524 results on '"Border security"'
Search Results
2. Border Security and Surveillance System Using IoT
- Author
-
Reda Mohamed Hamou, Abdelmalek Amine, and Siham Boukhalfa
- Subjects
Computer science ,business.industry ,Border Security ,General Medicine ,Computer security ,computer.software_genre ,Internet of Things ,business ,computer - Abstract
Security along the international border is a critical process in security assessment; It must be exercised the 24x7. With the advancements in wireless IoT technology, it has become much easier to design, develop and deploy a cost-effective, automatic and efficient system for intrusion detection in the context of surveillance. This paper set up to set up the most efficient surveillance solution, we propose a Border Surveillance Systems and sensitive sites. this surveillance and security system is to detect and track intruders trespassing into the monitoring area along the border, it able which triggers off precocious alerts and valuation necessary for the catch of efficient measurements in case of a threat. Our system is based on the classification of the human gestures drawn from videos envoy by Drones equipped with cameras and sensors in real-time. All accomplished experimentation and acquired results showed the benefit diverted from the use of our system and therefore it enables our soldiers to watch the borders at each and every moment to effectively and at low cost.
- Published
- 2021
- Full Text
- View/download PDF
3. Patterns in nascent, ascendant and mature border security: regional comparisons in transgovernmental coordination, cooperation, and collaboration
- Author
-
Emmanuel Brunet-Jailly, Christian Leuprecht, Todd Hataley, and Tim Legrand
- Subjects
021110 strategic, defence & security studies ,Sociology and Political Science ,business.industry ,05 social sciences ,0211 other engineering and technologies ,02 engineering and technology ,International trade ,0506 political science ,Ascendant ,Political science ,Political Science and International Relations ,050602 political science & public administration ,Border Security ,business - Published
- 2021
- Full Text
- View/download PDF
4. Border security management in the MENA region: models of nascent and ascendant coordination and cooperation
- Author
-
Daniel Meier
- Subjects
Sociology and Political Science ,business.industry ,Political science ,05 social sciences ,Political Science and International Relations ,050602 political science & public administration ,0507 social and economic geography ,Border Security ,International trade ,business ,050703 geography ,0506 political science ,Ascendant - Published
- 2021
- Full Text
- View/download PDF
5. Security beyond the border: exploring Australia and New Zealand trans-Tasman relations in a globalised world
- Author
-
Jamie Ferrill, Tim Legrand, Haydn McComas, and Germana Nicklin
- Subjects
060104 history ,Sociology and Political Science ,Economy ,Political science ,05 social sciences ,Political Science and International Relations ,050602 political science & public administration ,Border Security ,0601 history and archaeology ,06 humanities and the arts ,Aotearoa ,Geopolitics ,0506 political science - Abstract
This article addresses contemporary security challenges related to borders within Oceania, focusing on trans-Tasman relations. We address border security between Aotearoa New Zealand and Australia ...
- Published
- 2021
- Full Text
- View/download PDF
6. Border security in Africa: the paradigmatic case of the Sahel as the embodiment of security and economy in borderlands
- Author
-
Thomas Cantens
- Subjects
021110 strategic, defence & security studies ,Sociology and Political Science ,Economy ,Political science ,05 social sciences ,Political Science and International Relations ,0211 other engineering and technologies ,0507 social and economic geography ,Border Security ,02 engineering and technology ,16. Peace & justice ,050703 geography ,Violent extremism - Abstract
African borders are weakened by the recent development of jihadist armed groups that compete with states and whose territorial control straddles several countries. This article draws on six Sahelia...
- Published
- 2021
- Full Text
- View/download PDF
7. TWO FACES OF THE BORDER: TURKEY-IRAN BORDER WALL AND ITS IMPACT
- Author
-
AKDEMİR, İlhan Oğuz and AKMAN, Emine
- Subjects
Political Geography ,Securitization ,Border ,Border Security ,Refugee ,Siyasi Coğrafya ,Güvenlikleştirme ,Sınır ,Sınır Güvenliği ,Mülteci ,General Medicine ,Social Sciences, Interdisciplinary ,Sosyal Bilimler, Disiplinler Arası - Abstract
The border is conceptualized as the 'homeland' because it encompasses the symbol of state sovereignty, the sanctuary of security, and the conceptual and ideal, which is a collective identity. Borders, as a geopolitical interruption, are 'at the center' of political geography studies. Therefore, Turkey's geographical location; Recently, the border security and securitization axis has formed the basis of the border thesis due to reasons such as a global actor, with Europe. In addition, especially with the increase in the effect of neoliberal policies, border regions; It has been the route of intense flow of goods, information and people. Limits; The place where the walls and barbed wires rise has turned into low-intensity conflict areas and this situation continues to exist as an important issue in the country's policies.Purpose: The main thesis and purpose of the research; The Turkey-Iran border model, which is frequently emphasized in border and refugee studies and practice, where all kinds of security measures are lacking in the axis of border security/securitization, and which will not interrupt the "border people" and their lives today and in the future, during the creation and security of the borders. is to explain in the example of the wall.Method: "Turner's frontier model", which did not accept the "Germanic germ theory" by objecting to the emphasis on racial or hereditary characteristics, centered the "western settlers' struggle for borders" as a transformative force. Later border studies continued to develop on the basis of security (Wisconsin School etc.). The study is built on a new border thesis called the "multidimensional border model", which is based on the logic of "border people" to continue their lives at the border today and in the future, which was created against the one-dimensional border models that create victims, and based on the logic of designing other border elements accordingly. The typical sample of the model is the predictions developed on the Turkey-Iran border wall data.Originality: It should be known that the border model, which is considered correctly on the one-dimensional “security” axis, will pose a risk for the border people and the future of the border in multidimensional multi-factor feasibility. In the research; The multidimensional positive and negative environments created by the walls built for the Turkey-Iran border security have been constructed together with the possible unforeseen negative scenarios, despite the predicted empirical results., Sınır, devlet egemenliğinin sembolü, güvenliğin kutsandığı sahalar ve kolektif bir kimlik olan kavramsal ve ideal olanı kuşatması sebebi ile ‘vatan’ olarak kavramsallaşmıştır. Jeopolitik bir kesinti olan sınırlar, siyasi coğrafya çalışmalarının ‘merkezindedir.’ Dolayısıyla Türkiye’nin coğrafi konumu; son dönemde küresel bir aktör, Avrupa ile gibi nedenlerden ötürü sınır güvenliği ve güvenlikleştirme ekseni, sınır tezinin temelini oluşturmuştur. Ayrıca özellikle neoliberal politikaların etkisinin artması ile beraber sınır bölgeleri; yoğun mal, bilgi ve insan akışının güzergâhı olmuştur. Sınırlar; duvarların, dikenli tellerin yükseldiği yer yer düşük yoğunluklu çatışma alanları haline dönüşmüştür ve bu durum ülke siyasalarında önemli bir konu olarak varlığını sürdürmektedir. Amaç: Araştırmanın temel tezi ve amacı; sınır ve mülteci çalışmalarında ve uygulamada sıkça vurgulanan, sınır güvenliği/güvenlikleştirmesi ekseninde alınan her türlü güvenlik önleminin eksik olduğu ve sınırların oluşturulması ve güvenliği aşamasında mutlaka “sınır insanlarını” ve onların günümüzde ve gelecekte yaşamlarını kesintiye uğratmayacak “çok boyutlu sınır modelini” Türkiye-İran sınır duvarı örnekleminde açıklamaktırYöntem: Irksal veya kalıtsal özelliklere vurgu yapılmasına itiraz ederek “Germen mikrop teorisini” kabul etmeyen “Turner’ın sınır modeli” dönüştürücü bir güç olarak “batılı yerleşimcilerin sınırlar için mücadelesini merkeze alıyordu. Daha sonraki sınır çalışmaları da güvenlik esasına göre (Wisconsin Okulu vb) gelişime devam etti. Çalışma mağdurlar oluşturan tek boyutlu sınır modellerine karşı olarak oluşturulmuş “sınır insanlarının” günümüzde ve gelecekte sınırda hayatlarını sürdürmesini merkeze alan ve diğer sınır unsurlarını da buna göre dizayn edilmesi mantığına dayalı “çok boyutlu sınır modeli” adı altında yeni bir sınır tezi üzerine bina edilmiştir. Modelin tipik örneklemi, Türkiye-İran sınır duvarı verileri üzerinden geliştirilen öngörülerdir. Bulgular: Sınır güvenliği mantığına dayalı uygulamalar, sınırlarda yaşayan nüfus düşünülmeden kurgulanmıştır. Türkiye-İran sınırına örülen duvar ile geçirgenliği ortadan kalkan ve sınır boyunca görülen “illegal, kaçak, gölge sınır ticareti” sınırlandırılmıştır. Böylece geçim kaynakları engellenen sınır insanları, iç bölgelere göç edecek, sınırda olması gereken güvenilir ve caydırıcı nüfus yoğunluğu azalacaktır. Kaldı ki sınırı terk eden göçmenler, büyükşehirlerde Türkiye’de yaşayan göçmenlerin Türk toplumunun sosyal ve kültürel yapısı için bir tehdit oluşturduğu ve göçmenlerin kriminalize edilerek, çeşitli suçlarla eşleştirilmesi gibi söylemlerle karşılaşacak, bu da farklı sorunları gündeme getirecektir.Özgünlük: Tek boyutlu “güvenlik” ekseninde doğru olarak düşünülen sınır modelinin, çok boyutlu çok faktörlü fizibilitelerde sınır insanları ve sınırın geleceği açısından risk oluşturacağı bilinmelidir. Araştırmada; Türkiye-İran sınır güvenliği için inşa edilen duvarların oluşturduğu çok boyutlu olumlu ve olumsuz ortamlar, öngörülen ampirik sonuçlarına karşılık, öngörülmeyen olası olumsuz senaryolar ile birlikte kurgulanmıştır.
- Published
- 2022
- Full Text
- View/download PDF
8. Border Security Meets Black Mirror: Perceptions of Technologization from the Windsor Borderland
- Author
-
Patrick C. Lalonde
- Subjects
Sociology and Political Science ,media_common.quotation_subject ,05 social sciences ,Geography, Planning and Development ,0507 social and economic geography ,Media studies ,Windsor ,0506 political science ,Political science ,Perception ,Political Science and International Relations ,050602 political science & public administration ,Border Security ,050703 geography ,Law ,media_common - Published
- 2021
- Full Text
- View/download PDF
9. Значення державного кордону для забезпечення правопорядку в Україні
- Author
-
Yurii B. Kuryliuk
- Subjects
Physics ,Border Security ,Humanities - Abstract
У статті наведено аргументи на підтримку позиції, згідно з якою державний кордон є першоосновою та цінністю правопорядку будь-якої держави, а відсутність державних кордонів утворює передумови для руйнування правопорядку як ззовні – шляхом безперешкодного поширення на територію держави тих негативних процесів, що безпосередньо впливають на упорядковані внутрішньодержавні відносини (нелегальна міграція, контрабанда наркотичних засобів тощо), так і зсередини – через безперешкодне незаконне переміщення людських ресурсів, культурних, матеріальних та інших позитивних надбань суспільства поза межі держави (контрабанда культурних цінностей, торгівля людьми тощо). Визначено, що відсутність належного правопорядку негативно позначається на ефективності системи охорони державного кордону, призводить до нехтування правовими основами прикордонної безпеки держави, постійних незаконних перетинань державного кордону чи руйнування інших упорядкованих внутрішньодержавних відносин у прикордонній сфері. Територіальне верховенство означає повну та виключну владу держави в межах власної території. Така влада здійснюється цілою системою державних органів. Саме ці органи мають зменшити вразливість (хаос і безладдя) неконтрольованого кордону, щоб поліпшити якість життя мешканців і законних підприємств і зменшити ризик для економічної життєздатності країни. Шлях для досягнення цього полягає в тому, що єдиний спосіб увійти до України – це через законні канали, а ті, хто порушує законодавство про державний кордон, обов’язково були би за це покарані. Державний кордон покликаний бути певним бар’єром для будь-яких загроз жителям відповідної держави, відтак нерозривно пов’язаний із поняттям національної безпеки, що мають забезпечувати ефективні органи правопорядку відповідного державного апарату.
- Published
- 2021
- Full Text
- View/download PDF
10. Muddying the waters: migration management in the global commons
- Author
-
Noora Lori and Kaija Schilde
- Subjects
International waters ,Political science ,Political economy ,media_common.quotation_subject ,Political Science and International Relations ,Deterrence (psychology) ,Global commons ,Border Security ,Interdict ,Liberal democracy ,Democracy ,media_common - Abstract
Advanced liberal democratic states interdict migrants on the High Seas global commons. Why have liberal states engaged in this practice over the past four decades? Deterrence and humanitarian rescue explain part of this puzzle, but they are insufficient for understanding the patterns and justifications for migrant interdiction on the High Seas. Tension between states promoting international human rights and circumventing those obligations challenges expectations of liberal state behavior. International relations scholars must incorporate the global commons when explaining state behavior; ungoverned areas create exceptional zones for states to partially suspend their standard operating procedures to execute policies furthering their interests. We argue that liberal states use the regulatory gray zones of the High Seas to ‘muddy the waters’ in order to advance their security interests. States with the highest domestic refugee protections have incentives to circumvent their own obligations, which vary over time with changes to domestic asylum laws.
- Published
- 2021
- Full Text
- View/download PDF
11. Współpraca transgraniczna państw Grupy Wyszehradzkiej na rzecz zapewnienia bezpieczeństwa granic
- Author
-
Tomasz Klepner
- Subjects
Business administration ,Border Security ,Business - Abstract
The Visegrad Group cross‑border cooperation to ensure border security The aim of this article is to present a comprehensive analysis of the Visegrad cooperation in the field of borders security. The paper presents both legal and institutional environment in which the Visegrad partners pursue their policy of safety management at the borders. A short historical background is presented, followed by expended examples of V4 achievements. The key issue, however, is whether the cooperation provides opportunities to ensure security effectively in practice. The case of the Visegrad Group will help to understand this practical aspect.
- Published
- 2021
- Full Text
- View/download PDF
12. Bangladesh-India border issues: A critical review
- Author
-
Saleh Shahriar
- Subjects
Sociology and Political Science ,Economy ,Range (biology) ,Political science ,05 social sciences ,Realm ,0211 other engineering and technologies ,0507 social and economic geography ,Border Security ,021107 urban & regional planning ,02 engineering and technology ,050703 geography - Abstract
I critically review the literature on the Bangladesh-India borderlands to raise a couple of questions: What are the major themes and issues on the Bangladesh-India border? What are the research prospects on the border issues between the two states? Bangladesh and India share a common border of 4096 km, with a range of cross-border issues determining their bilateral relationship and cooperation. Several border issues have not only clouded these relations but have also led to the exchange of fire between the two countries' border security forces over disputed territory. This contribution broadly reviews Bangladesh-India cross-border issues and specifically calls attention to Bangladesh-India cross-border relations in the realm of comparative border research, which will expand our socio-political, economic, geographic and cultural understandings of bordering practices and border policies.
