Peace & Change, Vol. 7, No. 4, Fall 1981, p. 7.
Pavsic, Ursa, Principles of Global Security (Book), Journal of International Relations & Development, Vol.
5, No. 4, December 2002, p. 470.
Pawadee Tonguthai, Social Security for the Thai People, ASEAN Economic Bulletin, Vol. 3, No. 1, July
1986, p. 145.
Payne, Christian, On the Security of Open Source Software, Information Systems Journal, Vol. 12, No. 1,
January 2002, pp. 6178.
Peace, William J., Joseph Carrier, Adam Frank, and David Price, Exchange, Nation Company, L. P.,
February 12, 2001.
Pease-Watkin, Catherine, A Note on Annotating Bentham, Notes & Queries, Vol. 51, No. 2, June 2004,
pp. 128130.
Pencak, William, Invasion and Insurrection: Security, Defence, and War in the Delaware Valley, 1621-
1815, American Historical Review, Vol. 114, No. 2, April 2009, p. 435.
Peou, Sorpong, Collaborative Human Security? the UN and Other Actors in Cambodia, International
Peacekeeping (13533312), Vol. 12, No. 1, Spring 2005, pp. 105124.
Peou, Sorpong, The UN, Peacekeeping and Collective Human Security: From An Agenda for Peace to the
Brahimi Report, International Peacekeeping, Vol. 9, No. 2, Summer 2002, p. 51.
Perdomo, Catalina, International Assistance for Security Sector Reform, OASIS - Observatorio De Anlisis
De Los Sistemas Internacionales, No. 12, January 2006, pp. 77117.
Perlow, Mark, and Susan Gault-Brown, SEC Issues Concept Release on Use of Derivatives by Investment
Companies, Investment Lawyer, Vol. 18, No. 12, December 2011, pp. 315.
Perruci, Jr., The North-South Security Dialogue in Brazils Technology Policy, Armed Forces & Society
(0095327X), Vol. 21, No. 3, Spring 1995, pp. 371394.
Perzanowski, Aaron, Evolving Standards & the Future of DMCA Anticirumvention Rulemaking, Journal of
Internet Law, Vol. 10, No. 10, April 2007, pp. 122.
Petersen, Karen Lund, Risk, Responsibility and Roles Redefined: Is Counterterrorism a Corporate
Responsibility?, Cambridge Review of International Affairs, Vol. 21, No. 3, 2008, pp. 403420.
Peterson, Janice L., and Carol Dawn Petersen, Single Mother Families and the Dual Welfare State, Review
of Social Economy, Vol. 52, No. 3, Fall 1994, pp. 314338.
Peterson, Mark A., The Fate of Big Government in the United States: Not Over, But Undermined?,
Governance, Vol. 13, No. 2, April 2000, p. 251.
Petta, Paolo, and Jrg Mller, Best of From Agent Theory to Agent Implementation, Applied Artificial
Intelligence, April 2006.
Pettiford, Lloyd, Changing Conceptions of Security in the Third World, Third World Quarterly, Vol. 17, No.
2, June 1996, p. 289.
Pfau, W. D., Lifetime Earnings, Social Security Benefits, and the Adequacy of Retirement Wealth
Accumulation, Social Security Bulletin, Vol. 66, No. 1, March 2005, pp. 3857.

392
Pfau, Wade D., An Optimizing Framework for the Glide Paths of Life Cycle Asset Allocation Funds,
Applied Economics Letters, Vol. 18, No. 1, January 2011, pp. 5558.
Pfau,Wade D., Safe Savings Rates: A New Approach to Retirement Planning over the Life Cycle, Journal
of Financial Planning, Vol. 24, No. 5, May 2011, pp. 4250.
Phifer, Lisa, Defeating Malicious Mobiles, Business Communications Review, Vol. 37, No. 4, April 2007,
pp. 2225.
Phylaktis, Kate, and Antonis Aristidou, Security Transaction Taxes and Financial Volatility: Athens Stock
Exchange, Applied Financial Economics, Vol. 17, No. 18, December 2007, pp. 14551467.
Piazza, James A., Incubators of Terror: Do Failed and Failing States Promote Transnational Terrorism?,
International Studies Quarterly, Vol. 52, No. 3, 2008, pp. 469488.
Picotte, Mindi S., and Christina G. Campbell, The Effects of War on Iraqs Food System: A Historical
Analysis and Proposal for Future Direction, Journal of Hunger & Environmental Nutrition, Vol. 5, No.
2, June 2010, pp. 234253.
Pietsch, Juliet, and Ian McAllister, Human Security in Australia: Public Interest and Political
Consequences, Australian Journal of International Affairs, Vol. 64, No. 2, April 2010, pp. 225244.
Pietsch, Juliet, Marshall Clark, and Baogang He, Generational Change: Regional Security and Australian
Engagement with Asia, Pacific Review, Vol. 23, No. 2, May 2010, pp. 163181.
Piknerov, Linda, Regionalisation and Global Governance: The Taming of Globalisation?, Perspectives:
Central European Review of International Affairs, Vol. 18, No. 1, Summer 2010, pp. 8790.
Pilat, Joseph F., Reassessing Security Assurances in a Unipolar World, Washington Quarterly, Vol. 28, No.
2, Spring 2005, pp. 159170.
Pinstrup-Andersen, Per, and Anna Herforth, Food Security: Achieving the Potential, Environment, Vol.
50, No. 5, 2008, pp. 4861.
Pion-Berlin, David, and Harold Trinkunas, Attention Deficits: Why Politicians Ignore Defence Policy in Latin
America, Latin American Research Review, Vol. 42, No. 3, July 2007, pp. 76100.
Pistor, Katharina, Advancing the Rule of Law: Report on the International Rule of Law Symposium
Convened by the American Bar Association November 9-10, 2005, Berkeley Journal of International
Law, Vol. 25, No. 1, March 2007, pp. 743.
Pleuger, GunterSpatafora, Pro & Con, International Debates, Vol. 2, No. 1, January 2004, p. 10.
Pocatilu, Paul, and Adrian Pocovnicu, Mobile Learning Applications Audit, Informatica Economica, Vol.
14, No. 1, March 2010, pp. 137144.
Poirel, Marie-Laurence, Ellen Corin, and Lourdes Rodriguez Del Barrio, Revisiting Current Approaches of
Treatment and Outcomes, International Journal of Mental Health, Vol. 40, No. 3, Fall 2011, pp. 77
91.
Polak, Emily L., and Michael E. McCullough, Is Gratitude an Alternative to Materialism?, Journal of
Happiness Studies, Vol. 7, No. 3, 2006, pp. 343360.
Pollack, Jonathan D., Energy Insecurity with Chinese and American Characteristics: Implications for Sino-
American Relations, Journal of Contemporary China, Vol. 17, No. 55, May 2008, pp. 229245.
Pomazalov, Nataa, Zbyek Korecki, and Jaromr Mare, Fuel Additive as a Tool to Achieve Saving
Expenditures, Revista Academiei Fortelor Terestre, Vol. 15, No. 4, December 2010, pp. 488494.
Ponjaert, Frederik, and Julien Bclard, Public Research Projects in Europe and East Asia: Cooperation or
Competition? A Comparative Analysis of the ITER and Galileo Experiences, East Asia: An
International Quarterly, Vol. 27, No. 1, Spring 2010, pp. 99125.
Porta, Donatella Della, and Gianni Piazza, Local Contention, Global Framing: The Protest Campaigns
Against the TAV in Val Di Susa and the Bridge on the Messina Straits, Environmental Politics, Vol. 16,
No. 5, November 2007, pp. 864882.
Porter, Gareth, Gearid . Tuathail, Simon Dalby, and Paul Routledge, PART 4: Environmental Geopolitics:
Chapter 27: Environmental Security as a National Security Issue., Geopolitics Reader, Taylor &
Francis Ltd / Books, 1997, pp. 215222.
Porter, Patrick, Last Charge of the Knights? Iraq, Afghanistan and the Special Relationship, International
Affairs, Vol. 86, No. 2, March 2010, pp. 355375.

393
Portes, AlejandroRoberts, The Free-Market City: Latin American Urbanisation in the Years of the
Neoliberal Experiment, Studies in Comparative International Development, Vol. 40, No. 1, Spring
2005, p. 43.
Postal, Arhtur D., Lighting the Fuse, National Underwriter / Life & Health Financial Services, Vol. 115, No.
12, June 20, 2011, pp. 2629.
Powel, Brieg Tomos, The Stability Syndrome: US and EU Democracy Promotion in Tunisia, Journal of
North African Studies, Vol. 14, No. 1, March 2009, pp. 5773.
Powell, Colin L., German Marshall Funds Transatlantic Centre Third Anniversary, Defence Institute of
Security Assistance Management, Winter 2004.
Powner, David A., Information Technology: Major Federal Networks That Support Homeland Security
Functions: GAO-04-375, U.S. Government Accountability Office, 2004.
Powell, Diana L., Applicability of Rule 10b-5 to Pledges of Securities, California Law Review, Vol. 68, No.
3, May 1980, p. 547.
Prante, Tyler, and Alok K. Bohara, What Determines Homeland Security Spending? An Econometric
Analysis of the Homeland Security Grant Program, Policy Studies Journal, Vol. 36, No. 2, May 2008,
pp. 243256.
Prasad, Devi M., and B. Raja Shekhar, Development of Railqual: A Service Quality Scale for Measuring
Indian Railway Passenger Services, Management Science & Engineering, Vol. 4, No. 3, 2010, pp. 87
94.
Prenzler, Tim, Karen Earle, and Rick Sarre, Private Security in Australia: Trends and Key Characteristics,
Trends & Issues in Crime & Criminal Justice, No. 374, June 2, 2009, pp. 16.
Press-Barnathan, Galia, Managing the Hegemon: Nato Under Unipolarity, Security Studies, Vol. 15, No. 2,
April 2006, pp. 271309.
Prewitt, Kenneth, Security, Peace and Social Science, Society, Vol. 23, No. 1, November 1985, pp. 1215.
Price, Willard, Reducing the Risk of Terror Events at Seaports, Review of Policy Research, Vol. 21, No. 3,
May 2004, pp. 329349.
Prins, Gwyn, The Four-stroke Cycle in Security Studies, International Affairs, Vol. 74, No. 4, October
1998, p. 781.
Private Pensions: Participants Need Information on the Risks of Investing in Employer Securities and the
Benefits of Diversification: GAO-02-943, U.S. Government Accountability Office, 2002.
Prout, Sarah, Security and Belonging: Reconceptualising Aboriginal Spatial Mobilities in Yamatji Country,
Western Australia, Mobilities, Vol. 4, No. 2, July 2009, pp. 177202.
Przeworski, Adam, and Martin Zechman, Politics and the Initiation of Economic Development, Public
Choice, Vol. 10, Spring 1971, pp. 6180.
Pukelien, Violeta, and Neringa Epaitien, Economic Security: a Regional Public Goods Approach,
Management of Organisations: Systematic Research, No. 41, March 2007, pp. 113135.
Purcell, Patrick J., Income and Poverty Among Older Americans in 2008, Journal of Pension Planning &
Compliance, Vol. 36, No. 1, Spring 2010, pp. 129.
Purcell, Patrick J., Income and Poverty Among Older Americans in 2006, Journal of Pension Planning &
Compliance, Vol. 34, No. 1, Spring 2008, pp. 5877.
Purcell, Patrick J., and Jennifer Staman, A Summary of ERISA, Journal of Deferred Compensation, Vol. 14,
No. 1, Fall 2008, pp. 48122.
Purdum, Todd S., One Nation, Under Arms, Vanity Fair, No. 617, January 2012, p. 74.
Puterbaugh, Dolores T., The Ark of Civic Virtue, USA Today Magazine, Vol. 137, No. 2764, January 2009,
p. 16.
Pyle, Kenneth B., Uncertain Future, Harvard International Review, Vol. 18, No. 2, Spring 1996, p. 36.
Pytharouli, Stella I., and Stathis C. Stiros, Investigation of the Parameters Controlling the Crest Settlement
of a Major Earthfill Dam Based on the Threshold Correlation Analysis, Journal of Applied Geodesy,
Vol. 3, No. 1, March 2009, pp. 5562.
Qiang Yan, A Security Evaluation Approach for Information Systems in Telecommunication Enterprises,
Enterprise Information Systems, Vol. 2, No. 3, 2008, pp. 309324.

394
Qingxiong Ma, and J. Michael Pearson, ISO 17799: Best Practices in Information Security
Management?, Communications of AIS, Vol. 2005, No. 15, March 2005, pp. 577591.
Quadagno, Jill, Aging Nation: The Economics and Politics of Growing Older in America, Journal of Health
Politics, Policy & Law, Vol. 32, No. 5, October 2007, pp. 887889.
Quandt, Sara A, Thomas A Arcury, Julie Early, Janeth Tapia, and Jessie D Davis, Household Food Security
Among Migrant and Seasonal Latino Farmworkers in North Carolina, Public Health Reports
(Washington, D.C.: 1974), Vol. 119, No. 6, December 2004, pp. 568576.
Rabinowitch, Eugene, What Is a Security Risk?, Bulletin of the Atomic Scientists, Vol. 11, No. 4, April
1955, p. 163.
Radner, Daniel B., Economic Well-being of the Old Old: Family Unit Income and Household Wealth,
Social Security Bulletin, Vol. 56, No. 1, Spring 1993, p. 3.
Rahimi, Gholamreza, and Ghader Vazifeh Damirch, RFID Development Facors Efect In Supply Chain
Management (Case Study: Iran Tractor Manufacturing Co), , 3 897910, 2011.
Raju, Guntar A., and Rudresh Kunde, Indian IPO: A Goldmine Sans Index, Journal of Wealth
Management, Vol. 12, No. 1, Summer 2009, pp. 6274.
Ralby, Ian M., Maritime Security and the ICoC, Journal of International Peace Operations, Vol. 7, No. 3,
December 2011, pp. 1416.
Ralevic, P., S. G. Patil, and G. vanLoon, Integrated Agriculture Production Systems for Meeting Household
Food, Fodder and Fuel Security, Journal of Sustainable Agriculture, Vol. 34, No. 8, October 2010, pp.
878906.
Ramesh, M., Privatisation of Social Security in Southeast Asia, Review of Policy Research, Vol. 19, No. 3,
Fall 2002, p. 141.
Ramirez, David, Case Study: ITU-T Recommendation X.805 Applied to an Enterprise Environment
banking, Bell Labs Technical Journal, Vol. 12, No. 3, Fall 2007, pp. 5564.
Ranciere, Romain, and Aaron Tornell, Was the U.S. Crisis a Financial Black-Hole?, IMF Economic Review,
Vol. 59, No. 2, June 2011, pp. 271305.
Randazzo, Vincenzo, EU Security Policies and the Pillar Structure: A Legal Analysis, Perspectives on
European Politics & Society, Vol. 10, No. 4, December 2009, pp. 506522.
Raquel Freire, Maria, The OSCEs post-September 11 Agenda, and Central Asia, Global Society: Journal of
Interdisciplinary International Relations, Vol. 19, No. 2, April 2005, pp. 189209.
Rauf, Tariq, Confidence-building and Security-building Measures in the Nuclear Area with Relevance for
South Asia, Contemporary South Asia, Vol. 14, No. 2, June 2005, pp. 175189.
Record, Jeffrey, Edward S. Walker Jr., Leon Hadar, Babak Rahimi, Sanam Lebanese, Michael Rubner,
Beverly Miton-Edwards, et al., Book Reviews, Middle East Policy, Vol. 14, No. 3, Fall 2007, pp. 143
173.
Redding, Gordon, and Terry Casey, Managerial Beliefs Among Asian Managers, Academy of
Management, 1976, pp. 351355.
Redding, Lee, Social Security Reform and Corporate Governance, Journal of Policy Reform, Vol. 9, No. 3,
2006, pp. 235246.
Reed, James B., Securing Dangerous Rail Shipments, State Legislatures, Vol. 33, No. 9, November 2007,
p. 38.
Rees, Wyn, Inside Out: The External Face of EU Internal Security Policy, Journal of European Integration,
Vol. 30, No. 1, March 2008, pp. 97111.
Reid, Melanie, Secrets Behind Secrets, Seton Hall Legislative Journal, Vol. 35, No. 2, June 2011, pp. 272
301.
Reid, Robert L., The Infrastructure Crisis, Civil Engineering (08857024), Vol. 78, No. 1, January 2008, pp.
4065.
Reimers, Cordelia W., Book Reviews, Eastern Economic Journal, Vol. 24, No. 1, Winter 1998, p. 121.
Reiner, Robert, The Law and Order Trap, Soundings (13626620), No. 40, Winter 2008, pp. 123134.
Reisinger, Christian, A Framework for the Analysis of Post-conflict Situations: Liberia and Mozambique
Reconsidered, International Peacekeeping (13533312), Vol. 16, No. 4, 2009, pp. 483498.

