Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29284


Select areas to restrict search in scientific publication database:
10004627
Human Security Providers in Fragile State under Asymmetric War Conditions
Authors:
Abstract:
Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.
Digital Object Identifier (DOI):

References:

[1] Addison Tony (2000). Aid During and After Conflict. Foreign Aid and Development: Lessons Learnt and Directions for the Future edited by Tarp Finn pp306-307, Routledge New York.
[2] Almond G & Coleman J.S. (1960). The politics of the developing areas. Princeton, NJ, Princeton University Press.
[3] Breakey, Hugh. (2012). ’The Responsibility to Protect: Game Change and Regime Change.’ Chap. 1 In Norms of Protection: Responsibility to Protect, Protection of Civilians and Their Interaction, edited by Charles Sampford, Angus Francis and Vesselin Popovski, 11-39. Geneva: United Nations University.
[4] CCOE (2012). CIMIC Field Handbook. Civil-Miitary Cooperation Center of Excellence, version 3. available at http://www.cimic-coe.org/wp-content/uploads/2014/06/CIMIC-Handbook.pdf
[5] Cooke Jennifer & Richard Downie (2015). Rethinking Engagement in Fragile States: A Report of the CSIS Africa Program. Centre for Strategies & International Studies. Available at https://www.ciaonet.org/attachments/27897/uploads?1439163785
[6] Corinne Delechat et al (2015). Existing from Fragility in sub-Saharan Africa: The Role of Fiscal Policies and Fiscal Institutions. IMF. available at: http://www.imf.org/external/pubs/ft/wp/2015/wp15268.pdf
[7] Doucouliagos Hristos & Paldam Martin (2009). The Aid Effectiveness Literature: The Sad Results of 40 Years of Research. Journal of Economic Surveys. vol 23, issue 3.
[8] Federation of American Scientists. Guide to the Analysis of Insurgency. available at https://fas.org/irp/cia/product/insurgency.pdf
[9] Fouberg Erin ed. (2012). Nationalism. edited book: 21st Century Geography: A Reference Handbook, editor: Stoltman Joseph, SAGE: LA, pp189-190.
[10] Galula David (1964). Counter Insurgency Warfare: Theory and Practice. Frederick Praeger NY. pp 66.
[11] General Assembly, UN (2005). Res. 60/1: World Summit Outcome Document, A/Res/1, 16 Sept. 2005.
[12] Gha Admin (2010). Humanitarian aid in conflict: More money, more problems? Global Humanitarian Assistance. available at: http://www.globalhumanitarianassistance.org/humanitarian-aid-in-conflict-more-money-more-problems-561.html
[13] Hobbes, Thomas. (2001). Of Man, Being the First Part of Leviathan. Vol. XXXIV, Part 5. The Harvard Classics. New York: P.F. Collier & Son, 1909–14; Bartleby.com.
[14] ICISS (2001). The Responsibility to Protect. Report of the International Commission on Intervention and State Sovereignty. available at http://responsibilitytoprotect.org/ICISS%20Report.pdf
[15] Institute for Development and Peace (2006). Human Security on Foreign Policy Agendas: Changes, Concepts and Cases. Eds Debiel Tobias & Werthes Sascha. INEF Report, available at http://edoc.vifapol.de/opus/volltexte/2013/4527/pdf/report80.pdf
[16] ISI (1972). David Easton’s Political Theory. Political Science Reviewer. available at https://home.isi.org/search?search_api_multi_fulltext=easton
[17] Massingham Eve (2009). Military intervention for Humanitarian purposes: does the Responsibility to protect doctrine advance the legality of the use of force for humanitarian ends? International Review of the Red Cross. Vol 91, no 876, Dec. 2009.
[18] McCord Geoffrey (1999). Contemporary Contractarian Moral Theory. The Blackwell Guide to Ethical Theory edited by Hugh Lafollette, pp 247-267. available at: http://philosophy.unc.edu/files/2014/07/Contractarianism.pdf
[19] NATO (2011). Allied Joint Doctrine for Counterinsurgency (COIN) - AJP-3.4.4. North Atlantic Treaty Organisation, NATO Standardisation Agency (NSA).
[20] O’Neill Bard (2005). Insurgency &Terrorism: From Evolution to Apocalyps. Potomac Books, Washington D. C. 2nd ed. pp 19-29.
[21] OECD. (2015). States of Fragility 2015: Meeting Post-2015 Ambitions. OECD Publishing, Paris. Available at http://www.oecd.org/dac/governance-peace/publications/documentuploads/SOF2015.pdf
[22] Perrin Pierre (1998). The Impact of Humanitarian aid on conflict development. International Review of the Red Cross, no 323.
[23] Ramsbothan Oliver et al (2011). Contemporary Conflict Resolution, 3rd ed. Polity Press UK. pp25.
[24] Scott Rachel (2014). Imagining More Effective Humanitarian Aid: A Donor Perspective. OECD Development Cooperation Working Paper. available at http://www.oecd.org/dac/Imagining%20More%20Effective%20Humanitarian%20Aid_October%202014.pdf
[25] Stewart & Brown. (2009). Fragile States, CRISE Working Paper no 51. CRISE Centre for Research on Inequality, Human Security and Ethnicity. available at http://r4d.dfid.gov.uk/PDF/Outputs/Inequality/wp51.pdf
[26] Tadjbakhsh & Chenoy. (2009). Human Security: Concepts and implications. Routledge, London.
[27] Tadjbakhsh Shahrbanou (2010). Human Security beyond Responsibility to Protect. Revista Espanola de Desarrollo y Cooperacion, no 26, vol 2, pp13-37.
[28] Tilly Charles. (1985). War Making and State Making as Organised Crime. Bringing the State Back in, edited by Peter Evans, Dietrich Rueschemeyer and Theda Skocpol. Cambridge: Cambridge University Pres. pp169-191, available at http://globalization.qwriting.qc.cuny.edu/files/2010/09/warmaking3.pdf
[29] Ucko David & Egnell Robert (2014). Options for Avoiding Counterinsurgencies. On Military Interventions 44(1). available at:http://www.strategicstudiesinstitute.army.mil/pubs/Parameters/issues/Spring_2014/2_UckoEgnell.pdf
[30] UN (2006). The Rights of Non-Citizens. United Nations: New York and Geneva. available at http://www.ohchr.org/Documents/Publications/noncitizensen.pdf
[31] UNDP (1993). Human Development Report 1993. United Nations Development Program, available at http://hdr.undp.org/sites/default/files/reports/222/hdr_1993_en_complete_nostats.pdf
[32] United Nations Trust Fund for Human Security. (2009). Human Security in Theory and Practice: An overview of the Human Security Concept and United Nations Trust Fund for Human Security. United Nations: Human Security Unit, available at: http://www.un.org/humansecurity/sites/www.un.org.humansecurity/files/human_security_in_theory_and_practice_english.pdf
[33] US Army (2014). Insurgencies and Countering Insurgencies. Headquarters: Department of the Army: Washington DC, June 2014.
Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007