« Previous |
1 - 20 of 46
|
Next »
Number of results to display per page
Search Results
2. The East Mediterranean Gas Forum: Convergence of Regional and Energy Security Concerns
- Author:
- Stefy Joseph and Aneeta Thomas Peedikayil
- Publication Date:
- 03-2023
- Content Type:
- Journal Article
- Journal:
- AUSTRAL: Brazilian Journal of Strategy International Relations
- Institution:
- Postgraduate Program in International Strategic Studies, Universidade Federal do Rio Grande do Sul
- Abstract:
- As energy insecurity remains an imminent characteristic of energy security, it can simultaneously influence the securitization of non-energy referent objects in other sectors (Adamides and Odysseas 2015). This leads one to examine the geopolitical underpinnings behind the formation of the EMGF which by and large has affected the region as a whole. Egypt, the region’s star player has always played a fundamental role in harbouring relations based on energy and regional security and hence its relations with Greece, Cyprus, Israel, France, Italy and the EU needs examination in the wake of the establishment of the EMGF. The EMGF has been kept as the central pillar in understanding the international political economy behind the energy and regional security convergences by the above-mentioned member states. The objective behind undertaking this study has been to point out the inadequacies in establishing the EMGF which has inevitably shaped the geopolitics of the region.
- Topic:
- Security, Energy Policy, Natural Resources, and Gas
- Political Geography:
- Global Focus
3. Las políticas de seguridad y defensa como valor público y bien común
- Author:
- Xavier Torrens
- Publication Date:
- 06-2023
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- Una nueva perspectiva de la seguridad y la defensa centradaen el enfoque de bienes comunes abre la puerta a una relaciónentre Estado y sociedadcon gobernanza. De hecho, se trata deuna nueva forma de legitimación políticadel uso de la fuerza para garantizar la seguridadrealzándola como bien común(Ostrom, 1900) y como valor público (Moore, 1998). En el escenario actual de riesgos, cada vez la política de seguridad se desarrolla más allá de lo que algunos han llamado en decir lo estrictamente securitario. En este sentido, la teoría de los bienes comunes es un marco conceptual clave para comprender la transformación y el cambio de paradigma en las políticas de seguridad. Las cuestiones que se plantean en este monográfico giran en torno al marco teórico-conceptual de los bienes comunes, o bien a algunos de sus elementos. Desde la perspectiva de los bienes comunes, la seguridady la defensa, y sus políticaspúblicas, tienen en cuenta el valor que se crea a partir de las dinámicas entre distintos actores.
- Topic:
- Security, Defense Policy, Governance, and Society
- Political Geography:
- Global Focus
4. Derecho humano a la seguridad:Prevención del Extremismo Violentocon Vasili Grossman
- Author:
- Verónica Yazmín García Morales Morales
- Publication Date:
- 06-2023
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- El presente estudio aborda el derecho humano a la seguridad desde el enfoque de la Prevención del Extremismo Violento. La Prevención del Extremismo Violento (PEV) es una estrategia en el marco de Naciones Unidas enfocada a fortalecer el respeto de los derechos humanos. La PEV aborda el extremismo violento que conduce al terrorismo desde el enfoque de la prevención y de los derechos humanos. Lo más relevante de esta perspectiva es su innovación para garantizar la seguridad como derecho humano. Es más, la PEVsurge como respuesta a las políticas de seguridad antiterroristas que se consideran insuficientes para erradicar este fenómeno. Las medidas de acción de la PEV, por tanto, van más allá de lo que en sentido estricto se conoce como política securitaria. La educación y la cultura tiene así una función importante en la PEV, como también ponen de relieve las políticas de la UNESCO. El análisis que se desarrolla expone una propuesta de espacio dialógico que aplica la medida de educación, cultura y sensibilización a través de la literatura. Se reflexiona así, a partir del diálogo con Vida y destino de Vasili Grossman, sobre el extremismo violento y los derechos humanos.