- Published
- 2021
- Full Text
- View/download PDF
13. The Politics of Temporary Protection Schemes: The Role of Mexico’s TVRH in Reproducing Precarity among Central American Migrants
- Author
-
Carla Angulo-Pasel
- Subjects
Politics ,Precarity ,Sociology and Political Science ,Economy ,Political science ,05 social sciences ,Political Science and International Relations ,050602 political science & public administration ,0507 social and economic geography ,Border Security ,Central american ,050703 geography ,0506 political science - Abstract
Using Mexico’s Tarjeta de Visitante por Razones Humanitarias (TVRH) as a primary case study, this article examines how states can use temporary protection schemes as border security measures while claiming to provide protection. Although the TVRH offers a legal pathway and status to move within Mexico, it equally restricts certain rights due to its temporary nature. It becomes a form of differential inclusion by which the state has the right to be able to “exclude and define the limits” of a particular population but also claim inclusion on humanitarian grounds. Despite the claim of protecting migrants, the application of this regular status can essentially become a form of interdiction, which sustains the political framing of migration as ultimately a “threat” that needs to be governed. On the ground, migrants with these temporary regular statuses occupy a liminal space and live a precarious existence similar to those migrants who do not possess a legal status at all. This power imbalance exists more often as states prefer to grant a temporary immigration status, which ensures less responsibility and support that accompanies more rights and protections. Based on policy analysis and field work, the article will examine the TVRH, the processes for obtaining this legal status, and the consequences for irregular migrants.
- Published
- 2021
- Full Text
- View/download PDF
14. Forced migration management and politics of scale: how scale shapes refugee and border security policy
- Author
-
Josh Watkins
- Subjects
Forced migration ,Politics ,Public Administration ,Sociology and Political Science ,Scale (ratio) ,Refugee ,Political science ,Political economy ,Geography, Planning and Development ,Border Security ,Management, Monitoring, Policy and Law ,General Economics, Econometrics and Finance - Abstract
This article shows how politics of scale influence states’ conceptions and performances of asylum-seeker and refugee responsibility and risk. The resettlement and border security initiatives that r...
- Published
- 2021
- Full Text
- View/download PDF
15. Nigeria and Niger Republic trans-border management against arms trafficking: a whistleblowing model
- Author
-
Aminu Idris and Assel Tutumlu
- Subjects
Value (ethics) ,Information asymmetry ,Strategy and Management ,Corporate governance ,Political science ,Ethnography ,Border Security ,Participant observation ,Public administration ,Law ,Safety Research - Abstract
While studies have explored how the porosity of the Nigeria–Niger Republic border has fuelled the insecurity in Nigeria, they have glossed over the value of a shift in strategy from surveillance to whistleblowing as an approach for managing trans-border arms trafficking. This study explores the inadequacy of the surveillance approach in the management of trans-border arms trafficking on theNigeria–Niger Republic frontiers and suggests the whistleblowing approach as a more effective border security governance alternative. This study utilized a qualitative dominant method based on ethnographic fieldwork, comprising participant observation and interviews with security personnel, community leaders, and other stakeholders purposively selected along the Nigeria–Niger Republic borders. The study found, among other things, that border communities have been excluded in the border security governance on the Nigeria–Niger Republic borders, which leads to information asymmetry that benefits arms traffickers, thereby undermining the surveillance approach in border security management. The paper concludes that adopting the whistleblowing approach to supplement the surveillance approach while partnering with border communities is relevant in curbing arms trafficking on the Nigeria–Niger borders.
- Published
- 2021
- Full Text
- View/download PDF
16. UAV routing with genetic algorithm based matheuristic for border security missions
- Author
-
Muhammed Kaya and Omer Ozkan
- Subjects
Matheuristic ,Homeland security ,T57-57.97 ,Mathematical optimization ,UAV routing ,Applied mathematics. Quantitative methods ,Control and Optimization ,Computer science ,business.industry ,Applied Mathematics ,Usability ,Genetic algorithm ,Border security ,Optimal route ,QA1-939 ,Border Security ,Limit (mathematics) ,Routing (electronic design automation) ,business ,Metaheuristic ,Mathematics - Abstract
In recent years, Unmanned Aerial Vehicles (UAVs) are a good alternative for the problem of ensuring the security of the borders of the countries. UAVs are preferred because of their speed, ease of use, being able to observe many points at the same time, and being more cost-effective in total compared to other security tools. This study is dealt with the problem of the use of UAVs for the security of the Turkey-Syria borderline which becomes sensitive in recent years and the problem is modeled as a UAV routing problem. To solve the problem, a Genetic Algorithm Based Matheuristic (GABM) approach has been developed and 12 scenarios have been created covering the departure bases, daily patrol numbers, and ranges of UAVs. GABM finds the minimum number of UAVs to use in scenarios with the help of a GA run first and tries to find the optimal routes for these UAVs. If GABM can find an optimal route for the determined UAV number, it decreases the UAV number and tries to solve the problem again. GABM proposes a hybrid approach in which a metaheuristic with a mathematical model works together and the metaheuristic sets an upper limit for the number of UAVs in the model. In computational studies, when compared GA with GABM it is seen that GABM has obtained good results and decreased the utilized number of UAVs (up to 400%) and their flight distances (up to 85.99%) for the problem in very short CPU times (max. 122.17 s. for GA and max. 46.39 s. for GABM in addition to GA).
- Published
- 2021
- Full Text
- View/download PDF
17. Some Features of the Development of Legal Regulation of Ensuring the Border Security of the Member States of the European Union
- Author
-
Vladimir Vladimirovich Kudinov and Elena Gennadievna Mukhina
- Subjects
business.industry ,Member states ,Political science ,Border Security ,media_common.cataloged_instance ,General Medicine ,International trade ,European union ,business ,media_common - Abstract
The article examines the peculiarities of the development of legal regulation of ensuring the border security of the Member States of the European Union on the external and internal sections of the state border; highlights the main forms of interaction and powers of the European Border and Coast Guard Service (hereinafter the Agency, Frontex, ESSPO) in the area under consideration; shows the main problems in ensuring the border security of the European Union.
- Published
- 2021
- Full Text
- View/download PDF
18. Border Splurge to Deter Border Surge: An Auto-ethnographic Examination of Border Security Operations on the South Texas–Mexico Border
- Author
-
Eric Gamino
- Subjects
05 social sciences ,Rehabilitation ,Humanitarian crisis ,0507 social and economic geography ,Physical Therapy, Sports Therapy and Rehabilitation ,General Medicine ,0506 political science ,Auto ethnography ,Economy ,Political science ,Ethnography ,050602 political science & public administration ,Border Security ,050703 geography - Abstract
In the summer of 2014, the South Texas–Mexico border became the epicenter of a humanitarian crisis as thousands of unaccompanied minors and mothers from Central America seeking asylum traveled to the Rio Grande Valley. The institutional response from the state of Texas was to militarize the border with a multi-agency initiative dubbed Operation Strong Safety, at a cost of $1.3 million a week for the remainder of the year. I collected data for this study while I worked as a police officer in a police department located on the South Texas–Mexico border that participated in the operation. Importantly, from an institutional perspective, this study illustrates what police officers do while working on this operation. Findings reveal that officers spent their time performing non-enforcement functions. I argue that state governmental officials should divest from ineffective border security operations and should instead allocate funds to local communities and local organizations who are assisting with the humanitarian crisis.
