The aim of this thesis is to conduct research on challenges to the effectiveness of the WhatsApp neighbourhood watch team (WNWT) ‘Buurtpreventie Uithofslaan’ in The Hague, as a security network....Show moreThe aim of this thesis is to conduct research on challenges to the effectiveness of the WhatsApp neighbourhood watch team (WNWT) ‘Buurtpreventie Uithofslaan’ in The Hague, as a security network. WhatsApp neighbourhood watch teams are continuing to increase in number and use, especially with the shift into a ‘smartphone society’. Relevance lies in the necessity to understand whether this growth of WNWT’s and their use is justified, or if they primarily make the lives of participating member-residents harder. The research question ‘What are the challenges to the effectiveness of a WhatsApp neighbourhood watch team?’ has been answered. The method used for research conducting consists of a mixed method approach, involving five semi-structured interviews with members of ‘Buurtpreventie Uithofslaan’, and a document analysis regarding the groups’ messages. The analysis had displayed multiple challenges findings to the effectiveness of a WNWT. Firstly, ‘non-safety’ related messages, and messages deemed as panicking and/or false alarm. Furthermore, information overload inside of the group, the size of the group, and emerging confrontations inside the group. Lastly, distrust amongst the WNWT’s members and lack of actual action taking by the groups’ residents form the final revealed challenges. While the thought of a neighbourhood watch team seems terrific, there are multiple challenges to its effectiveness that cause problems. These existing challenges take away (some) value of ‘Buurtpreventie Uithofslaan’. Recommendations to tackle some challenges hear: creating an alternate (WNWT) group inside of the neighbourhood, and the assessing of some members as actual action takers so the lack of action-taking will dissolve. Limitations lie in the fact that this study cannot quantify its effect in large scales study hence the relatively short period and therefore small data samples.Show less
Dear reader, This thesis uses levels and indicators of effectiveness and legitimacy intending to identify challenges to the effectiveness and legitimacy of the National Coordinator of...Show moreDear reader, This thesis uses levels and indicators of effectiveness and legitimacy intending to identify challenges to the effectiveness and legitimacy of the National Coordinator of Counterterrorism in the Netherlands (NCTV). A literature review is conducted to assess different scholars’ work on measuring the effectiveness and legitimacy of security networks. This literature review develops the indicators that are utilized in the thesis. The indicators for effectiveness are a controlling state actor, goal consensus, and network structure. Whereas the indicators for legitimacy are democratic (parliamentary authority), legal (a clear legal framework), and social legitimacy (transparency). Afterward, to identify the challenges, this thesis implements document analysis. By the latter, this thesis identifies and explains challenges to the effectiveness and legitimacy of the NCTV by using news articles, and parliamentary documents, e.g., a debate concerning the NCTV. Using the indicators, the challenges are identified. Ultimately, these challenges are discussed using quotes and pieces from hearings, debates, and news articles. It is significant to identify the challenges to effectiveness and legitimacy as this lays the groundwork for further research on NCTV’s activities.Show less
This thesis analysed the Organisation for Security and Cooperation in Europe in terms of its legitimacy and effectiveness. First, it outlines why the OSCE can be defined as a security network and...Show moreThis thesis analysed the Organisation for Security and Cooperation in Europe in terms of its legitimacy and effectiveness. First, it outlines why the OSCE can be defined as a security network and provides a literature review on both topics. The theoretical framework concludes that the OSCE is analysed in terms of its legitimacy using the criteria of transparency, independent monitoring, public involvement and consensus. Structural, cultural, political, technological and relational dimensions were identified as criteria for effectiveness. The analysis revealed two main challenges. The first challenge is the consequences of a system based on consent. The second challenge is building and maintaining trust among the 57 participating states. Due to its size, a lack of trust makes it difficult to reach consesnus on matters discussed and can have severe consequences. The scope of this work is limited and further research is needed on these issues.Show less
This paper examines an analysis of challenges regarding effectiveness and legitimacy to the security network that the tripartite working arrangement (TWA) constitutes with EMSA, EFCA and Frontex on...Show moreThis paper examines an analysis of challenges regarding effectiveness and legitimacy to the security network that the tripartite working arrangement (TWA) constitutes with EMSA, EFCA and Frontex on the European cooperation on Coast Guard Functions (CGFs). The study utilizes the theoretical frameworks of Provan and Milward (2001) for effectiveness indicators and Den Boer et al. (2008) for legitimacy indicators combined with interviews of actors in the security network. The findings address challenges to the effectiveness of the network such as service duplication, coordination complexity, and resource limitations. The creation of the TWA contributes to improved cooperation and coordination on CGFs, reducing operational