This paper examined eight cases of counterinsurgency warfare to uncover conditions that lead to the use or non-use of Private Military Companies in military conflict by minor powers. This was done...Show moreThis paper examined eight cases of counterinsurgency warfare to uncover conditions that lead to the use or non-use of Private Military Companies in military conflict by minor powers. This was done through the use of a crisp-set Qualitative Comparative Analysis, which combines aspects of both quantitative as well as qualitative approaches. The conditions that were identified as having an impact on PMC involvement are: danger to the political leadership due to continuation of the conflict, quality of equipment and training soldiers receive, and whether the conflict has reached a stalemate. In the universe of cases presented in this paper the most important factor for predicting the use or non-use of PMC’s seems to be whether the political leadership is in danger due to the continuation of the conflict. This is highlighted through case studies of the Sierra Leone Civil War and the Bougainville Conflict. In Sierra Leone, the capital was surrounded which led to the use of PMC’s. In Papua New Guinea the prime minister felt politically threatened, leading to him contacting a PMC. However, the rest of the government and army were not directly threatened by the conflict and thus condemned the use of this PMC, leading to the cancellation of the contract.Show less
The Euromaidan revolution in Ukraine led to protests, violence, violations of human rights, and more than a hundred people lost their life. During the three months of protest (2013-2014), multiple...Show moreThe Euromaidan revolution in Ukraine led to protests, violence, violations of human rights, and more than a hundred people lost their life. During the three months of protest (2013-2014), multiple intergovernmental organisations made statements regarding the violence and called for action against the Ukrainian government. This paper investigates how much influence those intergovernmental organisations have on the decision-making of the Ukrainian government regarding the protests by using press releases. This paper finds that intergovernmental organisations have indeed influence while limited in the decision-making. This is seen due to the use of discourse analysis.Show less
This study argues that Russia’s cyber operations against Ukraine can be explained by a continuation of an old set Soviet legacy theories: deep operation theory, reflexive control theory and...Show moreThis study argues that Russia’s cyber operations against Ukraine can be explained by a continuation of an old set Soviet legacy theories: deep operation theory, reflexive control theory and political warfare. By using these theories Russia aims to create an advantage in the long-term competition and to alter the Western perception of its strategic intentions. Many scholars have argued Russia’s strategies are new forms of hybrid warfare, cyber warfare or informational warfare, while their actual strategic framework might just be a continuation of old theories. This study aims to answer the research question: “To what extent are Russia’s cyber operations against Ukraine guided by a coherent cyber strategy?” by analysing Russia’s cyber operations against Ukraine and attempts to start a debate on the gap in the current literature on a coherent Russian cyber strategy.Show less
The understanding of life as a complex system is becoming more and more prominent in many academic disciplines. This study applies this systems’ perspective to understand how transitional justice ...Show moreThe understanding of life as a complex system is becoming more and more prominent in many academic disciplines. This study applies this systems’ perspective to understand how transitional justice (TJ) practice contributes to reconciliation. Based on existing literature, a theoretical framework is constructed which theorizes that in the social network of TJ society, there is an emergent process towards reconciliation. This process is based on the value of interconnectedness. TJ practices emerge as part of this process and can serve as a catalysator. This emergent process is impacted by formal TJ structure and the TJ governance network. Consequently, this study applies this theoretical framework to the case of the post-genocide gacaca trials in Rwanda. The findings demonstrate that the model provides insights into the case. However, further research is needed to validate the theoretical framework.Show less
The 2022 Russian invasion of Ukraine led to the largest refugee movement in Europe since World War II. While refugees and migrants were commonly securitized in German right-wing media during the...Show moreThe 2022 Russian invasion of Ukraine led to the largest refugee movement in Europe since World War II. While refugees and migrants were commonly securitized in German right-wing media during the 2015 refugee crisis, it is remarkable that reporting on Ukrainian refugees in 2022 includes elements of support and solidarity. Therefore, this study investigates how German right-wing media outlets framed the Ukrainian refugee movement to Germany following the 2022 Russian invasion of Ukraine. By means of discourse analysis, 26 articles from five well-known German right-wing media outlets are analyzed to identify trends in media discourse. Results demonstrate that (1) German right-wing media clearly set Ukrainian refugees apart from other refugee flows, and (2) German right-wing media outlets frame Ukrainian refugees as humane and positive. This study contributes to the lack of research on refugee framing in non-English media discourse. The findings that German right-wing media outlets embrace Ukrainian refugees can also have implications for the tenability of the anti-immigration argument that Germany has reached its limit on accepting refugees.Show less
