To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Once women’s appearance in public space is accepted, the tensions concern how they appear. Self-representations of gender identity are performed in part through differences in hejab (required modest clothing) and bodily comportment, varying from women in chadors moving through the traditional local spaces of the bazaar to secular cosmopolitan women styling their own performance of transnational independence. But women asserting their presence in public face harassment and the threat of violence, especially when stepping into the street, using public transportation, and asserting their right to social and spatial mobility. Vigilantes (the serial killer Saeed Hanaei, the “Spider Killer”) and gangs (the “Black Vultures” and the “Wolves”) targeting women can defend their attacks as morally justifiable, while the government has initiated programs of “social security” that primarily have sought to control deviations from approved forms of hejab. Nonetheless, women insist on their right to the city and their freedom to be fully present as women in public, whether by negotiating their personal space in a taxi or challenging the arguments of their attackers face to face.
Chapter 1 analyzes the recordkeeping practices established in Kenya during the Emergency through the reorganization of colonial intelligence services. This chapter explores the connection between the British paranoia against Mau Mau fighters in particular and Kikuyu-speaking peoples in general and the administration’s anxious obsession with recordkeeping and the maintenance of Emergency secrets. Following a discussion of key terms and contexts, such as the colonial concept of information management and the Emergency period, this chapter situates the “migrated archives” in the colonial politics of concealment.
The mandate informs the mediators about key issues required to be able to design a peace accord with lasting qualities. This chapter discusses some of the procedural issues, such as the timing of ceasefires and questions of partial versus comprehensive agreements: Should all issues be negotiated or some left for future processes? A particular issue is the demand for territorial self-government or even complete independence. It seems that Nordic mediators have been influenced by previous experiences in this regard. Examples are given from the Oslo Process, Kosovo, Guatemala, Sudan, and Northern Ireland. The chapter addresses matters of power sharing and the importance Nordic mediators give to the role of women in negotiations and implementation. Human rights, justice, and security for the parties are discussed.
Welfare regime theory remains a central framework in social policy literature, valued for its theoretical insights and policy relevance. However, as this framework is increasingly applied to countries in the Global South, scholars have questioned whether all contexts fit neatly into the established welfare regime types. Recent contributions suggest adopting a hybrid lens, which recognizes that welfare arrangements often vary within the same country, with different populations experiencing distinct forms of social protection. This study contributes to this evolving debate by exploring the development of Iraq’s welfare system and proposing a hybrid classification within the welfare regime framework. We argue that Iraq functions as a hybrid welfare regime, where access to welfare and social protection is unevenly distributed across different segments of society. In doing so, the study extends welfare regime theory by classifying Iraq as a case of hybrid welfare regime and highlights the importance of hybrid welfare models for understanding welfare systems in the Global South.
Sir Thomas More’s Utopia provides an occasion to delve into how fiscal policy and administrative activity constitute forms of worldmaking. This chapter argues that More’s Utopia places the challenges of defining and funding security at the center of its project, both in Book One’s critique of contemporary rule and in Book Two’s thought experiment about how to govern security. Utopia, as an alternative to contemporary Europe, can be seen as an attempt to resolve the fiscal security dilemmas besetting European governments by eliminating private property and money. The presence of other polities, though, complicates the effort to imagine a world in which security is distributed equitably, a world without fiscal conflict or the violence that monarchical wealth enables. Utopia thus provides both a powerful diagnosis of the shortcomings of contemporary governmental practice and a meditation on the limits of the ability to govern security.
Chapter 6 situates John Milton’s major works – Paradise Lost, Paradise Regained, and Samson Agonistes – in relation to abiding conflicts over fiscal policy prompted by the Civil War and its aftermath. Milton was actively critical of the Commonwealth’s management of fiscal policy and voiced his fear about the fiscal impact of a restored monarchy. Though fiscal concerns are largely occluded from his poetry, Milton’s depiction of war and its effects continues this critique by dramatizing the disastrous consequences of security imaginaries organized around the violently expansive accumulation of wealth. Milton’s metasecurity dilemma arises in his poetry as a question about how to value people and circumstances correctly, about the relevant criteria to use to orient oneself ethically and politically within catastrophic realities. His poems thus highlight Milton’s deep uncertainty about how to define safety or about what kinds of collective security might be possible in such a disoriented moment.