costs, bureaucratic red tape, integrating services, managing multiple relationships, and enhancing overall effectiveness. The creation of a network administrative organization (NAO) such as the Steering Committee allow for efficient resource allocation, and interagency organization and cooperation. Regarding legitimacy, challenges arise in the indicator of democratic legitimacy due to the supranational power of Frontex, which was not elected by individual member state parliaments. However, proposed amendments and audit measures address this concern, contributing to democratic legitimacy. Legal legitimacy is ensured through binding legal instruments and adherence to established legal frameworks. Moreover, procedural legitimacy is maintained through controllable mandates, operating within established oversight mechanisms. Although, the TWA adheres to the latter two, the challenge to social legitimacy rises from the lack of transparency in operational output and errors in conduct, leading to public scrutiny. However, efforts are being made to address this social legitimacy challenge through regular reporting, independent monitoring bodies, an Ombudsman, and engagement with civil society and national authorities. To conclude, the security network, the TWA, offers an effective and increasingly legitimate answer to addressing wicked problems in European maritime security and safety. The network provides a viable solution to the complexity and multiplicity of maritime threats in the EU. This analysis contributes to a better understanding of challenges to the functioning of the network and is crucial for addressing existing and emerging threats in the European maritime context.Show less
The Taskforce RIEC Brabant – Zeeland covers the south of the Netherlands in tackling subversive crime. The security network combines forces of the police, public prosecution, tax authorities and...Show moreThe Taskforce RIEC Brabant – Zeeland covers the south of the Netherlands in tackling subversive crime. The security network combines forces of the police, public prosecution, tax authorities and other societal instances to share information and expertise on issues as real estate and financial fraud, motor gangs and drug- and human trafficking. The horizontal network structure is fighting a wicked issue which calls for a cautious attitude towards information sharing. The careful handling of information creates issues of legitimacy and openness of their processes. This research aims to learn where these issues come from and how these challenges can possibly be solved. After diving deeper into theory of challenges, legitimacy and effectiveness of security networks, appropriate theories can be applied to the case study of the Taskforce RIEC to see their current state of affairs and how they plan to tackle their organizational barriers, as well as diving deeper into the ins- and outs of the network and how it maintains its legitimacy. In addition, two in-depth interviews with employees of the Taskforce RIEC give a more detailed view of the organization. The main issues for the Taskforce RIEC are the wickedness of subversive crime, which calls for broad resourcing and stamina. With pre-existing capacity issues at the network members, this issue only grows bigger. Secondly, effectiveness is hard to define in this case, since numbers are not telling much about under-the-radar-crime. Thirdly their legitimacy faces difficulties in transparency, but which can be justified through the necessity to keep information about the cases form the public for confidentiality reasons. The network faces issues since it is young and developing, yet making promising progress and is aware of its difficulties as stated in their internal reports.Show less
This paper examines the challenges to the effectiveness and legitimacy of RIECs. Document analysis and a semi-structured interview were conducted using developed indicators for effectiveness and...Show moreThis paper examines the challenges to the effectiveness and legitimacy of RIECs. Document analysis and a semi-structured interview were conducted using developed indicators for effectiveness and legitimacy. The findings reveal the complex and multifaceted nature of the challenges that the RIECs face. For effectiveness, structural challenges include the lack of clarity and indifference to RIECs’responsibilities, involving municipalities, insufficient capacity, and short-term employment. Policy challenges involve objective coordination issues, the absence of a uniform approach in creating undermining images, deficient information sharing and merging procedures, lengthy lead times, and ill-structured financial support. Cultural challenges include a lack and divergence of administrative awareness and understanding of the risk related to undermining crime and a divergence and hesitance of participating in the integrated approach. Technical challenges involve an outdated and non-user-friendly RIEC-IS system and insufficient automation for connecting relevant information. Relational challenges arise from hierarchical relationships and low trust among partners. For legitimacy, only social legitimacy is examined. The challenge here revolves around aligning the joint and individual efforts in RIECs’ accountability approach. Other challenges include determining the focus of accountability during stressful periods and the need for dynamic accountability in RIECs’ operations. In conclusion, by categorizing the challenges to effectiveness into multiple layers, this study contributes to a better understanding of the areas that need future improvements, which is fruitful for policymakers. Furthermore, addressing social legitimacy contributes to a better understanding of accountability within networked governance, which is beneficial for future improvement of the accountability approach within networks, including the RIECs.Show less
