SlideShare a Scribd company logo
1 of 24
International Security, Peace, and
Human Rights
International Security
1
Three Critical Questions
• How do we define and understand “international Security”?
• In what ways are security and our attempt to achieve it, evolving?
• What can current debate over “nuclear non-proliferation” tell us about the state
of intl security today?
• How to keep the state secure from external military threats (the threat of nuclear
weapons)?
2
How do we define and understand “international
Security”?
International security is a relatively new field of study
Security is a contested concept
To some its antivirus,
To some it’s the line to get through security in the airport,
To some its terrorism.
Security: measures taken by states to ensure the safety of their citizens,
the protection of their way of life and the survival of the nation state.”
3
What does it mean to be secure?
In terms of national security: integrity of borders, independent control
of territory, economic wealth, military power and preservation of vital
interest.
What makes a human secure?
The United Nations Human Development Program (UNHDP) report
of 1994
4
Definition of Human Security 1
“Human security can be said to have two main aspects. It means, first, safety
from such chronic threats as hunger, disease and repression. And second, it
means protection from sudden and hurtful disruptions in the patterns of daily life
– whether in homes, in jobs or in communities. (UNPDP 1994)
The protection of individuals and communities from war and other forms of
violence. (The Human Security Center 2005)
To protect the vital core of all human lives in ways that advances human freedom
and human fulfillment. (Alkiri 2004).
Freedom from want, freedom from fear and a life lived in dignity- which one
should be prioritized?
5
6
Defining Human Security 2
• Former Secretary General of the United Nations Kofi Annan
“During the Cold War, security tended to be defined almost entirely in terms of military
might and the balance of terror. Today, we know that ‘security’ means far more than the
absence of conflict. We also have a greater appreciation for non-military sources of
conflict.
We know that lasting peace requires a broader vision encompassing areas such as
education and health, democracy and human rights, protection against environmental
degradation, and the proliferation of deadly weapons.
We know that we cannot be secure amidst starvation, that we cannot build peace without
alleviating poverty, and that we cannot build freedom on foundations of injustice. These
pillars of what we now understand as the people-centred concept of ‘human security’ are
interrelated and mutually reinforcing.”
Traditional vs Modern Security Studies 1
Traditional International security:
Was state centric. Security is provided by states for states.
Focused on military power.
Typical subjects for study were inter-state war, traditional disputes,
security dilemmas, arms races and arms control.
Traditional security practices were deterrence, compellence, alliance
systems, arms control.
7
Traditional vs Modern Security Studies 2
The Contemporary International Security:
The contemporary international security regards everything as a security
matter, ranging from traditional or conventional modes of military power to
new sources of threat.
Modern Security Studies is Human Centered
8
Concept of security
Old concept of security
• Walter Lippman: “A nation is secured if its core values are not threatened and is
able to maintain them by victory in such wars.”
• Arnold Wolfers: “Security is absence of Threat.”
New concept of security
• Barry Buzan: security is about the ability of a state and society to maintain its
independence, identity and functional integrity.
9
Traditional vs Modern Security Studies 3
Type of Security Referent Object of Protection Potential Threats
Traditional Security State Safety of the State Inter-state war and foreign
intervention
Civil Disorder
Nuclear Proliferation
Contemporary Security Human Safety and freedom of
Citizens
Economic threat (Poverty)
Health threat (Disease)
Environmental threat,
Personal threat, (Human
Rights Violations Conflicts,
Violence and Repression)
Political threat, Military
threat, social threat.
10
Why it is important to understand the concept
of security?
Safety and security are the fundamental
drivers of human being
Complex and unexpected challenges
11
Implications of human security
Nature of the threat; non-military
Referent object: all humans
Agents of security: inter-governmental, non-governmental, transnational.
Means of Security: fundamentally different than security of states
(emphasize on non-military).
12
Where does Human Security Locate Threats?
• Drug
• Disease
• Terrorism
• Pollution
• Poverty
• Environmental Problem
• Failed States
13
National Security
• What is National Security?
National security refers to the security of a nation state, including its citizens, economy, and
institutions, and is regarded as a duty of government. Government should protect the state
and its citizens against all kind of national crises through a variety of power projections such
as political power diplomacy economic and military power and so on. Originally conceived
as protection against military attack, national security is now widely understood to include
non-military dimensions, including economic security, energy security, environmental
security, food security, cyber security and so on.
• Aspects of National Security Threats
• International and national security are invariably linked. International security is
the state security or national security in global arena.
14
New Threats and threat Perceptions
• Rapid climate change
• Ethno-nationalism and ideological wars
• Rise of non-state actors, 9/11 dramatically changed security thinking
of the world.
• Failed states, Madrid attacks, Paris attacks, and many more
•
15
Five Sectors of Security by Barry Buzan
Societal Security
Political Security
Economic Security
Military Security
Environmental Security
16
Five Sectors of Security by Barry Buzan
Societal Security: ‘about identity, about the self-conception of
communities and of individuals identifying themselves as members of a
community’.
• Migration
• Horizontal competition
• Vertical competition
17
Five Sectors of Security by Barry Buzan
Political Security
• Security is – when state sovereignty is not challenged
• There should be no state within a state
• Successful power transfer from one govt to another
• Security against negative political transformation
18
Five Sectors of Security by Barry Buzan
• Economic Security
• Economic threats are difficult to determine
• There is an important linkage between economic security and military
security.
• Economic security can be considered a key indicator as to the general
security of a state.
19
Five Sectors of Security by Barry Buzan
Military Security
• Having legal status of arms
• Having ability to defend military with sophisticated weapons, troops,
technology, and training.
20
Five Sectors of Security by Barry Buzan
Environmental Security
• This is economic related – how climate change hits economy. But still
has security aspects;
• Environmental degradation, draught, famines, food shortage, land
erosion, floods, rains, earthquakes, tsunamis etc
21
Cyber security
Cybersecurity is the practice of protecting systems, networks, and programs
from digital attacks.
These cyber attacks are usually aimed at accessing, changing, or destroying
sensitive information, extorting money from users, or interrupting normal
business processes.
22
Asymmetric Warfare 1
What is asymmetric conflict?
Definition: “asymmetric” warfare could refer to terror attacks, rebel
bombings, computer viruses, nuclear proliferation and everything in-
between, as long as antagonists failed to “fight fair” or “deviated from the
norm.”
23
Asymmetric
Warfare 2
• Warfare between a state
actor and a non-state
actor
• Warfare between an actor
possessing strong
capabilities and an actor
with scarce resources
• Warfare between actors
pursuing different
strategic campaign plans
in the confrontation.
24