Chapter 5 examines how George Herbert confronts the profound limits on human capacities to create worldly security. The security dilemmas Hebert addresses derive from a tension built into the basic organizing metaphor of his theological vision, an understanding of God as a king. On the one hand, Herbert understands faithful devotion to require a perpetual payment of praise. Herbert offers his poems as a kind of fiscal payment, a mode of praise and devotion that he wishes, in turn, to correspond with divine protective care. On the other hand, Herbert’s fiscal theology must accommodate a God whose care frequently manifests as affliction and who understands worldly security as antithetical to faith. This chapter focuses on how Herbert confronts the disconnect between these distinct definitions of security and strives to reconcile God’s sovereign concern for his subjects’ eternal salvation and the need for protection and care in this world.
The cessation of the Russian Federation’s membership in the Council of Europe (CoE) under Article 58 of the European Convention on Human Rights (ECHR) and Article 8 of the Statute of the CoE is an important decision in the wake of Russian aggression against Ukraine involving serious human rights violations. Consequently, Russia’s disengagement from CoE mechanisms means Russians and other victims of human rights abuses seeking justice are no longer protected by the ECHR, as of September 16, 2022, thus affecting the human rights protection framework in Europe amidst the war. This implies that Russia no longer has a judge in the European Court of Human Rights (ECtHR) under Article 20 of the ECHR. Its citizens will no longer be able to appeal against their government to the ECtHR under the individual ECHR applications mechanism, raising serious concerns about Russians’ lack of access to the ECtHR and the non-implementation of ECtHR judgments, which tests the reach and resilience of Europe’s human rights framework in protecting peace and security in the region.
In this context, the authors argue that since the ECtHR no longer exercises its jurisdiction in Russia, it is necessary to analyze the Rome Statute’s role in this regard. A possible solution can be found in European Union (EU) nations undertaking national investigations through mutual partnerships against the individuals who have committed atrocities of international concern, such as crimes against humanity or war crimes, based on the principle of international jurisdiction, to reestablish international peace and security.
Taxation was a central challenge for England's rulers during the Renaissance, and consequently became a major theme for some of the period's greatest writers. Through close readings of works by Thomas More, Christopher Marlowe, William Shakespeare, George Herbert, and John Milton, David Glimp reveals how these writers and others grappled with the period's expanding systems of taxation and changing understandings of collective security. Such debates involved questions of political obligation, what it meant to be safe, and the nature of political community itself. Challenging dominant understandings of Renaissance sovereignty, Glimp explores in greater detail than ever before how early modern authors thought about and engaged the fiscal realities of government. From Utopia to Paradise Lost, his groundbreaking analysis illuminates how Renaissance literature addressed concerns about fiscal policy, state power, and collective wellbeing and will appeal to scholars of Renaissance literature, political theory, and economic history alike.
Edited by
Grażyna Baranowska, Friedrich-Alexander-Universität Erlangen-Nürnberg,Milica Kolaković-Bojović, Institute of Criminological and Sociological Research, Belgrade
In September 2023, the United Nations Working Group on Enforced or Involuntary Disappearances (WGEID) joined the numerous Special Procedures of the Human Rights Council which, over the past decade, analysed the subject of the human rights impacts of new technologies and it published a thematic study on ‘new technologies and enforced disappearances’. The Chapter briefly presents the gestation and contents of the study, but its main aim is to analyse the role played – if any – by new technologies, and in particular digital, information and communication technologies, in the regular activities of the WGEID, with a view at identifying innovative methods to carry out its mandate. The functions of the WGEID are illustrated, together with the opportunities that new technologies may offer to perform them. The challenges currently posed to the WGEID and its ‘counterparts’ by the use of new technologies in terms of security, verification and accessibility are also considered. The concluding remarks offer a reflection on how some of the findings and observations made with regard to the WGEID could be relevant also for the work of the Committee on Enforced Disappearances.
