StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

State and Security in the Third World - Dissertation Example

Cite this document
Summary
State and Security in the Third World Introduction The paper aims to provide a discussion on the parameters of Designing of a State and the Security of nations categorized mainly as Third World or Developing Economies. In that it tends to reflect mainly on four readings where it tends to reflect on the point where they argue or agree upon and also focuses on identifying any questions that arises thereof…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
State and Security in the Third World
Read Text Preview

Extract of sample "State and Security in the Third World"

Download file to see previous pages

Keenan firstly reflects on the ambiguous and manipulative military programs designed by the United States government, GWOT. This program GWOT though designed by the United States on a military intervention note is argued by Keenan to possess conspicuous elements that helped the American government gain a strong hold on scarce resources like Oil found in the African region. Furthermore, Keenan argues that to satisfy the introduction of GWOT in the African soil the American government used a false process to create and enhance internal terror in the region.

Keenan secondly focuses on another military program designed by United States, known as AFRICOM to promote the cause for internal security along with other social and economical developments. AFRICOM is reflected by the author also as a disguised terror creating instrument by the American government in the African region. Keenan finally focuses on how the concept of globalization with the help of non-government military corporations was manipulated by America to gain from the African soil. Agreement and Disagreement The above argument reflects that Keenan tends to disagree on the point that security efforts created by United States relating to Third World countries like Africa focus on reducing the amount of communal tension and in promoting development.

Rather here the author agrees on the point that such security efforts are mainly created by United States as a tool to exploit the resource base like oil. Examples to the above fact can be cited where United States through the use of military program GWOT focused on creation of false terrorist operations in the major part of Saharan Africa. Through the above system of duplicity United States government attempted to gain a control over the oil resources of Africa. Similarly another military effort of the United States government referred to as AFRICOM signifies another system of duplicity.

AFRICOM designed in competition with the military programs of the British Government created an outlook related to promotion of development in Africa. Concealed under its positive image the program continued with its false terrorism program whereby it continued killing innocent people in regions like Somalia. Question This question that arises relating to the above case is how global bodies like United Nations kept quite thereby allowing developed countries like United States carry out its spontaneous manipulative and exploitative activities on the African soil (Keenan 634-643).

The Article of Joseph Hellweg Discussion Joseph Hellweg in his article “Encompassing the State: Sacrifice and Security in the Hunters' Movement of Cote d'Ivoire” reflected on the rise of a parallel security and patrol force in the Cote d'Ivoire region. The author argues that in the absence of a proper police or state patrol force the civilians tend to take resort to the security services rendered by parallel forces like the Hunting Communities named Dozos as reflected in the article. The parallel security force tends to govern the security paradigm of the region through laws and procedures created that gain avid popularity owing to the parameter of innovation, accessibility and concern for compensating the victims.

Thus civilians were found to depend more on the parallel forces for meeting their security needs than on established police forces (Hellweg 3-22). Agreement or Disagreement

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“State and Security in the Third World Dissertation”, n.d.)
State and Security in the Third World Dissertation. Retrieved from https://studentshare.org/history/1457888-state-and-security-in-the-third-world
(State and Security in the Third World Dissertation)
State and Security in the Third World Dissertation. https://studentshare.org/history/1457888-state-and-security-in-the-third-world.
“State and Security in the Third World Dissertation”, n.d. https://studentshare.org/history/1457888-state-and-security-in-the-third-world.
  • Cited: 0 times

CHECK THESE SAMPLES OF State and Security in the Third World

Integration of Third Country Nationals in the EU

The basic aim behind the introduction of the phenomenon is to assimilate a universal culture within Europe and to train the third world nationals in the local language, norms, values and to develop them as a permanent fragment, notwithstanding of the color, of the European Society.... hellip; In the last 20 years the issue of migration of third world citizens to the European countries has gained particular importance and the member states of the European Union have shown special concern to the matter....
11 Pages (2750 words) Essay

Food Insecurity in the Regions of Developing Nation

By the llennium, one of the goals set by policy makers throughout the world was to reduce 50% of hunger throughout the word by the period of 2015 (Scanes, 2011, p.... During 2000, all the leaders throughout the world decided to comply with the aims and objectives of MDGs (Millennium Development Goals) (Sachs, 2005).... The terms “insecurity of food” and “security of food” are used to refer to the quality and the quantity of food available to individuals around the globe....
6 Pages (1500 words) Essay

Changes In School Security Policies

The paper "Changes In School security Policies" describes what the increased cases of schools insecurity have raised concerns about the capabilities of schools to offer protection of children in cases of threats, both at school and while in transit to and from school.... However, this dream cannot be realized if security risks in school continue.... he threats at schools are increasingly becoming complicated and diversified and thus regular revision of security policies is inevitable....
9 Pages (2250 words) Article

What Has Emancipation Got to Do With Security

Threats to the state normally come in the shape of outside military threats whereas the agencies of attaining security are its own Additionally realism beholds security studies as ‘the conditions that tend to employ force more likely, the ways that the application of force influences individuals, societies, state and the exclusive policies that states implement so as to get ready for, prevent or take part in war' (Walt 1991: 212).... Carnesale and Nacht 1976: 2 declare that ‘although all realists theorize the world differently, and hence proposition a different implication to security, all definitions have a tendency to focus on the conservation and safeguard of the sovereignty and regional integrity of… The referent affected in this case is the state within an anarchistic international system in which no superior power sits above states....
18 Pages (4500 words) Essay

Security from Global Terrorism

Terror groups take advantage of the fact that there are no stable governments and security mechanisms in these nations and use that to create a good environment for their operations.... As a state fails or declines, it leads to lost economic opportunities for the rest of the world (Alperen, 2011).... However, apart from the lost economic opportunity, such nations pose a security threat to the rest of the world.... nfortunately, there are not enough studies done in the area with regard to how these states pose a security problem to the rest of the world....
8 Pages (2000 words) Term Paper

Threats to Global Security

The world is grappling with increased terror attacks, especially in Iraq, Yemen, Nigeria, Kenya, and Syria among other countries.... In 2014, the world Hunger Statistics reported that over 800 million people were malnourished.... These two reports indicate that food insecurity is still a major challenge in the world today.... Poor farming methods and lack of scientific research in agriculture are also some potential causes of food insecurity in most parts of the world....
17 Pages (4250 words) Essay

Human Security and the Face of War in United Kingdom

With the increasing levels of world integration, United Kingdom is at the forefront in addressing the problem of insecurity resulting from the integration (Berdal, 1999).... The interest of security goes beyond the administration boundaries and entails making the world more peaceful (United Nation, 1994).... North Atlantic Treaty Organization defence strategies include air, maritime and land operation of which United Kingdom is a main contributor; it is third rated in its contribution to defence....
6 Pages (1500 words) Essay

Making a Security Strategy for Securing Client Details of BioMed Company

The world has grown into a technologically paced environment, and companies are using technology communication to keep their information secure.... The BioMed Devises Company uses GSM to communicate with the stakeholders, throughout the world.... … The paper "Making a security Strategy for Securing Client Details of BioMed Company" is an excellent example of a case study on information technology.... The paper "Making a security Strategy for Securing Client Details of BioMed Company" is an excellent example of a case study on information technology....
13 Pages (3250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us