Introduction: The Conceptualisation of Terrorism The concept of security historically based on the emergence of human society is also an ambiguity concept both in International Relations discipline and in daily usage. On the one hand while discussions about defining and specifying of the scope of the concept is continuing, on the other hand it is frequently
Today’s media is no longer limited to newspaper, television or radio but modern media, in written or audio-video form, has become fast, effective and accessible as it can share information worldwide in no time. Everything can be saved electronically in computers, mobiles or other digital devices. Digital media has great impact on states and societies with some good and bad sides.
The rapid advancement of Information and Communication Technologies (ICT) since the mid-1980s has revolutionized the Information Infrastructure (II), which comprises communications networks and associated software and facilitates interaction among people and organizations. The prevalence of information at all levels of a society-individual,
NATO Allies on the both sides of the Atlantic have been witnessing various ongoing crises: from mass refugee influx to rising concerns over emboldening Russian maneuvers in Ukraine and Syria, and nowadays the strategic consequences of Brexit for Euro-Atlantic relations. Evidently, these interrelated challenges are of transnational and hybrid nature involving state and nonstate actors alike. These threats of hybrid nature posed by
This is hard to materialize the perpetual peace by Kantian dream. It needs a lot of transparency, a whole gamut of committed political leadership and a collective will for a lasting peace. The problem with ethnic conflicts, especially centered on self-determination, is that they last for decades. Moreover,
The ‘Border Security and Control’ is an important function of ‘State Sovereignty’. “Sovereignty of state is one of the key feature of the Westphalian order.”1 It is also accepted as the supreme legitimate authority within the territorial boundaries of the state.2
Soft power has become an increasingly important part of effective foreign policy strategies as the 21. Century is distinguished by transnational interactions and dispersion of power at local, national and international levels. The rise of networks
In contemporary armed conflicts, science and technology increasingly plays a determining role and decisively shape outcomes. This techno-scientific discourse has led to development of cutting edge weapon systems, with armed drone as its prime example.
• Is Donald Trump trying to move the focus away to something else from the pandemic?
• What are the discourses of US and Chinese politics that feed the pandemic accusations?
• What policy does the WHO implement between US and China?
The China advocates an authoritarian liberal policy in the administration of the communist party, far from democracy, human rights and a western-style government. On the other hand, China, which is fully integrated with the world, is increasing its presence in the regions it chooses such as Africa and Middle East and North Africa. Keywords: China, Middle East, North Africa, Military, Economic Power, Diplomacy, Soft Power
Autonomous Weapons Systems (AWS) enable operating almost independent from human intervention by providing continuous monitoring, data collection, and processing great mount of data in a short-time period. In that respect, AWS have been desired for Indigenous Defense Industry Countries (IDIC) such as India, Israel, and Turkey. Key Words: Autonomous Weapons, Indigenization, Defense Industries, Regional Security, Military
Nowadays, it is obvious that the over-demands of the consumption society are not entirely met and can not be satisfied by many people especially in the poor and developing ountries.
This is not a sustainable way of life. It can not be denied that it has caused great human migrations, insurrections and conflicts for centuries that eventually feed terrorism.
Do cyber wars pose threats to national or global security? What is the impact of the privatization of intelligence in cyber sector? How can cyber wars ruin people’s daily lives? Is it really possible to attribute cybercrimes to their rightful perpetrators? Will information warfare be bloodless or do virtual acts have the potential to shed real blood?