More Related Content

What's hot

Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb by Scot...
Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb by Scot...Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb by Scot...
Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb by Scot...Syed Fakhar Ul Hassan
 
Human Security in Security Studies
Human Security in Security StudiesHuman Security in Security Studies
Human Security in Security StudiesHasnat Karim
 
Cooperation under the security dilemma
Cooperation under the security dilemmaCooperation under the security dilemma
Cooperation under the security dilemmaSamin Mohebbi
 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND DisarmamentUltraspectra
 
Weapons of mass destruction ir
Weapons of mass destruction irWeapons of mass destruction ir
Weapons of mass destruction irvirgo_az
 
International Law in Times of Armed Conflict
International Law in Times of Armed ConflictInternational Law in Times of Armed Conflict
International Law in Times of Armed Conflictswissnex San Francisco
 
Peace Conflict and Development
Peace Conflict and DevelopmentPeace Conflict and Development
Peace Conflict and Developmentshivraj negi
 
Concept of human security
Concept of human securityConcept of human security
Concept of human securityAdan Butt
 
INTERNATIONAL HUMANITARIAN LAW ENGLISH-BURMESE VERSION
INTERNATIONAL HUMANITARIAN LAW ENGLISH-BURMESE VERSIONINTERNATIONAL HUMANITARIAN LAW ENGLISH-BURMESE VERSION
INTERNATIONAL HUMANITARIAN LAW ENGLISH-BURMESE VERSIONMYO AUNG Myanmar
 
