Skip to main content

Political Security, an Uncertain Concept with Expanding Concerns

  • Chapter
Globalization and Environmental Challenges

Part of the book series: Hexagon Series on Human and Environmental Security and Peace ((HSHES,volume 3))

Abstract

The absence of political security as a key concept in social science encyclopaedias makes a (re)conceptualization of the term not easy. 2 Although the concept is widely used in the rhetoric of decision-makers or in compilations of a variety of subjects on security problems, political security is not an unequivocal label.3

For a wide range of issues and country reviews, from international border disputes and arms control to drug trafficking; see: Carpenter and Wiencek (1996).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 309.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 399.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. The author uses the classical assertion that“security, in an objective sense, measures the absence of threats to acquired values, in a subjective sense, the absence of fear that such values will be attacked,” by Wolfers (1962a): 150. Buzan and Kelstrup (1991: 4) pose that political security “concerns the organizational stability of states systems of government and the ideologies that give them legitimacy.” Although this definition is an important and rich component of the conceptualization of human security, due to the ambiguity of terms it lacks rigor for academic reproduction of the concept thereafter. For an excellent review of the concept of security (and all the adjectives needed to establish context), see Möller, Björn (2000): The Concept of Security: The Pros and Cons of Expansion and Contraction (Copenhagen: Copenhagen Peace Research Institute), at: <http://www.ciaonet.org/wps/mob01/#note0>. In his professional experience, the author consults literature in Portuguese and Spanish. In both languages, reflecting the Ibero-American political culture and discourse, the verbatim translation does not correspond to the concept.

    Google Scholar 

  2. The seven categories of human security are: economic, food, health, environment, personal, community, and political, see:UNDP (1994: 22–40).

    Google Scholar 

  3. On the position of the U.S. Government, see: U.S. Department of State, Bureau of Political-Military Affairs: Fact Sheet, Washington, DC, 30 July 2003; at: <http://www.state.gov/t/pm/rls/fs/23428.htm>.

    Google Scholar 

  4. On the controversies and legal fragility, see: Spencer Ackerman: “Suspect Policy”, in: New Republican (14 March 2005), 232,9: 14; David Ignatius: “Rendition Realities”, in: The Washington Post (9 March 2005): A21.

    Google Scholar 

  5. Daniel Byman: “Reject the Abuses, Retain the Tactics”, in: The Washington Post (17 April 2005): Boi. at: <http:// www.washingt0np0st.com/wp-dyn/articles/A58301-2005 Apr16_2.html>.

    Google Scholar 

  6. For a survey of failure issues, normative propositions, and efforts to rescue countries, see: Bilgin/ Morton (2002: 55–80); Fukuyama (2004: 17–32); Mallaby (2004); Thomas (2003a: 205–32); Zeleza/McConnaughay (2004); Rotberg (2002:127).

    Google Scholar 

  7. “Ungoverned space” is a term initially used by the United States Government, see the statement by Secretary of Defense Donald Rumsfeld at the Defense Ministerial in Santiago, 19 November 2002 (at: <http:// ciponline.org/ colombia/02111904.htm>). It is defined as “geographic areas where governments do not exercise effective control.” Its important is to reveal that “Terrorist groups and narco-traffickers use these areas as sanctuaries to train, plan, and organize, relatively free from interference. There are numerous ‘ungoverned spaces’ around the world, such as the western provinces of Pakistan, portions of the southern Philippines, Indonesia, Chechnya, rural areas of Burma, several areas in Africa, and areas in South America. Ungoverned spaces include densely populated cities where terrorists can congregate and prepare for operations with relative impunity. I believe these areas will play an increasingly important role in the War on Terrorism as A1-Qaeda, its associated groups and other terrorist organizations use these areas as bases for operations.” Citations from: Current and Projected National Security Threats to the United States, Vice Admiral Lowell E. Jacoby, U.S. Navy, Director, Defense Intelligence Agency, Statement for the Record, U.S. Senate Select Committee on Intelligence, 24 February 2004 (at: <http://www.iwar. org.uk/homesec/resources/threats-2004/jacoby.htm>).

    Google Scholar 

  8. See:Brian Fonseca and Dennis Fisher: “Data Theft Reveals Storage Flaws”, in: eWeek, 22,10 (7 March 2005): 12; Frank Hayes: “Speaking, Frankly”, in: Computerworld, 29,12 (21 March 2005): 58; Mark Maremont, “New Privacy Leak: Some Mutual Funds Reveal Client’s Data”, in: Wall Street Journal — Eastern Edition, 245,57 (23 March 2005): A1.

    Google Scholar 

  9. “Your DNA in Their Hands”, in: New Scientist, 186, 2494 (9 April 2005): 3.

    Google Scholar 

  10. Anne Sandra: “Watch Out for Spies with Friendly Faces”, in: PC World, 23,4 (Apr 2005): 39. In terms of biometrics, automatic identification can even reach the point of having transponders implanted in individuals, see: Katina Michael and M.G. Michael: “Microchipping People”, in: Quadrant, 49,3 (Mar 2005): 22.

    Google Scholar 

  11. Laurie Sullivan: “Europe Tries on RFID”, in: Information Week, 1029 (7 March 2005): 36; Eric Chabrow: “Homeland Security to Test RFID at Borders”, in: Information Week, 1024 (31 January 2005): 26. For the signs of consumer concern with this technology, see “Things to Ponder”, in: Computerworld, 39,6 (7 February 2005): 36.

    Google Scholar 

  12. Johann Cas: “Privacy in the Pervasive Computing Environment — A Contradiction in Terms?”, in: IEEE Technology & Society Magazine, 24,1 (Spring2005): 24.

    Google Scholar 

  13. See:Jennifer Burek Pierce: “The Scoop on Patron Privacy ”, in: American Libraries, 36,2 (February 2005): 30.

    Google Scholar 

  14. On privacy issues, see: Peter H. Lewis: “Kiss Privacy Goodbye”, in: Fortune, 151,1 (10 January 2005): 55.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Guedes da Costa, T. (2008). Political Security, an Uncertain Concept with Expanding Concerns. In: Brauch, H.G., et al. Globalization and Environmental Challenges. Hexagon Series on Human and Environmental Security and Peace, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75977-5_42

Download citation

Publish with us

Policies and ethics