The main purpose of this article is to identify a common basis for Japan and India as maritime democracies to work together for the maintenance and enhancement of the rules-based liberal ...international order at sea in the face of a variety of challenges in the Indo-Pacific region, China's maritime advancement in particular. As powerful maritime democracies in the Indo-Pacific, Japan and India will be able to engage in a wide variety of maritime security cooperation. The opinions of security experts of both countries should be mustered so that bilateral cooperation keeps up its momentum. Synergy of Tracks 1, 1.5 and 2 dialogues should be pursued for maritime security cooperation. In this bilateral effort, the US-centred alliance network, of which the Japan-US Alliance is the central portion, and India's autonomous and multi-directional approach toward international security must be intertwined effectively. Also, security dialogues between the two countries and between the two navies should work out the division of labour between Japan and India to contribute to the Indo-Pacific regional maritime security more effectively.
Extremely important for Europe, the Black Sea region is an important meeting point for the East-West Corridors and the North-South Corridor. Control of the Black Sea could easily dominate continental ...Europe, especially the Balkans and Central Europe, as well as the Eastern Mediterranean, the South Caucasus, and the northern Middle East. There are three NATO members in the region (Bulgaria, Romania, and Turkey) and several NATO partner countries, so any instability or hostility in the region will directly affect the actions of the Alliance. In Warsaw, at NATO summit in July 2016 allied leaders stated that the actual policy of Russia that has reduced stability and security, increased unpredictability, and changed the security environment. The security of this special area is vital to trade and the prosperity of the whole region. At present, the geopolitical model of the Black Sea is complex and changing, so we are witnessing the redesign of the world order in the near future. The aim of the study is to analyze the model of threat balance theory developed by Stephen Walt from a quantitative and qualitative perspective and its adaptation through the author's vision to the context of the Black Sea region using advanced statistical methods to present the model customization for countries from this region. The statistical methods used (multidimensional scaling with Euclidean distance analysis based on scores obtained on a Likert - Osgood scale) for quantitative and qualitative analysis are complemented by a research desk analysis of data from official sources. The study will have two parts, respectively (I) The situation until 2021 which contains data for the period 2019-2021 inclusive and (II) The situation after 2021 which will contain data as well as the presentation of the situation starting with 2022 which will be published later. The intrinsic value of the whole study is given by the fact that it puts on the map the strategic security analysis in the Black Sea region, the model of the theory of threat equilibrium developed by Stephen Walt. The Black Sea region is still an important area of competition. This confrontation and the threat it poses can develop to the point where they will eventually push the world to the brink of a new war, but these issues can be resolved through diplomacy and calm, which is vital to the stability of the region.
In this era when the geopolitical center of gravity is shifting to Northeast Asia where a strategic competition between great powers is resurgent, there are new opportunities for cooperation in the ...region in spite of significant challenges. In order to overcome traditional tensions, ongoing disputes, and struggles over hegemony in the region, it is necessary for the countries of the region to change the way they think and act. In that regard, it would be beneficial to develop some form of multilateral cooperation that promotes peaceful coexistence and mutual prosperity. By scrutinizing the current situation with an eye to the requirements and variables of building a multilateral security cooperation architecture, this article analyzes why Northeast Asia has yet to establish such a framework and tries to determine whether the region has the potential to do so. It concludes that while South Korea, Japan, and Russia are in favor of a multilateral approach, the United States, China, and North Korea are less enthusiastic about the idea. However, the United States and China recently have developed a basis for multilateral security cooperation from their experiences, especially in North Korean issues. A related question is how the countries involved would institutionalize cooperation. This analysis concludes that the best approach would be to start with a small but specific undertaking based upon existing architectures that can utilize existing resources. This idea can be realized by first holding a regional summit to discuss common security issues.
How do western states respond to real or perceived security threats? Do they tend to respond to the same threat in haphazard ways, or does their response follow similar patterns? By analysing the ...response to a number of diverse contemporary threats - the Crimean crisis, North Korea's nuclear proliferation, climate change and the 2014-2016 Ebola epidemic - this article shows that the security responses by different western states to the same threat tend to be consistent across states, while they also tend to follow a seemingly self-evident pattern of behaviour. In light of these findings, the article suggests that the joint pursuit of security (for short: security cooperation) has replaced war as a primary institution at the western core of sub-global international society. In order to make this argument this article develops a new approach to analysing primary institutions: the practice-based method. While this method is inspired by Peter Wilson and Kilian Spandler's idea that practitioners' behaviour and rhetoric matters to institutional status, it draws analytical purchase also from Emanuel Adler and Vincent Pouliot's influential practice-based theory to International Relations.