395
Remington, Robin Alison, NATO Transformation and Miscalculation. (Cover Story), Problems of Post-
Communism, Vol. 46, No. 4, July 1999, p. 11.
Renda, Kadri Kaan, European Security Culture: Language, Theory and Policy, Journal of Global Analysis,
Vol. 1, No. 1, January 2010, pp. 9497.
Rendall, Matthew, A Qualified Success for Collective Security: The Concert of Europe and the Belgian
Crisis, 1831, Diplomacy & Statecraft, Vol. 18, No. 2, June 2007, pp. 271295.
Rensenbrink, John, Security, Democracy and World Governance, Dialogue & Universalism, Vol. 11, No.
7/8, 2001, p. 63.
Resnick, Alan N., Letter of Credit as a Landlords Protection Against a Tenants Bankruptcy: Assurance of
Payment or False Sense of Security? (cover Story), American Bankruptcy Law Journal, Vol. 82, No. 3,
Summer 2008, pp. 497532.
Reuter, Peter, and David Ronfeldt, Quest for Integrity: The Mexican-US Drug Issue in the 1980s, Journal
of Interamerican Studies & World Affairs, Vol. 34, No. 3, Fall 1992, p. 89.
Revell, Janice, Doris Burke, Joan Levinstein, and Patricia Neering, The $366 Billion Outrage, Fortune, Vol.
149, No. 11, May 31, 2004, pp. 130142.
Reyntjens, Filip, Democratic Republic of Congo: Political Transition and Beyond, African Affairs, Vol. 106,
No. 423, April 2007, pp. 307317.
Ribstein, Larry E., Private Ordering and the Securities Laws: The Case of General Partnerships, Case
Western Reserve Law Review, Vol. 42, No. 1, January 1992, p. 1.
Richard Ned Lebow, and Janice Gross Stein, Beyond Deterrence, Journal of Social Issues, Vol. 43, No. 4,
Winter 1987, pp. 571.
Richardson, James J., Whitney B. Matson, and Robert J. Peters, Innovating Science Policy: Restructuring
S&T Policy for the Twenty-first Century, Review of Policy Research, Vol. 21, No. 6, November 2004,
pp. 809828.
Riches, Graham, Food Banks and Food Security: Welfare Reform, Human Rights and Social Policy. Lessons
from Canada?, Social Policy & Administration, Vol. 36, No. 6, December 2002, pp. 648663.
Richmond, Oliver P., Emerging Concepts of Security in the European Order: Implications for Zones of
Conflict at the Fringes of the EU, European Security, Vol. 9, No. 1, Spring 2000, p. 41.
Richmond, Oliver P., Shared Sovereignty and the Politics of Peace: Evaluating the EUs catalytic
Framework in the Eastern Mediterranean, International Affairs, Vol. 82, No. 1, January 2006, pp.
149176.
Rindfleisch, Aric, James E. Burroughs, and Nancy Wong, The Safety of Objects: Materialism, Existential
Insecurity, and Brand Connection, Journal of Consumer Research, Vol. 36, No. 1, June 2009, pp. 1
16.
Rishi, Bikram Jit, An Empirical Study of Online Shopping Behaviour: A Factor Analysis Approach, Journal
of Marketing & Communication, Vol. 3, No. 3, April 2008, pp. 4049.
Rissanen, E., Server Based Application Level Authorisation for Rotor, IEE Proceedings -- Software, Vol.
150, No. 5, October 2003, pp. 291295.
Ritchie, Nick, Deterrence Dogma? Challenging the Relevance of British Nuclear Weapons, International
Affairs, Vol. 85, No. 1, January 2009, pp. 8198.
Ritchie, Nick, Rethinking Security: a Critical Analysis of the Strategic Defence and Security Review,
International Affairs, Vol. 87, No. 2, March 2011, pp. 355376.
Ritchie, Stewart, Funding Issues for Defined- Benefit Schemes, Money Marketing, 2004, p. 33.
Roberts, David, The Intellectual Perils of Broad Human Security: Deepening the Critique of International
Relations, Politics, Vol. 28, No. 2, May 2008, pp. 124127.
Roberts, Paul, The Seven Myths of Energy Independence, Mother Jones, Vol. 33, No. 3, June 2008, pp.
3037.
Robertson, Guy, Downsizing the Binder: Effective Security Planning for Libraries, Feliciter, Vol. 49, No. 5,
October 2003, p. 263.
Robins, N., Greening European Foreign Policy, European Environment: The Journal of European
Environmental Policy (Wiley), Vol. 6, No. 6, December 1996, pp. 173182.

396
Robinson, W. C., High Fertility as Risk-Insurance, Population Studies, Vol. 40, No. 2, July 1986, pp. 289
298.
Rodrguez, Cristina M., The Significance of the Local in Immigration Regulation, Michigan Law Review,
Vol. 106, No. 4, February 2008, pp. 567642.
Roelofs, Jeffrey, Cor Meesters, and Peter Muris, Correlates of Self-reported Attachment (In)security in
Children: The Role of Parental Romantic Attachment Status and Rearing Behaviours, Journal of Child
& Family Studies, Vol. 17, No. 4, 2008, pp. 555566.
Roisman, G.I., E. Padrn, L.A. Sroufe, and B. Egeland, EarnedSecure Attachment Status in Retrospect and
Prospect, Child Development, Vol. 73, No. 4, July 2002, pp. 12041219.
Roisman, Glenn I., The Psychophysiology of Adult Attachment Relationships: Autonomic Reactivity in
Marital and Premarital Interactions, Developmental Psychology, Vol. 43, No. 1, January 2007, pp.
3953.
Rolfe, Jim, Regional Security for the Asia-Pacific: Ends and Means, Contemporary Southeast Asia: A
Journal of International & Strategic Affairs, Vol. 30, No. 1, April 2008, pp. 99117.
Romaniuk, Scott Nicholas, and Joshua Kenneth Wasylciw, Gender Includes Men Too! Recognising
Masculinity in Security Studies and International Relations, Perspectives: Central European Review of
International Affairs, Vol. 18, No. 1, Summer 2010, pp. 2339.
Romm, Jeff, Global Environmental Change and Human Security, EcoHealth, Vol. 7, No. 2, June 2010, pp.
262264.
Rompr, Christopher, Beyond the Rhetoric: Terminator Seeds and the Ethics of Canadian Foreign Policy,
Undercurrent, Vol. 3, No. 1, March 2006, pp. 1021.
Ronconi, Lucas, Enforcement and Compliance with Labour Regulation in Argentina, Industrial & Labour
Relations Review, Vol. 63, No. 4, July 2010, pp. 719736.
Ronczkowski, Michael, Homeland Security Defined, Taylor & Francis Ltd / Books;, 2003.
Roorda, Eric Paul, McCarthyite in Camelot: The Loss of Cuba, Homophobia, and the Otto Otepka Scandal
in the Kennedy State Department, Diplomatic History, Vol. 31, No. 4, 2007, pp. 723754.
Roosa, Mark W., Shiying Deng, Rajni L. Nair, and Ginger Lockhart Burrell, Measures for Studying Poverty
in Family and Child Research, Journal of Marriage & Family, Vol. 67, No. 4, November 2005, pp.
971988.
Rosdil, Donald, Testing Cultural and Economic Explanations for Local Development Policies, Journal of
Urban Affairs, Vol. 32, No. 1, February 2010, pp. 105130.
Rose, Alon, and Gil Segev, Chosen-Cipher Text Security via Correlated Products, SIAM Journal on
Computing, Vol. 39, No. 7, June 2010, pp. 30583088.
Rose, Gregory M., and Linda M. Orr, Measuring and Exploring Symbolic Money Meanings, Psychology &
Marketing, Vol. 24, No. 9, 2007, pp. 743761.
Rosenau, James, Understanding World Affairs: The Potential of Collaboration, Globalisations, Vol. 1, No.
2, December 2004, pp. 328341.
Rosenau, William, Counterinsurgency, Harvard International Review, Vol. 31, No. 1, Spring 2009, p. 52.
Rosenberg, Barr, and Michel Houglet, Error Rates in CRSP and Compustat Data Bases and Their
Implications, Journal of Finance, Vol. 29, No. 4, 1974, pp. 13031310.
Rosenberg, Janice, Soft Targets, Journal of Property Management, Vol. 72, No. 4, August 2007, pp. 28
32.
Ross, Catherine E., and John Mirowsky, Family Relationships, Social Support and Subjective Life
Expectancy. (cover Story), Journal of Health & Social Behaviour, Vol. 43, No. 4, December 2002, pp.
469489.
Ross, Jane L.Upp, Treatment of Women in the U.S. Social Security System, 1970-88, Social Security
Bulletin, Vol. 56, No. 3, Fall 1993, p. 56.
Ross, Robert S., Balance of Power Politics and the Rise of China: Accommodation and Balancing in East
Asia, Security Studies, Vol. 15, No. 3, September 2006, pp. 355395.
ROSS, STEPHEN A., Institutional Markets, Financial Marketing, and Financial Innovation, Journal of
Finance, Vol. 44, No. 3, July 1989, pp. 541556.

397
Rothstein, Mark A., Health Privacy in the Electronic Age, Journal of Legal Medicine, Vol. 28, No. 4,
December 2007, pp. 487501.
Rowe, James, Laying the Foundations: Addressing Heroin Use Among the Street Homeless, Drugs:
Education, Prevention & Policy, Vol. 12, No. 1, February 2005, pp. 4759.
Roy, Ash Narain, Human Security in India, a Mixed Bag, Desafos, Vol. 17, December 2007, pp. 77101.
Rozendaal, J. C., Choice of Law in Distinguishing Leases from Security Interests Under the Uniform
Commercial Code, Texas Law Review, Vol. 75, No. 2, December 1996, p. 375.
Rubin, Barnett R., Saving Afghanistan, Foreign Affairs, Vol. 86, No. 1, February 2007, pp. 5778.
Rubin, Barnett R., and Humayun Hamidzada, From Bonn to London: Governance Challenges and the
Future of Statebuilding in Afghanistan, International Peacekeeping (13533312), Vol. 14, No. 1,
March 2007, pp. 825.
Rubin, Barry, Motives and Interests in Israel-Gulf Relations, MERIA Journal, Vol. 13, No. 3, 2009, pp. 18.
Rubin, Ellen V., and Andrew Whitford, Effects of the Institutional Design of the Civil Service: Evidence
from Corruption, International Public Management Journal, Vol. 11, No. 4, December 15, 2008, pp.
404425.
Rudolph, Christopher, Security and the Political Economy of International Migration, American Political
Science Review, Vol. 97, No. 4, November 2003, pp. 603620.
Ruffle, Karen, May You Learn from Their Model: The Exemplary Father-Daughter Relationship of
Mohammad and Fatima in South Asian Shiism, Journal of Persianate Studies, Vol. 4, No. 1, January
2011, pp. 1229.
Rupp, KalmanSears, Eligibility for the Medicare Buy-in Programs, Based on a Survey of Income and
Programme Participation Simulation, Social Security Bulletin, Vol. 63, No. 3, 2000, p. 13.
Russell, Jenni, Who the Hell Are You?, New Statesman, Vol. 132, No. 4658, October 6, 2003, pp. 2022.
Ruteere, Mutuma, and Marie-Emmanuelle Pommerolle, Democratizing Security or Decentralizing
Repression?, African Affairs, Vol. 102, No. 409, October 2003, pp. 587604.
Rutten, Lila J. Finney, Amy L. Yaroch, Uriyoan Coln-Ramos, Wendy Johnson-Askew, and Mary Story,
Poverty, Food Insecurity, and Obesity: A Conceptual Framework for Research, Practice, and Policy,
Journal of Hunger & Environmental Nutrition, Vol. 5, No. 4, December 2010, pp. 403415.
Ruvolo, Ann P., and Lisa A. Fabin, Two of a Kind: Perceptions of Own and Partners Attachment
Characteristics, Personal Relationships, Vol. 6, No. 1, 1999, pp. 5779.
Ryan, Lori Verstegen, and Bryan Dennis, The Ethical Undercurrents of Pension Fund Management,
Business Ethics Quarterly, Vol. 13, No. 3, July 2003, pp. 315335.
Sable, Pat, Attachment in Adults: Clinical and Devlopmental Perspectives, Clinical Social Work Journal,
Vol. 24, No. 1, Spring 1996, pp. 107109.
Sacchi, Simona, Emanuele Castano, and Markus Brauer, Perceiving Ones Nation: Entitativity, Agency and
Security in the International Arena, International Journal of Psychology, Vol. 44, No. 5, 2009, pp.
321332.
Sahlin, Ingrid, The Staircase of Transition, Innovation: The European Journal of Social Sciences, Vol. 18,
No. 2, June 2005, pp. 115135.
Said, Mohamed Kadry, Potential Egyptian Contribution to a Security Framework in the Gulf, Middle East
Policy, Vol. 11, No. 3, Fall 2004, pp. 6372.
Salime, Zakia, The War on Terrorism: Appropriation and Subversion by Moroccan Women, Signs: Journal
of Women in Culture & Society, Vol. 33, No. 1, 2007, pp. 124.
Salimi, S., M. Salmasizadeh, and M. Reza Aref, Generalised Secure Distributed Source Coding with Side
Information, IET Communications, Vol. 4, No. 18, December 17, 2010, pp. 22622272.
Salmon, Trevor, United in Its Diversity (or Disunited in Adversary): That Is the Question for the European
Union and the European Security and Defence Policy, Perspectives on European Politics & Society,
Vol. 5, No. 3, December 2004, pp. 447468.
Salter, Mark B., When the Exception Becomes the Rule: Borders, Sovereignty, and Citizenship,
Citizenship Studies, Vol. 12, No. 4, 2008, pp. 365380.

