Open Access. Powered by Scholars. Published by Universities.®

Other Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Other Political Science

Security Is Local: An Analysis Of The Use Of Community-Based Security Forces During Counterinsurgency Operations, Alexander Stephenson May 2018

Security Is Local: An Analysis Of The Use Of Community-Based Security Forces During Counterinsurgency Operations, Alexander Stephenson

Dissertations

Counterinsurgency (COIN) operations are the most common type of military operation conducted by the United States and other Western powers. In most cases, conventional forces intervening in an insurgency are limited in personnel and turn to local community-based security forces to mitigate this shortcoming after initial attempts fail to defeat an insurgency with the conventional forces available. While the use of community-based security forces is a common element of COIN operations, little research has been conducted to determine the factors that contribute to their successful employment. A synthesis of existing COIN and community-based policing theory provides a model to evaluate …


Security Is Local: An Analysis Of The Use Of Community-Based Security Forces During Counterinsurgency Operations, Alexander Stephenson Dec 2017

Security Is Local: An Analysis Of The Use Of Community-Based Security Forces During Counterinsurgency Operations, Alexander Stephenson

Alexander Stephenson

Counterinsurgency (COIN) operations are the most common type of military operation conducted by the United States and other Western powers.  In most cases, conventional forces intervening in an insurgency are limited in personnel and turn to local community-based security forces to mitigate this shortcoming after initial attempts fail to defeat an insurgency with the conventional forces available.  While the use of community-based security forces is a common element of COIN operations, little research has been conducted to determine the factors that contribute to their successful employment.  A synthesis of existing COIN and community-based policing theory provides a model to evaluate …


Rethinking Baloch Secularism: What The Data Say, C. Christine Fair, Ali Hamza Apr 2017

Rethinking Baloch Secularism: What The Data Say, C. Christine Fair, Ali Hamza

Peace and Conflict Studies

Since 1947, Baloch have resisted inclusion into the Pakistan and have waged several waves of ethno-nationalist insurgency against the state. Scholars and Baloch nationalist leaders alike generally assert that Baloch are more secular than other Pakistanis, more opposed to the political Islamist policies pursued by the state, and less supportive of Islamist militancy in the country. However, these claims lack empirical support. We employ data derived from a large national survey of Pakistanis from 2012 to evaluate these conventional wisdoms. Contrary to claims in the literature, we find that Baloch resemble Pakistanis generally with few important exceptions.


Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam Jan 2010

Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam

Allen Gnanam

Terrorism as a violent and destabilizing act performed by terrorists, meaning loyal followers of political or religious agendas who hold resent and animosity toward a certain authority/ government (Lin, Liou, & Wu, 2007, pg. 149), will be explored and analyzed through the utilization of the governmentality perspective. For the purposes of this paper terrorism governance will refer to the governance/ control/ influence exerted by terrorists and terrorism. The focus of this explorative and analysis paper will be to identify diverse terrorism oriented technologies of governance, and analyze the ways in which these technologies enable terrorist to exert governance both indirectly …