Due to the academic field of security networks being rather thin, this paper tries to contribute to the field of security networks. Based on existing literature and annual reports, this paper...Show moreDue to the academic field of security networks being rather thin, this paper tries to contribute to the field of security networks. Based on existing literature and annual reports, this paper examines the challenges to the effectiveness and legitimacy of the Financial Action Task Force (FATF) as a security network. The research question addressed is: "What are the challenges to the effectiveness and legitimacy of the Financial Action Task Force?". This research presents three challenges to the effectiveness of the FATF, the lack of full implementation of recommendations by member countries, inefficient information sharing among member states and the constantly changing nature of illicit activity. Additionally, challenges to the democratic, legal, and social legitimacy of the FATF are discussed. Lastly, this research notes that challenges to legitimacy can impact the effectiveness of the FATF as a security network.Show less
This thesis’ aim was to investigate what challenges the ‘do-it-yourself’ surveillance networks of WhatsApp Neighbourhood Watches (WNW) face. Specifically, this research has focussed on identifying...Show moreThis thesis’ aim was to investigate what challenges the ‘do-it-yourself’ surveillance networks of WhatsApp Neighbourhood Watches (WNW) face. Specifically, this research has focussed on identifying the challenges that impede the network’s effectiveness and social legitimacy, using a range of indicators derived from existing scholarly literature. The analysis was performed on one WNW located in Delfgauw. The data used is a combination of data gathered from interviews and data gathered from prior studies on WNWs. Using these indicators and data, multiple challenges were found that the WNW examined faces. These challenges are as follows: information overload, lack of leadership, weak foundational trust, absence of formal policies, limited inclusion of citizens, and a lack of independent monitoring and transparency. Based on these findings several recommendations were made, such as implementing strong leadership, creating a website to improve transparency, and the WABP taking a more active role in the monitoring of the WNWs registered at their domain.Show less
Europol aims to support and coordinate cross-border cooperation between Member States of the European Union in criminal matters. Insider threats therefore pose an exceptionally important...Show moreEuropol aims to support and coordinate cross-border cooperation between Member States of the European Union in criminal matters. Insider threats therefore pose an exceptionally important consideration, when considering risks and threats to Europol´s information security. The framework ensuring information security by the Europol, is undeniably excellent both from a theoretical and practical perspective. Hence, the extent of effectiveness of information security is very high, both at participant-level and community-level. Europol effectively ensure prevention, mitigation and countering of information security challenges to confidentiality, integrity and accessibility to information. However, despite its effectiveness, several areas of concern can be identified. Among which the most important concerns are the so called unknown knowns, referring to issues that Europol has the capability to deal with, however is unaware of its possible occurrence.Show less
This research aimed to analyze the effectiveness of the National Cyber Security Centre of The Netherlands (NCSC-NL) as a security network. In the analysis of this qualitative document analysis,...Show moreThis research aimed to analyze the effectiveness of the National Cyber Security Centre of The Netherlands (NCSC-NL) as a security network. In the analysis of this qualitative document analysis, five contingencies were applied to the NCSC-NL security network; the range of provided services, strengths of relationships, network structure, trust, and consensus in goals. Furthermore, literature on the typologies of security networks was applied to the NCSC-NL network. The main findings conclude that the NCSC-NL network aligns with both a knowledge-generating and an informational network. Furthermore, the contingency of network structure was critical to its effectiveness, reducing complexity and allowing for expansion of participants. A third conclusion is that while centralized networks generally experience low consensus on goals, the NCSC-NL network boosts its effectiveness by achieving a unanimous consensus on goals. Finally, while the range of provided services is assessed by the new services that participants add (Provan & Milward, 2001), the NCSC-NL network reinforces the quality of its existing service with each new participant.Show less