398
Salvail, Louis, Momtchil Peev, Eleni Diamanti, Romain Allaume, Norbert Ltkenhaus, and Thomas Lnger,
Security of Trusted Repeater Quantum Key Distribution Networks, Journal of Computer Security,
Vol. 18, No. 1, January 2010, pp. 6187.
Samara, Tony, Security and Development in the Urban South After the Cold War, American Sociological
Association, 2006, p. 1.
Sanders, Deborah, Maritime Security in the Black Sea: Can Regional Solutions Work?, European Security,
Vol. 18, No. 2, June 2009, pp. 101124.
Sanquist, Thomas F, Heidi Mahy, and Frederic Morris, An Exploratory Risk Perception Study of Attitudes
Toward Homeland Security Systems, Risk Analysis: An Official Publication Of The Society For Risk
Analysis, Vol. 28, No. 4, 2008, pp. 11251133.
Santos, A., B. Arcay, J. Dorado, A.B. Rodrguez, and A. Pazos, Artificial Neural Networks Manipulation
Server: Research on the Integration of Databases and Artificial Neural Networks, Neural Computing
& Applications, Vol. 11, No. 1, April 2002, p. 3.
Sarathy, Ravi, Security and the Global Supply Chain, Transportation Journal (American Society of
Transportation & Logistics Inc), Vol. 45, No. 4, Fall 2006, pp. 2851.
Sarbanes, Paul S., Should the Senate Approve H.J. Res. 114, to Authorise the Use of Military Force Against
Iraq?, Congressional Digest, Vol. 81, No. 10, December 2002, p. 311.
Sarkar, Amarendra Nath, Global Climate Change and Emerging Environmental and Strategic Security
Issues for South Asia, Journal of Environmental Protection, Vol. 2, No. 9, November 2011, pp. 1162
1171.
Sarrel, Matthew D.Ellison, Know Your Weakness, PC Magazine, Vol. 22, No. 23, December 30, 2003, p.
122.
Sarto, Raffaella A. Del, Security and Democracy: A Reprise, European Security, Vol. 15, No. 4, December
2006, pp. 507518.
Sartori, L., JO - Bulletin of the Atomic Scientists, Bulletin of the Atomic Scientists, Vol. 34, No. 6, June
1978, p. 55.
Sass, Steven A., The Research Contributions of the Centre for Retirement Research at Boston College,
Social Security Bulletin, Vol. 69, No. 4, December 2009, pp. 3549.
Saudi, Madihah Mohd, Andrea J. Cullen, and Mike E. Woodward, Efficient STAKCERT KDD Processes in
Worm Detection, World Academy of Science, Engineering & Technology, Vol. 79, July 2011, pp. 453
457.
Saul, Ben, The Kafka-exque Case of Sheikh Mansour Leghaei, University of New South Wales Law Journal,
Vol. 33, No. 3, December 2010, pp. 629661.
Saupe, Achim, Human Security and the Challenge of Automobile and Road Traffic Safety: A Cultural
Historical Perspective, Historical Social Research, Vol. 35, No. 4, December 2010, pp. 102121.
Savi, Ana, Managing IT-related Operational Risks, Ekonomski Anali / Economic Annals, Vol. 53, No. 176,
March 2008, pp. 88109.
Savir, Uri, Pax Mediterraneo, Mediterranean Quarterly, Vol. 17, No. 1, Winter 2006, pp. 1622.
Saxena, Amitabh, and Ben Soh, A Cryptographic Primitive Based on Hidden-order Groups, Journal of
Mathematical Cryptology, Vol. 3, No. 2, July 2009, pp. 89132.
Sayed, Fatma H., Security, Donors Interests, and Education Policy Making in Egypt, Mediterranean
Quarterly, Vol. 16, No. 2, Spring 2005, pp. 6684.
Scalisi, Michael, WSUS 3.0 SP2: Easy Patch Management, PC World Communications Inc., March 2010.
Scanlan, Stephen J., New Direction and Discovery on the Hunger Front, Humanity & Society, Vol. 33, No.
4, November 2009, pp. 292316.
Schfer, Dorothea, and Klaus Zimmermann, Bad Bank(s) and the Recapitalisation of the Banking Sector,
Intereconomics, Vol. 44, No. 4, July 2009, pp. 215225.
Schellhorn, Gerhard, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, and David Toll, Verified
Formal Security Models for Multiapplicative Smart Cards, Journal of Computer Security, Vol. 10, No.
4, December 2002, p. 339.
Scher, A., Facilitators and Regulators: Maternal Orientation as an Antecedent of Attachment Security,
Journal of Reproductive & Infant Psychology, Vol. 19, No. 4, November 2001, pp. 325333.

399
Schieber, Sylvester J., A Framework and Proposal for Social Security Reform, Washington Quarterly, Vol.
22, No. 1, Winter 1999, p. 157.
Schindler, Andreas, Rainer Thomasius, Kay Petersen, and Peter-Michael Sack, Heroin as an Attachment
Substitute? Differences in Attachment Representations Between Opioid, Ecstasy and Cannabis
Abusers, Attachment & Human Development, Vol. 11, No. 3, May 2009, pp. 307330.
Schindler, Andreas, Rainer Thomasius, Peter-Michael Sack, Brigitte Gemeinhardt, and Udo Kstner,
Insecure Family Bases and Adolescent Drug Abuse: A New Approach to Family Patterns of
Attachment, Attachment & Human Development, Vol. 9, No. 2, June 2007, pp. 111126.
Schmidt, Albert J., The United States Since 1980./America Transformed: Globalisation, Inequality, and
Power, Journal of Social History, Vol. 42, No. 3, Spring 2009, p. 828.
Schmidt, Todd, US National Security Policy: Framing an Authentic Preemptive Strategy in the 21st
Century, Military Review, Vol. 86, No. 5, October 2006, pp. 7583.
Schneider, Friedrich, The Shadow Economy Labour Force, World Economics, Vol. 12, No. 4, December
2011, pp. 5392.
Scholz, John Karl, Ananth Seshadri, and Surachai Khitatrakun, Are Americans Saving Optimally for
Retirement?, Journal of Political Economy, Vol. 114, No. 4, 2006, pp. 607643.
Schreitmueller, Dick, Social Security Personal Accounts: How Would They Work?, Journal of Pension
Benefits: Issues in Administration, Vol. 10, No. 4, Summer 2003, p. 11.
Schroeder, Elizabeth-Ann, and Tennassie Nichola, The Adoption of HIV/AIDS Orphans and Food Security in
Rural Ingwavuma, South Africa, International Journal of Technology Management & Sustainable
Development, Vol. 5, No. 2, 2006, pp. 173187.
Schroeder, Jeanne L., A Repo Opera: How Criimi Mae Got Repos Backwards, American Bankruptcy Law
Journal, Vol. 76, No. 4, Fall 2002, p. 565.
Schryen, Guido, Is Open Source Security a Myth?, Communications of the ACM, Vol. 54, No. 5, May 2011,
pp. 130140.
Schultz, Keith, and Kevin Candland, Security Appliances Whip Blended Threats, Infoworld Publishing
Group, March 6, 2006.
Schulz, MichaelSoderbaum, Theorising the EUs Role in Regional Conflict Management, European
Security, Vol. 19, No. 3, 2010, pp. 361376.
Schwartz, Allan, What Should We Do Now?, Fairfield County Business Journal, Vol. 43, No. 31, 2004, p.
S3.
Schwartz, Ephraim, Own the Spyware Problem, InfoWorld, Vol. 27, No. 8, February 21, 2005, p. 10.
Scott, Kevin, and Charles R. Johnston, Factors Affecting the Adoption of Consumer Oriented Information
Technology Biometrics Solutions by the Credit Union Industry, Journal of Technology Research, Vol.
2, 2010, pp. 113.
Scott, Leslie, and Betty Reardon, An Ecofeminist Perspective on Global Security, International Journal of
Humanities & Peace, Vol. 8, No. 3, Summer 1991, pp. 1316.
Scott, Robert W., A Secure Business. (cover Story), Accounting Technology, Vol. 19, No. 3, April 2003, p.
14.
Sears, Carol R., and Scott D. Miller, Averting the Retirement Income Crisis, Journal of Pension Benefits:
Issues in Administration, Vol. 12, No. 3, Spring 2005, pp. 1721.
Sebastianutti, Paul, What Is This Thing Called International Financial Law? Part 5, Law & Financial
Markets Review, Vol. 3, No. 5, 2009, pp. 461478.
Sehgal, Naresh K., Sohum Sohoni, Ying Xiong, David Fritz, Wira Mulia, and John M. Acken, A Cross Section
of the Issues and Research Activities Related to Both Information Security and Cloud Computing,
IETE Technical Review, Vol. 28, No. 4, August 2011, pp. 279291.
Seibert, Kevin S., and Betty Meredith, Managing Retirement Income for the Mid-Market, Journal of
Financial Planning, Vol. 23, No. 8, 2010, pp. 3237.
Sekallariou, Jannis, Safeguarding Multilateralism: The Urgency of European Defence, Brown Journal of
World Affairs, Vol. 9, No. 2, Winter 2002, p. 83.
Sekhar, Chandra, Indias Security Environment: An Indian View, Studies in Conflict & Terrorism, Vol. 15,
No. 4, October 1992, pp. 309316.

400
Send, Kelli B., Face-to-Face, Benefits & Compensation Digest, Vol. 43, No. 9, 2006, p. 24.
Seng Tan, See, Untying Leifers Discourse on Order and Power, Pacific Review, Vol. 18, No. 1, March
2005, pp. 7193.
Servent, Ariadna Ripoll, Point of No Return? The European Parliament After Lisbon and Stockholm,
European Security, Vol. 19, No. 2, June 2010, pp. 191207.
Seufert-Barr, Nancy, The ABCs of a Better Life, United Nations Chronicle, Vol. 31, No. 4, December 1994,
p. 43.
Shahid, Arshi, and Muhammad Wasif Siddiqi, Food Security Analysis of Pakistan: Time Series Approach,
Interdisciplinary Journal of Contemporary Research in Business, Vol. 2, No. 7, November 2010, pp.
288307.
Shahnaz Saleem, Sana Ullah, and Kyung Sup Kwak, A Study of IEEE 802.15.4 Security Framework for
Wireless Body Area Networks, Sensors (14248220), Vol. 11, No. 2, February 2011, pp. 13831395.
Shaikh, Niaz Ahmed, Akhtar Ali Baloch, Abdul Samad Siddiqui, Mirza Yousuf Baig, Muhammad Zahid Qadri,
and Hari Lal, Professional Satisfaction Amongst Postgraduate Trainees of Civil Hospital Karachi,
Medical Channel, Vol. 16, No. 4, October 2010, pp. 497501.
Shamim, Choudhury, Alternative Views of Environmental Security in A Less Developed Country, Journal
of Third World Studies, Vol. 25, No. 1, Spring 2008, pp. 253272.
Shankarkumar, U., Complexities and Similarities of HLA Antigen Distribution in Asian Subcontinent,
Indian Journal of Human Genetics, Vol. 16, No. 3, December 2010, pp. 108110.
Shapiro, Ronald M., The Expanding Definition of a Security, American Bar Association Journal, Vol. 61,
No. 12, December 1975, p. 1504.
Sharkey, Joseph R, Cassandra M Johnson, and Wesley R Dean, Relationship of Household Food Insecurity
to Health-related Quality of Life in a Large Sample of Rural and Urban Women, Women & Health,
Vol. 51, No. 5, July 22, 2011, pp. 442460.
Shattuck, J.R., The Recapture of Insiders Profits, Journal of Finance, Vol. 8, No. 3, 1953, pp. 319332.
Shaw, Carolyn M., Limits to Hegemonic Influence in the Organisation of American States, Latin American
Politics & Society, Vol. 45, No. 3, Fall 2003, p. 59.
Shaw, Timothy M., South Africa: The Corporatist/regionalist Conjuncture, Third World Quarterly, Vol. 15,
No. 2, June 1994, pp. 243255.
Shearing, Clifford, Re-considering the Field of Policing: A Review of The Policing Web, Canadian Journal
of Criminology & Criminal Justice, Vol. 53, No. 3, July 2011, pp. 325341.
Sheehy, Michael W., Study Examines Unnamed Source Policies at The Washington Post, Newspaper
Research Journal, Vol. 31, No. 1, Winter 2010, pp. 8496.
Shefi, YoadTishler, The Effects of the World Defence Industry and US Military Aid to Israel on the Israeli
Defence Industry, Defence & Peace Economics, Vol. 16, No. 6, December 2005, pp. 427448.
Sheikhehi, Faiegh, and Mosayeb Naseri, Probabilistic Bidirectional Quantum Secure Communication
Based On A Shared Partially Entangled States, International Journal of Quantum Information, Vol. 9,
2011, pp. 357365.
Sheldon, Kennon M., and Tim Kasser, Psychological Threat and Extrinsic Goal Striving, Motivation &
Emotion, Vol. 32, No. 1, March 2008, pp. 3745.
Shelley, Nancy, Interdependence and Common Security: The New Paradigm, Social Alternatives, April
1987.
Sheperd, Laura J., Victims, Perpetrators and Actors Revisited: exploring the Potential for a Feminist
Reconceptualisation of (International) Security and (Gender) Violence, British Journal of Politics &
International Relations, Vol. 9, No. 2, May 2007, pp. 239256.
Shepherd, Laura J., Gender, Violence and Global Politics: Contemporary Debates in Feminist Security
Studies, Political Studies Review, Vol. 7, No. 2, May 2009, pp. 208219.
Shevchenko, Alexei, Charting Chinas Future: Political, Social, and International Dimensions, China
Journal, No. 59, January 2008, pp. 231233.
Shifter, Michael, and Vinay Jawahar, State Building in Colombia: Getting Priorities Straight, Journal of
International Affairs, Vol. 58, No. 1, Fall 2004, pp. 143154.