- Published
- 2021
- Full Text
- View/download PDF
19. IRREGULAR MIGRATION, CROSS BORDER CRIME AND THE SECURITIZATION THEORY: A SOUTH AFRICAN REFLECTION
- Author
-
Victor H. Mlambo
- Subjects
Politics ,National security ,business.industry ,Political science ,Political economy ,Border Security ,Irregular migration ,Narrative ,Social Welfare ,Securitization ,business ,Militarization - Abstract
This paper attempted to examine the narratives and debates around Undocumented migration, cross border crime and the securitization and militarization of South Africa’s borders. Adopting a systematic review of literature, this paper attempted to add to the growing literature around this highly politicized issue. This paper revealed that Undocumented migration and cross border crime are not serious issues that pose a threat to the country's socio-economic development let alone its national security. The drive to securitize these issues has been driven by politicians who seek voters and who use migrants as political scapegoats. This paper contends that rather than investing millions on border securitization and militarization, such monies will be well spent on health, education, social welfare and infrastructure development. Finally, this paper argues that unilateral approaches to border security are bound to fail because the factors driving Undocumented migration and cross border crime are multifaceted and beyond South Africa's control. Hence regional cooperation becomes key. Securitization and militarization approaches don’t stop migration and border crime, rather migrants and crime syndicates always find ways to go around such approaches.
- Published
- 2021
- Full Text
- View/download PDF
20. Issues in Border Security of Nepal
- Author
-
Yukesh Upreti
- Subjects
business.industry ,Political science ,Border Security ,International trade ,business - Abstract
Cross border is a major threat to the internal and external security of Nepal. To maintain peace and security and neutralize illicit trade, smuggling, and cross-border crimes, the Government of Nepal has deployed Security forces at the border. The Indo-Nepal border comparatively is challenging due to its open border status. This paper analyses the field issues faced by security personnel at border areas of Nepal. The study uses both primary and secondary data for analysis and interpretation. The findings show geographical problems, socio-economic similarities, operational problems, border laws, values, and ethics. These issues are faced by security forces daily. The study outcome suggests a need for a collaborative approach of stakeholders on strengthening border security.
- Published
- 2021
- Full Text
- View/download PDF
21. TERMINOLOGY CONTRADICTIONS AND IMPERFECTION IN PUBLIC MANAGEMENT OF THE INDIVIDUAL INFORMATION SECURITY IN THE FIELD OF BORDER SECURITY
- Author
-
I.V. Kukin
- Subjects
Public management ,Field (Bourdieu) ,Border Security ,Information security ,Business ,Electrical and Electronic Engineering ,Computer security ,computer.software_genre ,computer ,Atomic and Molecular Physics, and Optics ,Terminology - Published
- 2021
- Full Text
- View/download PDF
22. 'It’s To Protect the Country!': The Everyday Performance of Border Security in Sweden
- Author
-
Mette Catarina Skaarup
- Subjects
Sociology and Political Science ,media_common.quotation_subject ,Geography, Planning and Development ,050801 communication & media studies ,borders ,Communities. Classes. Races ,Public administration ,03 medical and health sciences ,0302 clinical medicine ,0508 media and communications ,Smart data ,Political science ,JV1-9480 ,Ethnography ,foucault ,Demography ,media_common ,sweden ,Realisation ,05 social sciences ,030206 dentistry ,Discretion ,border security ,biopolitics ,Scholarship ,HT51-1595 ,Anthropology ,Border Security ,Colonies and colonization. Emigration and immigration. International migration ,Law ,Biopower - Abstract
In 2015, Sweden introduced inner border control. Five years later, the ‘temporary’ controls remain. Their increasing permanence raises urgent questions about the logics that undergird the exercise of biopolitical border security and the relationship between intent and practices on the ground. Drawing on in-depth interviews with Swedish border guards and fieldwork conducted at Hyllie Station—the first station en route from Denmark—this article contributes original ethnographic research on the sparsely researched Swedish border control and the work routines of Swedish border professionals. The central theoretical contribution of the article is the consideration of how discretion and a range of mundane factors complicate the realisation of biopolitics. The article further contributes to the scholarship on everyday bordering practices with methodological reflections on the importance of studying the ‘unspectacular’ border sites and a firm reminder that not all borders have turned into semi-automated, smart data borders. Overall, the article argues that the border control at Hyllie functions according to a ‘leaky’ (Marr 2012: 84) biopolitics; not a monolithic performance of overarching state objectives, but one assembled 'ad hoc', constrained by resource availability and shaped by the discretion exercised by border officers.
- Published
- 2021
- Full Text
- View/download PDF
23. The private security and the uniform system of cross-border (security) of transport of cash between Euro-area Member States
- Author
-
P Nenad Radivojević, J Goran Mandić, and S Ljubomir Stajić
- Subjects
business.industry ,private security ,Member states ,media_common.quotation_subject ,Private security ,International trade ,Uniform system ,cross-border road transport of euro cash ,harmonization ,Cash ,Border Security ,business ,Law ,cash-in-trasit ,european union ,media_common - Abstract
With the creation of the European Union (EU), the signing of the Maastricht Agreement, the introduction of the single market and freedom of movement of labor and the introduction of the Euro as a common currency, the problem of cross-border road transport of cash and valuables between eurozone members arose. This is because almost all EU member states had more or less different solutions and practices for this type of transport. The EU tried to solve the problem by adopting Regulation No. 1214/2011 on professional cross-border road transport of cash between Euro-area Member States. The mentioned Regulation successfully solved many problems related to this issue, such as: issuance of appropriate permits (licences), maximum duration of delivery, rights and obligations of teams, necessary knowledge and skills of security staff, carrying weapons in the host country, type and equipment of vehicles, mutual information, etc. Although the intention was to establish a unified system of cross-border money transport, in addition to significant progress in the functioning of private security, it can be said that because some countries have retained their specifics, a unified system with the same rules has not been fully established. The paper presents and deals with the advantages and disadvantages of a single system (securing) of cross - border transport of cash under the said Regulation. The Republic of Serbia, as a country on the path to EU membership, has a special interest in getting to know and preparing in time for the harmonization of its legal solutions and practices which regulate the mentioned area (activity) of private security.
- Published
- 2021
- Full Text
- View/download PDF
24. Seme Border, Nigeria: Safety and Collective Vulnerability
- Author
-
Willie Aziegbe Eselebor
- Subjects
Political science ,Political economy ,General Engineering ,Constructive engagement ,Vulnerability ,General Earth and Planetary Sciences ,Border Security ,General Environmental Science - Abstract
The induced border closure at Seme Border, Nigeria, on March 23, 2020 is just one among other closures carried out from 1984-2020. The closure brings to the fore issues of safety and collective vulnerability of the border communities and the existing coping mechanisms for addressing their fears. In the absence of constructive engagement with the vulnerable, the people often resorted to self-help by creating alternate routes (bush paths and waterways) thereby rendering the securitisation of border security (Border Drill) management ineffectual. In decision-making and for a successful implementation, it is important to allow for a buy-in from those affected by such policy.
- Published
- 2020
- Full Text
- View/download PDF
25. Indian Borders in the Era of COVID-19
- Author
-
Dhananjay Tripathi and Sanjiv Krishan Sood
- Subjects
Coronavirus disease 2019 (COVID-19) ,business.industry ,Political science ,General Engineering ,General Earth and Planetary Sciences ,Border Security ,International trade ,business ,General Environmental Science - Abstract
After the outbreak of COVID-19, India closed its international borders and at the domestic level restricted intra-state movements. This paper underlines the impacts on Indian border security, management, trade, and life in the borderlands. The paper also discusses how new internal borders were erected during the nationwide lockdown.