Human vs National Security in the International arena
Human vs National Security in the International arenaHuman vs National Security in the International arena
Human vs National Security in the International arenaGabriel Orozco
 
America's War on Terror: Causes & Consequences
America's War on Terror: Causes & ConsequencesAmerica's War on Terror: Causes & Consequences
America's War on Terror: Causes & ConsequencesShahid Hussain Raja
 
Implementation of international law in current political scenario
Implementation of international law in current political scenarioImplementation of international law in current political scenario
Implementation of international law in current political scenarionimra soomro
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global ThreatFaheem Ul Hasan
 
strategic studies and international relations
strategic studies and international relationsstrategic studies and international relations
strategic studies and international relationsTallat Satti
 

What's hot (20)

Human security
Human securityHuman security
Human security
 
Human security
Human securityHuman security
Human security
 
Nuclear Proliferation
Nuclear ProliferationNuclear Proliferation
Nuclear Proliferation
 
Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb by Scot...
Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb by Scot...Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb by Scot...
Why Do States Build Nuclear Weapons? Three Models in Search of a Bomb by Scot...
 
Human Security in Security Studies
Human Security in Security StudiesHuman Security in Security Studies
Human Security in Security Studies
 
Peace and security
Peace and securityPeace and security
Peace and security
 
Cooperation under the security dilemma
Cooperation under the security dilemmaCooperation under the security dilemma
Cooperation under the security dilemma
 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND Disarmament
 
Weapons of mass destruction ir
Weapons of mass destruction irWeapons of mass destruction ir
Weapons of mass destruction ir
 
International Law in Times of Armed Conflict
International Law in Times of Armed ConflictInternational Law in Times of Armed Conflict
International Law in Times of Armed Conflict
 
Peace Conflict and Development
Peace Conflict and DevelopmentPeace Conflict and Development
Peace Conflict and Development
 
Concept of human security
Concept of human securityConcept of human security
Concept of human security
 
INTERNATIONAL HUMANITARIAN LAW ENGLISH-BURMESE VERSION
INTERNATIONAL HUMANITARIAN LAW ENGLISH-BURMESE VERSIONINTERNATIONAL HUMANITARIAN LAW ENGLISH-BURMESE VERSION
INTERNATIONAL HUMANITARIAN LAW ENGLISH-BURMESE VERSION
 
Global Peace & International Relations
Global Peace & International RelationsGlobal Peace & International Relations
Global Peace & International Relations
 
Human vs National Security in the International arena
Human vs National Security in the International arenaHuman vs National Security in the International arena
Human vs National Security in the International arena
 
America's War on Terror: Causes & Consequences
America's War on Terror: Causes & ConsequencesAmerica's War on Terror: Causes & Consequences
America's War on Terror: Causes & Consequences
 
Total war
Total warTotal war
Total war
 
Implementation of international law in current political scenario
Implementation of international law in current political scenarioImplementation of international law in current political scenario
Implementation of international law in current political scenario
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global Threat
 
strategic studies and international relations
strategic studies and international relationsstrategic studies and international relations
strategic studies and international relations
 

Similar to Haider Ali Sukhera - IPHS York University

International Relations Theory
International Relations TheoryInternational Relations Theory
International Relations TheoryClement Abugbe
 
International intellectual property law and human security
International intellectual property law and human securityInternational intellectual property law and human security
International intellectual property law and human securitySpringer
 
“LEE’s PERCEPTIONS ON HUMAN SECURITY IN AFRICA”
“LEE’s PERCEPTIONS ON HUMAN SECURITY IN AFRICA”“LEE’s PERCEPTIONS ON HUMAN SECURITY IN AFRICA”
“LEE’s PERCEPTIONS ON HUMAN SECURITY IN AFRICA”John LEE
 
Robin Luckham - Security and Development Synergies or Contradictions
Robin Luckham - Security and Development Synergies or ContradictionsRobin Luckham - Security and Development Synergies or Contradictions
Robin Luckham - Security and Development Synergies or ContradictionsInstitute of Development Studies
 