- Topic:
- Security, Human Rights, United Nations, Literature, and Countering Violent Extremism
- Political Geography:
- Global Focus
5. Seguridad y defensa,de bienes públicos puros aun enfoquede bienes comunes
- Author:
- Valente Tallabs
- Publication Date:
- 06-2023
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- Frente a la crisis de Estado moderno derivados de cambios globales y amenazas emergentes, frente a las limitaciones y vacíos que actualmente tiene para poder proveer seguridad y defensa, frente a la desvalorización y crítica que sociedades contemporáneas tienen respecto a estas funciones por ser poco democráticas y usualmente unilaterales, conviene hacer una análisis que considere una comprensión más amplia de estos conceptos como bienes públicos puros, para comenzar a contemplarlos como bienes comunes, lo que permitiría un nueva relación entre Estado y sociedad.
- Topic:
- Security, Defense Policy, Public Goods, and Commons
- Political Geography:
- Global Focus
6. Grayzone Aggression: The Need for Deterrence by Denia
- Author:
- Elisabeth Braw
- Publication Date:
- 12-2023
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Cyber deterrence needs to rely on a combination of deterrence by punishment of select attacks and deterrence by denial. By definition, punishment means that deterrence has failed, but given that it’s impossible to deter all cyber attacks and intrusions, Western governments with offensive cyber capabilities could retaliate against specific cyber attackers. The harm done to targets of such retaliation and the arbitrary nature of how they’re selected for punishment would increase the cost in most cyber attackers’ cost-benefit analysis. The public also expects the government to avenge, particularly egregious cyber attacks.
- Topic:
- Security, Cybersecurity, Deterrence, and Non-Traditional Threats
- Political Geography:
- Global Focus
7. Outer Space, Information Warfare, and the Truth
- Author:
- Gabrielle Lim and Joan Donovan
- Publication Date:
- 12-2023
- Content Type:
- Journal Article
- Journal:
- Fletcher Security Review
- Institution:
- The Fletcher School, Tufts University
- Abstract:
- Despite the distance, outer space and Earth are linked. However, our increasing dependence on space-based assets makes parsing the multitude of challenges and tradeoffs more difficult. Amidst talks of great power competition, space weapons, and commercialization there are equally pressing issues concerning production of knowledge, truth, and accountability. Though these topics sometimes overlap with national security (as with arms treaties or interstate war), they also affect the broad concept of human security—the wellbeing and safety of individuals and communities. As states and international organizations consider what to do to ensure the sustainable development and use of outer space, concerns should go well beyond simply reducing the level of debris, whether asteroids should be mined, or what qualifies as a space weapon.
- Topic:
- Security, Development, Strategic Competition, and Information Warfare
- Political Geography:
- Global Focus and Space
8. Cyber-Nuclear Weapons: Impact on the Modern Warfare Landscape
- Author:
- Shabana Fayyaz and Baqir Malik
- Publication Date:
- 01-2023
- Content Type:
- Journal Article
- Journal:
- South Asian Studies
- Institution:
- Department of Political Science, University of the Punjab
- Abstract:
- The popular trends of information technologies have created a virtual world around the globe with the domain of cyberspace, which offers plenty of opportunities and challenges. In the last few years, several events have been described in terms of cyber warfare or the use of cyber weapons, leading to critical international security concerns. At the same time, there is little research on the definitions and power of what constitutes a cyber weapon and how it can be profiled. In the age of globalization and with the dynamic digital environment a new way of strategy and thinking is developing to introduce the new weapons, which has challenged the strategic environment around the globe and changing the concept of warfare in 21st century. The present article is to develop a preliminary hypothesis for to identifying the power of cyber weapon and how it relates with the nuclear weapon to examining the changing landscape of modern warfare. The comparative analysis of cyber weapons and nuclear weapons will help to understand the exact nature of cyber weapons with comparison of nuclear weapons to conclude which one is more preferable and dangerous in modern warfare techniques. The paper is divided into three sections. First part is brief introduction of genesis of cyber weapons, nature, evolution and its different types. The second part is comparison of cyber weapons to the nuclear weapons based on diverse characteristics (developing of weapons, security, arsenal, uses, target etc.). The third part is an analysis cyber weapon vis-a-vis nuclear weapon on the impact level. The paper conclude that the development of cyber-nuclear weapons has significantly altered the nature of contemporary warfare techniques. As technology continues to advance, the use of a cyber weapons has becomes increasingly likely, which could result in devastating consequences. It is important for nations to develop effective cybersecurity measures and maintain a strong nuclear deterrence strategy to prevent such scenarios from occurring.