401
Shiva, Vandana, Earth Democracy: Creating Living Economies, Living Democracies, Living Cultures, South
Asian Popular Culture, Vol. 2, No. 1, April 2004, pp. 518.
Shouhuai Xu, On the Security of Group Communication Schemes, Journal of Computer Security, Vol. 15,
No. 1, February 2007, pp. 129169.
Shouldis, William, High Rise Help: Sharing the Lessons, Fire Engineering, Vol. 161, No. 3, March 2008, pp.
167172.
Shravani, D., P. Suresh Varma, B. Padmaja Rani, D. Sravan Kumar, and M. Upendra Kumar, Web Services
Security Architectures Composition and Contract Design Using RBAC, International Journal on
Computer Science & Engineering, December 2010, pp. 26092615.
Shropshire, Jordan D., Merrill Warkentin and Allen C. Johnston, Impact of Negative Message Framing on
Security Adoption, Journal of Computer Information Systems, Vol. 51, No. 1, Fall 2010, pp. 4151.
Shubin, Sergei, Cultural Exclusion and Rural Poverty in Ireland and Russia, Transactions of the Institute of
British Geographers, Vol. 35, No. 4, October 2010, pp. 555570.
Shuja, Sharif, Pakistan: Islam, Radicalism and the Army, International Journal on World Peace, Vol. 24,
No. 2, June 2007, pp. 2535.
Siapno, Jacqueline Aquino, Living Through Terror: Everyday Resilience in East Timor and Aceh, Social
Identities, Vol. 15, No. 1, January 2009, pp. 4364.
Sias, Richard, Causes and Seasonality of Momentum Profits, Financial Analysts Journal, Vol. 63, No. 2,
April 2007, pp. 4854.
Sicherman, Haervey, The Best and the Brightest Return, Orbis, Vol. 43, No. 4, Fall 1999, p. 633.
Siclen, Sally Van, Background Note, Revue De lOCDE Sur Le Droit Et La Politique De La Concurrence, Vol.
11, No. 1, July 2010, pp. 1850.
Sidel, Mark, The Third Sector, Human Security, and Anti-Terrorism: The United States and Beyond,
Voluntas: International Journal of Voluntary & Nonprofit Organisations, Vol. 17, No. 3, 2006, pp. 199
210.
Sidel, Victor W., and Barry S. Levy, Security and Public Health, Social Justice, Vol. 29, No. 3, 2002, pp.
108119.
Sidhu, R. S., Inderpreet Kaur, and Kamal Vatta, Food and Nutritional Insecurity and Its Determinants in
Food Surplus Areas: The Case Study of Punjab State, Agricultural Economics Research Review, Vol.
21, No. 1, June 2008, pp. 9199.
Sijun Wang, Dwayne D., Sharon E. Beatty, and William Foxx, Signaling the Trustworthiness of Small Online
Retailers, Journal of Interactive Marketing (John Wiley & Sons), Vol. 18, No. 1, Winter 2004, pp. 53
69.
Sikder, Mohammad Jalal Uddin, Livelihoods and Informal Trade at the Bangladesh Border, Inter-Asia
Cultural Studies, Vol. 6, No. 3, 2005, pp. 432445.
Silberfein, Marilyn, The Geopolitics of Conflict and Diamonds in Sierra Leone, Geopolitics, Vol. 9, No. 1,
Winter 2004, pp. 213241.
Silva, Juliano, and Surender Reddy, A Framework for Reducing Disaster Risks in Supply Chains,
International Journal of Business Research, Vol. 11, No. 4, July 2011, pp. 112117.
Simmons, Cynthia S., Marcellus M. Caldas, Stephen P. Aldrich, Robert T. Walker, and Stephen G. Perz,
Spatial Processes in Scalar Context: Development and Security in the Brazilian Amazon, Journal of
Latin American Geography, Vol. 6, No. 1, January 2007, pp. 125148.
Simon Parry, Tindall Admits: I Told Lies over Drunken Night with Blonde, Mail on Sunday, October 2,
2011, p. 6.
Simon, Sheldon W., Evaluating Track II Approaches to Security Diplomacy in the Asia-Pacific: The CSCAP
Experience, Pacific Review, Vol. 15, No. 2, May 2002, pp. 167200.
Simoneti, StylianiAckermann, Eastern Europe, Peace & Change, Vol. 17, No. 2, April 1992, p. 229.
Simonsen, Sven Gunnar, The Role of East Timors Security Institutions in National Integration - and
Disintegration, Pacific Review, Vol. 22, No. 5, December 2009, pp. 575596.
Simpson, Adam, The Environment - Energy Security Nexus: Critical Analysis of an Energy Love Triangle in
Southeast Asia, Third World Quarterly, Vol. 28, No. 3, April 2007, p. 539.
Simpson, Anna, Security Force?, Green Futures, No. 81, July 2011, pp. 1821.

402
Sinclair, Jane, Action Systems for Security Specification, Journal of Computer Security, Vol. 5, No. 2, June
1997, p. 129.
Sindre, Guttorm, and Andreas Opdahl, Eliciting Security Requirements with Misuse Cases, Requirements
Engineering, Vol. 10, No. 1, February 2005, pp. 3444.
Singh, Bhubhindar, Japans Security Policy: From a Peace State to an International State, Pacific Review,
Vol. 21, No. 3, July 2008, pp. 303325.
Singh, Hari, Malaysias National Security: Rhetoric and Substance, Contemporary Southeast Asia: A
Journal of International & Strategic Affairs, Vol. 26, No. 1, April 2004, pp. 125.
Singh, Naresh, Fighting Rural Poverty, Inequality and Low Productivity Through Legal Empowerment of
the Poor, Routledge, October 2009.
Sjaastad, Espen, and Daniel W. Bromley, The Prejudices of Property Rights: On Individualism, Specificity,
and Security in Property Regimes, Development Policy Review, Vol. 18, No. 4, December 2000.
Sjoberg, Laura, Introduction to Security Studies: Feminist Contributions, Security Studies, Vol. 18, No. 2,
June 2009, pp. 183213.
Skeel, Jr., Inside-Out Corporate Governance, Journal of Corporation Law, Vol. 37, No. 1, Fall 2011, pp.
147201.
Sklavos, N., and O. Koufopavlou, Implementation of the SHA-2 Hash Family Standard Using FPGAs,
Journal of Supercomputing, Vol. 31, No. 3, March 2005, pp. 227248.
Slater, Rachel, Differentiation and Diversification: Changing Livelihoods in Qwaqwa, South Africa, 1970-
2000, Journal of Southern African Studies, Vol. 28, No. 3, 2002, pp. 599614.
Sliwinski, Krzysztof, British Nuclear Strategy at the Threshold of the 21st Century, European Security, Vol.
18, No. 1, March 2009, pp. 8197.
Smeeding, Timothy M., Nonmoney Income and the Elderly: The Case of the Tweeners, Journal of Policy
Analysis & Management, Vol. 5, No. 4, Summer 1986, pp. 707724.
Smith, Graham M., Into Cerberus Lair: Bringing the Idea of Security to Light, British Journal of Politics &
International Relations, Vol. 7, No. 4, November 2005, pp. 485507.
Smith, Katherine T., L. Murphy Smith, and Jacob L. Smith, Case Study on Cybercrime and Their Impact on
Marketing Activity and Stakeholder Value, , 15 6781, 2011.
Smith, Lisa C., and Lawrence Haddad, How Potent Is Economic Growth in Reducing Undernutrition? What
Are the Pathways of Impact? New Cross-Country Evidence*, Economic Development & Cultural
Change, Vol. 51, No. 1, October 2002, p. 55.
Smith, M., and N. Kotze, The Suitability of Maize as a Bio-ethanol Crop in South Africa, Journal of
Environmental Science & Engineering, Vol. 5, No. 6, June 2011, pp. 742752.
Smith, Martin A., and Grahem Timmins, The EU, NATO, and the Extension of Institutional Order in
Europe, World Affairs, Vol. 163, No. 2, Fall 2000, p. 80.
Smith, Michael, Taming the Elephant? The European Union and the Management of American Power,
Perspectives on European Politics & Society, Vol. 6, No. 1, May 2005, pp. 129154.
Smith, Robert E., Land Tenure Reform in Africa: a Shift to the Defensive, Progress in Development
Studies, Vol. 3, No. 3, July 2003, pp. 210222.
Snyder, Joel, How Do Messaging- Security Gateways Work?, Network World, Vol. 24, No. 40, October 15,
2007, p. 48.
Soederberg, Susanne, American Empire and Excluded States: The Millennium Challenge Account and the
Shift to Pre-emptive Development, Third World Quarterly, Vol. 25, No. 2, March 2004, p. 279.
Sofer, Sasson, Guardians of the Practinioners Virtue: Diplomats at the Warriors Den, Diplomacy &
Statecraft, Vol. 16, No. 1, March 2005, pp. 112.
Solomon, Richard H., Asian Architecture, Harvard International Review, Vol. 16, No. 2, Spring 1994, p. 26.
Solomon, Robert C., The Corporation as Community, Business Ethics Quarterly, Vol. 4, No. 3, July 1994,
pp. 271285.
Song, Jae G.Manchestre, How Have People Responded to Changes in the Retirement Earnings Test in
2000?, Social Security Bulletin, Vol. 67, No. 1, March 2007, p. 1.
Sorpong Peou, Withering Realism? A Review of Recent Security Studies on the Asia-Pacific Region,
Pacific Affairs, Vol. 75, No. 4, Winter 2002, p. 575.

403
Southeast Asia: Better Human Rights Reviews and Strategic Planning Needed for U.S. Assistance to Foreign
Security Forces: GAO-05-793, U.S. Government Accountability Office, July 29, 2005.
Sowatey, Emmanuel Addo, Democracy and Peace-building in Ghana: Paradoxes and Challenges, African
& Asian Studies, Vol. 4, No. 1/2, February 2005, pp. 107136.
Spalding, Albert D., Mark-to-Market and the Widening Gap Between Financial and Tax Accounting,
Global Journal of Business Research (GJBR), Vol. 5, No. 1, January 2011, pp. 125137.
Sparks, Wesley R., Not Just Collateral Damage, Infantry, Vol. 99, No. 2, August 2010, pp. 1921.
Spector, Bertrami I., and Amanda Wolf, Negotiating Security: New Goals, Changed Process, International
Negotiation, Vol. 5, No. 3, 2000, pp. 411426.
Spernbauer, Martina, Security in the New Europe, Journal of Common Market Studies, Vol. 46, No. 4,
2008, pp. 901902.
Spieker, Jrg, Foucault and Hobbes on Politics, Security, and War, Alternatives: Global, Local, Political,
Vol. 36, No. 3, 2011, p. 187.
projcar, Josef, Proposal of a Semiformal Model of Anonymous Communication, International Journal of
Foundations of Computer Science, Vol. 20, No. 3, June 2009, pp. 523548.
Spurr, Shelley, The Politics of Policy Development to End Obesity for Aboriginal Youth in the Educational
Environment, First Peoples Child & Family Review, Vol. 3, No. 3, 2007, pp. 7283.
Sridharan, E., International Relations Theory and the IndiaPakistan Conflict, India Review, Vol. 4, No. 2,
April 2005, pp. 103124.
Srinivasan, Krishnan, The 11 September 2001 and After, Round Table, Vol. 91, No. 363, January 2002, pp.
510.
St. Amant, Brendan, The Misplaced Role of Identity Theft in Triggering Public Notice of Database
Breaches, Harvard Journal on Legislation, Vol. 44, No. 2, Summer 2007, pp. 505528.
Stage, Ole, and Peter Revke, Food Security and Food Self-Sufficiency: The Economic Strategies of
Peasants in Eastern Ethiopia, European Journal of Development Research, Vol. 10, No. 1, June 1998,
p. 189.
Standing, Guy, From Peoples Security Surveys to a Decent Work Index, International Labour Review, Vol.
141, No. 4, December 2002, p. 441.
Standing, Guy, Responding to the Crisis: Economic Stabilisation Grants, Policy & Politics, Vol. 39, No. 1,
January 2011, pp. 925.
Stapel, Julie K., IRS Issues Final Regulations on Diversification Requirements for Defined Contribution
Plans Holding Employer Securities, Employee Benefit Plan Review, Vol. 65, No. 2, 2010, pp. 3032.
Stark, Steven M., Anderson Brothers Ford v. Valencia: An Unfortunate Departure from Settled Principles
Under the Guise of Truth in Lending, Journal of Corporation Law, Vol. 8, No. 1, Fall 1982, p. 179.
Staskeviciene, Vilma, and Nijole Bankauskiene, The Features of Educational Activity of Children-foster-
care Family: The Case of Lithuania, Social Sciences (1392-0758), Vol. 66, No. 4, 2009, pp. 8297.
Steele, John W., and Louis P. Eatman, How Do You Want to Own That Property? Trends and Preferences
For Ownership of Real Estate in the Early 21st Century, International Council of Shopping Centres,
2008, pp. 123.
Steen, Adam, Papers: Securitisation: From Here to Where?, Journal of Corporate Treasury Management,
Vol. 4, No. 3, 2011, pp. 216224.
Stefanova, Boyka, NATOs Mixed-Policy Motives in the Southeast-European Enlargement: Revisiting
Balkan Geopolitics, Journal of Contemporary European Studies, Vol. 13, No. 1, April 2005, pp. 3958.
Stefanova, Boyka,, The European Union as a Security Actor, World Affairs, Vol. 168, No. 2, Fall 2005, p.
51.
Steffens, P., and Chris R. J. de Neubourg, European Network on Indicators of Social Quality: Summary of
the Dutch National Report, European Journal of Social Quality, Vol. 5, No. 1/2, January 2005, pp.
186200.
Stehle, Richard, An Empirical Test of the Alternative Hypotheses of National and International Pricing of
Risky Assets, Journal of Finance, Vol. 32, No. 2, May 1977, pp. 493502.

