The Soviet intervention in Afghanistan was a costly and, ultimately, pointless war. However, exactly why the Red Army wound up in direct military conflict, embroiled in a bitter and complicated civil war—some 3,000 kilometres away from Moscow—is a point of historiographical uncertainty. Little known and appreciated for its significance, the Soviet-Afghan War was one of the turning points of the late Cold War.
Because the scale and intensity of human rights violations remains high, the UN has already acknowledge the importance of investing in development projects that can create long-term change by educating future generations to be imaginative and thoughtful in their problem-solving capabilities. Ultimately, we must believe in the power of art to change lives.
This essay examines the extent to which agency is the determining factor of a migrant’s situation at their point of departure and upon entering a new community. It suggests that whilst recognizing the individual is crucial, policy also needs to account for structural limitations which constrict choices.
International institutions are generally the results of leading states. Therefore, it is world powers that could eventually, under conditions of extreme political will, promote global peace and security and not the international institutions they have created in order to build their spheres of influence and increase their power in the international system.
Terrorist organizations have become more effective in delivering fear to global populations. It is not only globalization that has helped terrorist groups operate more efficiently, but also their inherited nature of a constant process of adaptation, ingenuity, and incrementalism when faced with new grand strategies.
The media affects the structure of both the domestic and international system and has influenced the way international actors interact, thus indirectly impacting foreign policy.
The idea of poverty as a security issue has been fairly commonplace since the end of the Cold War. In 1993, the United Nations sought to redefine security with individuals as the referent object; a framework in which poverty is one of the principal security threats as it significantly reduces quality and quantity of life. At the same time, poverty was gaining importance in the security agendas of states. This is based on the idea that poverty is a threat to the rich as well as the poor and that an unequal world is an unstable one; a view that has become very powerful in the years since September, 2001. This essay will address the implications of this second type of securitisation – world poverty as a threat to the west.
Indigenous identity is problematic because it is grounded on the politics of difference, especially on the existence of a prior identity. This essay argues that indigenous security implies the identification and security of the vulnerable shared identity from the dominant one, which then results in the creation of indigenous peoples as a threat.
The typical approaches to warfare, force, offence, defence and deterrence, do not necessarily cross over into cyber conflicts, be they for cyber warfare or countering cyber-terrorism. The world of network interactions changes the rules of the game, where the attackers can more easily remain anonymous, and the targets can be anything that is on an open network.
Since Poland gained its independence in1989, economic development and modernization has been a driving factor for reforms. As EU at the time was closely associated with democratic stability and the prosperity enjoyed in Western Europe, membership became a vital step in the pursuit to attain Western level of welfare and prosperity.
Before you download your free e-book, please consider donating to support open access publishing.
E-IR is an independent non-profit publisher run by an all volunteer team. Your donations allow us to invest in new open access titles and pay our bandwidth bills to ensure we keep our existing titles free to view. Any amount, in any currency, is appreciated. Many thanks!
Donations are voluntary and not required to download the e-book - your link to download is below.