This thesis explores how the AKP’s discourse on national security constructed Turkey’s national identity and defined threats during two major domestic crises: the Gezi Protests and the Peace...Show moreThis thesis explores how the AKP’s discourse on national security constructed Turkey’s national identity and defined threats during two major domestic crises: the Gezi Protests and the Peace Process between Turkey and the PKK. Through a theoretical framework drawing from securitization and ontological security theory, it provides a discourse analysis in order to determine how AKP officials constructed these events as a threat, identified them as a national emergency, legitimized the application of extraordinary measures against them, and rejected legitimate alternatives. Further, it studies the implications of this construction of identity and (in)security on ontological security, and argues that an appreciation of these implications helps provide significant insights on the nexus of identity and (in)security in contemporary Turkey.Show less
This paper explores the nature of the EU Common Security and Defense Policy and its influence on the path to European strategic autonomy, which has increasingly become salient in EU politics in the...Show moreThis paper explores the nature of the EU Common Security and Defense Policy and its influence on the path to European strategic autonomy, which has increasingly become salient in EU politics in the past few years. Not only because of military escalation in the East or the instability in the European Neighbourhood with regard to migration, but upheaval in the structures we thought to be invincible as well: America and NATO, and Brexit. Unexpected changes don’t necessarily lead to instability when autonomy is guaranteed. How can this be achieved for the EU? After analysing said influence in four dimensions of European strategic autonomy, the reader is presented with the conclusion that the CSDP has only had a relatively small influence, and many problems with its DNA prevent the Union from taking the steps required to become self-sufficient in an increasingly hostile environment.Show less
Framing a societal issue as a matter of national security is a powerful motivator that, when used strategically, can elicit unprecedented outcomes. Recently, the EU adopted a novel regulation aimed...Show moreFraming a societal issue as a matter of national security is a powerful motivator that, when used strategically, can elicit unprecedented outcomes. Recently, the EU adopted a novel regulation aimed at establishing rules upon one of the most unrestrained areas: online platforms. The adoption of the Digital Services Act, marked a shift within two of the most regarded values in democratic societies: freedom and security, leaning heavily towards the latter due to the restrictive notions that are now being promoted upon a previously unregulated realm. This situation leads to wonder, how does the EU justify the tradeoff between freedom and security? Through a discourse analysis methodology, that studied the preeminence of a securitizing discourse, versus two other rival frames: Novelty, understood as seeking to hold a first mover advantage at regulating a sector and Equity, as a yearning to promote EU values through regulation, it was found that the negotiation process of the DSA showed strong indications of a securitizing discourse, which frames the adverse effects of online platforms as a matter of national security. This leads to conclude that EU policymakers securitized the discourse around online platforms to succeed where others failed at regulating the internet.Show less
China has emerged as a new rising power with the largest Navy force and the second-biggest economy in the world. A regional collective defense security organization, NATO, has expanded its global...Show moreChina has emerged as a new rising power with the largest Navy force and the second-biggest economy in the world. A regional collective defense security organization, NATO, has expanded its global partnership to the Asia-Pacific region. This thesis seeks to research the impact of the military rise of China on NATO-led security cooperation among NATO and far yet like-minded countries. Comparative qualitative content analysis is conducted to elaborate on how the security implications of the rise of China engendered NATO to form global initiatives, analyzing two cases, the Republic of Korea, and New Zealand. Theoretical expectations are based on Regional Security Complex Theory, which is anchored on constructivism: if NATO successfully securitizes China's rise, the ROK and NZ will create bilateral or multilateral security cooperation with NATO. This paper finds out that NATO successfully framed China as an identity and a military threat, and expanded security cooperation with the ROK and NZ based on common liberal norms and values.Show less
Since the People’s Republic of China was created in 1949, one of its main objectives has been the reunification of all its territory. In recent years, China has focussed increasingly on the...Show moreSince the People’s Republic of China was created in 1949, one of its main objectives has been the reunification of all its territory. In recent years, China has focussed increasingly on the securitisation of the Hong Kong independence movement and Taiwanese independence to achieve this unification. This thesis conducts a comparative case study, using securitisation theory, where China’s security strategy on Hong Kong and Taiwan is compared. It analyses the influence of colonial periods over Hong Kong and Taiwan’s current domestic politics, focusing on the years 1841 to 1997. Furthermore, it studies China’s security approach to Hong Kong and Taiwan in the 21st century and how this approach has influenced local responses in Hong Kong and Taiwan. This research is conducted through a critical discourse analysis, focussing on policy documents and speeches by Chinese officials. It argues that the colonial history of Hong Kong and Taiwan, the perceived and legitimate legal authority of China, the successfulness of securitisation of the local independence movements, and the response of both citizens and local politics all influence China’s security strategy towards Hong Kong and Taiwan all influence China’s security strategy.Show less