Chapter 1 is the introductory chapter. It introduces the reader to the two seemingly complementary global imperatives of ‘dealing with the past’ and ensuring non-repetition of mass atrocities. The chapter sets up a conundrum about transitional justice, ontological (in)securities, and non-recurrence. It then proceeds with a summary of the book’s key questions and core arguments. The chapter subsequently puts forward a brief history of the evolution of transitional justice as a global project, a vehicle of peace as well as security, discussing the claimed intersections between transitional justice and ‘Never Again’. This is followed by brief notes on methodology and contributions of the book. In outlining the contributions, the chapter demonstrates how the book interacts with and enriches scholarly knowledge in the field of transitional justice as well as in ontological security studies. Finally, the chapter introduces the outline of the book with brief chapter summaries.
Chapter 5 continues to explore the connections and disconnections between the transitional justice project and non-recurrence of conflict in Bosnia and Herzegovina (BiH). It proposes that education can make or break meaningful assurances of conflict non-recurrence. The chapter demonstrates how ethnically segregated history teaching in BiH plays a key role in the maintenance of a post-conflict status quo which has frozen certain anxieties around the uncertain future of peace in the country. Further, the chapter posits that the global project of transitional justice, while not responsible for the burgeoning ethnonationalism, has actively made bad situations worse with its short-sighted security priorities and general misunderstanding of security as lived experience. In particular, the chapter focuses on how and why the International Criminal Tribunal for the former Yugoslavia undertook a role of an educator of the BiH youth and public and how the advocates of the transitional justice project have ignored the complexity of the prevention needs of the BiH society.
While often described as a unified process imposed by external actors on weak, conflict-ridden countries, international state building increasingly comprises a variety of actors involved in different ways in (re)building a diverse set of institutions. Civilian preferences are often excluded from this fragmented environment. We identify and explicate three dimensions along which postconflict state building meaningfully varies: the actor involved, the type of institution targeted, and the form of involvement. We then examine how variation along each dimension impacts civilians’ state-building preferences with two rounds of original survey experiments fielded in Liberia. We find that Liberians largely prefer state-building processes overseen by a subset of international actors; that they prefer state building focused on security-oriented institutions over non-security-oriented institutions; and that different forms of involvement in the process meaningfully influence their preferences. We also find that these preferences depend on civilians’ characteristics. Ultimately, we provide an initial, conceptual mapping of the diversified landscape of international state building, as well as an empirical “unpacking” of the conditions that may shape civilians’ preferences toward the process.
The rise of antagonism between the German and Czech nationalist activists in the mid-19th century has been neither clearly explained nor convincingly dated. Although this is a topic closely linked to the history of nationalism, the state of research has paradoxically been misguided by the nationalist approach adopted by historians analyzing it. The reason is that nationalism was not the cause but just one response to a greater phenomenon. The aim of the article is therefore to clarify the German-Czech relationship in the broader context of European history and the history of international relations using the perspective of geopolitics and security. As it claims, it was not cultural, linguistic, or constitutional issues but the fear of external threats that caused the mutual distrust of political activists that led to hostility and conflicting policies. Under the impact of international events and within the context of their relations to other international actors this process originated in 1839 by the latest. During subsequent years it developed rapidly and became obvious during the 1848 revolutions. The article thus reveals that this year did not represent the beginning but merely another chapter in a process that had begun nearly a decade earlier.
Technological developments and affordable price structures have increased the usage of unmanned aerial vehicles (UAVs) across almost all sectors, hence increasing demand. Since UAVs can fly and perform various tasks without requiring a human operator, the most dangerous and time-consuming tasks previously performed by humans in many sectors are now accomplished by using UAVs. The increased use of UAVs has also introduced critical safety and security risks, including airspace congestion, collisions and malicious use, and therefore, identifying and assessing the risks associated with UAVs and finding ways to mitigate them is of great importance. This qualitative study investigates the safety and security risks posed by the increased use of UAVs and discusses ways to mitigate these risks. Semi-structured interviews with aviation professionals, including pilots, air traffic controllers and academicians, were conducted, and the collected data were analysed by using MAXQDA 24 qualitative analysis software. The results indicate that 86% of participants emphasised air traffic density as a major safety concern, while 71% underlined the need for dedicated air corridors and robust legal frameworks to reduce collision risks. These insights suggest that the safe integration of UAVs into current aviation systems demands a multifaceted strategy involving regulatory interventions, such as clearly defined UAV flight zones and essential technological enhancements. Overall, the study underscores the urgent need for coordinated efforts–legal, technological, and inter-institutional–to ensure the secure incorporation of UAVs into national airspace.