Internal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated EffortsInternal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated EffortsSudip Pandit
 
Civilians Protecting Civilans: The Role of Unarmed Civilians
Civilians Protecting Civilans: The Role of Unarmed CiviliansCivilians Protecting Civilans: The Role of Unarmed Civilians
Civilians Protecting Civilans: The Role of Unarmed CiviliansNonviolent Peaceforce
 
Catch-up Friday Human_Security_Peace Education.pdf
Catch-up Friday Human_Security_Peace Education.pdfCatch-up Friday Human_Security_Peace Education.pdf
Catch-up Friday Human_Security_Peace Education.pdfJEFFREYBERMUDEZ2
 
17 471 07_interest_groups_media_public
17 471 07_interest_groups_media_public17 471 07_interest_groups_media_public
17 471 07_interest_groups_media_publicAndrei Bujaki
 
Dialectical Relationship Between Terrorism and Human Security: A Sociological...
Dialectical Relationship Between Terrorism and Human Security: A Sociological...Dialectical Relationship Between Terrorism and Human Security: A Sociological...
Dialectical Relationship Between Terrorism and Human Security: A Sociological...Rula alsawalqa
 
Protecting Civilians in Situations of Violent Conflict
Protecting Civilians in Situations of Violent ConflictProtecting Civilians in Situations of Violent Conflict
Protecting Civilians in Situations of Violent ConflictNonviolent Peaceforce
 
Global Securities : Issues & Challenges (Post-Covid Scenario)global securiti...
Global Securities : Issues & Challenges (Post-Covid Scenario)global securiti...Global Securities : Issues & Challenges (Post-Covid Scenario)global securiti...
Global Securities : Issues & Challenges (Post-Covid Scenario)global securiti...ashimasahni3
 
Human security basic overview
Human security basic overviewHuman security basic overview
Human security basic overviewLindsey Cottle
 
7. report-for-police-intelligence.pptx
7. report-for-police-intelligence.pptx7. report-for-police-intelligence.pptx
7. report-for-police-intelligence.pptxgege131656
 

Similar to Haider Ali Sukhera - IPHS York University (20)

Human Security.pdf
Human Security.pdfHuman Security.pdf
Human Security.pdf
 
International Relations Theory
International Relations TheoryInternational Relations Theory
International Relations Theory
 
Elements of national security by Abid Hussain
Elements of national security by Abid HussainElements of national security by Abid Hussain
Elements of national security by Abid Hussain
 
International intellectual property law and human security
International intellectual property law and human securityInternational intellectual property law and human security
International intellectual property law and human security
 
Security Types & Role
Security Types & RoleSecurity Types & Role
Security Types & Role
 
“LEE’s PERCEPTIONS ON HUMAN SECURITY IN AFRICA”
“LEE’s PERCEPTIONS ON HUMAN SECURITY IN AFRICA”“LEE’s PERCEPTIONS ON HUMAN SECURITY IN AFRICA”
“LEE’s PERCEPTIONS ON HUMAN SECURITY IN AFRICA”
 
Robin Luckham - Security and Development Synergies or Contradictions
Robin Luckham - Security and Development Synergies or ContradictionsRobin Luckham - Security and Development Synergies or Contradictions
Robin Luckham - Security and Development Synergies or Contradictions
 
Human Security Approach
Human Security ApproachHuman Security Approach
Human Security Approach
 
Internal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated EffortsInternal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated Efforts
 
Civilians Protecting Civilans: The Role of Unarmed Civilians
Civilians Protecting Civilans: The Role of Unarmed CiviliansCivilians Protecting Civilans: The Role of Unarmed Civilians
Civilians Protecting Civilans: The Role of Unarmed Civilians
 
Catch-up Friday Human_Security_Peace Education.pdf
Catch-up Friday Human_Security_Peace Education.pdfCatch-up Friday Human_Security_Peace Education.pdf
Catch-up Friday Human_Security_Peace Education.pdf
 
17 471 07_interest_groups_media_public
17 471 07_interest_groups_media_public17 471 07_interest_groups_media_public
17 471 07_interest_groups_media_public
 
Dialectical Relationship Between Terrorism and Human Security: A Sociological...
Dialectical Relationship Between Terrorism and Human Security: A Sociological...Dialectical Relationship Between Terrorism and Human Security: A Sociological...
Dialectical Relationship Between Terrorism and Human Security: A Sociological...
 