- Topic:
- Security, Nuclear Weapons, Cybersecurity, and Weapons
- Political Geography:
- Global Focus
9. PART I: The Singleton Paradox On the Future of Human-Machine Teaming and Potential Disruption of War Itself
- Author:
- Ben Zweibelson
- Publication Date:
- 03-2023
- Content Type:
- Journal Article
- Journal:
- Journal of Advanced Military Studies
- Institution:
- Marine Corps University Press, National Defense University
- Abstract:
- Technological innovation has historically been applied in war and security affairs as a new tool or means to accomplish clear political or societal goals. The rise of artificial intelligence posits a new, uncharted way forward that may be entirely unlike previous arms races and advancements in warfare, including nuclear weapons and quantum technology. This article introduces the concept of a singleton as a future artificial intelligent entity that could assume central decision making for entire organizations and even societies. In turn, this presents what is termed a “singleton paradox” for security affairs, foreign policy, and military organizations. An AI singleton could usher in a revolutionary new world free of war and conflict for all of human civilization or trigger a catastrophic new war between those with a functioning singleton entity against those attempting to develop one, along with myriad other risks, opportunities, and emergent consequences.
- Topic:
- Security, Science and Technology, Machine Learning, Transhumanism, and War Studies
- Political Geography:
- Global Focus
10. Leadership in police work applied to critical contexts: An integrative review and scientific mapping using VOSviewer and Google Trends tools
- Author:
- Lucius Paulo de Carvalho, Ana Paula Grillo Rodrigues, and Marcello Beckert Zappellini
- Publication Date:
- 09-2023
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The aim of this study is to identify cutting-edge studies on the phenomenon of leadership applied to police work, especially in critical contexts, based on an integrative literature review. The integrative review made it possible to survey publications on the subject in the Scopus, Web of Science, Ebsco Host, ScienceDirect, Core, and SciELO databases. Scientific mapping is complemented with the use of VOSviewer and Google Trends tools. The integrative review resulted in 15 studies that fit the research strategy, bringing different leadership approaches, such as instrumental, transformational, charismatic, consultative, ethical, authentic, military, destructive, and laissez-faire, through qualitative and/or quantitative studies. For bibliometric analysis using VOSviewer, the research corpus was expanded to 63 articles, admitting documents that studied leadership with firefighters, military personnel, and police officers. The analysis showed almost no co-authorship link between the 129 authors. The co-occurrence analysis of keywords reveals that leadership strongly links with law enforcement, police, management, crisis management, emergency management, and decision-making, establishing a close relationship between these concepts and a semantic map that underlies the field of study. The analysis of trends by Google Trends in the science category indicates the stability of interest in the topic of leadership in the world. However, the theme of police leadership produced results close to zero. The findings reveal that few studies address leadership in police organisations, and even fewer if critical, dangerous contexts are examined. The trends analysed indicate that worldwide scientific interest in the subject remains low and the theme must be further explored.
- Topic:
- Security, Leadership, Crisis Management, and Police
- Political Geography:
- Global Focus
11. Anxiety, Ambivalence and Sublimation: ontological in/security and the world risk society
- Author:
- John Cash
- Publication Date:
- 04-2022
- Content Type:
- Journal Article
- Journal:
- Uluslararasi Iliskiler
- Institution:
- International Relations Council of Turkey (UİK-IRCT)
- Abstract:
- This article aims to expand the social-theoretical and psychoanalytic range of research on ontological in/ security, by exploring parallel concerns addressed by Beck, Kristeva, Butler and Zizek. These include, first, the psychic roots of othering processes and their encoding into cultural repertoires. Second, the difficulties and possibilities of displacing othering processes within national and international politics. Third, the disruptive effects of globalising processes on the symbolic efficiency of cultures and on their encoded defences against ontological insecurity. Fourth, the crucial significance for political and international relations of the qualitative characteristics of those defences against ontological insecurity that gain predominance within cultural repertoires and their variable norms of recognition. Likewise, the significance of those norms of recognition that challenge established norms and successfully reorganise cultural repertoires.