- Published
- 2020
- Full Text
- View/download PDF
26. The border is not the territory: the securitarian-humanitarian dialectic and the outsourcing of European borders
- Author
-
Dragoș Costache
- Subjects
Dialectic ,humanitarian response ,Border enforcement ,Third party ,business.industry ,lcsh:HM401-1281 ,Crisis response ,borders ,migration ,border security ,Humanitarian response ,Outsourcing ,lcsh:Social Sciences ,lcsh:H ,lcsh:Sociology (General) ,Foreign policy ,Political economy ,Political science ,Border Security ,crisis response ,business - Abstract
At the core of the European projects there is a fundamental tension between the securitarian and the humanitarian aspects of border and foreign policy, especially in its response to the Mediterranean Migration Crisis. This tension has far reaching consequences, from the outsourcing of border controls to third party states to fundamental changes in the makeup of the European Project. Starting from Etienne Balibar’s seminal question “what makes a border” I explore several facets of European border enforcement and the impact it is having on the European project.
- Published
- 2020
- Full Text
- View/download PDF
27. Governing border security infrastructures: Maintaining large-scale information systems
- Author
-
Georgios Glouftsios
- Subjects
Sociology and Political Science ,Michel foucault ,Scale (ratio) ,05 social sciences ,0507 social and economic geography ,0506 political science ,Argument ,Political science ,Political Science and International Relations ,050602 political science & public administration ,Information system ,Regional science ,media_common.cataloged_instance ,Border Security ,European union ,050703 geography ,media_common - Abstract
This article explores the maintenance of large-scale information systems that are used for, among other purposes, border security in the European Union. My argument is that information systems do not always operate according to their design scripts. They materialize as unruly, unstable and failing infrastructures that are governed through maintenance in order to correct any identified functional anomalies and address potential future failures by adapting them to emerging technologies and the service needs of end-users (e.g. border guards, police). To conceptualize the maintenance labour through which information systems are governed, I synthesize ideas developed in Michel Foucault’s work on biopolitics and governmentality with contributions that explore the agentic forces and proclivities of technoscientific matter. By unearthing the very mechanics of maintenance processes, I make two contributions to the literature that interrogates the digitization and smartening of border security. First, I demonstrate that attending to maintenance permits a more complete understanding of the agency of information systems. Second, I broaden the research agenda that explores border security as practice by directing attention towards the often invisible, but politically significant, labour of maintainers who, by rendering information systems functional, sustain the power to govern international mobility by digital means.
- Published
- 2020
- Full Text
- View/download PDF
28. Features of international cooperation on border security
- Author
-
S.P. Mosov and S.M. Saliy
- Subjects
business.industry ,Border Security ,General Medicine ,Business ,International trade - Abstract
Systematized are features of international cooperation of states in the interests of ensuring border security in the context of globalizing world processes, that causes an increase in number of different levels of tasks and problems that arise in the process of forming relations between states on the international platform. The article is focused on feasibility and international experience of integrated management of activities of state bodies at borders within the framework of international cooperation. Analyzed are features of European management model that has prospects for its implementation in a number of European countries outside the European Union, as well as in Central Asia, incl. the Republic of Kazakhstan. Attention is focused on incorrect terminological use of such phrases, as “integrated border management”, “integrated border management”, or “coordinated border management”, that does not correspond to the semantic essence. The correct phrase was introduced, i.e. “integrated management of activities of state bodies at the borders”. The article analyzes features of international cooperation models, based on examples of the CIS member countries and member countries of the Eurasian economic community, African countries and Scandinavian countries in the issues of integrated management of activities of state bodies at borders. Prospects for further researches are determined.
- Published
- 2020
- Full Text
- View/download PDF
29. ENSURING NATIONAL ECONOMIC SECURITY IN THE FUNCTIONAL STRATEGY OF THE STATE BORDER GUARD SERVICE OF UKRAINE
- Author
-
Andrii Fomenko, Vitaliy Prymachenko, Andrey Padalka, Serhii Shevchenko, and Victoria Belevtseva
- Subjects
Service (business) ,Guard (information security) ,Functional Strategy ,Renewable Energy, Sustainability and the Environment ,media_common.quotation_subject ,Geography, Planning and Development ,Computer security ,computer.software_genre ,State (polity) ,Economic security ,Border Security ,Business ,Safety Research ,computer ,media_common - Published
- 2020
- Full Text
- View/download PDF
30. Absent and present: Biopolitics and the materiality of body counts on the US–Mexico border
- Author
-
Gabriella Soto
- Subjects
Archeology ,Materiality (auditing) ,060101 anthropology ,History ,05 social sciences ,0507 social and economic geography ,Globe ,06 humanities and the arts ,Politics ,medicine.anatomical_structure ,Arts and Humanities (miscellaneous) ,Aesthetics ,Anthropology ,medicine ,Border Security ,0601 history and archaeology ,050703 geography ,Biopower - Abstract
As the deaths of undocumented migrants expose the violence of border security policies around the globe, a complicated politics emerges between bodily death and the ways in which the migrant association of decedents (dis)appears in vital records – even as many migrants physically disappear during their border crossings. What happens between death and bureaucratic disappearance after a migrant body is discovered? How does the overwhelming material presence of migrant death, someone who dies through an unnecessary and excruciating process like drowning or dehydration during a border crossing, become not-a-migrant? This article considers these questions by exploring the materiality of body counts at the nexus of biopolitics, forensic anthropology, and material culture studies. To probe the process behind migrants’ seemingly systematized bureaucratic postmortem disappearance, this ethnographic case study of local postmortem investigations of migrant deaths at the US–Mexico border examines practices around burial or cremation and body discovery.
- Published
- 2020
- Full Text
- View/download PDF
31. An inquiry into the digitisation of border and migration management: performativity, contestation and heterogeneous engineering
- Author
-
Georgios Glouftsios and Stephan Scheel
- Subjects
Mobility control ,Political science ,05 social sciences ,Performativity ,Soziologie, Sozialwissenschaften ,050602 political science & public administration ,Information system ,Media studies ,Border Security ,Development ,050601 international relations ,0506 political science - Abstract
This article is concerned with the digitisation of border security and migration management. Illustrated through an encounter between a migrant and the Visa Information System (VIS)–one of the largest migration-related biometric databases worldwide–the article’s first part outlines three implications of digitisation. We argue that the VIS assembles a set of previously unconnected state authorities into a group of end users who enact border security and migration management through the gathering, processing and sharing of data; facilitates the practice of traceability, understood as a rationality of mobility control; and has restrictive effects on migrants’ capacity to manoeuvre and resist control. Given these implications, the article’s second part introduces three analytical sensitivities that help to avoid some analytical traps when studying digitisation processes. These sensitivities take their cue from insights and concepts in science and technology studies (STS), specifically material semiotics/ANT approaches. They concern, firstly, the ways that data-based security practices perform the identities of the individuals that they target; secondly, the need to consider possible practices of subversion by migrants to avoid control-biased analyses; and finally, the challenge to study the design and development of border security technologies without falling into either technological or socio-political determinism.
