Tangible explanations for structural changes in terrorism over time are missing. Furthermore, attempting to explain such changes as ideological is problematic in that it reinforces a tautology,...Show moreTangible explanations for structural changes in terrorism over time are missing. Furthermore, attempting to explain such changes as ideological is problematic in that it reinforces a tautology, considering that terrorism itself is often conceptualised as inherently ideological. Problematising the notion of ideology in the definition of terrorism and the typology of changes in terrorism, therefore, offers an exit from such continuous circular reasoning that focuses on ideology. A tangible change in terrorism is that from pack terrorism, i.e. group terrorism, to lone wolf terrorism. Three rival explanations potentially account for this change. An ideological explanation that focuses on the capability of ideology to spark violence, as well as a contextual explanation that argues that changes in the living environments of perpetrators lead to changes in the characteristics of terrorism, cannot stand firm when taken to the test. Meanwhile, a processual explanation according to which terrorist and counterterrorist forces continuously exploit the other side’s disadvantage does. Ultimately, changes in terrorism can be conceptualised using the analogy of a cat-and-mouse game in which learning and adaptation processes on the side of terrorists and counterterrorist forces likewise cause terrorism to change structurally.Show less
This thesis seeks to address the academic debate surrounding the intervention of state actors in foreign information spaces, as this discourse lacks a coherent framework, allowing researchers to...Show moreThis thesis seeks to address the academic debate surrounding the intervention of state actors in foreign information spaces, as this discourse lacks a coherent framework, allowing researchers to identify, compare, categorize and hence explain acts of Information Intervention (II). To initiate a solution for this problem, this thesis aimed to create a typology of common contemporary types of covert and semi-covert state IIs beyond the means subsumed by the soft power and public diplomacy concepts. This process was facilitated by Kluge’s (2000) framework for the empirically grounded construction of types and an empirical research process, which was based on the identification of sources by employing keyword configurations and the search engines Google/Google Scholar. Given the scope of this project and the public unavailability of certain II practices, it was not possible to cover all acts of II for the given typology. Rather, the goal of this thesis was to guide future research in the field of Information Interventions, by providing a notion of the dynamics in the given field, on which future research can be built on. Therefore, while the typology presented in this thesis cannot be determined as universal, it made the first step towards the establishment of such framework, allowing researchers to systematically analyze IIs.Show less
Through the case study of the NPFL in Liberia, this thesis explains why some rebel groups are able to transform to a successful political organization after conflict, and others are unable to do so.
This study examines the variations in the security outlooks of the Baltic States – Estonia, Latvia, and Lithuania – toward the European Union’s quest for strategic autonomy. For decades, the...Show moreThis study examines the variations in the security outlooks of the Baltic States – Estonia, Latvia, and Lithuania – toward the European Union’s quest for strategic autonomy. For decades, the concept of ‘strategic autonomy’ has remained ambiguous and ill-defined despite waves of discussions amongst leaders and academics alike. In an increasingly multipolar world and a considerably evolving security landscape in Northeastern Europe in light of the war in Ukraine, a renewed interest in the topic has emerged. Nevertheless, as in previous waves of discussion, the focus is primarily directed at the major powers. This study aims to shed light on the divergence of interpretation to be found among three small states; countries often finding themselves treated as one homogenous region with the same security concerns and objectives. By conducting eight interviews with current government officials, as well as analyzing government documents, the study answers two questions: How do the Baltic states view the concept of strategic autonomy? and What differences can be identified in their understanding of the concept? The research finds that strategic autonomy is viewed as a process rather than a fixed goal. Despite increasing support for the implementation of EU security initiatives, worries about NATO decoupling, duplication, and potential discrimination of strategic partners, especially the United States, remain significant. Most notably yet, the Baltic State’s interpretation and importance of the concept do, in fact, vary. This study highlights the challenges in achieving a unified interpretation of strategic autonomy both within the contexts of the EU and between global strategic partners. In the face of shifting geopolitical realities, discerning the misunderstandings among the Baltic nations is a crucial step in bridging differences and addressing the practical implications across national borders.Show less
Disruptions to the routine operations of ICTs in conflict situations have made cybersecurity come to ascend a prominent position in the legal and political decision-makeing of the EU....Show moreDisruptions to the routine operations of ICTs in conflict situations have made cybersecurity come to ascend a prominent position in the legal and political decision-makeing of the EU. Europeanization has been used to describe the processes by which EU decision-makeing manifests itself in the logic of, for example, national policy outcomes of those processes (see Radaelli, 2012, p. 1 as cited by Fererro & Ackrill, 2016, p.880). The literature has pointed to the significant amount of soft law which the EU has issued to regulate cybersecurity. However, per definition EU member states are not legally obliged to implement soft law. Accordingly, by utilizing Europeanization as a conceptual frame, this thesis has sought to answer the question: To what extent has non-legally binding EU soft law on cybersecurity influenced the making of the national cybersecurity policies of its MS over time? To address the research, question the thesis has taken a small-scale empirical mixed-method approach by analyzing the extent to which specifically, Germany's and Slovakia's national cybersecurity strategies have harmonized over time toward the 2020 EU cybersecurity strategy (EUCSS) as a consequence of using the soft law document in their stagey-making. The analysis suggest that the EU cybersecurity strategy did influence the national strategy-making, but that the degree of harmonization depended on the extent to which the EUCSS aligned with national ambitions and priorities. To this end, the member states actively strived to 'Europeanize' their national cybersecurity strategies.Show less
The United Kingdom (UK)'s 2020 decision to prohibit the Chinese company Huawei from participating in the development of Britain's 5G networks, also known as the Huawei ban, raised many questions....Show moreThe United Kingdom (UK)'s 2020 decision to prohibit the Chinese company Huawei from participating in the development of Britain's 5G networks, also known as the Huawei ban, raised many questions. The ban represented a stark policy shift, as the UK had earlier granted Huawei the right to participate in 5G development to a limited extent. Amid political pressure that came from the United States (US) and the United Kingdom itself, the UK government reversed course. The rhetoric used by the political actors pressuring the UK government as well as by the government itself in its announcement of the ban contained characterisations of Huawei and China as threatening. This suggests the securitisation of China played a role in the UK's decision. Therefore, this study posed the following research question: "What role did the securitisation of China in the West play in the UK's decision to prohibit Huawei from participating in the development of British 5G networks?" This is a relevant question as it is concerned with how British foreign policy towards China takes shape and how securitisation takes place and influences consequential policy decisions. Critical discourse analysis with special attention to the context of discourse production and making use of Amin's (2019) three- step conceptualisation of securitisation theory found that the securitisation of China and Huawei played a key role in the UK government's decision to ban the company. The securitisation of China by US political actors influenced US and British pressure on the UK government to reverse its earlier decision. Ultimately the UK government backtracked and implemented the Huawei ban securitising China and Huawei in the process in an effort to regain lost credibility and win support for its newly adopted policy.Show less