The intense search for security has, over the past half-century, become increasingly contradictory in the context of the current global unsettling. The techno-scientific search for increased security is now generating circles of increasing insecurity. This chapter is concerned to understand the foundational unsettling of that world space and its consequences for human security in general, including increasing ontological insecurity. The earliest and most dramatic example of this process is the nuclear revolution. With the dropping of the atomic bomb on civilians towards the end of World War II, the search for an ultimate weapon of mass destruction that would end the war created the conditions for escalating insecurity. The chapter documents elements of this process but, more importantly, seeks to broaden the usual emphasis, drawing the mechanics of military security into encompassing questions of human security (see also Chapter 8 on human security). The chapter draws parallels between the areas of nuclear security, anti-terrorist security, drone assassinations, and biosecurity to document the unsettling of the meaning and practice of contemporary global attempts to securitise.
This chapter deals with cash (banknotes and coins), the oldest and most traditional form of money in existence. Cash involves a paradox: On the one hand, it is technologically less advanced that modern means of payments like cards and apps, so one could presume that it should decline in use and eventually disappear. On the other, however, evidence for almost the whole world shows that the demand for cash is increasing, although it is used less frequently for certain types of transactions like online commerce, retail stores, and restaurants. Criminal activities may explain part of the puzzle, but not much. One advantage of cash is that it can be seen and touched, therefore appealing to the senses and conveying a sense of security. Another is that it ensures absolute privacy of transactions. Other important characteristics explaining the popularity of cash are that it is simple (it requires no technology or complication whatsoever); definitive (it instantly settles any financial obligation); private and personal (it appeals to the desire of confidentiality); and self-sufficient (it does not depend on any other infrastructure functioning). We conclude therefore that physical cash is a useful complement of a robust and diversified monetary system, in which digital means of payments gradually prevail.
In many areas experiencing severe impacts from climate change, it is not the state, but rather rebel groups who wield authority over populations. Rebels are often engaged in responding and adapting to the risks and impacts of climate change as part of their local governance efforts; however, a systematic consideration of the activities and implications has been lacking. This Element looks at a set of behaviors we call 'rebel environmental governance' (REG+). This refers to rebel actions aimed at protecting or managing the natural environment to affect civilian welfare amidst increasing pressures of climate change. A framework is advanced for understanding why rebels engage in environmental governance and the implications for security and climate governance. The Element brings rebel organizations into the conversation on climate change, highlighting their role in areas where state power is contested, weak, or absent. This title is also available as Open Access on Cambridge Core.
This chapter theorizes payment infrastructures as crucial material sites of hegemonic power in three different regards. First, the material form of payment technologies and the uneven routes of circulation produced by them are an integral part of the ways in which modern money and finance exercise power. Payment technology is not a neutral infrastructure, but a carrier of hegemonic power and potential site of hegemonic contestation. Second, payment infrastructure is inextricably connected to state security and sovereignty. State security and sovereignty were enabled and made durable with and through the payment infrastructure. Third, infrastructures are historically durable, though they may be rerouted or reinscribed. This chapter distills three elements that typify the hegemonic power of infrastructure and that can be used when taking “infrastructure” as the starting point for analysis. These elements are (1) sedimentation, (2) reach, and (3) disposition. The arguments are illustrated empirically by reference to the so-called financial war on terror, where financial infrastructures became a major but highly depoliticized site of security power. Empirically, this chapter focuses on the way in which the payment technology SWIFT and financial transactions are being appropriated for security purposes.
1911 to 1935 was a chaotic, yet foundational, period in the transformation of the police force in Tehran and Iran more broadly. The nationalization of modern Iranian policing can be traced back to this time period. This article explores the role of nationalism and anti-imperialism on policing, how the structure and process of policing underwent transformation, including how police were recruited, trained, and deployed. Localized and decentralized policing was slowly abandoned in favor of an integrated national force, with policing through mediation being replaced with the exercise of power in a top-down and center to periphery manner. Education of police officers also underwent transformation, as new strategies were pursued to create a modern nationalist Iranian police force.