...United Nations Development Programme Human Development Report Office This note should be read in conjunction with the Regional/ National Human Development Report Toolkit. While the toolkit provides general guidance on preparing a Regional or National Human Development Report, this note gives specific suggestions on how to approach the concept of human security as a topic for such a report. Human Security A Thematic Guidance Note for Regional and National Human Development Report Teams BY OSCAR A. GÓMEZ AND DES GASPER Contents What is Human Security?............ 2 Getting Started...................................... 4 Selecting objectives and themes...... 4 The process.................................................... 6 Many important aspects of human development relate also to people’s security: loosely defined as people’s freedom from fear and freedom from want in a broad sense. Applying a human security approach offers an opportunity to analyse many issues in an informative way. This note explains how one might go about doing that. Human security relates to much more than security from violence and crime. A report team wanting to look at the security of people’s livelihoods (economic, food, environment or health security) might apply a human security approach. Human security can also be used to look into personal, community and political security. Indeed, human development reports from around the world have applied the approach in other innovative ways. But...
Words: 7478 - Pages: 30
...HUMAN AND NATIONAL SECURITY: ENMESHING CONCEPTUALIZATION OF SECURITY PARADIGM IN EMERGING SECURITY DYNAMICS Introduction and Background In the realm of international relations and political science, there has been the recurring debate on the human versus national security. Theorists and scholars, like Goucha and Crowley (2008, 57) enrolled into the ethos of realism take the state-oriented view of the security and places the dominance of national security over human security; whereas, those who take the idealistic view of the entire episode take the human security as the primary level of security to be protected by the state (Mathew, 2010, 78). The idea of human security gained eminence in security studies with developments taken place in the aftermath of the post-Cold War era. The Cold War put the security apparatuses and concepts over all other dominant themes of national and pubic life and couched them into strategic and national cultures all over the world. Now as the world is moving into new era of globalization, economic expansion and post-industrial revolution, the focus has also been shifted from national security to other facets of global world like climate change, AIDS/HIV and poverty. In this work, the contrasting debate between national security and human security will be presented in an argumentative style. For this purpose, the concept of human security will be derived from UNHP Report of 1994 whereas the concept of national security will be couched in its classical...
Words: 2210 - Pages: 9
...the era of globalization. New actors, new events, new issues being securitized and new approaches of international relations, particularly of International Security Studies came out in this period. With this set of new affairs, the concepts of Human Security and Human Rights gained relevance in the international security and international norms field. And because those terms are still contested among both the academics and the States’ decision-makers, there is a need for us to understand what they really mean. The purpose of the present essay is to bring forward the differences between Human Security and Human Rights, regarding the fact that they are very similar and complementary, and also to understand the implications that the emphasis in the concept of Human Security have for the States foreign policy and for the international order and justice. The essay is composed by an introduction, a main body where we develop the answers for the research questions, a conclusion and finally the references. 2. The Prominence of the Concept Human Rights in International Relations 3.1. Human Security different from Human Rights? Despite the fact that the Universal Declaration of Human Rights (UDHR) was adopted in 1948, due the debate raised because of the Holocaust, the WWII and many others factors, it is known that Human Rights gained more emphasis in the post-Cold War period, when the emergence of new wars (no longer conflicts between nation-states, but intra-state conflicts...
Words: 1597 - Pages: 7
...Human Resources Information Security Standards Human Resources Information Security Standards Standards August 2009 Project Name Product Title Version Number Human Resources Information Security Standards Standards 1.2 Final V1.2 Final Page 1 of 10 Human Resources Information Security Standards Document Control Organisation Title Author Filename Owner Subject Protective Marking Review date Wokingham Borough Council Human Resources Information Security Standards Steve Adamek, Head of Business Systems G\Government Connect\WBC Policies Head of Business Systems IT Policy Internal Public April 2010 Revision History Revision Date Revisor Previous Version Description of Revision V2.1 V2.2 V2.3 V2.4 V1.0 V1.1 V1.2 Laura Howse Laura Howse Steve Adamek Laura Howse Laura Howse Laura Howse Laura Howse 2.0 2.1 2.2 2.3 2.4 1 1.1 Updated to include WBC references Updated to incorporate WBC changes Updated to incorporate Unison changes Updated to incorporate Unison changes Final Version Updated to include feedback from Human Resources Updated to include feedback from Human Resources Document Approvals This document requires the following approvals: Sponsor Approval Name Date Director of Transformation General Manager for Business Services & Section 151 Officer Head of Business Systems Deputy Head of Human Resources Computacenter Service Manager (Outsourced IT Provider) Document Distribution Andrew Moulton Graham Ebers Steve Adamek Maureen Vaughan-Dixon...