- Published
- 2020
- Full Text
- View/download PDF
32. A Comparative Analysis of the Attitudes toward the U.S.-Mexico Border Policy: Evaluating Perspectives on Border Security and Building a Wall in the Rio Grande Valley, National Hispanic and General U.S. Populations
- Author
-
Mi-son Kim, Natasha Altema McNeely, and Dongkyu Kim
- Subjects
Cultural Studies ,Linguistics and Language ,Potential impact ,Geography ,Social Psychology ,Economy ,Anthropology ,media_common.quotation_subject ,Immigration ,Border Security ,media_common - Abstract
Recently, there has been a surge of national attention toward the U.S.-Mexican border in South Texas, known as the Rio Grande Valley (RGV). Despite the attention and potential impact, which the wall would directly have on the RGV community, there has been no systemic attention paid to the opinions of the RGV residents regarding the proposed wall and other related immigration policies. This article, therefore, aims to fill this gap by comparing immigration policy attitudes in the borderland communities to both the national Hispanic and the general national populations. By utilizing original data from an RGV public opinion survey we conducted in 2018, our analysis shows that RGV residents hold more lenient immigration attitudes than do both the national Hispanic and the general populations. We utilize logistic regression analysis to further our understanding of the correlates of these attitudes across different samples. Our findings provide important policy and political implications.
- Published
- 2020
- Full Text
- View/download PDF
33. Strengthening Public Resilience and Border Security Management against Terrorism: A Case Study of Elubo Border in the Western Region of Ghana
- Author
-
Dominic Apau, Er-Menan Amaniampong, Samuel Krampah, and Francess Dufie Azumah
- Subjects
Political science ,Development economics ,Terrorism ,Border Security ,General Medicine ,Resilience (network) - Published
- 2020
- Full Text
- View/download PDF
34. Multiple-Pursuer, Single-Evader Border Defense Differential Game
- Author
-
Alexander Von Moll, David W. Casbeer, Eloy Garcia, M. Suresh, and Sufal Chandra Swar
- Subjects
Computer science ,Control theory ,Bellman equation ,Differential game ,Aerospace Engineering ,Border Security ,Pursuer ,Electrical and Electronic Engineering ,Optimal control ,Closed loop ,Computer Science Applications - Abstract
Ensuring border security against potential threats has been a long-standing problem, and it becomes much more challenging for international borders due to their massive physical extent coupled with...
- Published
- 2020
- Full Text
- View/download PDF
35. التحديات الأمنية التي تواجه المنافذ الحدودية لانتشار فيروس كرونا (COVID-19): قطاع أمن المطارات نموذجًا
- Author
-
Mamdooh A. Abdelmottlep
- Subjects
Airport security ,Coronavirus disease 2019 (COVID-19) ,030231 tropical medicine ,Immunology ,Computer security ,computer.software_genre ,medicine.disease_cause ,03 medical and health sciences ,0302 clinical medicine ,medicine ,Border Security ,030212 general & internal medicine ,Business ,computer ,Coronavirus - Abstract
تشكل حالات الطوارئ الطبية تحديات خاصة لأجهزة الأمن والشرطة وإنفاذ القانون، سواء أكان التهديد من صنع الإنسان (مثل: الجمرة الخبيثة)، أم (الهجمات الإرهابية البيولوجية) أم التي تحدث بشكل طبيعي (مثل: أوبئة الإنفلونزا، أو كورونا)، وتختلف الإستراتيجيات الأمنية لمواجهة تلك الحالات، حسب أسباب ومستويات واتجاهات التهديد، وكذلك طبقًا للخطر المحتمل على قوة الشرطة، وفي حالات انتشار الأوبئة واسعة النطاق، مثل: كورونا COVID-19، سيضطر موظفو الشرطة، إلى موازنة مواردهم وجهودهم بين هذه المسؤوليات الجديدة وبين متطلبات الخدمة اليومية المتعلقة بأمن المجتمع وسلامة أفراده، كما أن قدرة وزارة الداخلية والأجهزة المعنية بالأمن العام، تعتمد على الاستجابة بفاعلية لأي ظرف طارئ يتعلق بالصحة، كما تعتمد إلى حد كبير على استعداد وتخطيط هذه الأجهزة مع شركائها الإستراتيجيين لمواجهة هذه الطوارئ، وتوضح الدراسة الراهنة، القضايا الرئيسة التي يتعين على مسؤولي الشرطة، معالجتها في أعقاب حالات الطوارئ الطبية، وتركز الدراسة على العاملين في أمن المنافذ الحدودية، وقطاع أمن المطارات، وقد أظهرت وجود ثلاثة تحديات تواجهها أجهزة الشرطة في هذا الشأن، التحدي الأول: يتعلق بضمان استمرار العمليات الأمنية لتأمين حركة الطيران، والتحدي الثاني: يتعلق بكيفية المحافظة على سلامة العاملين في أمن المطار، والتحدي الثالث: يتعلق بمشكلة التجمعات المجتمعية التي تتعامل معها أجهزة الشرطة بوصفها مستجيبًا أوليًّا، كالعاملين في المطارات والمنافذ، وقد تعد قضايا السلامة العامة للعاملين في أجهزة الشرطة جديدة نسبيًّا في هذه الحقبة من العمل الأمني، لذلك تتطلب مزيدًا من التنسيق والتعاون بين الأجهزة الأمنية والشرطية المختلفة من ناحية، وبين غيرها من الجهات المعنية بإنفاذ القانون، من ناحية أخرى، ولقد انتهت الدراسة إلى مجموعة من التوصيات التي تعمل على مواجهة حالات الطوارئ الطبية بما يضمن أمن
- Published
- 2020
- Full Text
- View/download PDF
36. Układ z Schengen a bezpieczeństwo Polski
- Author
-
Maciej Maruszak, Antoni Olak, and Bożena Konecka‐Szydełko
- Subjects
National security ,business.industry ,Political science ,Member states ,Economic history ,Benelux countries ,Border Security ,business ,The Republic - Abstract
Idea układu z Schengen narodziła się w Saarbrucken, gdzie Francja i Niemcy podpisały porozumienie ułatwiające ich obywatelom przekraczanie wspólnej granicy. Pomysł ten został zaakceptowany w krajach Beneluksu, które do niego dołączyły. W 1995 r. do porozumienia przystąpiły Hiszpania i Portugalia. Natomiast status obserwatora uzyskały Grecja, Austria, Włochy, Norwegia, Szwecja, Finlandia, Dania i Islandia. Rzeczpospolita Polska przystąpiła do Układu z Schengen 21 grudnia 2007 r. Niniejszy materiał będzie częściowo odpowiedzią na często zadawane pytanie: Jaki jest wpływ rozwiązań z Schengen na codzienne życie obywateli. Jest to umowa znosząca kontrolę osób przekraczających granice między państwami członkowskimi tej umowy. Konsekwencją porozumienia było rozszerzenie współpracy w zakresie bezpieczeństwa granic, polityki azylowej i współpracy transgranicznej.
- Published
- 2020
- Full Text
- View/download PDF
37. Políticas de Segurança e Defesa das Fronteiras Paraguaias e Uruguaias com o Brasil / Security and Defense Policies along the Paraguayan and Uruguayan Borders with Brazil
- Author
-
Maurício Kenyatta Barros da Costa
- Subjects
International relations ,Economy ,Political science ,Border Security - Abstract
A segurança nas fronteiras é realidade multifacetada em que questões locais se articulam com problemas nacionais, regionais e internacionais. O presente artigo analisa os desafios securitários paraguaios e uruguaios na fronteira com o Brasil. O questionamento deste artigo é: as políticas paraguaias e uruguaias corroboram com a segurança fronteiriça e incorporam vetores explícitos de cooperação e integração fronteiriça com o Brasil? Argumenta-se que há desafios securitários nas duas fronteiras e nos três países estudados, mas que a cooperação bilateral eleva a qualidade e os resultados da segurança e defesa fronteiriça entre países vizinhos. Este artigo utilizou-se de documentos oficiais e da literatura de estudos fronteiriços e relações internacionais.