Intelligence organisations (IOs) present a unique series of challenges regarding organisational legitimacy (OL). The secrecy required by IOs has the potential to bypass conventional mechanisms of...Show moreIntelligence organisations (IOs) present a unique series of challenges regarding organisational legitimacy (OL). The secrecy required by IOs has the potential to bypass conventional mechanisms of oversight, which can impact elements of their democratic, legal, and social legitimacy. The support IOs provide for military and policing operations and intrusions into areas of personal and national privacy can raise deep ethical and moral questions. Trends for informal organisational cooperation following 9/11 and high profile failures have raised questions regarding the legitimacy of IOs. Where IOs may find themselves lacking legitimacy in the eyes of their political masters or the public they serve, the continued existence of an organisation or cooperative arrangement may be challenged. It is therefore important for IOs to monitor, measure and maintain their organisational legitimacy. Utilising concepts of corporate responsibility (CR) and elements of organisational legitimacy theory, three realms of corporate responsibility are identified, and typologies of legitimacy established. These typologies form the basis for a theoretical framework which is used to conduct a qualitative document analysis. Official documents from the United States Congress, academic articles, and journalistic sources are analysed through the theoretical framework. This theoretical lens is applied to the Central Intelligence Agency as an example of the type of security network which could find its legitimacy challenged by structure or events. The case study is applied to the question “To what extent does the CIA as a security network meet theoretically grounded criteria for legitimacy?” This analysis finds that the CIA does meet the requirements for organisational legitimacy on a democratic and legal basis. Although, incidents of failure and controversy in parts of the CIA have negatively impacted the agency’s social legitimacy. It is therefore concluded that the CIA does meet the theoretical requires to achieve appropriate levels of organisational legitimacy. It is recommended that strong democratic oversight and robust legal frameworks are maintained. That cooperation and ad-hoc project formation should be founded with oversight mechanisms at the fore, and that maintenance of social legitimacy is reliant on the moral and ethical perceptions of an organisation as the sum of its parts.Show less
Part of the responsibility of the public security networks of Care and Safety Houses is to reduce and prevent juvenile crime. Because criminal youth are committing increasingly serious offences, it...Show morePart of the responsibility of the public security networks of Care and Safety Houses is to reduce and prevent juvenile crime. Because criminal youth are committing increasingly serious offences, it is important that Care and Safety Houses manage their network effectively. Based on qualitative interviews complemented by a document analysis, this thesis aims to advance our knowledge of the obstacles to the effectiveness of Care and Safety Houses and the factors that influence their performance. To this end, a theoretical framework is established including five effectiveness criteria: trust, number of participants, the relationship between actors, network-level competencies, and resource munificence. With the use of qualitative interviews with staff from Care and Safety Houses, these five criteria are evaluated. This led to the identification of three main obstacles to the effectiveness: the capacity issues at the public prosecutor, financial restraints, and a lack of oversight on the online activity of criminal youth. This thesis makes three recommendations with the aim to reduce the effect of these obstacles on the effectivity.Show less
Organized crime is increasingly infiltrating the legal branches of the Dutch economy, which undermines the integrity of institutions and businesses. In the Netherlands, this process is referred to...Show moreOrganized crime is increasingly infiltrating the legal branches of the Dutch economy, which undermines the integrity of institutions and businesses. In the Netherlands, this process is referred to as undermining and affects all layers of society. This thesis argues that undermining should be tackled via a networked approach and explores the challenges to the effectiveness of these networks. It uses five criteria to systematically analyze the existing literature and introduces Taskforce-RIEC Brabant-Zeeland as an illustrative case study. It concludes that the current criminal landscape demands networks to intensify their cooperation, be flexible and adaptive, further integrate knowledge and practice, and be creative in the technological domain.Show less
Because of the increase in the number of security networks, researchers are more interested in how the legitimacy and the effectiveness of these networks can be decided. This thesis aims to provide...Show moreBecause of the increase in the number of security networks, researchers are more interested in how the legitimacy and the effectiveness of these networks can be decided. This thesis aims to provide insights into the four main challenges that are encountered in these networks by using the biggest police cooperation organization, Interpol, as the subject. In addition, this thesis aims to show how these challenges influence the effectiveness and legitimacy of the organization by examining over fifty sources. Results suggest that Interpol is successful in its day-to-day operations in terms of social and output legitimacy. In contrast, democratic legitimacy was harder to justify as within Interpol the paradigm of us versus them is strongly present. Therefore, a closing point of this thesis is the recommendation to stimulate further research regarding the countering of this us versus them paradigm in individual stakeholders of such global security networks. As well as change the paradigm from individual stakeholders in the security networks to the security network as a whole.Show less