Open Access. Powered by Scholars. Published by Universities.®
Social Psychology and Interaction Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Afghanistan (1)
- Assessments (1)
- Banopitcon (1)
- Book Review (1)
- Counter law (1)
-
- Crime (1)
- Crime in an insecure world (1)
- Cyber (1)
- Disciplinary networks (1)
- Economic obstacles (1)
- Exceptionalism (1)
- Foucaults triangular model (1)
- Future oriented risk assessments (1)
- Governmnetality (1)
- Insecure (1)
- Insecurity management (1)
- Intelligence networks (1)
- Mertons Strain theory (1)
- Multilateral networks (1)
- Neo liberal culture (1)
- Normalization of imperative movement (1)
- Opium eradication (1)
- Opium trade (1)
- Political economy (1)
- Political obstacles (1)
- Precautionary logic (1)
- Preventing regression (1)
- Private Security (1)
- Private justice networks (1)
- Private security (1)
Articles 1 - 4 of 4
Full-Text Articles in Social Psychology and Interaction
Non Nation Destabilizing Eradication Of Opium Cultivation In Afghanistan: A History Backed Analysis, Allen Gnanam
Non Nation Destabilizing Eradication Of Opium Cultivation In Afghanistan: A History Backed Analysis, Allen Gnanam
Allen Gnanam
A successful and non nation destabilizing eradication of opium cultivation in Afghanistan, is contingent upon the mandatory countering of interconnected (a) economic obstacles, (b) sociocultural obstacles, and (c) political obstacles that are fueling and maintaining the illegal production and trade of heroin. This paper will explore and analyze the above mentioned interconnected obstacles, in order to present the complex issues that need to be addressed when it comes to dismantling the illegal opium bastion in Afghanistan. At a macro- level Foucault’s triangular model that identifies the interconnectivity between the government, the population, and the political economy (1978) will be utilized …
Cyber Terrorism, Allen Gnanam
Cyber Terrorism, Allen Gnanam
Allen Gnanam
This paper sets out to identify and explain the negative national security implications, negative physical & psychological implications, and the negative economic implications that society could face, as a result of a severe cyber attack against major sectors of a nations infrastructure. In addition instigating factors that lead to/ provoke cyber terrorism will be identified, in order to strategically influence counter cyber terrorism policy towards an offensive model. Along with that, this paper will present defensive/ target hardening counter- cyber terrorism policies that will enable proactive security mechanisms to be implemented.
Book Review Of: Crime In An Insecure World: By Richard Ericson, Allen Gnanam
Book Review Of: Crime In An Insecure World: By Richard Ericson, Allen Gnanam
Allen Gnanam
Crime in an Insecure World written by Richard Ericson, depicts western society as a neo-liberal state, that has an impulsive tendency to criminalizes all sources of harm through precautionary logic, risk assessment, surveillance measures, and counter law I and II, due to the dominant culture of impulsive criminalization that produces uncertainty. Counter Law, precautionary logical, risk assessment, and uncertainty are the 4 major concepts discussed by Ericson, and these concepts will be analyzed and interpreted during this book review.
Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam
Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam
Allen Gnanam
This paper is theoretically grounded on the Ban opticon framework that is characterized by the use of exceptionalism, the normalization of imperative movement, and profiling for insecurity management purposes (Bigo, 2005). This framework will be utilized in order to expose and analyze the Ban optic governmentality of the private security industry. Secondly, the overall discussion and analysis of the private security industry- Ban opticon nexus will be discussed with specific reference to the private security operations of The New Commons. Thirdly, three private security intelligence networks identified by Lippert & O’Connor (2006) namely Disciplinary Networks, Private Justice Networks, and Multilateral …