Protecting Civilians in Situations of Violent Conflict
Protecting Civilians in Situations of Violent ConflictProtecting Civilians in Situations of Violent Conflict
Protecting Civilians in Situations of Violent Conflict
 
human security
human securityhuman security
human security
 
Global Securities : Issues & Challenges (Post-Covid Scenario)global securiti...
Global Securities : Issues & Challenges (Post-Covid Scenario)global securiti...Global Securities : Issues & Challenges (Post-Covid Scenario)global securiti...
Global Securities : Issues & Challenges (Post-Covid Scenario)global securiti...
 
Human security basic overview
Human security basic overviewHuman security basic overview
Human security basic overview
 
NSTP 111 Module 7ppt.pptx
NSTP 111 Module  7ppt.pptxNSTP 111 Module  7ppt.pptx
NSTP 111 Module 7ppt.pptx
 
WS509-final paper
WS509-final paperWS509-final paper
WS509-final paper
 
7. report-for-police-intelligence.pptx
7. report-for-police-intelligence.pptx7. report-for-police-intelligence.pptx
7. report-for-police-intelligence.pptx
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 

Haider Ali Sukhera - IPHS York University

  • 1. International Security, Peace, and Human Rights International Security 1
  • 2. Three Critical Questions • How do we define and understand “international Security”? • In what ways are security and our attempt to achieve it, evolving? • What can current debate over “nuclear non-proliferation” tell us about the state of intl security today? • How to keep the state secure from external military threats (the threat of nuclear weapons)? 2
  • 3. How do we define and understand “international Security”? International security is a relatively new field of study Security is a contested concept To some its antivirus, To some it’s the line to get through security in the airport, To some its terrorism. Security: measures taken by states to ensure the safety of their citizens, the protection of their way of life and the survival of the nation state.” 3
  • 4. What does it mean to be secure? In terms of national security: integrity of borders, independent control of territory, economic wealth, military power and preservation of vital interest. What makes a human secure? The United Nations Human Development Program (UNHDP) report of 1994 4
  • 5. Definition of Human Security 1 “Human security can be said to have two main aspects. It means, first, safety from such chronic threats as hunger, disease and repression. And second, it means protection from sudden and hurtful disruptions in the patterns of daily life – whether in homes, in jobs or in communities. (UNPDP 1994) The protection of individuals and communities from war and other forms of violence. (The Human Security Center 2005) To protect the vital core of all human lives in ways that advances human freedom and human fulfillment. (Alkiri 2004). Freedom from want, freedom from fear and a life lived in dignity- which one should be prioritized? 5
  • 6. 6 Defining Human Security 2 • Former Secretary General of the United Nations Kofi Annan “During the Cold War, security tended to be defined almost entirely in terms of military might and the balance of terror. Today, we know that ‘security’ means far more than the absence of conflict. We also have a greater appreciation for non-military sources of conflict. We know that lasting peace requires a broader vision encompassing areas such as education and health, democracy and human rights, protection against environmental degradation, and the proliferation of deadly weapons. We know that we cannot be secure amidst starvation, that we cannot build peace without alleviating poverty, and that we cannot build freedom on foundations of injustice. These pillars of what we now understand as the people-centred concept of ‘human security’ are interrelated and mutually reinforcing.”
  • 7. Traditional vs Modern Security Studies 1 Traditional International security: Was state centric. Security is provided by states for states. Focused on military power. Typical subjects for study were inter-state war, traditional disputes, security dilemmas, arms races and arms control. Traditional security practices were deterrence, compellence, alliance systems, arms control. 7
  • 8. Traditional vs Modern Security Studies 2 The Contemporary International Security: The contemporary international security regards everything as a security matter, ranging from traditional or conventional modes of military power to new sources of threat. Modern Security Studies is Human Centered 8
