Skip to main content
Prior research reveals the interrelations between gentrification and policing, yet this paper introduces the unheard perspective of the of police on their role in gentrification. The study focuses on South Tel Aviv, which houses... more
Communities everywhere have experienced the negative effects of street gangs. The presence of military-trained gang members (MTGMs) in the community increases the threat of violence to citizens. The problem addressed was the apparently... more
Within less than a decade piracy has been turned from a marginal economic problem into a global security problem. A surprising array of international actors addresses piracy and coordinates their activities. In this contribution we... more
Résumé Dans la foulée des événements du 11 septembre 2001, la problématique des incivilités permet de légitimer des politiques sécuritaires souvent musclées. Comment cette situation influence-t-elle les relations entre l’État et le... more
Security is (or should be) an immune system: it neutralises toxic and infectious organisms. Counterintelligence techniques comprise an important part of hardening that immunity. This contribution will build upon theorised patterns of lone... more
There are many histories of the police as a law-enforcement institution, but no genealogy of the police as a form of power. This book provides a genealogy of the modern police by tracing the evolution of ‘police science’ and of police... more
This study demonstrates that that the lion’s share of everyday policing and patrol in Onion Lake and Ahtahkakoop is administered by Peacekeepers and that their withdrawal would result in a significant impact on the effectiveness of the... more
After the Cold War the security scenario in the Arctic has gone through drastic changes. Opposed to the state centric military security definitions that were dominant during the Cold War, academics now write about the different security... more
Security is a multidimensional concept, with many meanings, practising domains and heterogeneous occupations. Therefore it is difficult to define security as a singular, although understanding may be achieved by its applied context in... more
This Report was produced just before the Law Commission of Canada was defunded by the newly elected Conservative government. The Report argued for a new governance structure to oversee policing that incorporated the rapidly increasing... more
Este Dossier es el resultado del encuentro y trabajo conjunto entre investigadores de México, Centroamérica y Argentina interesados en analizar los procesos sociopolíticos centroamericanos a partir de un eje problemático compartido:... more
“Power is war, the continuation of war by other means”: Foucault’s reversal of Clausewitz’s formula has become a staple of critical theory — but it remains highly problematic on a conceptual level. Elaborated during Foucault’s 1976... more
Abstract: In modern times, ensuring security in cyberspace is the main task of national security for most states. States have different approaches to cybersecurity from the aspect of national security policies. They can be divided into... more
This Global Report provides research and analysis on counter-terrorism international intelligence cooperation, the European Union intelligence cooperation regarding counter-terrorism, terrorism and counter-terrorism measures in Asia,... more
This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... more
The European Union (EU) has closely correlated different aspects of the peace process in Bosnia with progress towards European accession. The ‘power of attraction’ of EU membership would presumably induce the Bosnian authorities to accept... more
Among the deficiencies demonstrated by the world financial crisis of 2008–9, one was the limited capacity of G-8 to provide for global economic governance. The developed economies quickly realised that they should seek joint solutions and... more
Gathering the proceedings from the 2019 Annual Conference of the Institute of Middle East and Islamic Studies at Durham University (UK), this volume explores the policies and priorities of Gulf Cooperation Council states, the tensions... more
This article argues that the post-Dayton political organisation of Bosnia represents an exemplary illustration of the difficulties associated with the empirical application of the pluralist model of “consociational democracy”. The... more
This dissertation seeks to map, compare, and interrogate the concept of desecuritization, as it has been developed in normative-political and empirical literatures, both within and beyond the Copenhagen School. Departing from the ordering... more
Yep, fuck it. Neoliberalism sucks. We don't need it.
The problem of use of private military and security companies (PMSC’s) today raises a number of questions on these companies’ role in world politics. Having an unclear status under International Law, PMSC’s are still playing an important... more
The General Data Protection Regulation (GDPR) harmonizes personal data protection laws across the European Union, affecting all sectors including the healthcare industry. For processing operations that pose a high risk for data subjects,... more
The new information technology is becoming an important factor in the future development of financial services industry, and especially banking industry. Growing international trading and problems in transferring money have motivated... more
Disgruntled students may become motivated to carry out ricin attacks on University of California campuses. The poison has already been discovered on several US campuses, signaling that it is easy to obtain, and increased tensions between... more
Across the globe, states have attempted to contain COVID-19 by restricting movement, closing schools and businesses, and banning large gatherings. Such measures have expanded the degree of sanctioned state intervention into civilians'... more
Emerging with increased intensity since the 1990s, peace-building and reconstruction of post-conflict and war-torn societies have become central to today's international relations and assistance agendas. When we are talking about... more
Mientras los organismos multilaterales parecen ser incapaces de utilizar los avances tecnológicos para identificar y culpar a los responsables del fraude fiscal mundial -estimado en un mínimo de 130.000 millones de euros por año (Zucman,... more
—A study is presented that examines the distribution and the usage of some unsafe functions that are known to cause security vulnerabilities in 15 software systems, written in C/C++. The systems are commonly used for mobile computing, and... more