Words: 2757 - Pages: 12
...“I am one or two days away from death; they will shoot me dead, thus if you give birth to a son please name him after me.” ----An Eritrean victim of human trafficking from The Sinai Desert INTRODUCTION This paper examines the issue of human trafficking as it relates to human security in the Horn of Africa. Trafficking takes place by criminal means through the threat or use of force, coercion, abduction, fraud, deception, abuse of positions of power or abuse of positions of vulnerability. Further, it relates to all stages of the trafficking process: recruitment, transportation, transfer, harboring or receipt of person. An agreed definition of human trafficking exists under Article 3 of the “Palermo Protocol” on trafficking in persons which went into effect on 25 December 2003. This internationally agreed definition focuses on exploitation of human beings – be it for sexual exploitation, other forms of forced labor, slavery, servitude, or for the removal of human organs. Trafficking is not just a transnational crime across international borders; the definition applies to internal domestic trafficking of human beings. In the Horn of Africa (HOA), both cross border and internal trafficking of women and children is prevalent. For example, in Ethiopia, children are being trafficked into armed conflict where it is reported that over 20,000 of them have been victims. Almost all of the countries in the region have been identified as sources, transit points or destination...
Words: 7776 - Pages: 32
...From Compliance to Practice Mining Companies and the Voluntary Principles on Security and Human Rights in the Democratic Republic of Congo Tanja A. Börzel/Jana Hönke SFB-Governance Working Paper Series 25 • October 2011 DFG Sonderforschungsbereich 700 Governance in Räumen begrenzter Staatlichkeit - Neue Formen des Regierens? DFG Research Center (SFB) 700 Governance in Areas of Limited Statehood - New Modes of Governance? SFB-Governance Working Paper Series Edited by the Research Center (SFB) 700 „Governance In Areas of Limited Statehood - New Modes of Governance?“ The SFB-Governance Working Paper Series serves to disseminate the research results of work in progress prior to publication to encourage the exchange of ideas and academic debate. Inclusion of a paper in the Working Paper Series should not limit publication in any other venue. Copyright remains with the authors. Copyright for this issue: Tanja A. Börzel/Jana Hönke Editorial assistance and production: Tanja Kilper/Sara Gebh/Anna Jüschke All SFB-Governance Working Papers can be downloaded free of charge from our website www.sfb-governance.de/en/ publikationen or ordered in print via e-mail to sfb700@zedat.fu-berlin.de. Börzel, Tanja A./ Hönke, Jana 2011: From Compliance to Practice. Mining Companies and the Voluntary Principles on Security and Human Rights in the Democratic Republic of Congo, SFB-Governance Working Paper Series, No. 25, Research Center (SFB) 700, Berlin, October 2011. ISSN 1864-1024 (Internet)...
Words: 16584 - Pages: 67
...Security of the Human Rights Defenders in Protecting Human Rights in Bangladesh Security of the Human Rights Defenders in Protecting Human Rights in Bangladesh -Justice A. K. Badrul Huq Human Rights are Charter of Rights for Mankind. Human Rights are those Rights which are inherent in the nature of Human Beings without which Human Beings cannot live in the World. Concept of Human Right is not a new one but ancient. From the earliest time, human history is a history of long struggle to protect human rights, liberty and independence. Scholars like Plato and Aristotle championed thought that People/Men were not subject who are exclusively made to bow but, also were Human Beings who needed to be taken care of. History witnesses that powerful Emperor/Rajas by dint of their power and superiority conquered another weak state/ country and Land and Independent citizens of conquered/vanquished state/ country were taken to the Land of Conquerors and their Liberty and Independence were seized, thus grossly violating their Human Rights to live in their state/ country/Land as free and Independent citizens. citizens of the conquered country were taken to the Land Conquerors as slaves. We speak of Roman Civilization. But the question is- By dint of sheer power and arms did Romans not violate Human Rights of free and Independent citizens of another weak and powerless countries. In the face of Human Right violation can Romans be characterized as Civilized? My answer is in firm Negative. British...