  • 9. Concept of security Old concept of security • Walter Lippman: “A nation is secured if its core values are not threatened and is able to maintain them by victory in such wars.” • Arnold Wolfers: “Security is absence of Threat.” New concept of security • Barry Buzan: security is about the ability of a state and society to maintain its independence, identity and functional integrity. 9
  • 10. Traditional vs Modern Security Studies 3 Type of Security Referent Object of Protection Potential Threats Traditional Security State Safety of the State Inter-state war and foreign intervention Civil Disorder Nuclear Proliferation Contemporary Security Human Safety and freedom of Citizens Economic threat (Poverty) Health threat (Disease) Environmental threat, Personal threat, (Human Rights Violations Conflicts, Violence and Repression) Political threat, Military threat, social threat. 10
  • 11. Why it is important to understand the concept of security? Safety and security are the fundamental drivers of human being Complex and unexpected challenges 11
  • 12. Implications of human security Nature of the threat; non-military Referent object: all humans Agents of security: inter-governmental, non-governmental, transnational. Means of Security: fundamentally different than security of states (emphasize on non-military). 12
  • 13. Where does Human Security Locate Threats? • Drug • Disease • Terrorism • Pollution • Poverty • Environmental Problem • Failed States 13
  • 14. National Security • What is National Security? National security refers to the security of a nation state, including its citizens, economy, and institutions, and is regarded as a duty of government. Government should protect the state and its citizens against all kind of national crises through a variety of power projections such as political power diplomacy economic and military power and so on. Originally conceived as protection against military attack, national security is now widely understood to include non-military dimensions, including economic security, energy security, environmental security, food security, cyber security and so on. • Aspects of National Security Threats • International and national security are invariably linked. International security is the state security or national security in global arena. 14
  • 15. New Threats and threat Perceptions • Rapid climate change • Ethno-nationalism and ideological wars • Rise of non-state actors, 9/11 dramatically changed security thinking of the world. • Failed states, Madrid attacks, Paris attacks, and many more • 15
  • 16. Five Sectors of Security by Barry Buzan Societal Security Political Security Economic Security Military Security Environmental Security 16
  • 17. Five Sectors of Security by Barry Buzan Societal Security: ‘about identity, about the self-conception of communities and of individuals identifying themselves as members of a community’. • Migration • Horizontal competition • Vertical competition 17
  • 18. Five Sectors of Security by Barry Buzan Political Security • Security is – when state sovereignty is not challenged • There should be no state within a state • Successful power transfer from one govt to another • Security against negative political transformation 18
  • 19. Five Sectors of Security by Barry Buzan • Economic Security • Economic threats are difficult to determine • There is an important linkage between economic security and military security. • Economic security can be considered a key indicator as to the general security of a state. 19
  • 20. Five Sectors of Security by Barry Buzan Military Security • Having legal status of arms • Having ability to defend military with sophisticated weapons, troops, technology, and training. 20
  • 21. Five Sectors of Security by Barry Buzan Environmental Security • This is economic related – how climate change hits economy. But still has security aspects; • Environmental degradation, draught, famines, food shortage, land erosion, floods, rains, earthquakes, tsunamis etc 21
  • 22. Cyber security Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. 22
  • 23. Asymmetric Warfare 1 What is asymmetric conflict? Definition: “asymmetric” warfare could refer to terror attacks, rebel bombings, computer viruses, nuclear proliferation and everything in- between, as long as antagonists failed to “fight fair” or “deviated from the norm.” 23
  • 24. Asymmetric Warfare 2 • Warfare between a state actor and a non-state actor • Warfare between an actor possessing strong capabilities and an actor with scarce resources • Warfare between actors pursuing different strategic campaign plans in the confrontation. 24