- Topic:
- International Relations, Security, Defense Policy, and Political Theory
- Political Geography:
- Global Focus
12. Environmental Security in the Anthropocene
- Author:
- Simon Dalby
- Publication Date:
- 03-2022
- Content Type:
- Journal Article
- Journal:
- Brown Journal of World Affairs
- Institution:
- Brown Journal of World Affairs
- Abstract:
- Simon Dalby is a Professor at Wilfrid Laurier University, Waterloo, Ontario, where he teaches in the Balsillie School of International Affairs, and a Senior Fellow at the Centre for International Governance Innovation. He is author of Anthropocene Geopolitics (University of Ottawa Press 2020) and Rethinking Environmental Security (Edward Elgar 2022).
- Topic:
- Security, Environment, Politics, and Anthropocene
- Political Geography:
- Global Focus
13. Desradicalizacióny desvinculación:aspectos formales y teóricos
- Author:
- Roberto Muelas Lobato and David García
- Publication Date:
- 06-2022
- Content Type:
- Journal Article
- Journal:
- Journal on International Security Studies (RESI)
- Institution:
- International Security Studies Group (GESI) at the University of Granada
- Abstract:
- La radicalización constituye una de las mayores problemáticas a nivel securitario y social. No obstante, el número de detenciones en los últimos años han llevado a replantearse reforzar los modelos de intervención en su relación con la desvinculación y la desradicalización. Como consecuencia, la atención está cambiando hacia los procesos de desvinculación/desradicalización. Tratando de aunar los conocimientos sobre la temática, en el presente manuscrito se realiza una revisión de la literatura que trata de identificar y valorar algunos de los factores y modelos de desvinculación, desradicalización y/o reinserción desarrollados en estas últimas décadas. En primera instancia se conceptualizan la desradicalización, entendida como un proceso social y psicológico por el que el compromiso de un individuo con la radicalización violenta y su participación en ella se reducen hasta el punto de que ya no corre el riesgo de implicarse y participar en actividades violentas, y la desvinculación, proceso mediante el cual un individuo experimenta un cambio de rol o función que suele ir asociado a una reducción de la participación en la violencia. Posteriormente, se analizan los principales factores de empuje y atracción que se han encontrado en la literatura, destacando, por un lado, la desilusión con la estrategia o las acciones del grupo radical y, por otro lado, las relaciones con personas fuera del grupo y las demandas familiares. A continuación, se hacen explícitos siete modelos teóricos propuestos desde distintas disciplinas que tratan de explicar los procesos de desvinculación, desradicalización y/o reinserción social. Entre estos modelos, encontramos la trayectoria de desvinculación,el modelo de inversión,el modelo 3N,el modelo pro-integración,los bucles de refuerzo,el modelo de las dinámicas de la desvinculación y el modelo fénix de desvinculación. Finalmente, se discuten algunas de las similitudes y diferencias de estos modelos y sus principales limitaciones.
- Topic:
- Security, Disengagement, Deradicalization, and Theoretical Models
- Political Geography:
- Global Focus
14. Selected Problems of Security Control in Civil Aviation Based on Own Empirical Research
- Author:
- Gabriel Nowacki and Bohdan Paszukow
- Publication Date:
- 06-2022
- Content Type:
- Journal Article
- Journal:
- Polish Political Science Yearbook
- Institution:
- Polish Political Science Association (PPSA)
- Abstract:
- The paper refers to the evolution of methods, new technologies, and devices in security control processes in light of civil aviation requirements, procedures, and increased flow of passengers. The research problem has been defined as follows: How shall the international airport security controls function in the context of regulatory and operational conditions and current and future threats? In reference to the problem, the research hypothesis was defined as follows: Security control in civil aviation consists of screening persons and detecting prohibited articles and mainly depends on the professional competence of security staff and the proper selection and maintenance of electronic assistive devices. Professional competences refer to personnel’s knowledge, experience, qualification, monitoring, operational supervision, and quality control as part of their tasks. The development of new technologies requires the appropriate selection, commensurate with risk analysis, of electronic assistive devices, including equipment, methods, technical means, and their maintenance in a proper technical condition. The paper presents the results of empirical research conducted amongst experienced aviation security forums. Because of its complexity and unpredictability, this problem still leaves a wide margin for improvement and efficiency. The following research methods were used to solve the research problem: theoretical methods and empirical methods: diagnostic survey and expert interview.
