This website uses cookies to ensure you have the best experience. Learn more

Human Security Essay

1956 words - 8 pages

AN ESSSY ON

THE POSSIBILITIES AND LIMITATIONS PRESENTED BY THE NEW LIBERAL APPROACH OF HUMAN SECURITY

By ANON

INTRODUCTION

1. ‘Human Security’ is an emerging paradigm which is used to understand contemporary security issues that affect the individual rather than the state. The notion of ‘National Security’ where the perceived threat came from another state intending to attack other states borders is being re-viewed. “Ideally, ‘national security’ and ‘human security’ should be mutually reinforcing, for the past 100 years far more people have died as a direct or indirect consequence of the actions of their own governments or rebel forces in civil wars than have been killed by ...view middle of the document...

Although primarily an analysis of development crisis facing the post- Cold War world, it also adopted a key postulate that, if applied, would have major implications for security politics”. 3 Although these categories are still to be defined by the international community, they are recognisable as a framework for the ‘human security’ issues. By being able to recognise and understanding the primary elements, the ‘Human Security’ threats can be identified earlier and can act as ‘triggers’ for the early recognition of potential issues.

4. Understanding these ‘triggers’ will enable states to devise complex strategies that will allow for the possibility of early intervention by the international community. It is understood that due to the diversity and complexity of the range of issues within the broad categories, multiple strategies may be required. “International initiatives - such as the Millennium Development Goals (MDGs) and the Responsibility to Protect (R2P) present realistic opportunities to enhance human security”. 4 These initiatives rely heavily on support from the international community and require commitment by nations in order to be effective. The development of strategies by nations would serve to enhance the relationships between government agencies (including military and police forces), non-government organisations and international humanitarian agencies. This in turn would allow for better cooperation and planning and achieve a more targeted level of support.

5. The ability to foresee and to predict issues prior to the culmination of the event should be harnessed where practicable by the international community. Strategies enable orchestrated action which can potentially offset the negative effect on human life and minimise the impact on other states, thus containing the problems and enhancing the provision of aide by local governments, foreign countries and international aid agencies.

COORDINATED APPROACH

6. In addition to the possibilities of complex strategies, and in direct support of the actions entailed within them, the paradigm of ‘Human Security’ has the possibility to provide a very coordinated, targeted and effective approach to the issues. Throughout the international community there are numerous nations which are already committed to supporting the needs of the individual within the ‘human security’ construct.

7. Not all of these nations such as Japan and Canada agree on the priorities within the spectrum of issues and therefore plan and act in different ways in relation to the issues. For example;” the Japanese government has focused on ‘freedom from want’ and the impact on human security of economic downturns”. 5 “To facilitate this Japan established The Trust Fund for Human Security through the UN with contributions from Japan”. 6 “Canada has focused on ’freedom from fear’ as the pillar of its human security doctrine. As part of its security agenda Canada has promoted initiatives such as the...

Other Papers Like Human Security

Security Breach Essay

1832 words - 8 pages . References Burdon, M., Reid, J & Low, R. (2010). Encryption safe harbours and data breach notification laws. Computer Law & Security Review, 26(5), 520-534. Colwill, C. (2009). Human factors in information security: The insider threat – Who can you trust these days. Information Security Technical Report, 14(4), 186-196. Electronic support. (2011). Retrieved October 14, 2011 from http://esupport.sony.com/perl/select-system.pl Information

Cap Study Guide Essay

5295 words - 22 pages human resources that's required to achieve a particular outcome. 9. There are Tasks associated with each RMF step.  You must have a basic understanding of what happens at each task AND the role that has Primary Responsibility for each task. • Categorize the information system and the information processed, stored, and transmitted by that system based on an impact analysis. • Select an initial set of baseline security

Security Management In Noi Bai Airport

1339 words - 6 pages assurance that goods have not been tampered with and kept secure. There are several security threats such as Terrorism, Organised Crime and Cargo Theft, Hijacking and Piracy, Drug/human smuggling, Illegal weapons, Counterfeit goods, Illegal exports of licensed materials/technology For instance, transnational criminal organizations use the aviation system to transport contraband and, increasingly, people across the globe. Cocaine smugglers have used

Homeland Security

571 words - 3 pages politicians and voters. Homeland security builds coalitions and partnerships, protects civil rights and civil liberties, and develops human capital. Coalitions and partnerships are one of the key points of homeland security. Homeland security was created during Cold War. This was to protect the USA from the possibility of a nuclear war with the communistic government of the Russians at the time. Today the USA’s department of homeland security

To What Extent Is Security a Necessary Precondition for Development?