This thesis compares the effects of NATO’s out-of-area operations in Kosovo and Afghanistan to analyze what effect geographical distance of operations have on Alliance Cohesion through the method...Show moreThis thesis compares the effects of NATO’s out-of-area operations in Kosovo and Afghanistan to analyze what effect geographical distance of operations have on Alliance Cohesion through the method of process tracing. Mainly because of the current geopolitical shift, it is important to evaluate what NATO should look out for policy-wise moving forward. The main variable of analysis in this was the changing threat-perception of the five largest contributors to both operations. The threat-perception was determined by analyzing national security reports and other primary sources from the countries involved in the analysis, focusing on elite-level policy making. What was found in the comparison was the threat-perceptions of all analyzed states were more aligned in the operations in Kosovo, while the lack of regional/national interests for the analyzed states in Afghanistan made it hard for the states to securitize the operations, damaging Alliance Cohesion. National interests and geopolitical interests were combined in the case of Kosovo, and led to the same end-goal. Meanwhile the operations in Afghanistan led to a larger discrepancy between national interests and geopolitical interests, making Alliance commitment tougher to define, and follow through on.Show less
When asking: what do humans need to survive? The word ‘security’ will be unmistakably an important answer to that question. When asking: what do states need to survive? The same word is, again, an...Show moreWhen asking: what do humans need to survive? The word ‘security’ will be unmistakably an important answer to that question. When asking: what do states need to survive? The same word is, again, an inherent concept that is interwoven with its survival. But what is security? For humans the answer seems obvious: having a steady source of food and water and not being in physical danger. Yet in recent times even this has been challenged and concepts such as ‘identity’ and ‘freedom of fear’ are debated to be also important in the concept of ‘security’. This already is a complex debate, but when it comes to states, the answer is yet even more complex. Because a state, unlike a human, is not a physical object, but as Anderson famously argued, is an ‘imagined community’ (Anderson, 1983). Then what does security mean for a state? This study aims to contribute to this understanding by deconstructing and critically examining ‘national security’ in a policy case study: Taiwan in Japanese foreign (security) policy documents.Show less
The evolution of security provision generated a shift from government to governance. As a consequence, security is increasingly being pursued by networks consisting of public as well as private...Show moreThe evolution of security provision generated a shift from government to governance. As a consequence, security is increasingly being pursued by networks consisting of public as well as private actors. With the aim of addressing wicked security problems, these actors try join their efforts by exchanging information, coordinate joint responses and in this way generate knowledge regarding the security issue. The Community Fathers ‘Al-Wasl’ are such a security network which aims to address complex security problems within the district Laak in The Hague. Since security networks encounter serious challenges in their efforts to solve these problems that affects the level of legitimacy and effectiveness. Through the evaluation of Community Fathers ‘Al-Wasl’ by qualitative research techniques, this thesis aims to find an answer to the question: “What are the challenges that affect the legitimacy and effectiveness of the Community Fathers ‘Al-Wasl’ in The Hague?”. This thesis argues that Community Fathers ‘Al-Wasl’ experiences great internal and social legitimacy but lacks external legitimacy. Furthermore, Al-Wasl is effective from a network-level and organizational-level perspective but lacks scientific evidence to prove the effectiveness on a community-level. However, this thesis argues that Al-Wasl is effective on a community-level since the social-societal contributions to the community being served can be regarded as priceless.Show less
Cybercrime is not clearly defined. This is an important issue as academics, but also law and policymakers are not able to tackle the issue sufficiently without knowing the boundaries of the concept...Show moreCybercrime is not clearly defined. This is an important issue as academics, but also law and policymakers are not able to tackle the issue sufficiently without knowing the boundaries of the concept. Defining what the boundaries are, is important to identify if it is a crime and to establish international consensus on the topic with regards to law enforcement. This thesis aimed to map out the debate regarding the definition of ‘cybercrime’. A database of 139 sources was created and divided into three categories; sources that used no definition, sources that were about the debate itself and the last category, sources that provided/stated a definition on cybercrime (see Appendix A). In this category, two main camps were identified. One following the Budapest Convention on Cybercrime definition and one where the role of technology was deemed the centre point of the definition. ‘Technology’ was an important concept but the meaning of this term differed across the definitions. Finally, to provide new angles for this research gap, the ‘cybercrime’ definition debate was compared to the ‘white-collar crime’ definition debate. Three uncertainties that Quinney (1964) described were compared to the findings from the database. Two uncertainties were comparable. This means that this is not a new discussion but rather history repeating itself in another form. This opens up possible new opportunities and angles for research.Show less