The most significant new risk for businesses and governments is related to cyber security (NCSC, 2018). The formation of public-private partnerships (PPP) is perhaps the optimal way to facilitate...Show moreThe most significant new risk for businesses and governments is related to cyber security (NCSC, 2018). The formation of public-private partnerships (PPP) is perhaps the optimal way to facilitate collaboration between the parties. The purpose of this qualitative study is to shed light on the Information Sharing and Analysis Center (ISAC) for the cyber security of the critical infrastructure in the Netherlands, specifically the energy sector. To construct this thesis, the research question “To what extent could the Energy-ISAC be considered effective in supporting the state for cyber securing the Dutch Critical Infrastructure in the energy sector?” is used. Before assessing the efficacy of the Energy-ISAC, it is first determined what kind of PPP the Energy-ISAC is. Van Montfort et al. (2012) classified three types of PPPs, the alliance, concessions, and improvisation model. Moreover, the four problems of PPPs by Dunn-Cavelty and Suter (2009) are used to discover any shortcomings of the Energy-ISAC. As for the analysis, the alliance model is found most applicable to the Energy-ISAC due to the presence of a horizontal hierarchy and mutual dependency (Vos et al., 2017). Furthermore, the application of the public-private partnership of the energy-ISAC assures that there are very few to no adverse consequences currently. However, a contradiction between the logic of security and the logic of PPP, is an exception to this rule and evident in the energy-ISAC (Dunn-Cavelty & Suter, 2009). This study sheds light on the Dutch strategy to assuring cybersecurity in a critical industry, notably, the energy-ISAC, which has never been presented in studies yet. Moreover, by evaluating how effective the Dutch cyber security public-private partnership is in the energy sector, the Netherlands may strengthen their ability to withstand the effects of potential dangers, therefore improving their overall level of safety.Show less
Europol aims to support and coordinate cross-border cooperation between Member States of the European Union in criminal matters. Insider threats therefore pose an exceptionally important...Show moreEuropol aims to support and coordinate cross-border cooperation between Member States of the European Union in criminal matters. Insider threats therefore pose an exceptionally important consideration, when considering risks and threats to Europol´s information security. The framework ensuring information security by the Europol, is undeniably excellent both from a theoretical and practical perspective. Hence, the extent of effectiveness of information security is very high, both at participant-level and community-level. Europol effectively ensure prevention, mitigation and countering of information security challenges to confidentiality, integrity and accessibility to information. However, despite its effectiveness, several areas of concern can be identified. Among which the most important concerns are the so called unknown knowns, referring to issues that Europol has the capability to deal with, however is unaware of its possible occurrence.Show less
It is widely accepted that the consequences of climate change are being felt globally and are contributing to an increasing number of refugees. The relationship between climate change migration and...Show moreIt is widely accepted that the consequences of climate change are being felt globally and are contributing to an increasing number of refugees. The relationship between climate change migration and gendered vulnerabilities has been acknowledged in the field of migration research. However, policies on migration by the European Union (EU) have been lacking a gender-inclusive focus. This research aims to develop an analytical lens on the nexus between gender, climate change refugees and EU migration policies. To indicate what has changed over the years, EU migration policies which addressed the refugee crisis in 2015 will be compared to policies on climate change migration, so-called environmental policies. After a thorough analysis of the policy reports, this research has found that there have been slight improvements in the inclusion of a gender perspective by the EU, which is for instance attributed to the incorporation of the EU Gender Equality Strategy. However, the recurrent takeaway from this thesis is the lack of gender-inclusiveness in EU policies on migration and the complete lack of acknowledgement by the EU of the gendered aspects of climate change migration. By linking these findings to previous research and debates on gender and migration, this research indicates that there is an urgent need to create effective gender-inclusive EU policies for refugees fleeing the consequences of climate change.Show less
Rwanda and Burundi have both experienced a long history of violence between the two ethnic groups the Hutus and Tutsis. This violence has escalated into several examples of genocidal killings over...Show moreRwanda and Burundi have both experienced a long history of violence between the two ethnic groups the Hutus and Tutsis. This violence has escalated into several examples of genocidal killings over the twentieth century, namely in the 1990’’s. This thesis examines and compares the ethnopolitical histories of Rwanda and Burundi and looks at postgenocidal efforts taken in terms of peacebuilding and transnational justice in both countries, followed by a close look at what the current day relational peace between Hutus and Tutsis in Rwanda and Burundi looks like, with the ultimate goal to find out to what extent peacebuilding efforts in Rwanda and Burundi are loosening ethnic tensions between the Hutus and Tutsis. Burundi’s peacebuilding efforts including equal ethnic representation in its government structures was found to be an effective tool of improving Hutu and Tutsi relations, while Rwanda’s method of ethnic amnesia was found to allow ethnic dominance to remain active within Rwanda to a lesser extent than it was pre-genocide.Show less
In recent years, an increase in far-right terrorist attacks can be seen in the West. Such attacks are often preceded by the publishment of manifestos in which the ideology, motivation and tactical...Show moreIn recent years, an increase in far-right terrorist attacks can be seen in the West. Such attacks are often preceded by the publishment of manifestos in which the ideology, motivation and tactical choices of the terrorists are often described. At the hand of the concepts of Windisch et al. (2018), who explain how individuals are able to engage in violence, the manifestos of Brendan Tarrant and Patrick Crusius will be analysed. By coding the manifestos at the hand of the familiarisation process (Terry et al., 2017), the concepts of disengaging morally, deindividuation and establishing emotional dominance will be connected or not be connected to certain codes. Both Brendan Tarrant and Patrick Crusius have committed terrorists attacks in 2019 which have resulted in the death of multiple people in the name of defending the White race. At the hand of the research question; how do certain techniques that are identified in the manifestos of Brendan Tarrant and Patrick Crusius show that they enabled themselves to engage in violence, this research will show that the manifestos of Patrick Crusius and Brendan Tarrant show that they have enabled themselves to engage in violence by framing violence as the only answer to the immigration issue as perceived by them, by dehumanizing non-Western people and immigrants, by aligning oneself with other violent actors and by explaining their target selection.Show less