- Published
- 2020
- Full Text
- View/download PDF
38. Аналіз прикордонної безпеки на сході України та особливості її забезпечення силами та засобами прикордонних загонів в районі операції Об’єднаних сил
- Subjects
Guard (information security) ,Hardware_MEMORYSTRUCTURES ,National security ,business.industry ,Border Security ,Scientific article ,Computer security ,computer.software_genre ,business ,computer - Abstract
The scientific article summarizes the main threats to national security, describes the operation of the Joint Forces in eastern Ukraine, border security and reveals the peculiarities of using forces and facilities of border guard detachments of the State Border Guard Service of Ukraine in the area of the aforementioned operation. The complex of actions carried out by border guard detachments of the State Border Guard Service of Ukraine to counter threats and challenges that negatively affect the state of border security was summarized. The classification of codes for the situational aggravations is given and the indexes of each type of possible danger in the area of responsibility of the border guard detachments are organized according to the importance of values. It is established that in conditions of aggravation of the situation for functioning of the border guard detachments in the area of the Joint Forces operation will be characterized by a "green" information code at the levels of aggravation from “4” to “1”, where: “4” – to react it is enough regular forces and facilities of a border guard detachment; “3” – it is necessary to deploy the Ready Reserve and the standby forces of neighbouring border guard detachments; “2” – it is necessary to deploy the Standby Reserve and the Standby Reserve of neighbouring border guard detachments; “1” – it is necessary to deploy all available resources, as well as the reserves of neighbouring border guard detachments.
- Published
- 2020
- Full Text
- View/download PDF
39. دور الإعلام الأمنی فی مواجهة الجرائم الإلکترونیة والحد منها من وجهة نظر العاملین فی الأجهزة الأمنیة فی دولة الکویت The Role of Security Media in Confronting and Reducing Cybercrime from the Viewpoints of Workers in the Security Services in Kuwait
- Subjects
Cybercrime ,Public security ,Border Security ,Average level ,Sociology ,Limiting ,Social science - Abstract
هدفت الدراسة الى التعرف على دور الإعلام الأمني في الوقاية والحد من الجرائم الإلکترونية، والتعرف على اساليب تعزيز دورها والکشف عن معوقاتها من وجهة نظر العاملين في الأجهزة الأمنية في دولة الکويت. اعتمدت الدراسة لتحقيق أهدافها على المنهج المسحي بالعينة، واستخدام أداة الاستبيان لجمع البيانات والتي تم التأکد من صدقها وثباتها، تکون مجتمع الدراسة من العاملين في الأجهزة الأمنية في دولة الکويت من الضباط وضباط الصف والأفراد من قوات الشرطة العاملين في القطاعات الرئيسة للشرطة والمؤلفة من قطاع الأمن العام بکافة مديرياته وما يتبعها من مراکز أمنية في محافظات الکويت الستة (العاصمة، الجهراء، الفروانية، حولي، مبارک الکبير، الأحمدي)، بالإضافة إلى الإدارة العامة لأمن الحدود، والإدارة العامة لأمن المنافذ، والإدارة العامة للمرور، وتکونت عينة الدراسة من (767) ضابطا وضابط صف وفرد، تمثل ما نسبته 2.78 % من مجتمع الدراسة. أظهرت نتائج الدراسة أن دور الإعلام الأمني في الوقاية والحد من الجرائم الإلکترونية في دولة الکويت قد جاء مرتفعا من وجهة نظر العاملين في الأجهزة الأمنية، وقد بلغ المتوسط الحسابي العام للإجابات 3.742 من 5، وتبين من النتائج أن الإعلام الأمني في دولة الکويت قد ساهم بدرجة مرتفعة في خلق وعي أمني بخطورة الجرائم الالکترونية، وساهم أيضا في ابراز أنماط الجرائم الالکترونية وأساليب ارتکابها وطرق الوقاية منها، ونشر التشريعات والقوانين الخاصة بالجرائم الإلکترونية. کما أشارت النتائج أن أساليب تعزيز دور الإعلام الأمني في التوعية من الجرائم الإلکترونية قد جاءت بمستوى مرتفع من وجهة نظر العاملين في الأجهزة الأمنية، وقد بلغ المتوسط الحسابي العام للإجابات 3.811 من 5، وبينت النتائج أن من أهم أساليب تعزيز دور الإعلام الأمني في التوعية من الجرائم الإلکترونية قد تمثلت في ترکيز إدارة الإعلام الأمني على توعية أفراد المجتمع بأخطار الجرائم الإلکترونية من خلال وسائل التواصل الاجتماعي الإلکترونية، والاستفادة من الخبرات الإعلامية للدول الصديقة في مجال إعداد البرامج الإعلامية الخاصة بالوقاية من الجرائم الإلکترونية، وأوضحت النتائج أن المعوقات التي تواجه الإعلام الأمني في الوقاية والحد من الجرائم الإلکترونية قد جاءت بمستوى متوسط من وجهة نظر العاملين في الأجهزة الأمنية، وقد بلغ المتوسط الحسابي العام للإجابات 3.590 من 5، وأظهرت النتائج أن أهم هذه المعوقات قد تمثل في ضعف التعاون والتنسيق بين إدارة الاعلام الأمني والمؤسسات ذات العلاقة بالوقاية من الجرائم الالکترونية. The current study aimed to identify the role of security media in preventing and limiting cybercrime and define methods to enhance its role and reveal the obstacles from the viewpoint of workers in the security services in the State of Kuwait. To achieve such objectives, the study adopted the survey method, and made use of a questionnaire to gather data after verifying its validity and reliability. The study population consisted of employees in the security services in the State of Kuwait, including officers, non-commissioned officers, and individuals from the police forces working in the main sectors of the police, which are composed of the public security sector in all its directorates and the security centers that follow in the six governorates of Kuwait (the capital, Jahra, Al Farwaniyah, Hawalli, Mubarak Al-Kabeer, Al-Ahmadi), in addition to the General Administration for Border Security, the General Administration for Ports Security and the General Administration of Traffic. The study participants included (767) officers and non-commissioned officer and individual, representing 2.78% of the study population. The results of the study showed that the role of security media in the prevention and reduction of cybercrime in the State of Kuwait has been big from the viewpoints of workers in the security services, and the general arithmetic mean of the answers reached 3.742 out of 5. The results also showed that the security media in the State of Kuwait has contributed greatly in creating a security awareness of the seriousness of cybercrime. The study also contributed to highlighting patterns of cybercrime, methods of committing and ways of preventing and publishing legislation and laws related to cybercrime. The results also indicated that the methods of enhancing the role of the security media in raising awareness of cybercrime came at a high level from the viewpoints of employees in the security services, and the general mean of the answers has reached 3,811 out of 5, and the results have shown that one of the most important methods of enhancing the role of the security media in raising awareness of cybercrime is educating community members about the dangers of cybercrime through electronic social media, and benefiting from the media experiences of friendly countries in the field of preparing information programs for the prevention of cybercrime. The results showed that the obstacles facing the security media in the prevention and reduction of cybercrime came at an average level from the viewpoints of employees in the security services, and the general arithmetic mean of the answers reached 3.590 out of 5. It was showed that the most important obstacles were the weak cooperation and coordination between the management Security media and institutions related to the prevention of cybercrime.