3117 words - 13 pages will aim to illustrate, is the extent of this link, the theories which explain it, and whether or not security underpins development. Before we begin however, it would be prudent to first, define the concepts of ‘security’ and ‘development’. From the obvious, national security dimension, to the more human-centred, holistic definitions, finding a simple definition for the concept of security is a complex task, due to the variety of ways in which it

Global Security Policy - Week 5 - Cmgt-400

969 words - 4 pages Global Security Policy CMGT-400 Monday, May 11, 2015 Vijay Bhaskar Jonnalagadda Global Security Policy Organizations with offices in multiple countries have to strategically implement personnel, logistics, network configurations, and inventory; but they also have to create a security plan to secure these assets to keep their customer, brand integrity, and profits. Some of the issues faced while maintaining security for a company in

Hospital and Healthcare Security

1854 words - 8 pages not through ‘undermining, ‘regardless of how noble and right the goal.” The Human Resources department must coordinate with the COO on how many security personnel they need. They must consider on the response timeof a situation, patrolling the facility and fixed watching posts to determine number of staffs. They must decide if they want to be an in house security or a contracted one. Depending on the facility the number of beds, schedule of

A Security Risk Management Approach for E Commerce.Pdf

2235 words - 9 pages shortcomings can be used to improve an organisation and show its weaknesses, but also, to show possibilities for attack. Baseline security approach The aim of risk analysis is to eliminate or reduce risks and vulnerabilities that affect the overall operation of organisational computer systems. Risk analysis not only looks at hardware and software, but also covers other areas such as physical security, human security, and business and

Understand Security

1491 words - 6 pages security management plan. The security management plan will detail the design criteria for systems / procedures and state which standards are to be complied with as a minimum, for example Vetting of security personnel to BS 7858:2006 and electronic system standards for access control BS EN 50133. Conclusion. Security Management is a broad field of management related to asset management, physical security and human resource safety functions. It

Private Security Evolution

589 words - 3 pages In his paper, “A Theory of Human Motivation,” the famed American Psychologist Abraham Maslow outlined the basic human needs. These included Physiological, Safety, Belongingness and Love, Esteem, and Self-Actualization in that order. In his study, he points out that every human being has a need to feel safe (McLeod). It is innate to long for security for your person and your property. Even depictions of the earliest man show them with clubs

Preventing Security Breaches

542 words - 3 pages avoid data breaches. Hackers are far more likely to take advantage of “low hanging fruit” than battle with proper encryption and high quality passwords. Train Your Employees A recently released report from computing giant IBM attributes some 95% of IT security breaches to human error. It simply does not matter how amazingly secure a network is if the people accessing it are unaware of their role in maintaining that network’s security. The

Related Essays

Top 10 Laws Of Security Essay

1706 words - 7 pages entity and ensure its integrity. Business is built on Trust, and no trust without security. It is important to notice the great effect of human being due care and due deligence as crucial factors to practice security awareness. It is very important to cover security issues periodically to ensure no vulnerabilities stand out their. Finally, management, employees, teachers, students, doctors, family... etc should work together under pre-defined rules and strategic security objectives to secure their communities and environments.

From Traditional To Critical Security Essay

704 words - 3 pages * Refer to lecture slides. Final points of CSS * Refer to lecture slides Human security * Refer to lecture slides IR theory and human security * Realism: human security is not a important concept * Liberalism: Role of international organization in promoting human security * constructivism- focus on political development and human rights * Critical approaches- focus on freedom from oppression. Emergence of human

Linux Security Essay

448 words - 2 pages and improving security. • security policy; • organization of information security; • asset management; • human resources security; • physical and environmental security; • communications and operations management; • access control; • information systems acquisition, development and maintenance; • information security incident management; • business continuity management; • Compliance. ISO/IEC 27001 is an internationally

Information Security Essay

988 words - 4 pages Human differences Human beings are prone to certain characteristics that tend to affect their relation to information security. Information security refers to the ability of an individual to ensure that information is free from any kind of access by unwarranted individuals. There are several human inadequacies that affect the level of information security. However, this discussion is going to concentrate on three major human characteristics