404
Steinberg, David A., and Stephen M. Saideman, Laissez Fear: Assessing the Impact of Government
Involvement in the Economy on Ethnic Violence, International Studies Quarterly, Vol. 52, No. 2, June
2008, pp. 235259.
Steinberg, Gerald M., Realism, Politics and Culture in Middle East Arms Control Negotiations,
International Negotiation, Vol. 10, No. 3, 2005, pp. 487512.
Steinberg, Gerald M., The Politics of NGOs, Human Rights and the Arab-Israel Conflict, Israel Studies, Vol.
16, No. 2, Summer 2011, pp. 2454.
Stephens, David O., Document Security and International Records Management, Records Management
Quarterly, Vol. 31, No. 4, October 1997, p. 69.
Stephenson, Paul, Europeanisation and Multilevel Governance Cohesion Policy in the European Union
and Britain By I. Bache, Journal of Common Market Studies, Vol. 47, No. 1, January 2009, p. 207.
Stephenson, Peter, Assessing Vulnerabilities, Information Systems Security, Vol. 9, No. 1, April 2000, p. 5.
Stepputat, Finn, Forced Migration, Land and Sovereignty, Government & Opposition, Vol. 43, No. 2,
Spring 2008, pp. 337357.
Stettinius, Edward R., Working Together, Vital Speeches of the Day, Vol. 71, No. 10, 2005, pp. 290294.
Still, Brian, A Dozen Years After Open Sources 1998 Birth, Its Time for OpenTechComm, Journal of
Technical Writing & Communication, Vol. 40, No. 2, March 2010, pp. 219228.
Stodiek, Thorsten, OSCEs Police-related Activities: Lessons-learned During the Last Decade, Security &
Human Rights, Vol. 20, No. 3, 2009, pp. 201211.
Stone, Marvin L., Social Security: Safety Net in Need of Repair, CPA Journal, Vol. 75, No. 8, 2005, p. 12.
Story, Jonathan, The Launching of the EMS: An Analysis of Change in Foreign Economic Policy, Political
Studies, Vol. 36, No. 3, 1988, pp. 397412.
Strakes, Jason E., Illicit Arms Transfers: Linking Weapons Characteristics and Strategic Applications,
Defence & Security Analysis, Vol. 24, No. 1, March 2008, pp. 6164.
Stratton, Jon, The Murderous State: The Naturalisation of Violence and Exclusion in the Films of
Neoliberal Australia, Cultural Studies Review, Vol. 15, No. 1, March 2009, pp. 1132.
Straus, Murray A., Childhood Experience and Emotional Security in the Context of Sinhalese Social
Organisation, Social Forces, Vol. 33, No. 2, December 1954, pp. 152160.
Stringer, Kevin D., Energy Security: Applying a Portfolio Approach, Baltic Security & Defence Review, Vol.
10, January 2008, pp. 121142.
Struyk, Raymond J., and Friedemann Roy, Kyrgysstans Squatter Communities and the Potential of
Housing Micro Finance to Support Upgrading, Housing Finance International, Vol. 21, No. 1, 2006,
pp. 2227.
Stubbs, Richard, The Many Faces of Asian Security (Book), Contemporary Southeast Asia: A Journal of
International & Strategic Affairs, Vol. 24, No. 1, April 2002, p. 176.
Stuff, Janice E., Michelle LaCour, Xianglin Du, Frank Franklin, Yan Liu, Sheryl Hughes, Ron Peters, and
Theresa A. Nicklas, He Prevalence of Food Insecurity and Associated Factors Among Households
with Children in Head Start Programs in Houston, Texas and Birmingham, Alabama, Race, Gender &
Class, Vol. 16, No. 3/4, 2009, pp. 3147.
Stutz, John, The Unhappy Hedge Fund Manager: Thoughts on Work and Well-Being, Reflections, Vol. 10,
No. 2, March 2010, pp. 1927.
Stvilia, Besiki, Les Gasser, Michael B. Twidale, and Linda C. Smith, A Framework for Information Quality
Assessment, Journal of the American Society for Information Science & Technology, Vol. 58, No. 12,
October 2007, pp. 17201733.
Suk Kyoon Kim, Understanding Maritime Disputes in Northeast Asia: Issues and Nature, International
Journal of Marine & Coastal Law, Vol. 23, No. 2, June 2008, pp. 213247.
Sullivan, David, Professionalism and Australias Security Intellectuals: Knowledge, Power, Responsibility,
Australian Journal of Political Science, Vol. 33, No. 3, November 1998, p. 421.
Summers, Alison, and Chinar Goel, Substance Use in Early Intervention Services for Psychosis, Advances
in Dual Diagnosis, Vol. 4, No. 3, 2011, pp. 115124.
Sumner, Mary, Information Security Threats: A Comparative Analysis of Impact, Probability, and
Preparedness, Information Systems Management, Vol. 26, No. 1, Winter 2009, pp. 212.

405
Sung Won Kim, Human Security with an Asian Face?, Indiana Journal of Global Legal Studies, Vol. 17, No.
1, Winter 2010, pp. 83103.
Sunitha, R., R. Kumar Sreerama, and Abraham T. Mathew, A Composite Security Index for On-line Steady-
state Security Evaluation, Electric Power Components & Systems, Vol. 39, No. 1, January 2011, pp. 1
14.
Suri, Jeremi, Detente and Human Rights: American and West European Perspectives on International
Change, Cold War History, Vol. 8, No. 4, November 2008, p. 527.
Suwanrada, Worawet, Poverty and Financial Security of the Elderly in Thailand, Ageing International,
Vol. 33, No. 14, January 2009, pp. 5061.
Svendsen, Adam D. M., Re-fashioning Risk: Comparing UK, US and Canadian Security and Intelligence
Efforts Against Terrorism, Defence Studies, Vol. 10, No. 3, 2010, pp. 307335.
Svilanovic, Goran, and Jelena Milic, Open up Sesame!, Helsinki Monitor, Vol. 17, No. 3, July 2006, pp.
226243.
Swami, Praveen, Failed Threats and Flawed Fences: Indias Military Responses to Pakistans Proxy War,
India Review, Vol. 3, No. 2, April 2004, pp. 147170.
Swan, Eliot J., Financing Social Security, American Economic Review, Vol. 37, No. 2, May 1947, p. 345.
Swatuk, Larry A., and Peter Vale, Why Democracy Is Not Enough: Southern Africa and Human Security in
the Twenty-first Century, Alternatives: Global, Local, Political, Vol. 24, No. 3, September 1999, p.
361.
Swatuk, Larry A.Vale, Why Democracy Is Not Enough: Southern Africa and Human Security in the Twenty-
first Century, Alternatives: Global, Local, Political, Vol. 24, No. 3, September 1999, p. 361.
Sweetman, Bill, Will the Pentagons Commonality Bug Kill JSF?, Interavia Business & Technology, Vol. 55,
No. 643, June 2000, p. 38.
Tabbush, Constanza, The Possibilities for and Constraints on Agency: Situating Womens Public and
hidden Voices in Greater Buenos Aires, Journal of International Development, Vol. 21, No. 6, 2009,
pp. 868882.
Taebi, Behnam, and Andrew C. Kadak, Intergenerational Considerations Affecting the Future of Nuclear
Power: Equity as a Framework for Assessing Fuel Cycles, Risk Analysis: An International Journal, Vol.
30, No. 9, 2010, pp. 13411362.
Tamborini, Christopher R.Whitman, Women, Marriage, and Social Security Benefits Revisited, Social
Security Bulletin, Vol. 67, No. 4, December 2007, p. 1.
Tan, Jose Allan, Asias Precarious State of Security, Enterprise Innovation, Vol. 3, No. 7, December 2007,
pp. 2225.
Tanada, Wigberto E., Human Security from a Filipino Perspective, Peace Review, Vol. 11, No. 3, 1999, p.
443.
Tang, Shiping, The Security Dilemma: A Conceptual Analysis, Security Studies, Vol. 18, No. 3, September
2009, pp. 587623.
Tank, Pinar, Dressing for the Occasion: Reconstructing Turkeys Identity?, Journal of Southeast European
& Black Sea Studies, Vol. 6, No. 4, December 2006, pp. 463478.
Tansu, Okan, September 11: Early Thoughts on the Imbrication of Security, ICT, and International
Relations, Perspectives on Global Development & Technology, Vol. 2, No. 1, March 2003, pp. 7793.
Tatalovi, Sinisa, Energy Security and Security Policies: The Republic of Croatia in Comparative
Perspective, Politicka Misao: Croatian Political Science Review, Vol. 45, No. 5, November 2008, pp.
115134.
Tatzel, Miriam, The Art of Buying: Coming to Terms with Money and Materialism, Journal of Happiness
Studies, Vol. 4, No. 4, December 2003, pp. 405435.
Taylor JR., William J., and Donald F. Bletz, A Case for Officer Graduate Education, Journal of Political &
Military Sociology, Vol. 2, No. 2, Fall 1974, pp. 251267.
Taylor, Chris, Planning for the Long Term, HRMagazine, Vol. 49, No. 3, March 2004, pp. 7074.
Taylor, Ian, and Paul D. Williams, Political Culture, State Elites and Regional Security in West Africa,
Journal of Contemporary African Studies, Vol. 26, No. 2, April 2008, pp. 137149.

406
Teodoru, Silviu Florin, Business Process Management Integration Solution in Financial Sector,
Informatica Economica, Vol. 13, No. 1, March 2009, pp. 4756.
Terer, Taita, George G. Ndiritu, and Nathan N. Gichuki, Socio-economic Values and Traditional Strategies
of Managing Wetland Resources in Lower Tana River, Kenya, Hydrobiologia, Vol. 527, No. 13,
October 2004, pp. 315.
Thai, Vinh V., Effective Maritime Security: Conceptual Model and Empirical Evidence, Maritime Policy &
Management, Vol. 36, No. 2, April 2009, pp. 147163.
Thangavel, T. S., and A. Krishnan, Efficient Secured Hash Based Password Authentication in Multiple
Websites, International Journal on Computer Science & Engineering, Vol. 1, No. 5, 2010, pp. 1846
1851.
The Coastal Zone Canada Association, Tuktoyaktuk Declaration Coastal Zone Canada 2006 Conference
Statement 18 August 2006, Vol. 61, Arctic Institute of North America, 2008, pp. 122123.
Theurillat, Thierry, Jose Corpataux, and Olivier Crevoisier, The Impact of Institutional Investors on
Corporate Governance: A View of Swiss Pension Funds in a Changing Financial Environment,
Competition & Change, Vol. 12, No. 4, December 2008, pp. 307327.
Thibault, MarcBrooks, The Response of the U.S. Maritime Industry to the New Container Security
Initiatives, Transportation Journal (American Society of Transportation & Logistics Inc), Vol. 45, No.
1, Winter 2006, p. 5.
Thomas, Neil, Land, Fertility, and the Population Establishment, Population Studies, Vol. 45, No. 3,
November 1991, pp. 379397.
Thomas, Stuart, Morven Leese, Maired Dolan, Mari-Anne Harty, Jenny Shaw, Hugh Middleton, Julie
Carlisle, Lisa Davies, Graham Thornicroft, and Louis Appleby, The Individual Needs of Patients in
High Secure Psychiatric Hospitals in England, Routledge, June 2004.
Thompson, Charis, Dolly Mixtures: The Remaking of Genealogy, British Journal of Sociology, Vol. 59, No.
1, March 2008, pp. 169171.
Thompson, Helen, Retooling retirement with Annuities, Advisor Today, Vol. 102, No. 5, May 2007, pp.
4044.
Thornton, Alexander, Beyond the Metropolis: Small Town Case Studies of Urban and Peri-urban
Agriculture in South Africa, Urban Forum, Vol. 19, No. 3, 2008, pp. 243262.
Tibaijuka, Anna Kajumulo, Food Security in Africa, New Economy, Vol. 11, No. 3, 2004, pp. 170173.
Tie, Warwick, Belief in Policing, New Zealand Sociology, Vol. 23, No. 2, July 2008, pp. 7589.
Tierney, Dominic, Does Chain-Ganging Cause the Outbreak of War?, International Studies Quarterly, Vol.
55, No. 2, June 2011, pp. 285304.
Till, Geoffrey, A Cooperative Strategy for 21st Century Seapower: Whats New? Whats Next? A View
From Outside, Defence Studies, Vol. 8, No. 2, July 2008, pp. 240257.
Timmer, C. Peter, Food Security and Economic Growth: An Asian Perspective, Asian-Pacific Economic
Literature, Vol. 19, No. 1, May 2005, pp. 117.
Timms, Jill, Deciphering the Global: Its Scales, Spaces and Subjects, British Journal of Sociology, Vol. 59,
No. 1, March 2008, pp. 171173.
Timofeev, A., D. Pomozov, A. Makkaveev, and S. Molotkov, Public Classical Communication in Quantum
Cryptography: Error Correction, Integrity, and Authentication, Journal of Experimental & Theoretical
Physics, Vol. 104, No. 5, May 2007, pp. 675688.
Timothy, Kristen, Human Security Discourse at the United Nations, Peace Review, Vol. 16, No. 1, March
2004, pp. 1924.
Tomes, Robert R., Boon or Threat?, Naval War College Review, Vol. 53, No. 3, Summer 2000, p. 39.
Tonta, Yaar, and Irem Soydal, Service Quality of Web Information Systems, Journal of Faculty of Letters
/ Edebiyat Fakultesi Dergisi, Vol. 27, No. 2, December 2010, pp. 117127.
Toolson, Richard B., Tax Planning for the Use of TIPS at Retirement, Tax Adviser, Vol. 38, No. 11,
November 2007, p. 666.
Toriello, John M., Judith R. Nemsick, and Harmony I. Loube, Identity Theft and Data Security Laws: Protect
Your Customers, Protect Your Business, Banking & Financial Services Policy Report, Vol. 25, No. 6,
June 2006, pp. 15.

