The Inter-American Security System: Changes and Challenges

نویسنده

  • Brigitte Weiffen
چکیده

Beginning in the mid to late 1980’s, democracy took root in most countries in the Western hemisphere. This development in conjunction with the end of the Cold War led to a revival of the OAS and the initiation of new regional security institutions. The strategic framework of the Cold War had consisted in the perception of a threat outside the hemisphere and the monopoly of the U.S. government in defi ning and identifying the enemy. As these structures lost relevance, a new security agenda came to the fore, encompassing both traditional security threats like territorial disputes and nontraditional security threats, such as terrorism and drug-traffi cking. Additionally, security was increasingly defi ned as the establishment of improved civil-military relations and the collective defense of democracy. However, the war against terrorism initiated by the U.S. after September 11, 2001 led to a revitalization of strategic framework of the Cold War. Hence, the paper analyzes how the regional security system in the Americas has changed since the early 1990s. It traces the major innovations with respect to its legal and institutional framework, the impact of the hegemonic position of the United States in the hemisphere and the challenges posed by the emergence of sub-regional organizations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Intersectoral Collaboration in the Iranian Health System for Implementing Health in all Policies: Challenges and the Way Forward (This Research was Conducted Before the Covoid-19 Pandemic)

Background and Aim: For achievement of equity in the population health the implementation of health in all policies is essential. The most crucial intervention in this approach is inter-sectoral collaboration.  Materials and Methods: This was a qualitative study based on the national policy framework. Data were collected using literature review, in-depth interviews and focus group discussions ...

متن کامل

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Incorporating Wind Power Generation And Demand Response into Security-Constrained Unit Commitment

Wind generation with an uncertain nature poses many challenges in grid integration and secure operation of power system. One of these operation problems is the unit commitment. Demand Response (DR) can be defined as the changes in electric usage by end-use customers from their normal consumption patterns in response to the changes in the price of electricity over time. Further, DR can be also d...

متن کامل

An Autonomic Service Oriented Architecture in Computational Engineering Framework

Service Oriented Architecture (SOA) technology enables composition of large and complex computational units out of the available atomic services. Implementation of SOA brings about challenges which include service discovery, service interaction, service composition, robustness, quality of service, security, etc. These challenges are mainly due to the dynamic nature of SOA. SOAmay often need to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011