- Topic:
- Security, Science and Technology, Terrorism, and Aviation
- Political Geography:
- Global Focus
15. The Role of Material Stocks in the National Security System
- Author:
- Malgorzata Grzelak
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Polish Political Science Yearbook
- Institution:
- Polish Political Science Association (PPSA)
- Abstract:
- The article consists of two parts. The first part describes the essence of the national security system and its structure. Using the Ishikawa diagram and the value chain, the authors presented the shortcomings of the national security system and a sequence of actions that can improve it. The second part of the article is devoted to material stocks and their role in the analyzed system. The survey research presented in this part of the article confirmed the importance of material stockpiles in ensuring national security. In addition, the research highlighted the need for government organizations to cooperate in the continuous replenishment of material stocks during a crisis.
- Topic:
- Security, Defense Policy, National Security, Pandemic, and COVID-19
- Political Geography:
- Global Focus
16. PLAN E: A Grand Strategy for the Twenty-first Century Era of Entangled Security and Hyperthreats
- Author:
- Elizabeth G. Boulton
- Publication Date:
- 03-2022
- Content Type:
- Journal Article
- Journal:
- Journal of Advanced Military Studies
- Institution:
- Marine Corps University Press, National Defense University
- Abstract:
- A transdisciplinary research project investigated the idea of framing climate and environmental change (CEC) as a new type of threat: a hyperthreat. Traditional military analytical methods were used to assess the hyperthreat and its context and develop ideas about how an adequate response could be conceived. This approach contrasts to prior literature and longstanding geopolitical discourse that identify the risks of taking a securitization approach. Instead, the author argues that it is now riskier not to consider CEC within a mainstream geopolitical and nation-state security strategy. When the hyperthreat of CEC is centered as the main threat to be contained, and its relationship to other threats is analyzed, startling new pathways to stability emerge. The research developed a new theoretical approach called “entangled security” to develop an initial new “grand narrative” and “grand strategy” (PLAN E). This article offers a vision of how military theory can be reimagined to support new policy directions and security priorities.
- Topic:
- Security, Climate Change, Environment, Military Strategy, and Non-Traditional Threats
- Political Geography:
- Global Focus
17. Proposed method for building an anti-drone system for the protection of facilities important for state security
- Author:
- Jędrzej Łukasiewicz
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- Unmanned aerial vehicles (UAVs) pose a threat to buildings and facilities important to the security of the state. As they are able to operate like individual aircraft, the number of ways they can be used for terrorist activity is practically unlimited. Anyone in charge of a facility that is crucial for the reliable functioning of a state is obliged to ensure an acceptable level of security. Since drones can be used to attack protected structures, they need to be protected by an anti-drone system. The paper proposes a method for assessing the effectiveness of systems for detecting and neutralising unmanned aerial vehicles. In order to suggest a new method for assessing the effectiveness of anti-drone systems, an analysis of the scientific literature and other documents describing existing anti-drone systems has been carried out. Attacks involving the use of drones, both in wartime and in incidents of terrorism, are also analysed and existing anti-drone solutions assessed. Because there are a variety of technical solutions for the detection and neutralisation of drones, and different location and weather conditions, a universal method is proposed based on probability calculations and neutralisation of drones, using mathematical formulas. This method allows for the effectiveness of the entire anti-drone system to be assessed on the basis of measuring the probability of detection and neutralisation of drones in real conditions. The proposed method allows the effectiveness of the currently existing anti-drone systems to be evaluated and for new methods for detecting and neutralising drones to be proposed. This method, based on mathematical calculations, enables software to be written for simulating anti-drone systems on computers and for the effectiveness of these systems to be confirmed before their construction in a protected facility.