407
Torrente, Diego, Security Systems: Private and Public Security Articulation in Spain, American
Sociological Association, 2004, p. 1.
Totten, Robbie, National Security and U.S. Immigration Policy, 1776-1790, Journal of Interdisciplinary
History, Vol. 39, No. 1, Summer 2008, pp. 3764.
Touray, Omar A., The Common African Defence and Security Policy, African Affairs, Vol. 104, No. 417,
October 2005, pp. 635656.
Toussaint, Janneke, and Marja Elsingsa, Exploring Housing Asset-based Welfare. Can the UK Be Held Up
as an Example for Europe?, Housing Studies, Vol. 24, No. 5, 2009, pp. 669692.
Toussaint, Janneke, Gudrun Tegeder, Marja Elsinga, and Ilse Helbrecht, Security and Insecurity of Home
Ownership: Germany and the Netherlands, European Journal of Housing Policy, Vol. 7, No. 2, June
2007, pp. 173192.
Tow, William T., and Beverley Loke, Rules of Engagement: Americas Asia-Pacific Security Policy Under an
Obama Administration, Australian Journal of International Affairs, Vol. 63, No. 4, December 2009,
pp. 443457.
Tow, William T., and William Choong, Asian Perceptions of BMD: Defence or Disequilibrium?,
Contemporary Southeast Asia: A Journal of International & Strategic Affairs, Vol. 23, No. 3, December
2001, p. 379.
Trapani, David A., The Impact of Financial Regulatory Reform on Structured Products, Venulex Legal
Summaries, Q2 2010, pp. 13.
Tremblay, Diane-Gabrielle, From Casual Work to Economic Security; The Paradoxical Case of Self-
Employment, Social Indicators Research, Vol. 88, No. 1, 2008, pp. 115130.
Trenin, Dmitri, Southern Watch: Russias Policy in Central Asia, Journal of International Affairs, Vol. 56,
No. 2, Spring 2003, p. 119.
Trenkamp, BradWiseman, The Food Stamp Programme and Supplemental Security Income, Social
Security Bulletin, Vol. 67, No. 4, December 2007, p. 71.
Treverton, Gregory F., and Tom Farer, International Organised Crime, National Security and the Market
State, Transnational Crime in the Americas, Taylor & Francis Ltd / Books, 1999, pp. 3957.
Triantaphyllou, Dimitrios, The Security Paradoxes of the Black Sea Region, Journal of Southeast
European & Black Sea Studies, Vol. 9, No. 3, 2009, pp. 225241.
TriBar Opinion Committee, Special Report of the TriBar Opinion Committee -- Opinions on Secondary
Sales of Securities, Business Lawyer, Vol. 66, No. 3, May 2011, pp. 625657.
Trimbath, Susanne, Trade Settlement Failures in US Bond Markets, IUP Journal of Financial Economics,
Vol. 9, No. 1, March 2011, pp. 5378.
Tripunitara, Mahesh V., and Ninghui Li, A Theory for Comparing the Expressive Power of Access Control
Models, Journal of Computer Security, Vol. 15, No. 2, April 2007, pp. 231272.
Trombetta, Maria Julia, Environmental Security and Climate Change: Analysing the Discourse, Cambridge
Review of International Affairs, Vol. 21, No. 4, December 2008, pp. 585602.
Trueman, Myfanwy, Diana Cook, and Nelarine Cornelius, Creative Dimensions for Branding and
Regeneration: Overcoming Negative Perceptions of a City, Place Branding & Public Diplomacy, Vol.
4, No. 1, January 2008, pp. 2944.
Trupin, Jerry, Exposures and Coverages, Insurance Advocate, Vol. 119, No. 16, 2008, pp. 2223.
Trushechkin, A. S., and I. V. Volovich, On Standards and Specifications in Quantum Cryptography,
International Journal of Quantum Information, Vol. 6, No. 2, April 2008, pp. 347367.
Tryggestad, Torunn L., Trick or Treat? The UN and Implementation of Security Council Resolution 1325 on
Women, Peace, and Security, Global Governance, Vol. 15, No. 4, December 2009, pp. 539557.
Tsai-Jyh Chen, and Shu-Hsing Li, Directors & Officers Insurance, Corporate Governance and Firm
Performance, International Journal of Disclosure & Governance, Vol. 7, No. 3, 2010, pp. 244261.
Tsantoulis, Yannis, Why Europe Fears Its Neighbours? by Fabrizio Tassinari, Journal of Southeast
European & Black Sea Studies, Vol. 10, No. 3, 2010, pp. 381383.
Tscholl, Elizabeth, and David H. Holben, Knowledge and Practices of Ohio Nurse Practitioners Regarding
Food Access of Patients, Journal of the American Academy of Nurse Practitioners, Vol. 18, No. 7, July
2006, pp. 335342.

408
Tso, Raylin, Xun Yi, and Xinyi Huang, Efficient and Short Certificateless Signatures Secure Against Realistic
Adversaries, Journal of Supercomputing, Vol. 55, No. 2, February 2011, pp. 173191.
Tsohou, Aggeliki, Spyros Kokolakis, Maria Karyda, and Evangelos Kiountouzis, Investigating Information
Security Awareness: Research and Practice Gaps, Information Security Journal: A Global Perspective,
Vol. 17, No. 5/6, 2008, pp. 207227.
Tsukada, Noriko, and Yasuhiko Saito, Factors That Affect Older Japanese Peoples Reluctance to Use
Home Help Care and Adult Day Care Services, Journal of Cross-Cultural Gerontology, Vol. 21, No.
3/4, December 2006, pp. 121137.
Tsygankov, Andrei P., Preserving Influence in a Changing World, Problems of Post-Communism, Vol. 58,
No. 2, April 2011, p. 28.
Tu, S.-F., and Y.-C. Hou, Design of Visual Cryptographic Methods with Smoothlooking Decoded Images of
Invariant Size for Grey-level Images, Imaging Science Journal, Vol. 55, No. 2, June 2007, pp. 90101.
Tudor, Crstian, The Middle East and the New Global Security Architecture, Buletin Stiintific, Vol. 15, No.
1, June 2010, pp. 102113.
Turcotte, Heather, Slippery Security: National, International and Global Security Issues Within Petroleum
Production, Alternatives: Turkish Journal of International Relations, Vol. 1, No. 4, Winter 2002, pp.
109153.
Turner, Edward, and Simon Green, Understanding Policy Convergence in Britain and Germany, German
Politics, Vol. 16, No. 1, March 2007, pp. 121.
Turner, John, Designing 401(k) Plans That Encourage Retirement Savings: Lessons From Behavioural
Finance, Benefits Quarterly, Vol. 22, No. 4, Fourth Quarter 2006, pp. 2436.
Turner, Nancy J., and Katherine L. Turner, Where Our Women Used to Get the Food: Cumulative Effects
and Loss of Ethnobotanical Knowledge and Practice; Case Study from Coastal British Columbia,
Botany, Vol. 86, No. 2, February 2008, pp. 103115.
Tuvendal, Magnus, and Thomas Elmqvist, Ecosystem Services Linking Social and Ecological Systems: River
Brownification and the Response of Downstream Stakeholders, Ecology & Society, Vol. 16, No. 4,
December 2011, pp. 116.
Twining, Daniel, Democratic Partnership in Asia, Policy Review, No. 163, November 2010, p. 55.
U.S. Government Accountability Office, Afghanistans Donor Dependence., GAO Reports, 2011, p. 1.
U.S. Government Accountability Office, Building Security: Interagency Security Committee Has Had
Limited Success in Fulfilling Its Responsibilities: GAO-02-1004, GAO Reports, 2002, p. 1.
U.S. Government Accountability Office, Building Security: Security Responsibilities for Federally Owned
and Leased Facilities: GAO-03-8, GAO Reports, October 31, 2002, p. 1.
U.S. Government Accountability Office, Cybercrime: Public and Private Entities Face Challenges in
Addressing Cyber Threats: GAO-07-705, GAO Reports, July 23, 2007, p. 1.
U.S. Government Accountability Office, Elections: All Levels of Government Are Needed to Address
Electronic Voting System Challenges: GAO-07-741T, GAO Reports, April 18, 2007, p. 1.
U.S. Government Accountability Office, Enhanced DHS Oversight and Assessment of Interagency
Coordination Is Needed for the Northern Border, GAO Reports, 2011, p. 1.
U.S. Government Accountability Office, Federal Information System Controls Audit Manual (Fiscam), U.S.
Government Accountability Office, February 2, 2009.
U.S. Government Accountability Office, Highlights of a Forum Convened by the Comptroller General of
the United States: GAO-08-627SP, GAO Reports, April 15, 2008, p. 1.
U.S. Government Accountability Office, Homeland Security: Efforts Under Way to Develop Enterprise
Architecture, but Much Work Remains: GAO-04-777, GAO Reports, 2004, p. 1.
U.S. Government Accountability Office, Information Security: Federal Agencies Show Mixed Progress in
Implementing Statutory Requirements: GAO-06-527T, GAO Reports, March 17, 2006, p. 1.
U.S. Government Accountability Office, Information Security: The Centres for Medicare & Medicaid
Services Needs to Improve Controls over Key Communication Network: GAO-06-750, GAO Reports,
October 3, 2006, p. 1.
U.S. Government Accountability Office, Information Technology: Architecture Needed to Guide NASAs
Financial Management Modernisation: GAO-04-43, GAO Reports, November 21, 2003, p. 1.

409
U.S. Government Accountability Office, Rail Safety and Security: Some Actions Already Taken to Enhance
Rail Security, but Risk-based Plan Needed: GAO-03-435, GAO Reports, April 30, 2003, p. 1.
U.S. Government Accountability Office, Social Security Reform: Answers to Key Questions: GAO-05-
193SP, GAO Reports, May 2, 2005, p. 1.
U.S. Government Accountability Office, Social Security Reform: Greater Transparency Needed About
Potential General Revenue Financing: GAO-07-213, GAO Reports, March 22, 2007, p. 1.
U.S. Government Accountability Office, Social Security Reform: Implications for Private Pensions: HEHS-
00-187, GAO Reports, 2000, p. 1.
U.S. Government Accountability Office, State Has Taken Steps to Implement a Continuous Monitoring
Application, but Key Challenges Remain, GAO Reports, 2011, pp. 158.
U.S. Government Accountability Office, Transportation Security Research: Coordination Needed in
Selecting and Implementing Infrastructure Vulnerability Assessments: GAO-03-502, GAO Reports,
2003, p. 1.
U.S. Government Accountability Office, Year 2000 Computing Crisis: Readiness of the Electric Power
Industry: AIMD-99-114, GAO Reports, April 6, 1999, p. 1.
U.S. Government Accountability Office,Homeland Security: Management Challenges Facing Federal
Leadership: GAO-03-260, U.S. Government Accountability Office, December 20, 2002.
Ufford-Chase, Rick, No Pollyanna He: Following Jesus in a Time of Fear, Presbyterian Voices for Justice,
Spring 2007.
Ugland, Trygve, Regionalisation and Global Governance: The Taming of Globalisation? Edited by A.F.
Cooper, C.W. Hughes and P. De Lombaerde, Journal of Common Market Studies, Vol. 47, No. 1,
January 2009, p. 206.
Ukeje, Charles, Globalisation and Conflict Management: Reflections on the Security Challenges Facing
West Africa, Globalisations, Vol. 5, No. 1, March 2008, pp. 3548.
Ulrichsen, Kristian Coates, Internal and External Security in the Arab Gulf States, Middle East Policy, Vol.
16, No. 2, Summer 2009, pp. 3958.
Umbach, Frank, Russia as a Virtual Great Power: Implications for Its Declining Role in European and
Eurasian Security, European Security, Vol. 9, No. 3, October 2000, p. 87.
Unni, J., and U. Rani, Social Protection for Informal Workers in India: Insecurities, Instruments and
Institutional Mechanisms, Development & Change, Vol. 34, No. 1, January 2003, pp. 127161.
Unni, Jeemol, Globalisation and Securing Rights for Women Informal Workers in Asia, Journal of Human
Development, Vol. 5, No. 3, November 2004, pp. 335354.
Upshur, Ross, Ethics and Infectious Disease, Bulletin of the World Health Organisation, Vol. 86, No. 8,
2008, p. 654.
Useem, John, Does Decentralised Industry Mean Greater Security? The Case of Massachusetts, Rural
Sociology, Vol. 6, No. 1, March 3, 1941, pp. 4356.
Vaisanen, R., I. Kraav, and P. Niemela, Insecurity Related to Working Life by Age Groups in Finland and
Estonia in the 1990s, International Journal of Social Welfare, Vol. 9, No. 3, July 2000, p. 158.
Vala, Jorge, and Rui Costa-Lopes, Youth Attitudes Toward Difference and Diversity: a Cross-national
Analysis, Analise Social, Vol. 45, No. 195, June 2010, pp. 255275.
Valero, Larry, We Need Our New OSS, Our New General Donovan, Now...: The Public Discourse over
American Intelligence, 1944-53, Intelligence & National Security, Vol. 18, No. 1, Spring 2003, pp. 91
118.
Vallado, Alfredo G. A., Democratic Hegemony and American Hegemony, Cambridge Review of
International Affairs, Vol. 19, No. 2, June 2006, pp. 243260.
Vamsi Thalatam, M. N., P. Venkata Rao, K. V. S. R. P. Varma, N. V. R. Murty, and Allam Apparao, Prediction
of Protein Secondary Structure Using Artificial Neural Network, International Journal on Computer
Science & Engineering, Vol. 1, No. 5, 2010, pp. 16151621.
Vamvakas, Petros, NATO and Turkey in Afghanistan and Central Asia: Possibilities and Blind Spots,
Turkish Studies, Vol. 10, No. 1, March 2009, pp. 5774.
Van der Veen, Anne, and Tagel Gebrehiwot, Effect of Policy Interventions on Food Security in Tigray,
Northern Ethiopia, Ecology & Society, Vol. 16, No. 1, March 2011, pp. 117.

410
Van Derhei, Jack, Retirement Savings Shortfalls for Todays Workers, EBRI Notes, Vol. 31, No. 10, October
2010, pp. 29.
Van Derhei, Jack, and Craig Copeland,, The Impact of Deferring Retirement Age on Retirement Income
Adequacy, EBRI Issue Brief, No. 358, June 2011, pp. 133.
Van Dongen, Diana, Tjabe Smid1, and Danille RM Timmermans, Perception of Health Risks of
Electromagnetic Fields by MRI Radiographers and Airport Security Officers Compared to the General
Dutch Working Population: a Cross Sectional Analysis, Environmental Health: A Global Access
Science Source, Vol. 10, No. 1, January 2011, pp. 95102.
Van Evera, Stephen, Offense, Defence, and the Causes of War, International Security, Vol. 22, No. 4,
Spring98 1998, p. 5.
Van Ginkel, Bibi, and Steven Westervelt, The Ethical Challenges of Implementing Counterterrorism
Measures and the Role of the OSCE, Security & Human Rights, Vol. 20, No. 2, May 2009, pp. 123
132.
van Puijenbroek, Joost, Human Security from Below, a Case Study from the Ituri District, Democratic
Republic of Congo, Security & Human Rights, Vol. 19, No. 1, January 2008, pp. 4553.
VanDerhei, Jack, A Post-Crisis Assessment of Retirement Income Adequacy for Baby Boomers and Gen
Xers, EBRI Issue Brief, No. 354, February 2011, pp. 125.
VanDerhei, Jack, and Craig Copeland, The EBRI Retirement Readiness Rating: Retirement Income
Preparation and Future Prospects, EBRI Issue Brief, No. 344, July 2010, pp. 135.
VanDeveer, Stacy D., and Geoffrey D. Dabelko, Redefining Security Around the Baltic: Environmental
Issues in Regional Context, Global Governance, Vol. 5, No. 2, April 1999, p. 221.
VanEenwyk, J., and J. Sabel, Self-Reported Concern About Food Security Associated with Obesity -
Washington, 1995-1999, MMWR: Morbidity & Mortality Weekly Report, Vol. 52, No. 35, 2003, pp.
840842.
Vargo, Kimberly Karcewski, Compliance with Fund of Funds Rules and Related Form Amendments,
Investment Lawyer, Vol. 14, No. 5, May 2007, pp. 1519.
Varnovskii, N. P., Provable Security of Digital Signatures in the Tamper-proof Device Model, Discrete
Mathematics & Applications, Vol. 18, No. 4, October 2008, pp. 427437.
Vyrynen, Tarja, Gender and UN Peace Operations: The Confines of Modernity, International
Peacekeeping (13533312), Vol. 11, No. 1, Spring 2004, pp. 125142.
Vejnovic, Dusko, and Velibor Lalic, Community Policing in a Changing World: A Case Study of Bosnia and
Herzegovina, Police Practice & Research, Vol. 6, No. 4, 2005, pp. 363373.
Verdun, Amy, The Eurogroup: How a Secretive Circle of Finance Ministers Shape European Economic
Governance By U. Puetter, Journal of Common Market Studies, Vol. 47, No. 1, January 2009, pp.
203204.
Vergnaud, Damien, New Extensions of Pairing-Based Signatures into Universal (Multi) Designated Verifier
Signatures, International Journal of Foundations of Computer Science, Vol. 20, No. 1, February 2009,
pp. 109133.
Verma, Seema, and Deepak Garg, Improvement in RSA Cryptosystem, Journal of Advances in Information
Technology, Vol. 2, No. 3, 2011, pp. 146151.
Vernon, Steve, Retirement Planning for the Middle Class: Holistic Strategies Will Be Essential, Journal of
Financial Service Professionals, Vol. 63, No. 2, March 2009, pp. 3748.
Verrastro, Frank, and Sarah Ladislaw, Providing Energy Security in an Interdependent World,
Washington Quarterly, Vol. 30, No. 4, October 2007, pp. 95104.
Vicedo, Marga, Mothers, Machines, and Morals: Harry Harlows Work on Primate Love from Lab to
Legend, Journal of the History of the Behavioural Sciences, Vol. 45, No. 3, Summer 2009, pp. 193
218.
Vidakis, C., and M. Fleury, Engineering Multicast Group Key Distribution: a Review, IEE Proceedings --
Software, Vol. 152, No. 6, December 2005, pp. 260272.
Villars, C., Social Security for Migrant Workers in the Framework of the Council of Europe, International
Labour Review, Vol. 120, No. 3, May 1981, p. 291.

