non-traditional security in the post-cold war era

non-traditional security in the post-cold war era

388 Pages · 2013 · 2.95 MB · English

The growing salience of non-traditional security concerns for the post-Cold War national security of western states have given me the best gift a parent can: the knowledge that there is no achievement in the world that superiority (rather than quantitative) over their key opponent, the Soviet Uni

non-traditional security in the post-cold war era free download

i NON TRADITIONAL SECURITY IN THE POST COLD WAR ERA: IMPLICATIONS OF A BROADENED SECURITY AGENDA FOR THE MILITARIES OF CANADA AND AUSTRALIA by LEANNE JENNIFER SMYTHE MA, University of Kent (Canterbury), 2005 BA (Hon), Trinity Western Univers ity, 2003 A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY in THE FACULTY OF GRADUATE STUDIES (Political Science) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) April 2013 © Lean ne Jennifer Smythe, 2013 ii ABSTRACT The growing salience of non traditional security concerns for the post Cold War national security of western st ates has led this author to ask : What implications does the p ost Cold War proliferation of “security” threats, and therefore, the securitization of non traditional challenges, hold for the primary security institution of the state, namely, the military? Using the research design of a heuristic case study, this project seeks to answer this question through the meth odology of process tracing, relying on document analysis and semi structured elite interviews for data This dissertation first argues that the category of “non traditional” security concerns can be separated into three “types”: (1) Fragile and Failing St ates, (2) Global Terrorism, and (3) Transnational Political Challen ges Using this framework, the dissertation then examines two cases , which are the national security strategies of Canada and Australia throughout the post Cold War Era For each case, the impact of the securitization of no ntraditional security concerns is analyzed with relation to defence policy, military doctrine, force structure, and operational outputs It concludes that both militaries have been significantly impacted by the securit ization of non tradition al security concerns during the post Cold War Era, although the securitization processes and policy outcomes have been different in each case iii PREFACE This project w as supervised by Dr Brian Job and support ed by two committee me mbers, Dr Kati a Coleman and Dr Michael Byers, all at the University of British Columbia These individuals provided guidance throughout the p roject and editorial comments on the final drafts All primary research, including document analysis and the co nducting of interviews , as well as the subsequent analysis and writing, was undertaken and compl eted by myself This project received ethics approval from the UBC Behavioural Research Ethics Board, certificate number H10 02078 iv TABLE OF CONTENTS ABSTRACT ii PREFACE iii TABLE OF CONTENTS iv LIST OF TABLES viii LIST OF FIGURES ix LIST OF ACRONYMS x ACKNOWLEDGEMENTS xii DEDICATION xiii INTRODUCTION 1 Contribution to the Field 2 Structure of the Dissertation 5 Conclusion 7 PART I: FOUNDATIONAL IDEAS 8 CHAPTER 1: NON TRADITIONAL SECURITY 8 The Nature of Security in the Post Cold War Er a 8 The Definition of “Non Traditional Security” 16 Constructed Nature of Security Threats 28 Implications of a Broadened Security Agenda for the Military 40 Conclusion 51 CHAPTER 2: RESEARCH DESIG N AND METHODOLOGY 53 Scope Conditions 53 Policy Creation and Translation: A Model 60 Research Methodology and Data Gathering Tools 62 Case Study Selection 67 Examining the Research Project: Caveats 69 Conclusion 71 CHAPTER 3: STRATEGIC CULTURES OF CANADA AND AUSTRALIA 72 Strategic Culture Framework 73 CANADA 74 The Canadian Strategic Context 74 v Analysis: Canadian Strategic Culture and NTS 87 AUSTRALIA 90 The Australian Strategic Context 90 Analysis: Australian Strategic

------------- Read More -------------

Download non-traditional-security-in-the-post-cold-war-era.pdf

non-traditional security in the post-cold war era related documents

A Typology of Victim Characterization in Television Crime Dramas

33 Pages · 2010 · 278 KB · English

her analysis of one season of Law & Order, NYPD Blue, and The Practice. She found that only

Immigration and Economy in the Globalization Process

236 Pages · 2002 · 1.63 MB · English

will need employees with the right skills and motivation. Switching to an active im- Finland by analyzing the development of the volume of foreign-born and foreign na- tionals and direct foreign . In the globalization trend of corporations, competition has shifted from natural re- source and expen

International Student Guide for Employment in the US

19 Pages · 2012 · 741 KB · English

Problem- If you do not speak English as a native language, you are at a distinct disadvantage communicating with recruiters. Solution- Consciously make an effort to talk with Americans: • Make presentations, take English courses, and work tirelessly at improving your English skills. • Ask a fel

Assistance and Accountability in Externally Managed Schools

37 Pages · 2008 · 263 KB · English

Edison Schools, Inc., is the largest and most visible among a growing number of. Education Management profit EMOs were managing 521 public schools serving nearly 240,000 students across the United . educational services; and management consulting under the “Edison Alliance” flag, through 

22 NAVAJO NATION COUNCIL | Office of the Speaker

2 Pages · 2013 · 295 KB · English

Law and Order Committee receives update regarding and an additional amount of $1.4 million to ensure operation through operations through the winter season.

The European Car Parking Sector Sees M&A Flurry, But Will It Be An Easy Ride For Investors?

11 Pages · 2017 · 813 KB · English

The European Car Parking Sector Sees M&A Flurry, But Will It Be An Easy Ride For Investors? Dec. 6, 2017. 2. Despite lots of M&A activity in the. European car parking sector, the future is somewhat uncertain. Acquisitions are the major growth catalyst for operators, but

constraints facing the implementation of the greater new orleans urban water plan

5 Pages · 2015 · 480 KB · English

IMPLEMENTATION OF THE GREATER. NEW ORLEANS URBAN WATER PLAN. Annabel Visschedijk en Frans van de Ven*. On September 6th of last year the Greater New Orleans Urban Water Plan. (UWP) was presented. A comprehensive plan which addresses flooding caused by heavy rainfall and 

Using Geographic Locations in BIM Models

22 Pages · 2016 · 2.58 MB ·

Configure Building Location in Architectural Revit Model coordinates file (in XML format) from Autodesk® AutoCAD® Civil3D®. The XML file is then As we said earlier, you can set up two different Revit family types for spot 

2) Install Mac OS X 10.6 Snow Leopard on the new partition

1 Pages · 2011 · 9 KB · English

1) Create a partition for Mac OS X Lion Download Mac OS X 10.6 (Snow Leopard) off of iTunes or insert the Snow Leopard DVD Launch Disk Utility

Word-Level Language Identification and Predicting Codeswitching Points in Swahili-English ...

9 Pages · 2016 · 136 KB · English

Proceedings of the Second Workshop on Computational Approaches to Code Switching, pages 21–29,. Austin, TX, November 1, 2016. cO2016 conveys meaning (Myers-Scotton, 1993b). A model should be able to see this Solorio and Liu look at English-Spanish codeswitching in a relatively small