- Published
- 2020
- Full Text
- View/download PDF
40. Crossing Constitutional Boundaries: Searches and Seizures of Electronic Devices at U.S. Borders
- Author
-
Scott Memmel
- Subjects
business.industry ,Communication ,Law ,Political science ,Internet privacy ,Border Security ,Electronics ,InformationSystems_MISCELLANEOUS ,business ,Search and seizure - Abstract
In an era of increased attention to border security and continued technological advances, questions have been raised regarding searches and seizures of electronic devices at U.S. borders, implicati...
- Published
- 2020
- Full Text
- View/download PDF
41. VALUE COMPONENT OF STATE POLICY IN THE FIELD OF STATE BORDER SECURITY
- Author
-
Volodymyr Nikiforenko
- Subjects
State (polity) ,media_common.quotation_subject ,Field (Bourdieu) ,State policy ,Component (UML) ,Value (economics) ,Border Security ,Business ,Economic system ,media_common - Published
- 2020
- Full Text
- View/download PDF
42. Can Boko Haram Constitute a Threat to European Security?
- Author
-
Tibor Babos and Gábor Sinkó
- Subjects
Political economy ,Refugee ,Political science ,Terrorism ,Border Security ,Boko haram ,Country of origin ,Variety (cybernetics) - Abstract
In this study, the authors seek to address the question whether Boko Haram can constitute a threat to European security. Toanswer this question, one mustanalyse recent Nigerian migration patterns to Italy, actual reports, peer-reviewed academic works, a wide variety of regional journals and media articles. By evaluating all available research sources, it can be concluded that the answer is not as clear-cut as one might thinkat first glance. On the one hand, we could argue that a terrorist group like Boko Haram cannot constitute a serious European security threat, since the majority of Nigerians arriving in Europe seems to have decided to flee their country of origin due to economic, social and security reasons, therefore, these migrants have nothing to do with terrorism. On the other hand, we could also argue that Boko Haram can pose a threat to European security, by taking advantage of migration flows and inserting its own soldiers, thus creating terrorist cells within them. We have found plenty of evidences related to the terrorist organisation’s increased use of women as soft targets and the potential re-radicalisation of traumatised children in Europe. Since its alignment with ISIL in 2015, there has been growing concern that Boko Haram could follow suit with focusing its efforts on refugees, infiltrating migration flows and thereby creating a significant security risk to Europe. However, in recent years the number of Nigerian migrants arriving in Europe has been decreasing, which could be justified by tighter links between African and European governments and by stronger European control. If this continuous cooperation and tight internal European border security andpolice procedures are to remain, there is less chance for Boko Haram to constitute a threat to European security.
- Published
- 2020
- Full Text
- View/download PDF
43. ON THE ISSUE OF DEPARTMENTAL RULE-MAKING IN THE FIELD OF STATE BORDER SECURITY
- Author
-
Volodymyr Nikiforenko
- Subjects
State (polity) ,Field (Bourdieu) ,media_common.quotation_subject ,Political science ,Border Security ,Computer security ,computer.software_genre ,computer ,media_common - Published
- 2020
- Full Text
- View/download PDF
44. Border security interventions and borderland resilience
- Author
-
Eeva-Kaisa Prokkola
- Subjects
Political science ,Development economics ,Psychological intervention ,Border Security ,Resilience (network) - Published
- 2021
- Full Text
- View/download PDF
45. Border Security, U.S. Citizenship, and Immigration Services
- Author
-
Charles P. Nemeth
- Subjects
Political economy ,media_common.quotation_subject ,Political science ,Immigration ,Border Security ,Citizenship ,media_common - Published
- 2021
- Full Text
- View/download PDF
46. Margaret Thatcher, Repartition, and Cross-Border Security, 1979–1990
- Author
-
Stephen Kelly
- Subjects
Economy ,Political science ,Repartition ,Border Security - Abstract
This chapter examines Margaret Thatcher’s attitude to repartition, cross-border security, and the Irish border during her period as the United Kingdom’s prime minister, between 1979 and 1990. The chapter is comprised of two central and interrelated subjects. The first part analyses Thatcher’s occasional discussion of the prospect of repartition and the redrawing of the boundary of Northern Ireland, including the mass transfer of Northern Catholics to the Republic of Ireland. The second part focusses on Thatcher’s determination to improve cross-border security co-operation along the Irish border in her dealings with successive Irish governments and associated security forces.
- Published
- 2021
- Full Text
- View/download PDF
47. Ready for take-off: how biometrics and blockchain can beat aviation's quality issues
- Author
-
Irra Ariella Khi
- Subjects
General Computer Science ,Biometrics ,Aviation ,business.industry ,media_common.quotation_subject ,Immigration ,Border Security ,Business ,Electrical and Electronic Engineering ,Computer security ,computer.software_genre ,computer ,media_common - Abstract
Biometric technologies have been embraced and adopted in aviation and international border control more than in any other industry. This is due to the emphasis on airline and border security and increasing pressure from governments to control and monitor immigration and the movement of people. However, biometrics are still not at the stage of universal adoption and face several significant barriers that need to be overcome.
- Published
- 2020
- Full Text
- View/download PDF
48. Visas and Walls: Border Security in the Age of Terrorism
- Author
-
Ugur Altundal
- Subjects
Sociology and Political Science ,Political science ,Terrorism ,Economic history ,Border Security - Published
- 2020
- Full Text
- View/download PDF
49. Ephemeral or durable? Donald Trump’s impact on Canada–US issues in the Great Lakes heartland and northeast borderlands
- Author
-
Frédérick Gagnon and Christophe Cloutier-Roy
- Subjects
050502 law ,Economy ,13. Climate action ,Ephemeral key ,Political science ,05 social sciences ,Political Science and International Relations ,Environmental impact of the energy industry ,Border Security ,Climate change ,0501 psychology and cognitive sciences ,050104 developmental & child psychology ,0505 law - Abstract
This article assesses whether Donald Trump’s impact on Canada–US issues such as trade, energy and the environment, and border security could be ephemeral or durable. We answer this question by exam...
- Published
- 2019
- Full Text
- View/download PDF
50. CROSS]BORDER SECURITY OF THE MEDITERRANEAN: AFRICAN AND ASIAN MIGRATION VECTORS
- Author
-
Maria G Bistrina
- Subjects
information exchange ,Guard (information security) ,Asia ,business.industry ,illegal migration ,cooperation ,lcsh:Political science ,General Medicine ,International trade ,Local economic development ,Knowledge base ,financial support ,the countries of North Africa ,the reduction of cross-border crime ,media_common.cataloged_instance ,Border Security ,Human trafficking ,European Union ,Business ,European union ,lcsh:J ,Information exchange ,Coast guard ,media_common - Abstract
The current European migration crisis outlined the problems of cooperation between the EU countries in the search for solutions in emerging multilateral conflicts. Therefore, the purpose of this analysis is to identify the role of the regional information exchange network and cooperation in the field of illegal migration and to reduce cross-border crime between the countries of North Africa, Asia and the EU. Cooperation can include assistance with the authorities to implement national strategies to address the causes of illegal migration by encouraging local economic development and providing access to jobs for migrants and host communities, and to strengthen protection for the most vulnerable. It is extremely important to increase the capacity of the authorities in North Africa and Asia to combat illegal migration and human trafficking by strengthening their border surveillance systems. Other areas of support with EU countries include an inter-agency visit to the European Border Guard and the Coast Guard Agency in Warsaw, the designation of a contact point for Operation Sophia and the study of information exchange opportunities within the Seahorse Mediterraneo project. Key issues include changes in the legal and institutional framework, knowledge base, channels for legal migration, border control, prevention of illegal migration.
- Published
- 2019
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.