411
Vines, Alex, Rhetoric from Brussels and Reality on the Ground: The EU and Security in Africa,
International Affairs, Vol. 86, No. 5, 2010, pp. 10911108.
Vivoda, Viado, and James Manicom, Oil Import Diversification in Northeast Asia: A Comparison Between
China and Japan, Journal of East Asian Studies, Vol. 11, No. 2, August 2011, pp. 223254.
Volkert, Juergen, European Union Poverty Assessment: A Capability Perspective., Journal of Human
Development, Vol. 7, No. 3, November 2006, pp. 359383.
Volpi, Frdric, Introduction: Strategies for Regional Cooperation in the Mediterranean: Rethinking the
Parameters of the Debate, Mediterranean Politics, Vol. 11, No. 2, July 2006, pp. 119135.
Von Braun, Joachim, Tesfaye Teklu, and Patrick Webb, Labour-intensive Public Works for Food Security in
Africa: Past Experience and Future Potential, International Labour Review, Vol. 131, No. 1, January
1992, p. 19.
von Hippel, Eric, Horizontal Innovation Networks--by and for Users, Industrial & Corporate Change, Vol.
16, No. 2, April 2007, pp. 293315.
Vorster, H(H, The Link Between Poverty and Malnutrition: a South African Perspective, Health SA
Gesondheid, Vol. 15, No. 1, December 2010, pp. 194199.
Voskopoulos, George, Greek-Bulgarian Relations in the Post -- Cold War Era: Contributing to Stability and
Development in Southeastern Europe, Mediterranean Quarterly, Vol. 19, No. 4, Fall 2008, pp. 6880.
Voskopoulos, George, The Geographical and Systemic Influences on Greek Foreign Policy in the Balkans in
the 1990s, Perspectives: Central European Review of International Affairs, Vol. 26, Summer 2006, pp.
6990.
Vre, Francois, African Maritime Security: a Time for Good Order at Sea, Australian Journal of Maritime
& Ocean Affairs, Vol. 2, No. 4, December 2010, pp. 121132.
Vychov, Helena, Economic Stimulation of Demand in the Market of Adult Education, Economic Studies
& Analyses / Acta VSFS, Vol. 5, No. 1, June 2011, pp. 2960.
Waever, Ole, Identity, Integration and Security, Journal of International Affairs, Vol. 48, No. 2, Winter
1995, p. 389.
Wai Kong Cheung, Adrian, Do Stock Investors Value Corporate Sustainability? Evidence from an Event
Study, Springer Science & Business Media B.V., March 15, 2011.
Waine, Barbara, New Labour and Pensions Reform: Security in Retirement?, Social Policy &
Administration, Vol. 43, No. 7, December 15, 2009, pp. 754771.
Waisova, Sarka, Human Security--the Contemporary Paradigm?, Perspectives: Central European Review
of International Affairs, Vol. 20, Summer 2003, pp. 5872.
Wakabayashi, Koji, Relationship Between Business Definition, Pacific Economic Review, Vol. 13, No. 5,
December 2008, pp. 663679.
Walcott, Charles E., and Karen M. Hult, The Bush Staff and Cabinet System, Perspectives on Political
Science, Vol. 32, No. 3, Summer 2003, pp. 150155.
Walker, Andrew, The Submerged Logic of Doing Business and Attribution: Diving Below the Surface of
the Offshore Lending GLAM, Tax Lawyer, December 2011, pp. 405469.
Walker, Andrew, and Nicholas Farrelly, Northern Thailands Specter of Eviction, Critical Asian Studies,
Vol. 40, No. 3, 2008, pp. 373397.
Walker, Jerome F., and Francis C. Theimann, The Relationship of the Internal Security System to Group
Level Organisation in Millers Living systems theory, Behavioural Science, Vol. 35, No. 2, April 1990,
p. 147.
Wall, David S., Policing Cybercrimes: Situating the Public Police in Networks of Security Within
Cyberspace, Police Practice & Research, Vol. 8, No. 2, May 2007, pp. 183205.
Wallach, Dan, Native Client: A Clever Alternative, Communications of the ACM, Vol. 53, No. 1, January
2010, p. 90.
Wallander, Celeste A., Institutional Assets and Adaptability: NATO After the Cold War, International
Organisation, Vol. 54, No. 4, 2000, pp. 705735.
Walliser, Jan, Would Saving Social Security Raise National Saving?, National Tax Journal, Vol. 52, No. 3,
1999, pp. 541552.

412
Walmsley, Nick, Russian Rule in Samarkand 1868-1910: a Comparison with British India, Central Asian
Survey, Vol. 28, No. 3, 2009, pp. 341343.
Walter, Andrew, Rob Allen, Nisa Brown, David Duggan, Ruth Duggan, Consuelo J. Silva, Carla Ulibarri, Larry
Varoz, and Greg Wyss, Development of an Intrinsic Security Design and Assessment Methodology,
Proceedings of the Institute of Nuclear Materials Management Annual Meeting, January 2009, pp. 1
10.
Wamhoff, SteveWiseman, The TANF/SSI Connection, Social Security Bulletin, Vol. 66, No. 4, December
2005, p. 21.
Wang, K.-L., Y.-T. Tseng, and C.-C. Weng, A Study of Production Efficiencies of Integrated Securities Firms
in Taiwan, Applied Financial Economics, Vol. 13, No. 3, March 2003, p. 159.
Ward, Jeremy, Operational Risk and Information Security Need to Co-exist If Businesses Want to
Effectively Manage Risk, Credit Control, Vol. 26, No. 7, July 2005, pp. 1821.
Warf, Barney, Financial Services and Inequality In New York, Industrial Geographer, Vol. 2, No. 2, Spring
2005, pp. 110126.
Watrous, John, Zero-Knowledge Against Quatum Attacks, SIAM Journal on Computing, Vol. 39, No. 1,
July 2009, pp. 2558.
Weathers II, Robert R., Chris Silanskis, Michelle Stegman, John Jones, and Susan Kalasunas, Expanding
Access to Health Care for Social Security Disability Insurance Beneficiaries, Social Security Bulletin,
Vol. 70, No. 4, November 2010, pp. 2547.
Weaver, David A., Widows and Social Security, Social Security Bulletin, Vol. 70, No. 3, 2010, p. 89.
Webber, Katherine, and Helen Johnson, Women, Peace Building and Political Inclusion: A Case Study from
Solomon Islands, Hecate, Vol. 34, No. 2, November 2008, pp. 8399.
Weber-Jahnke, Jens H, Security Evaluation and Assurance of Electronic Health Records, Studies In Health
Technology And Informatics, Vol. 143, 2009, pp. 290296.
Webersik, Christian, Wars Over Resources?: Evidence from Somalia, Environment, Vol. 50, No. 3, May
2008, pp. 4658.
Weddle, Peter, Going Above and Beyond to Build Career Security. (cover Story), California Job Journal,
Vol. 28, No. 1230, April 4, 2010, p. 1.
Weeks, Donna, Softly, Softly to Iraq: Removing the Inverted Commas from Japans Security
Contributions, Australian Journal of International Affairs, Vol. 58, No. 4, December 2004, pp. 446
463.
Weg, Howard, and Kathryn Russo, Can You Sail into the Safe Harbor?, Bankruptcy Litigation, Vol. 17, No.
1, Fall 2011, pp. 64.
Weintraub, Marc R., Securities Concerns in the Offering of Interests in Oil and Gas Investments, Energy &
Mineral Law Institute, No. 26, June 2005, pp. 503521.
Weise, Steven O., Personal Property Secured Transactions, Business Lawyer, Vol. 66, No. 4, 2011, pp.
11651185.
Weisenhaus, Doreen, National Security and Freedom of the Press in Hong Kong, Conference Papers --
International Communication Association, Annual Meeting 2004, p. 1.
Weiss, Meredith L., The Politics of Multiculturalism (Book), Contemporary Southeast Asia: A Journal of
International & Strategic Affairs, Vol. 24, No. 3, December 2002, p. 612.
Wells, Martina, Social Transformations and Identity in the Age of Globalisation in Germany: Georg
Oswalds Alles Was Zhlt, Seminar -- A Journal of Germanic Studies, Vol. 47, No. 4, 2011, pp. 417
433.
West, Malcolm L, Sheila W Spreng, Sarah M Rose, and Kenneth S Adam, Relationship Between
Attachment-Felt Security and History of Suicidal Behaviours in Clinical Adolescents, Canadian
Journal of Psychiatry, Vol. 44, No. 6, 1999, pp. 578582.
West, Malcolm, Kenneth Adam, Sheila Spreng, and Sarah Rose, Attachment Disorganisation and
Dissociative Symptoms in Clinically Treated Adolescents, Canadian Journal of Psychiatry, Vol. 46, No.
7, 2001, p. 627.

413
Wezenbeek, Rogier, The European Commissions Recommendation for Simplified Procedures for Claiming
Cross-border Withholding Tax Relief, Journal of Securities Operations & Custody, Vol. 2, No. 4,
January 2010, pp. 304311.
Wheeler, Nicholas J., I Had Gone to Lahore With a Message of Goodwill But in Return We Got Kargil: The
Promise and Perils of Leaps of Trust in India-Pakistan Relations, India Review, Vol. 9, No. 3,
September 2010, pp. 319344.
Wheeler, Peter M., and John R. Kearney, Income Protection for the Aged in the 21st Century: A
Framework to Help Inform the Debate, Social Security Bulletin, Vol. 59, No. 2, Summer 1996, p. 3.
Whitaker, Elizabeth A., Janet L. Bokemeier, and Scott Loveridge, Retirement Plan Participation in an Era of
Change: The Case of a Rural Region, Rural Sociology, Vol. 76, No. 3, 2011, pp. 319346.
White, Frederick L., The Commodity Futures Modernisation Act of 2000: How It Affects Professional and
Institutional Users of Derivatives, Investment Lawyer, Vol. 8, No. 3, March 2001, p. 15.
Whitman, Kevin, An Overview of the Railroad Retirement Program, Social Security Bulletin, Vol. 68, No.
2, June 2008, p. 41.
Whitman, KevinReznik, Who Never Receives Social Security Benefits?, Social Security Bulletin, Vol. 71,
No. 2, May 2011, p. 17.
Whitman, Richard G., Book Reviews, Political Studies, Vol. 47, No. 1, March 1999, p. 173.
Whitworth, Brian, and Michael Zaic, The Wosp Model: Balanced Information System Design and
Evaluation, Communications of AIS, Vol. 2003, No. 12, 2003, pp. 258282.
Wholfeld, Monika, Subregional Cooperation and the OSCE, Journal of Southeast European & Black Sea
Studies, Vol. 1, No. 2, May 2001, p. 86.
Wilde, ParkeDagata, Food Stamp Participation by Eligible Older Americans Remains Low, FoodReview,
Vol. 25, No. 2, Summer 2002, p. 25.
Wilder, Andrew, Aid and Stability in Pakistan: Lessons from the 2005 Earthquake Response, Disasters,
Vol. 34, 2010, pp. S406S426.
Wilder, David, Unlocking the Volatility Key Using ATR, Futures: News, Analysis & Strategies for Futures,
Options & Derivatives Traders, Vol. 37, No. 13, December 2008, pp. 3234.
Willams, Anne M., and Vera F. Irurita, Therapeutic and Non-therapeutic Interpersonal Interactions: The
Patients Perspective, Journal of Clinical Nursing, Vol. 13, No. 7, October 2004, pp. 806815.
Williams, Gareth, Alex Duncan, Pierre Landell-Mills, and Sue Unsworth, Politics and Growth,
Development Policy Review, Vol. 27, No. 1, January 2009, pp. 531.
Williams, M. J., The Coming Revolution in Foreign Affairs: Rethinking American National Security,
International Affairs, Vol. 84, No. 6, November 2008, pp. 11091129.
Williams, Mark, Foreign Investment in China: Will the Anti- Monopoly Law Be a Barrier or a Facilitator?,
Texas International Law Journal, Vol. 45, No. 1, Fall 2009, pp. 127155.
Williams, Paul D., From Non-Intervention to Non-Indifference: The Origins and Development of the
African Unions Security Culture, African Affairs, Vol. 106, No. 423, April 2007, pp. 253279.
Williams, Paul D., and Jrgen Haacke, Security Culture, Transnational Challenges and the Economic
Community of West African States, Journal of Contemporary African Studies, Vol. 26, No. 2, April
2008, pp. 119136.
Williams, Paul, South African Foreign Policy: Getting Critical?, Politikon: South African Journal of Political
Studies, Vol. 27, No. 1, May 2000, pp. 7391.
Williams, Phil, Organised Crime and Corruption in Iraq, International Peacekeeping (13533312), Vol. 16,
No. 1, February 2009, pp. 115135.
Williamson, John B., and Fred C. Pampel, Politics, Class, and Growth in Social Security Effort: A Cross-
National Analysis, International Journal of Comparative Sociology (Brill Academic Publishers), Vol.
27, No. 1/2, June 1986, pp. 1530.
Wilschsen, Gregory C., Information Security: Emerging Cybersecurity Issues Threaten Federal Information
Systems: GAO-05-231, U.S. Government Accountability Office, May 13, 2005.
Wilshusen, Gregory C., Concerted Effort Needed to Improve Federal Performance Measures, GAO
Reports, October 29, 2009, pp. 144.

