Sweden, military intervention and the loss of memory

Author(s):  
Annika Bergman Rosamond ◽  
Christine Agius

Within the space of roughly two decades, Sweden has changed from a neutral country to one that is currently engaged in a range of activities and practices that are far removed from the definition of neutrality. Its engagement with NATO, contribution of forces to Kosovo, Afghanistan and Libya, and its role as a leading framework nation in the emergent EU Battle Groups suggest at first glance the shifting demands of global security practices. The rationale of the move away from traditional state-centric security, however, obscures a more complex picture. In this chapter, we investigate specific aspects of these changes in relation to Swedish security policy, specifically robust forms of military intervention. We argue that rather than reflecting global security practices, deeper endogenous processes are at work. Significantly, such engagements are part of disembedding norms around neutrality and revising public and elite memory of Sweden as a neutral state. By focusing on identity and memory, we posit that Sweden’s current military engagements are concerned with rewriting identity and with a view to making new memories (or a ‘memory bank’) of wartime experiences. This has played a crucial part in not only justifying and naturalizing specific practices and actions, but also reconstituting identity in the process.

Author(s):  
Brent A. R. Hege

AbstractAs dialectical theology rose to prominence in the years following World War I, the new theologians sought to distance themselves from liberalism in a number of ways, an important one being a rejection of Schleiermacher’s methods and conclusions. In reading the history of Weimar-era theology as it has been written in the twentieth century one would be forgiven for assuming that Schleiermacher found no defenders during this time, as liberal theology quietly faded into the twilight. However, a closer examination of this period reveals a different story. The last generation of liberal theologians consistently appealed to Schleiermacher for support and inspiration, perhaps none more so than Georg Wobbermin, whom B. A. Gerrish has called a “captain of the liberal rearguard.” Wobbermin sought to construct a religio-psychological method on the basis of Schleiermacher’s definition of religion and on his “Copernican turn” toward the subject and resolutely defended such a method against the new dialectical theology long after liberal theology’s supposed demise. A consideration of Wobbermin’s appeals to Schleiermacher in his defense of the liberal program reveals a more complex picture of the state of theology in the Weimar period and of Schleiermacher’s legacy in German Protestant thought.


Author(s):  
Aroon Manoharan ◽  
Marc Fudge

This chapter highlights the research findings of a longitudinal study of online privacy and security practices among global municipalities conducted in 2005 and 2007. As cities worldwide implement sophisticated e-government platforms to increasingly provide services online, many barriers still inhibit the adoption of such strategies by the citizen users, and one such factor is the availability of a comprehensive privacy policy. The survey examines cities throughout the world based upon their population size, the total number of individuals using the Internet, and the percentage of individuals using the Internet. Specifically, we examined if the website has a privacy or security policy, does the website utilize digital signatures and if the website has a policy addressing the use of cookies to track users. Overall, results indicate that cities are increasingly emphasizing on privacy and security policies with major improvements in 2007, along with significant changes in the top ranking cities in when compared to the 2005 study.


Author(s):  
McLaughlin Rob

This chapter examines the concept of State failure from the perspective of international law as it concerns the facilitation, regulation, and occasionally the degradation of global security. International law, in this context, is primarily conceptualized as an enabler for security-informed responses to the phenomenon of State failure. International law approaches State failure from the perspective of restorative legal and institutional facilitation, with a structural predilection for a State-centric security framework. This has resulted in the nexus between ‘State failure’ and international law being dominated by two interlinked purposes: (1) promoting the normative continuity of ‘Stateness’ for failed entities; and (2) managing the transition back to a minimum level of stable ‘Stateness’ with the least harm to the population and the international community. Ultimately, international law’s approach to State failure is primarily one of remedy, not of acceptance. The chapter seeks to evolve a working definition of ‘State failure’ from an international law perspective and assesses the adequacy of selected modes and indicators by which international law may recognize State failure.


2018 ◽  
Vol 14 (A30) ◽  
pp. 466-470
Author(s):  
D. W. Evans ◽  
M. Riello ◽  
F. De Angeli ◽  
J. M. Carrasco ◽  
P. Montegriffo ◽  
...  

AbstractGaia DR2 was released in April 2018 and contains a photometric catalogue of more than 1 billion sources. This release contains colour information in the form of integrated BP and RP photometry in addition to the latest G-band photometry. The level of uncertainty can be as good as 2 mmag with some residual systematics at the 10 mmag level. The addition of colour information greatly enhances the value of the photometric data for the scientific community. A high level overview of the photometric processing, with a focus on the improvements with respect to Gaia DR1, was given. The definition of the Gaia photometric system, a crucial part of the calibration of the photometry, was also explained. Finally, some of the photometric improvements expected for the next data release were described.