Muslim terrorism and radicalization have been topics of increasing concern in the West since the beginning of the 21st century. The rise of the Islamic State, commonly referred to as ISIS, which...Show moreMuslim terrorism and radicalization have been topics of increasing concern in the West since the beginning of the 21st century. The rise of the Islamic State, commonly referred to as ISIS, which experienced a rapid and unexpected development after 2014, increased these widespread concerns related to Muslim terrorism and radicalization. This thesis tackles these topics from the perspective of France, a country that has been hardly hit by ISIS since 2014. Thus, the aim of this paper is to analyze how the Islamic State, and Muslim terrorism more broadly, have influenced the making of the French counter-terrorist apparatus. This research provides a detailed overview and analysis of the concrete impact of these phenomena on the French counter-terrorist apparatus, and delves into the role played by key counter-terrorist actors through the preemptive and reactive measures that have been taken in order to counter the Islamic State. Further, this research looks at the implications of the dynamics existing between the Islamic State and France, and investigates the resulting limitations that affect France's counter-terrorist system, in terms of overall efficiency and, more importantly, regarding the respect of fundamental human rights. This paper suggests that further research should be conducted on this topic, in order to gain a proper understanding of the processes and dynamics that are at play in the elaboration of counter-terrorist measures aimed at providing appropriate answers to existing and upcoming threats.Show less
Russia's foreign policy towards the Middle East bears a strinking resemblance to its strategy for gaining power in Central Asia. In both regions, Russia uses its capacity for protecting countries...Show moreRussia's foreign policy towards the Middle East bears a strinking resemblance to its strategy for gaining power in Central Asia. In both regions, Russia uses its capacity for protecting countries from threats through military cooperation,conflict mediation and anti-interventionism to gain influence.Show less
The central question this thesis will attempt to address is: ‘What problems arise when private security companies are allowed to perform public tasks and how may these problems be overcome?’ In...Show moreThe central question this thesis will attempt to address is: ‘What problems arise when private security companies are allowed to perform public tasks and how may these problems be overcome?’ In order to narrow the scope of this very broad question, I will attempt to answer it by focusing specifically on PMSC activity during anti-piracy actions. The arguments in this thesis will show how the ambiguous nature of the current legal framework has caused a lack of democratic responsibility in anti-piracy action. This has led to a situation of increased violence and human rights violation as economic incentives have been allowed to precede social incentives. To increase democratic responsibility in PMSC’s, I propose that Dutch policy should focus on the creation of corporate social responsibility within the companies that are allowed to operate on board ships passing through high risk areas. It is important however, to be aware of the internal contradictions that face CSR-theory and focus on the possibility of omitting these obstacles in the unique context in which the Law for the Protection of Dutch Merchant Ships will be implemented.Show less
This study investigates the question how migration has shaped the broader relationship between the EU and Egypt between the 2011 Revolution and 2019. It found that migration has profoundly affected...Show moreThis study investigates the question how migration has shaped the broader relationship between the EU and Egypt between the 2011 Revolution and 2019. It found that migration has profoundly affected the bilateral relationship, particularly in the fields of democracy, human rights, development aid and economic cooperation. An analysis of policy documents and (public) statements by officials from the EU and Egypt shows how migration cooperation has made it difficult for the EU to uphold its image as a normative actor. Egypt's efforts to limit irregular migration to the EU are mainly driven by its economic dependency on the EU.Show less
In light of the growth in cyberattacks occurring over the past few years, especially after the devastating effects of NotPetya and WannaCry malwares, this thesis reviews the application of the...Show moreIn light of the growth in cyberattacks occurring over the past few years, especially after the devastating effects of NotPetya and WannaCry malwares, this thesis reviews the application of the securitisation theory to the phenomenon of cyberattacks. It addresses the shortcomings of the theoretical framework proposed by the Copenhagen School of thoughts with regards to this particular security area and suggests an adapted approach, more flexible and contextual. The paper develops its thesis in the context of Russian cyberattacks against the Ukrainian power grid and infrastructures that occurred in recent years.Show less