414
Wilshusen, Gregory C., and Nabajyoti Barkakati, Federal Agencies Have Taken Steps to Secure Wireless
Networks, but Further Actions Can Mitigate Risk, GAO Reports, November 30, 2010, pp. 145.
Winkates, James, The Transformation of the South African National Defence Force: A Good Beginning,
Armed Forces & Society (0095327X), Vol. 26, No. 3, Spring 2000, pp. 45112.
Winter, Denis, Security Culture in the Nuclear Field, Nuclear Security Culture: From National Best
Practices to International Standards, Vol. 28, No. 1, 2007, pp. 6373.
Wivel, Anders, Economic Adjustment and Political Transformation in Small States By E. Jones, Journal
of Common Market Studies, Vol. 47, No. 1, January 2009, p. 212.
Wolfe, Michael, See Past Self-Proclaimed Experts Open-Source Security Evaluations, Association for
Computing Machinery, May 2007.
Wolfendale, Jessica, Terrorism, Security, and the Threat of Counterterrorism, Studies in Conflict &
Terrorism, Vol. 29, No. 7, October 2006, pp. 753770.
Wolff, Andrew T., The Structural and Political Crisis of NATO Transformation, Journal of Transatlantic
Studies (Routledge), Vol. 7, No. 4, Winter 2009, pp. 476492.
Wolff, Edward N., and Ajit Zacharias, Household Wealth and the Measurement of Economic Well-being in
the United States, Journal of Economic Inequality, Vol. 7, No. 2, June 2009, pp. 83115.
Wong Man Lai, Sonia, and Yong Yang, From Scorned to Loved? The Political Economy of the Development
of the Stock Market in China, Global Economic Review, Vol. 38, No. 4, December 2009, pp. 409429.
Wong, Alfred, Nandan Paramesh, and Pradeep Ray, Towards An Ontology Mapping Approach for Security
Management, International Journal on Artificial Intelligence Tools, Vol. 15, No. 6, December 2006,
pp. 10711090.
Wood, Jennifer, and Clifford Shearing, Securing Safety on Campus: A Case Study, Canadian Journal of
Criminology, Vol. 40, No. 1, January 1998, pp. 8195.
Woodward, Susan L., Shifts in Global Security Policies: Why They Matter for the South, IDS Bulletin, Vol.
40, No. 2, March 2009, pp. 121128.
Workman, Michael, Richard Ford, and William Allen, A Structuration Agency Approach to Security Policy
Enforcement in Mobile Ad Hoc Networks, Information Security Journal: A Global Perspective, Vol.
17, No. 5/6, 2008, pp. 267277.
Wright, Mary J., The Secure Preschooler: Nurturing Creativity with Courage, Wisdom with Responsibility,
Canadian Psychology/Psychologie Canadienne, Vol. 51, No. 4, November 2010, pp. 231240.
Wright, P. Daniel, Matthew J. Liberatore, and Robert L. Nydick, A Survey of Operations Research Models
and Applications in Homeland Security, Interfaces, Vol. 36, No. 6, December 2006, pp. 514529.
Wyss, Gregory D., John Darby, Consuelo Silva, and Andrew Walter, Risk-Based Cost-Benefit Analysis for
Security Assessment Problems, Proceedings of the Institute of Nuclear Materials Management
Annual Meeting, January 2009, pp. 110.
Xi Li, How to Take Advantage of Distrusted Parties or Secure Auxiliary Computations for Every Language in
NP, Information Security Journal: A Global Perspective, Vol. 19, No. 3, May 2010, pp. 160174.
Xiangmin Zhang, Java Security: Issues and Implications for Library and Archival Systems, Library &
Archival Security, Vol. 16, No. 2, July 2001, pp. 520.
Xiaoyun He, Haibing Lu, Jaideep Vaidya, and Nabil Adam, Secure Construction and Publication of
Contingency Tables from Distributed Data, Journal of Computer Security, Vol. 19, No. 3, April 2011,
pp. 453484.
Xingping Kang, and Yongjiang Zhao, The Violence-Plagued Peace Process: Predicament, Prospect, and
Test for U.S. Middle East Policy, American Foreign Policy Interests, Vol. 23, No. 6, December 2001, p.
357.
Xinwen Fu, Yong Guan, Riccardo Bettati, and Wei Zhao, Hiding Role Assignment in Mission-critical
Collaborative Systems, Quality & Reliability Engineering International, Vol. 18, No. 3, May 2002, pp.
201216.
Xiong, James X., Thomas Idzorek, and Peng Chen, Allocation to Deferred Variable Annuities with GMWB
for Life, Journal of Financial Planning, Vol. 23, No. 2, February 2010, pp. 4250.
Xuan-Thao Nguyen, Security Interest in Intellectual Property and Licenses and the Revised Article 9,
Licensing Journal, Vol. 23, No. 5, May 2003, p. 9.

415
Xuhua Ding, Gene Tsudik, and Shouhuai Xu, Leak-free Mediated Group Signatures, Journal of Computer
Security, Vol. 17, No. 4, June 2009, pp. 489514.
Yakushev, L.P., New Approaches to Social Security Provision in the USSR, International Labour Review,
Vol. 130, No. 3, May 1991, p. 329.
Yamori, Nobuyoshi, and Ayami Kobayashi, Wealth Effect of Public Fund Injections Toaling Banks,
Japanese Economic Review, Vol. 58, No. 4, December 2007, pp. 466483.
Yang, Haibin, Zhiang (John) Lin, and Ya (Lisa) Lin, A Multilevel Framework of Firm Boundaries: Firm
Characteristics, Dyadic Differences, and Network Attributes, Strategic Management Journal, Vol. 31,
No. 3, March 2010, pp. 237261.
Yaohang Li, Daniel Chen, and Xiaohong Yuan, Trustworthy Remote Compiling Services for Grid-based
Scientific Applications, Journal of Supercomputing, Vol. 41, No. 2, 2007, pp. 119131.
Yaphe, Judith S., Do No Harm: Thoughts on NATOs Mediterranean Initiative, Mediterranean Quarterly,
Vol. 10, No. 4, Fall 1999, p. 56.
Ycas, Martynas A., The New Beneficiary Data System: The First Phase, Social Security Bulletin, Vol. 55,
No. 2, Summer 1992, p. 20.
Yeltsin, Boris N., Peace Keeping Burden in the Former Soviet Union Lies Upon the Russian Federation,
McMurry Inc., October 15, 1994.
Yenisey, M. M., A. A. Ozok, and G. Salvendy, Perceived Security Determinants in E-commerce Among
Turkish University Students, Behaviour & Information Technology, Vol. 24, No. 4, August 2005, pp.
259274.
Yeonjung Lee, Work Incentive and Labour Force Participation After the Senior Citizens Freedom to Work
Act of 2000, Journal of Human Behaviour in the Social Environment, Vol. 20, No. 6, 2010, pp. 778
790.
Yergin, Daniel, Ensuring Energy Security, Foreign Affairs, April 2006.
Yi-Chein Chiang, and Chih-Chen Kuo, Characteristics of Firms Owned by Foreigners on the Taiwanese
Stock Market: An Analysis, International Journal of Management, Vol. 23, No. 3, 2006, pp. 721728.
Yim, Soo J., Jerome J. Roche, and Anne Ralph, Broker-Dealer 101: An Introduction to the Law and Lore of
Securities Brokers and Dealers, Investment Lawyer, Vol. 10, No. 7, July 2003, p. 1.
Yim, Yong S., and Jae K. Ryoo, The New Dimensions of Korea-US Security Cooperation, East Asia: An
International Quarterly, Vol. 20, No. 2, Summer 2003, pp. 34.
Yngstrom, Ingrid, Women, Wives and Land Rights in Africa: Situating Gender Beyond the Household in the
Debate Over Land Policy and Changing Tenure Systems, Oxford Development Studies, Vol. 30, No. 1,
February 2002, pp. 2140.
Yong Deng, The Asianisation of East Asian Security and the United States Role, East Asia: An
International Quarterly, Vol. 16, No. 3/4, Autumn 1998, p. 87.
Yongtao, Liu, Discourse, Meanings and IR Studies: Taking the Rhetoric of Axis of Evil As a Case, Confines
De Relaciones Internacionales y Ciencia Poltica, Vol. 6, No. 11, May 2010, pp. 85107.
Yorke, Valerie, Imagining a Palestinian State: An International Security Plan, International Affairs, Vol. 66,
No. 1, January 1990, p. 115.
Yousafzai, Shumaila, John Pallister, and Gordon Foxall, Multi-dimensional Role of Trust in Internet
Banking Adoption, Service Industries Journal, Vol. 29, No. 5, May 2009, pp. 591605.
Yu Xintian, China and Northeast Asian Regional Security Cooperation, Asia-Pacific Review, Vol. 12, No. 2,
November 2005, pp. 3038.
Yu-Fen Chen, Chih-Yung Wang, and Fu-Lai Lin, Do Qualified Foreign Institutional Investors Herd in
Taiwans Securities Market?, Emerging Markets Finance & Trade, Vol. 44, No. 4, August 2008, pp.
6274.
Yurke, Alice, Principal Protection Products: Possibilities and Perils from a Legal Perspective, Bank
Accounting & Finance, Vol. 16, No. 5, 2003, pp. 1321.
Yu-tai Tsai, The Emergence of Human Security: A Constructivist View, International Journal of Peace
Studies, Vol. 14, No. 1, Summer 2009, pp. 1933.
Yu-tai, T., The Study of Diffusion and Practice of International Norms Through the Human Security: The
Case of Responsibility to Protect, Asian Social Science, Vol. 6, No. 2, February 2010, pp. 1219.

416
Zakharov, Mikhail, and Elvira Tuchkova, The Government Is Continuing Its Offensive Against Its Citizens
Incomes, Russian Politics & Law, Vol. 41, No. 4, August 2003, p. 18.
Zaeski, Krzysztof, The Evolution of the Security Notion and Its Influence on the Concepts of Armed Forces
Employment, Baltic Security & Defence Review, Vol. 13, No. 1, January 2011, pp. 516.
Zambrowicz, Kevin A., Tim Foley, and Aileen Foley, Securities Lending: What Law Governs?, Investment
Lawyer, Vol. 17, No. 12, December 2010, pp. 2736.
Zambrowicz, Kevin, and Aileen M. Foley, Bank Securities Activities Under Regulation R: Compensation
Related Issues. (cover Story), Investment Lawyer, Vol. 18, No. 7, July 2011, pp. 122.
Zangl, Bernhard, and Michael Zurn, The Effects of Denationalism on Security in the OECD World, Global
Society: Journal of Interdisciplinary International Relations, Vol. 13, No. 2, April 1999, pp. 139161.
Zangl, Bernhard, and Michael Zurn , The Effects of Denationalism on Security in the OECD World, Global
Society: Journal of Interdisciplinary International Relations, Vol. 13, No. 2, April 1999, pp. 139161.
Zartman, I. William, Europe and Africa: Decolonisation or Dependency?, Foreign Affairs, Vol. 54, No. 2,
January 1976, pp. 325343.
Zartman, I. William, Reinhold Brender, David S. Sorenson, John P. Entelis, and William Lawrence, North
Africa: Reform, Development and Islamism, Middle East Policy, Vol. 14, No. 4, Winter 2007, pp. 1
22.
Zedner, Lucia, Securing Liberty in the Face of Terror: Reflections from Criminal Justice, Journal of Law &
Society, Vol. 32, No. 4, December 2005, pp. 507533.
Zeff, Stephen A., and Vaughan Radcliffe, The Ontario Securities Commission on Accounting and Auditing
from the 1960s to 2008-Part 2: The First Four Chief Accountants, 1986-1996, Accounting
Perspectives, Vol. 9, No. 2, June 2010, pp. 97138.
Zeidan, Sami, Can Abundance and Scarcity Clash? Environmental Security in Lebanons Second Republic,
Alternatives: Turkish Journal of International Relations, Vol. 4, No. 4, Winter 2005, pp. 115.
Zelikow, Philip, The Transformation of National Security, National Interest, No. 71, Spring 2003, p. 17.
Zeyad Mohammad, Yaw-Chung Chen, Chien-Lung Hsu, and Chi-Chun Lo, Cryptanalysis and Enhancement
of Two-pass Authenticated Key Agreement with Key Confirmation Protocols, IETE Technical Review,
Vol. 27, No. 3, June 2010, pp. 25265.
Zha, Daojiong, Chinese Considerations of Economic Security, Journal of Chinese Political Science, Vol. 5,
No. 1, March 1999, pp. 6987.
Zha, Daojiong, Security in the South China Sea, Alternatives: Global, Local, Political, Vol. 26, No. 1, March
2001, p. 33.
Zhanna, Mingaleva, and Kapuskina Tatiana, Institutional Aspects of Information Security in Russian
Economy, World Academy of Science, Engineering & Technology, Vol. 58, October 2009, pp. 164
170.
Zheng, D., V. K. Wei, and K. F. Chen, GDH Group-based Signature Scheme with Linkability, IEE
Proceedings -- Communications, Vol. 153, No. 5, October 2006, pp. 639644.
Zhiguo He, In Gu Khang, and Arvind Krishnamurthy, Balance Sheet Adjustments During the 2008 Crisis,
IMF Economic Review, Vol. 58, No. 1, 2010, pp. 118156.
Zhiwei Zhang, and William E. Snisek, Occupation, Job Characteristics and the Use of Alcohol and Other
Drugs, Social Behaviour & Personality: An International Journal, Vol. 31, No. 4, June 2003, p. 395.
Zimmerman, William P., and Shawn K. Baker, Two Recent Private Letter Rulings Provide a Rationale for
Determining When Certain Derivative Contracts Will Be Considered Securities Under Code Sec.
851(b)(2) and Will Produce Qualifying Income for a Regulated Investment Company, Journal of
Taxation of Financial Products, Vol. 9, No. 3, July 2011, pp. 5160.
Zirker, Daniel, and Marvin Henberg, Amaznia: Democracy, Ecology, and Brazilian Military Prerogatives in
the 1990s, Armed Forces & Society, Vol. 20, No. 2, Winter 1994, pp. 259281.
Zviran, Moshe, and William J. Haga, Password Security: An Empirical Study, Journal of Management
Information Systems, Vol. 15, No. 4, Spring 1999, pp. 161185.

417

View publication stats

Vous aimerez peut-être aussi