Nested Security

Nested Security
Author :
Publisher : Cornell University Press
Total Pages : 261
Release :
ISBN-10 : 9781501701269
ISBN-13 : 1501701266
Rating : 4/5 (69 Downloads)

Book Synopsis Nested Security by : Erin K. Jenne

Download or read book Nested Security written by Erin K. Jenne and published by Cornell University Press. This book was released on 2015-11-02 with total page 261 pages. Available in PDF, EPUB and Kindle. Book excerpt: Why does soft power conflict management meet with variable success over the course of a single mediation? In Nested Security, Erin K. Jenne asserts that international conflict management is almost never a straightforward case of success or failure. Instead, external mediators may reduce communal tensions at one point but utterly fail at another point, even if the incentives for conflict remain unchanged. Jenne explains this puzzle using a "nested security" model of conflict management, which holds that protracted ethnic or ideological conflicts are rarely internal affairs, but rather are embedded in wider regional and/or great power disputes. Internal conflict is nested within a regional environment, which in turn is nested in a global environment. Efforts to reduce conflict on the ground are therefore unlikely to succeed without first containing or resolving inter-state or trans-state conflict processes. Nested security is neither irreversible nor static: ethnic relations may easily go from nested security to nested insecurity when the regional or geopolitical structures that support them are destabilized through some exogenous pressure or shocks, including kin state intervention, transborder ethnic ties, refugee flows, or other factors related to regional conflict processes. Jenne argues that regional security regimes are ideally suited to the management of internal conflicts, because neighbors that have a strong incentive to work for stability provide critical hard-power backing to soft-power missions. Jenne tests her theory against two regional security regimes in Central and Eastern Europe: the interwar minorities regime under the League of Nations (German minorities in Central Europe, Hungarian minorities in the Carpathian Basin, and disputes over the Åland Islands, Memel, and Danzig), and the ad hoc security regime of the post–Cold War period (focusing on Russian-speaking minorities in the Baltic States and Albanian minorities in Montenegro, Macedonia, and northern Kosovo).


Nested Security Related Books

Nested Security
Language: en
Pages: 261
Authors: Erin K. Jenne
Categories: Political Science
Type: BOOK - Published: 2015-11-02 - Publisher: Cornell University Press

DOWNLOAD EBOOK

Why does soft power conflict management meet with variable success over the course of a single mediation? In Nested Security, Erin K. Jenne asserts that interna
Software System Reliability and Security
Language: en
Pages: 428
Authors: Charles Antony Richard Hoare
Categories: Computers
Type: BOOK - Published: 2007 - Publisher: IOS Press

DOWNLOAD EBOOK

To make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and metho
Obstructions in Security-Aware Business Processes
Language: en
Pages: 359
Authors: Julius Holderer
Categories: Computers
Type: BOOK - Published: 2022-07-23 - Publisher: Springer Nature

DOWNLOAD EBOOK

This Open Access book explores the dilemma-like stalemate between security and regulatory compliance in business processes on the one hand and business continui
Data and Applications Security XVII
Language: en
Pages: 415
Authors: Sabrina De Capitani di Vimercati
Categories: Computers
Type: BOOK - Published: 2006-04-11 - Publisher: Springer

DOWNLOAD EBOOK

Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, soci
Securing Delay-Tolerant Networks with BPSec
Language: en
Pages: 358
Authors: Edward J. Birrane, III
Categories: Technology & Engineering
Type: BOOK - Published: 2023-02-07 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

One-stop reference on how to secure a Delay-Tolerant Network (DTN), written by experienced industry insiders Securing Delay-Tolerant Networks with BPSec answers