Full text
Available for:
BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK
This article provides an analysis of less traditional forms of regional security cooperation in Africa through the case study of the Regional Cooperation Initiative for the Elimination of the Lord’s ...Resistance Army (RCI-LRA) in Central Africa. It explores the progress and shortcomings of this task force. It argues that although its successes were limited by its militarised mandate and approach, the operation has been largely effective in downgrading the threat status of the Lord’s Resistance Army. This example of regional cooperation offers important lessons for other arrangements which deal with similar threats. This type of response represents an emerging trend in security cooperation in Africa and it is clear that task forces of this structure are becoming more frequent in dealing with transnational violence as opposed to more traditional cooperative arrangements organised through the African Union’s African Peace and Security Architecture (APSA).
The Law of the Sea Convention (LOSC) is a veritable constitution of the oceans that was negotiated with the overarching objective of protecting the "common heritage of mankind". While the primary ...goal of developing countries was to protect their economic interests by seeking maritime areas with exclusive jurisdiction, the LOSC has a significant role in furthering maritime security cooperation among countries. The universally accepted trait of international cooperation in maritime security efforts requires a commonality of perception of threats and the legally acceptable ways in which they may be mitigated. In order to develop meaningful cooperative endeavours in maritime security, it is essential for India to develop a domestic legislative framework that supports its maritime security demands and promotes its standing as an upholder of the international order.
To address malicious attacks generated from wireless sensor networks (WSNs), in this paper, we study the difficulty of detecting uncoordinated behavior by using a model that is unreliable and has ...uncontrollable accuracy, trustless control, and an inextensible protocol. A security collaboration model involving coupled state vectors associated with topology control and time synchronization is proposed. The networks achieve synchronization using weights and by controlling the number of goals. The simple calculation of time synchronization values between neighboring nodes serves as the basis for judging the behavior of the node topology control. The coupling state vector calculation is the core of the model. The topology coupling strength rate, signal intensity reduction, clock drift, and clock delay are combined to form a comprehensive model. The network energy consumption is reduced by updating the coupling state vector regularly. The coupling cooperation threshold is set to make security decisions and effectively distinguish between attack nodes and dead nodes. Thus, to ensure the security and reliability of the network, we present a security cooperation collection tree protocol (SC-CTP) scheme that maintains a trusted environment and isolates misbehaving nodes. The simulation results show that the model can detect malicious nodes effectively, has a high detection rate, and greatly reduces the energy consumption of the whole network. In order to verify the effectiveness of the proposed model, a large-scale wireless sensor network with 200 nodes was deployed on a campus. The proposed model was applied to optimize the deployment of key nodes on the campus. Furthermore, a candidate set of these nodes were selected to achieve coupling cooperation of key goals. This test verified the reliability of the model, its customizable accuracy, and the reliability of the control.
PurposeRelations between the People's Republic of China and Latin America have gradually expanded from commerce and finance to cover different aspects of security. The purpose of this article is to ...provide an overview over security cooperation between China and South America. Specifically, it analyses the motivations for security cooperation on both sides and its value added for Sino–South American relations.Design/methodology/approachThe article describes four dimensions of security cooperation between China and South America: functional cooperation, defence diplomacy, long-term cooperation initiatives and arms sales. For each dimension of security cooperation, the main motivations on the two sides are discussed, together with the value added of security cooperation to the “comprehensive and cooperative partnership” China's policy papers on Latin America and the Caribbean have called for.FindingsSecurity and defence considerations have not caused the development of Sino–South American security cooperation. Instead, it were the rapidly growing economic links from the 2000s on that facilitated China's broader political engagement with South America, including in the field of security. There are a number of important motivations that indicate security cooperation between China and South American states will further expand in the future.Practical implicationsSecurity cooperation should not only be practiced as an end in itself but also serve tangible outcomes to reduce insecurity.Originality/valueIn the context of Sino–Latin American relations, security cooperation has received relatively little attention beyond a comparatively small group of pundits despite the fact that military diplomacy has become increasingly important in bolstering China's growing international profile. This article makes an original contribution in discussing four dimensions of security cooperation between China and South America.
Regional organisations (ROs) are increasingly important actors in managing regional and intrastate threats to peace and security, especially in Africa. The article introduces the Regional ...Organisations Security Activity Dataset for Africa (ROSADA), which encompasses military and non-military peace and security activities by all 24 ROs in Africa (1997-2016). Bridging the literature on comparative regionalism and international conflict management, ROSADA offers new insights into a broad spectrum of conflict management tasks such as mediation, sanctions, capacity building and military operations. The analysis indicates a considerable variation over time between different regions and subregions, and these activities are interconnected. ROSADA's broad conventionalisation of peace and security activities contributes to the analysis of complex regional engagement in peace and security affairs, especially concerning preventive measures and post-conflict peacebuilding. By using established coding standards and including detailed raw data, ROSADA is useful for a wide set of research agendas.
Full text
Available for:
BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK
This article explores how middle powers in the Indo-Pacific are engaging in a new type of diplomacy, one that includes lobbying, insulating, and rulemaking in the realms of security, trade, and ...international law, to protect their national interests from Sino-U.S. strategic competition.
Full text
Available for:
BFBNIB, NMLJ, NUK, ODKLJ, PNG, UL, UM, UPUK