2009 ◽  
Vol 44 (3) ◽  
pp. 268-287 ◽  
Author(s):  
Moritz Weiss ◽  
Simon Dalferth

In this article, we argue that the premature abolishment of the allegedly anachronistic concepts of internal versus external security is of doubtful heuristic value for the study of security practices. The two domains may gradually converge from the perspective of problems, but do so much less in terms of political practices. We show that security policy is pursued according to different systems of rules. It follows distinct institutional logics. We undertake a systematic comparison of policy-making in the European Union’s Security and Defence Policy (ESDP) and Justice and Home Affairs (JHA). It is structured along the distinction between making and implementing an agreement as indicative stages of the policy-making process. First, rule-setting asks how decisions are made in the two domains: with or without the inclusion of external actors. Second, we explore whether the implementation of political decisions involves management or enforcement mechanisms. The empirical results are unambiguous: the political actors follow different systems of rules in the two domains. There are still ‘ideal-typical’ differences in a Weberian sense. This implies that internal and external security may be closely linked, like the opposite sides of the same coin, but must be separated for the purpose of analytical clarity.


2021 ◽  
Author(s):  
Tahir Mahmood ◽  
Ubaid ur Rehman ◽  
Jabbar Ahmmad

Abstract We establish in this manuscript a new model complex picture fuzzy N-soft sets (CPFN-SSs) which is the fusion of complex picture fuzzy sets (CPFSs) along with N-soft sets (N-SSs) and a novel definition of CPFSs which is a mixture of complex fuzzy sets (CFSs) and picture fuzzy sets (PFSs). In CPFN-SS notions of N-SSs, fuzzy N-SSs (FN-SSs), intuitionistic FN-SSs (IFN-SSs), picture FN-SSs (PFN-SSs) complex FN-SSs (CFN-SS), complex IFN-SSs (CIFN-SSs) are generalized. We also talk about few basic operations on CPFN-SSs with the assistance of examples. Additionally, we establish two kinds of union (extended and restricted) and intersection (extended and restricted) of CPFN-SSs and illustrate them through examples. We also establish a complement of CPFN-SSs along with an example. Furthermore, we define an algorithm to solve the data in the environment of CPFN-SSs, and then we represent two real-world applications (performance assessment of e-waste recycling program and predication about the champions of FIFA world cup 2022 through audience poll) of our established model in decision-making (DM) to show the advantages and usefulness of the CPFN-SSs. In the end, we represent a comparison of our established model with some existing methods which shows that our established model is more general than existing ones.


Author(s):  
Edward Newman

Human security suggests that security policy and security analysis, if they are to be effective and legitimate, must focus on the individual as the referent and primary beneficiary. In broad terms, human security is “freedom from want” and “freedom from fear:” positive and negative rights as they relate to threats to core individual needs. Human security is normative; it argues that there is an ethical responsibility to (re)orient security around the individual in line with internationally recognized standards of human rights and governance. Much human security scholarship is therefore explicitly or implicitly underpinned by a solidarist commitment to moral obligation, and some are cosmopolitan in ethical orientation. However, there is no uncontested definition of, or approach to, human security, though theorists generally start with human security challenges to orthodox neorealist conceptions of international security. Nontraditional and critical security studies (which are distinct from human security scholarship) also challenges the neorealist orthodoxy as a starting point, although generally from a more sophisticated theoretical standpoint than found in the human security literature. Critical security studies can be conceived broadly to embrace a number of different nontraditional approaches which challenge conventional (military, state-centric) approaches to security studies and security policy. Human security has generally not been treated seriously within these academic security studies debates, and it has not contributed much either.


2014 ◽  
Vol 10 (2) ◽  
pp. 62-78 ◽  
Author(s):  
Tonia San Nicolas-Rocca ◽  
Benjamin Schooley ◽  
Janine L. Spears

Institutions of higher education capture, store and disseminate information that is protected by state and federal regulations. As a result, IS security policies are developed and implemented to ensure end user compliance. This case study investigates end user knowledge of their university's IS security policy and proposes a new approach to improve end user compliance. The results of this study suggest that users may be contributors to the transfer of IS security policies when provided with an opportunity to participate in the development of an IS security awareness and training program.


Author(s):  
Thomas Ramopoulos

Article 25 TEU Without prejudice to Article 240 of the Treaty on the Functioning of the European Union, a Political and Security Committee shall monitor the international situation in the areas covered by the common foreign and security policy and contribute to the definition of policies by delivering opinions to the Council at the request of the Council or of the High Representative of the Union for Foreign Affairs and Security Policy or on its own initiative. It shall also monitor the implementation of agreed policies, without prejudice to the powers of the High Representative.


Sign in / Sign up

Export Citation Format

Share Document