Nobody downloaded yet

State and Security in the Third World - Dissertation Example

Comments (0) Cite this document
State and Security in the Third World Introduction The paper aims to provide a discussion on the parameters of Designing of a State and the Security of nations categorized mainly as Third World or Developing Economies. In that it tends to reflect mainly on four readings where it tends to reflect on the point where they argue or agree upon and also focuses on identifying any questions that arises thereof…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.6% of users find it useful
State and Security in the Third World
Read TextPreview

Extract of sample
"State and Security in the Third World"

Download file to see previous pages Keenan firstly reflects on the ambiguous and manipulative military programs designed by the United States government, GWOT. This program GWOT though designed by the United States on a military intervention note is argued by Keenan to possess conspicuous elements that helped the American government gain a strong hold on scarce resources like Oil found in the African region. Furthermore, Keenan argues that to satisfy the introduction of GWOT in the African soil the American government used a false process to create and enhance internal terror in the region. Keenan secondly focuses on another military program designed by United States, known as AFRICOM to promote the cause for internal security along with other social and economical developments. AFRICOM is reflected by the author also as a disguised terror creating instrument by the American government in the African region. Keenan finally focuses on how the concept of globalization with the help of non-government military corporations was manipulated by America to gain from the African soil. Agreement and Disagreement The above argument reflects that Keenan tends to disagree on the point that security efforts created by United States relating to Third World countries like Africa focus on reducing the amount of communal tension and in promoting development. Rather here the author agrees on the point that such security efforts are mainly created by United States as a tool to exploit the resource base like oil. Examples to the above fact can be cited where United States through the use of military program GWOT focused on creation of false terrorist operations in the major part of Saharan Africa. Through the above system of duplicity United States government attempted to gain a control over the oil resources of Africa. Similarly another military effort of the United States government referred to as AFRICOM signifies another system of duplicity. AFRICOM designed in competition with the military programs of the British Government created an outlook related to promotion of development in Africa. Concealed under its positive image the program continued with its false terrorism program whereby it continued killing innocent people in regions like Somalia. Question This question that arises relating to the above case is how global bodies like United Nations kept quite thereby allowing developed countries like United States carry out its spontaneous manipulative and exploitative activities on the African soil (Keenan 634-643). The Article of Joseph Hellweg Discussion Joseph Hellweg in his article “Encompassing the State: Sacrifice and Security in the Hunters' Movement of Cote d'Ivoire” reflected on the rise of a parallel security and patrol force in the Cote d'Ivoire region. The author argues that in the absence of a proper police or state patrol force the civilians tend to take resort to the security services rendered by parallel forces like the Hunting Communities named Dozos as reflected in the article. The parallel security force tends to govern the security paradigm of the region through laws and procedures created that gain avid popularity owing to the parameter of innovation, accessibility and concern for compensating the victims. Thus civilians were found to depend more on the parallel forces for meeting their security needs than on established police forces (Hellweg 3-22). Agreement or Disagreement ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“State and Security in the Third World Dissertation”, n.d.)
State and Security in the Third World Dissertation. Retrieved from https://studentshare.org/history/1457888-state-and-security-in-the-third-world
(State and Security in the Third World Dissertation)
State and Security in the Third World Dissertation. https://studentshare.org/history/1457888-state-and-security-in-the-third-world.
“State and Security in the Third World Dissertation”, n.d. https://studentshare.org/history/1457888-state-and-security-in-the-third-world.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
The challenges and opportunities for virtual world marketing: World of Warcraft
The aims and objectives of this research paper are to: identify the opportunities and challenges for virtual world marketing; determine how virtual worlds provide marketing managers with the opportunity for communicating with their customers and getting customers to engage in observed interactions and thus generate a co-productive marketplace for effective exchanges.
52 Pages(13000 words)Dissertation
Service and the Security implication of VOIP
The growing popularity of VoIP in the business industry has been growing exponentially in the last 5 years however little is communicated to businesses on the extent of the security exposure these companies are facing. The use of technology, the internet in particular, in transmitting useful information increases the incentive for nefarious individuals to take advantage of technology for gain.
52 Pages(13000 words)Dissertation
Network security
The student should read and sign the declaration. Student Particulars Name: Mohammed Abdul Rahman Student Id: xxxxxxxxxx Project Title: Network Security and Its Business Impact in Educational institutions Student Declaration I declare that 1. I understand what plagiarism is; 2.
50 Pages(12500 words)Dissertation
Cloud Computing and Security Issues
1.1 Research Background Cloud computing is a new and emerging trend in the IT industry that is set to revolutionize the way people approach and use computing. There has been an exponential growth in new technologies that have converged to develop cloud computing services.
51 Pages(12750 words)Dissertation
Third world countries
NGOs are playing very vital role to foster human rights in the entire globe and they work as watchdog against violation of human rights. Such organizations raise their voice against
1 Pages(250 words)Essay
Our modern German state
With the opportunity to look back, it is possible to see that Hitler did indeed provide large sums of monetary support for the art world he believed in, which did lead to the proliferation of many new sculptures and other artworks; however, the constraints placed on Germany’s art world did not lead the country to produce highly influential works of art. Instead, they reflect the struggle for creative expression within a dictatorial regime in which creative expression was to be feared rather than celebrated.
35 Pages(8750 words)Dissertation
To What Extent Do Violent Non State Actors Contribute to And /Or Detract From Security In the Contemporary World Politics
The study question is, to what extend do the violent non state actors contribute to and/or detract from security in the contemporary world of politics? The study aims at explaining the impact of the VNSAs to the security and world politics. Journals and books will be utilized in providing information to answer the study question.
4 Pages(1000 words)Dissertation
As a result, TPL business is growing in content, adding to interest in supply chains. Industries get competitive edge from the integration of logistics functions, thus, changing the role of TPL providers both in content and in range. New companies from other business segments are making their entry to compete with traditional logistics and stock keeping firms (Hertz & Alfredsson, 2003).
25 Pages(6250 words)Dissertation
Social network security is seriously threatened
Most importantly, the defining feature of interconnectivity of social media is being used for the privacy breach with mall intentions (Sophos, 2010; Gallagher, 2009). This has also formed the ground for this dissertation. The dissertation with primary (questionnaire based) and secondary research has developed the review pertaining to the understanding of security and safety of the content by the Social Networking Sites (SNS).
16 Pages(4000 words)Dissertation
Libyan Negotiations to Join the World Trade Organization
Citizens of the member countries are not provided with more choices and as a result, the producers are more inspired to ensure the quality of their product to survive in an era dominated by intense competition.
70 Pages(17500 words)Dissertation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Dissertation on topic State and Security in the Third World for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us