Words: 3969 - Pages: 16
...Defining Security “Security” comes from a broader subject referred to International Relations which is the study of all political cooperation that occurs between states that have their own government, international organizations with or without government influence, and some wealthy separate individuals. “Security Studies concerns itself with a sub-set of those political interactions marked by their particular importance in terms of maintaining the security of actor” (Hough 2008: 2). Depending on the emergency of security of an actor will depend how a government or country will act on the security measure. For example, concerns relating to health and rights of the people will be at top on the global political agenda compare to other events such as natural disasters or mass killings are rarely seen as security concerns. It might be of importance to the people that these events are happening to, but not to the people not being affected. There are four main paradigms of International Relations that affect issues in security. Those paradigms are Realism, Pluralism, Marxism, and Social Constructivism. Realism is the idea that states should be self-centered, competitive, and should look after themselves and not trust any other states. The state should do anything within its reach to expand its power in wherever possible being in military or economic sectors in order to secure themselves and be at the top. Realists tend to favor governments that separate the high and low...
Words: 1237 - Pages: 5
...research is to discuss possible security threat across the borders happened due to the ethnic conflict of Myanmar. In this era of globalization, internal factors of a state can produce some external impacts on other neighboring countries; which is commonly known as a “spillover effects” in political science. Some cases even become so much critical to solve, that the whole continent become affected by the problem. The impact of that ethnic conflict becomes so vulnerable, that the case has not been concealed nationally but also become an international phenomenon. In my case, the problem has become a huge threat to national and international security system. The hypothesis of the paper is to conducting possible security threat across the borders, particularly in the whole south-Asian region. The ethnic violence in Myanmar has some direct impact on social, political and economic processes at national and international levels. In fact, the conflict can result not only in destabilizing the trade and security of Myanmar, but also of the surrounding states. But my concern is focusing the ongoing security issue inside and across borders due to that conflict. That’s why, I think this is a very urgent matter to study and its totally connected with the problem of IR. (Koser 2005, pp- 12) International communities could not able to present perfect legislation or implement new constitution for that particular case so far in order to address the problem of security threat and securitization of...
Words: 2298 - Pages: 10
...G4S today became a founder signatory of the new International Code of Conduct for Private Security Providers G4S, the world’s leading international security solutions group, today became a founder signatory of the new International Code of Conduct for Private Security Providers. Representatives from the world’s largest security solutions company were present in Geneva to sign the code, developed by the industry, civil society representatives and the Swiss, UK and US Governments. The Code sets out principles for security operations in so-called “complex environments” – areas experiencing or recovering from disaster or unrest and where governments and the rule of law are weak. It covers recruitment, vetting and training of staff, the use of force by security company staff, including the handling of firearms, health and safety and reporting and complaints handling. G4S CEO Nick Buckles said: “As the market leader, G4S recognises its responsibility to help embed the highest standards in the security industry. That is why we have previously supported many national initiatives to raise industry standards, and why today we are delighted to become one of the founding signatories to the International Code of Conduct. “We take the obligations set out in the Code seriously, and will work determinedly with the rest of our industry, the Swiss and other governments and representatives of civil society to try to develop an effective mechanism to oversee the functioning of the Code and...
Words: 460 - Pages: 2
...Failed and weak states are posing greater security threats to the world than it were ever imagined. The collapse of autonomy and sovereignty among states is therefore a susceptible situation in the modern world. Developed states like the United States and other notable security sensitive nations are focusing their security efforts towards the failed states. This is mainly because these weak states have become breeding sites for criminal activities, and terrorist groups have established strong bases in such countries. The challenges posed by these failed states on security issues are far-reaching, and reliable measures have to be taken in order to safeguard the safety of the global population. Many forms of transnational security threats have emerged, and international peace has persistently been compromised by this trend. Solomon Islands, Somalia, Afghanistan and Sudan are good examples of failed countries that have contributed in several ways to transnational insecurity (Wyler, 2010). This essay explores the issue of transnational security threats from failed states. In detail, this paper illustrates the specific security challenges that failed states have posed on the traditional security concerns in the world. While the failure of states is attributed to struggles for political liberalism, the lack of sovereignty and autonomy are the major factors contributing to collapse in some states (Bar-Joseph. 2001). Fragile or failed states are defined as nations which face extreme...