- Topic:
- Security, Defense Policy, Weapons, and Drones
- Political Geography:
- Global Focus
18. Intelligent terrorism as a security threat to critical infrastructure
- Author:
- Ossi Heino
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- This paper considers terrorism as potentially ‘intelligent’, as a threat capable of abusing the critical infrastructures of societies and the related methods for knowledge production. Respectively, it sees critical infrastructures as attractive mediums for terrorist influence. The paper describes the contrast between the logic of providing security and certainty for critical infrastructures and the threat of terrorism, which is evolving in terms of its systemic capacities and intelligence. The way security is provided within critical infrastructures and the way intelligent terrorism could operate seem to separate from each other, thereby creating vulnerability. The paper seeks to enhance the conceptual understanding of this question by describing and closing the gap created by the intellectual separation. By doing so, the article will shed light on the conceptual dimension of the (in)security that has gone unnoticed in the interface between critical infrastructures and terrorism. It outlines the aforementioned dilemma and provides conceptual understanding that makes it easier to grasp and communicate further. The paper shows that the intellectual separation has weakened the possibilities for theoretically understanding and practically recognising terrorism as a phenomenon that is becoming systemically more conscious, more intelligent and potentially increasingly capable in a form of violence that exploits the basic structures of societies and the related knowledge methods for its own purposes. As a conclusion, the paper stresses the importance of profoundly critical tools. Such tools are often perceived as being undesirable or even counter-productive in figuring out the mechanism through the very means utilised in providing for security.
- Topic:
- Security, Terrorism, Infrastructure, Cybersecurity, and Rationality
- Political Geography:
- Global Focus
19. Preparing critical infrastructure for the future: Lessons learnt from the Covid-19 pandemic
- Author:
- Amelia Tomalska
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The objective of this paper is to provide a view on the problem of insufficient state protection of critical infrastructure throughout the Covid-19 crisis. The paper looks at this problem with regard to the definition of critical infrastructure, its content, and also the limitations of current approaches to critical infrastructure protection. The examples relating to the Covid-19 crisis show the practices adopted and suggest possible steps forward. The research methodology implemented in this research is based on a critical analysis of the existing literature. The themes described in this paper show there is an urgent need to change current critical infrastructure protection approaches to a resilience-based modus operandi. Specifically, this paper highlights the need to shift the understanding of critical infrastructure from an object-oriented approach towards essential services/functions and to highlight its complex, socio- technical nature. It also highlights the deficiencies of current, prevention-based approaches to critical infrastructure protection such as the insufficient focus on identification and management process of vulnerabilities, especially in relation to (inter)dependencies resulting from interconnections with other systems. The gravity of the situation caused by the Covid-19 pandemic, despite its negative connotations, can be used as an opportunity to examine the real condition of protection of critical infrastructure. The pandemic suggests that there is much left to be done and because of the unpredictability of the future, we need to start acting as soon as possible.
- Topic:
- Security, Infrastructure, Resilience, COVID-19, and Protection
- Political Geography:
- Global Focus
20. Abstraction-decomposition space for critical infrastructure systems: A framework for infrastructure planning and resilience policies
- Author:
- Stig Rune Sellevåg
- Publication Date:
- 09-2022
- Content Type:
- Journal Article
- Journal:
- Security and Defence Quarterly
- Institution:
- War Studies University
- Abstract:
- The objective of this work has been to propose a framework that will aid governments with the development of more coherent and effective infrastructure planning and resilience policies through a system-of-systems approach that is grounded in theory for complex sociotechnical systems. The framework has been developed by using a work domain analysis (WDA). The WDA consists of an abstraction hierarchy analysis and a part-whole decomposition. Together, the abstraction hierarchy and the part-whole description form the abstraction-decomposition space (ADS) for which the system constraints apply. By imposing constraints, the WDA promotes design for adaptation where actors within the system are allowed to adapt their behaviour as they find appropriate without violating the system’s constraints. The proposed ADS consists of five levels of abstraction and four levels of decomposition. By applying the ADS, it will aid decision making related to the overall purposes of the critical infrastructure system, the values and priority measures that are used to assess the system’s progress towards the functional purposes, as well as formulation of infrastructure needs that are necessary to achieve the functional purposes. The framework is formative in the sense that it reveals how work can be done in the critical infrastructure system. This is important because it is not feasible to prescribe, describe and risk assess all possibilities for action that are available in complex sociotechnical systems, especially when dealing with unforeseen events. Future research should focus on finding science-based yet useful in practice ways for establishing values and priority measures that encompass sustainability issues and resilience standards.
- Topic:
- Security, National Security, Infrastructure, Resilience, Economic Security, and Adaptation
- Political Geography:
- Global Focus
- « Previous
- Next »
- 1
- 2
- 3