Words: 1317 - Pages: 6
...From traditional to critical security Why security? * It is fundamental to international relations. * States will often regard security as one of the most important factor. * Refer to lecture slides What is security? * Security most heavily contested and discussed concepts. * Security is inherently subjective 3 core lines of disagreement between scholars over security ( Test ) * What should we seek to secure? * What do we need to secure? What are most important to states? * Who or what should be responsible for providing security? The state? Or the people? Traditional security studies * Focuses on Military forces, states, armed conflict. * Liberalism was a popular approach to study of IR * Realists opposes them * Concept of security became closesly associated with military dynamics of cold war * Nuclear weapons were developed. * States are responsible for providing their own security * The states is always central for the 3 core lines * Main method for securing the state is to bolster high military grade technology and weapons Critical security studies * It responds to the first question of what should we secure by suggesting that it is the individual or other things * IT suggests that we should secure the individual. * It covers different theoretical approaches. * Professor Keith Krause, Ken Booth and Michael Williams were the key people that wrote on CSS * Read ketih Krause article...
Words: 687 - Pages: 3
...Human Resource Management Student’s Name University Affiliation Human Resource Management Summarize the case in 1-2 paragraphs. The case study talks about TSA, which is one of the bodies under homelands securities in the United States and is responsible for security checkups in most of the transportation modes in the country, especially in the airports. The role of this agency is checking individual luggage’s and bags for safety purpose to avoid instances such as the terrorist activity experienced in 2001. However, the agency has experienced problems in especially in the management of the staff. The employees of the agency show a very low level of non-professionalism due to cases such as misplaced or lost items and cheating at the security checkpoints. This alerts the management that there is the need to hire more qualified and knowledgeable individuals so as to improve professionalism. According to the case study, various human resource efforts have been made to help in solving this problem in the agency. Some of these efforts include the redesigning of the jobs from just security screeners to a more dignified law enforcer with a better compensation land and also setting itself apart as a performance oriented agency. Explain which of the HR practices described in the case you think contribute to greater efficiency and effectiveness of TSA employees. Why? Recommend at least two other practices which could be employed to increase efficiency and effectiveness of TSA...
Words: 684 - Pages: 3
...than society as a whole (Austin & Boxerman, 2008). Discuss the impacts of breach to Healthcare Information systems, especially the financial and privacy impacts. Some of the most devastating security breaches can occur during employee termination when steps are not taken to remove access to resources in a timely manner. HIPAA guidelines specify that when employees are terminated, that certain steps, at a minimum, must be followed. These include changing locks, removal from access lists, removal of user account, and confiscation of keys, tokens and other access cards. Though these steps may seem to be common sense, some organizations may not have documented procedures to follow when an employee is terminated. Additionally, the responsibility for carrying out the termination procedures must be clearly assigned and documented (SANS Institute, 2001). Security Training In order for a security program to work well, the employees must be educated insecurity practices such as password protection, monitoring login failures and other basic practices. A well-educated workforce can become an extension of the security group of any organization through simple awareness. The HIPAA regulations require a Security Awareness training program that includes: awareness training for all personnel, security reminders to the workforce, virus...
Words: 1211 - Pages: 5
...This article was downloaded by: [Texas A&M University-Commerce] On: 05 January 2015, At: 16:08 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Geopolitics Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/fgeo20 Rethinking Climate Change, Conflict and Security Jan Selby & Clemens Hoffmann a a b Department of International Relations, University of Sussex, Brighton, UK b Department of International Relations, Bilkent University, Ankara, Turkey Published online: 30 Oct 2014. Click for updates To cite this article: Jan Selby & Clemens Hoffmann (2014) Rethinking Climate Change, Conflict and Security, Geopolitics, 19:4, 747-756, DOI: 10.1080/14650045.2014.964866 To link to this article: http://dx.doi.org/10.1080/14650045.2014.964866 PLEASE SCROLL DOWN FOR ARTICLE Taylor & Francis makes every effort to ensure the accuracy of all the information (the “Content”) contained in the publications on our platform. However, Taylor & Francis, our agents, and our licensors make no representations or warranties whatsoever as to the accuracy, completeness, or suitability for any purpose of the Content. Any opinions and views expressed in this publication are the opinions and views of the authors, and are not the views of or endorsed by Taylor & Francis. The accuracy of the Content should not be relied upon...
Words: 5013 - Pages: 21