Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
216
result(s) for
"Internal security Case studies."
Sort by:
Secession and Security
2017
Since World War II, separatist conflicts have been the most common and deadly types of war in international politics. Such wars result from a simple incongruity: ethno-nationalist groups desire a homeland, but on territory that is controlled by states unwilling to give it up. This book examines states’ strategies, particularly their use of violence, when confronted by separatist movements. Using more than 110 interviews, American and British diplomatic archives, and newspaper archives, this book’s emphasis on external security can account for separatist violence, or its lack thereof, in a variety of historical contexts including Pakistan's treatment of Bengali secessionists; India’s treatment of separatism in Assam, Punjab, and Jammu and Kashmir; interactions between the Ottoman Empire and Armenia; and Israel's attitudes toward Palestine.
Survival Migration
by
Betts, Alexander
in
21st century
,
Africa, Sub-Saharan
,
Africa, Sub-Saharan -- Emigration and immigration -- Political aspects -- Case studies
2013
International treaties, conventions, and organizations to protect refugees were established in the aftermath of World War II to protect people escaping targeted persecution by their own governments. However, the nature of cross-border displacement has transformed dramatically since then. Such threats as environmental change, food insecurity, and generalized violence force massive numbers of people to flee states that are unable or unwilling to ensure their basic rights, as do conditions in failed and fragile states that make possible human rights deprivations. Because these reasons do not meet the legal understanding of persecution, the victims of these circumstances are not usually recognized as \"refugees,\" preventing current institutions from ensuring their protection. In this book, Alexander Betts develops the concept of \"survival migration\" to highlight the crisis in which these people find themselves.
Examining flight from three of the most fragile states in Africa-Zimbabwe, the Democratic Republic of Congo, and Somalia-Betts explains variation in institutional responses across the neighboring host states. There is massive inconsistency. Some survival migrants are offered asylum as refugees; others are rounded up, detained, and deported, often in brutal conditions. The inadequacies of the current refugee regime are a disaster for human rights and gravely threaten international security. InSurvival Migration, Betts outlines these failings, illustrates the enormous human suffering that results, and argues strongly for an expansion of protected categories.
Weapons of Mass Migration
2010,2011
At first glance, the U.S. decision to escalate the war in
Vietnam in the mid-1960s, China's position on North Korea's nuclear
program in the late 1990s and early 2000s, and the EU resolution to
lift what remained of the arms embargo against Libya in the
mid-2000s would appear to share little in common. Yet each of these
seemingly unconnected and far-reaching foreign policy decisions
resulted at least in part from the exercise of a unique kind of
coercion, one predicated on the intentional creation, manipulation,
and exploitation of real or threatened mass population movements.
In Weapons of Mass Migration , Kelly M. Greenhill offers
the first systematic examination of this widely deployed but
largely unrecognized instrument of state influence. She shows both
how often this unorthodox brand of coercion has been attempted
(more than fifty times in the last half century) and how successful
it has been (well over half the time). She also tackles the
questions of who employs this policy tool, to what ends, and how
and why it ever works.
Coercers aim to affect target states' behavior by exploiting the
existence of competing political interests and groups, Greenhill
argues, and by manipulating the costs or risks imposed on target
state populations. This \"coercion by punishment\" strategy can be
effected in two ways: the first relies on straightforward threats
to overwhelm a target's capacity to accommodate a refugee or
migrant influx; the second, on a kind of norms-enhanced political
blackmail that exploits the existence of legal and normative
commitments to those fleeing violence, persecution, or privation.
The theory is further illustrated and tested in a variety of case
studies from Europe, East Asia, and North America. To help
potential targets better respond to-and protect themselves
against-this kind of unconventional predation, Weapons of Mass
Migration also offers practicable policy recommendations for
scholars, government officials, and anyone concerned about the true
victims of this kind of coercion-the displaced themselves.
At first glance, the U.S. decision to escalate the war in
Vietnam in the mid-1960s, China's position on North Korea's nuclear
program in the late 1990s and early 2000s, and the EU resolution to
lift what remained of the arms embargo against Libya in the
mid-2000s would appear to share little in common. Yet each of these
seemingly unconnected and far-reaching foreign policy decisions
resulted at least in part from the exercise of a unique kind of
coercion, one predicated on the intentional creation, manipulation,
and exploitation of real or threatened mass population
movements.
In Weapons of Mass Migration , Kelly M. Greenhill offers
the first systematic examination of this widely deployed but
largely unrecognized instrument of state influence. She shows both
how often this unorthodox brand of coercion has been attempted
(more than fifty times in the last half century) and how successful
it has been (well over half the time). She also tackles the
questions of who employs this policy tool, to what ends, and how
and why it ever works. Coercers aim to affect target states'
behavior by exploiting the existence of competing political
interests and groups, Greenhill argues, and by manipulating the
costs or risks imposed on target state populations.
This \"coercion by punishment\" strategy can be effected in two
ways: the first relies on straightforward threats to overwhelm a
target's capacity to accommodate a refugee or migrant influx; the
second, on a kind of norms-enhanced political blackmail that
exploits the existence of legal and normative commitments to those
fleeing violence, persecution, or privation. The theory is further
illustrated and tested in a variety of case studies from Europe,
East Asia, and North America. To help potential targets better
respond to-and protect themselves against-this kind of
unconventional predation, Weapons of Mass Migration also
offers practicable policy recommendations for scholars, government
officials, and anyone concerned about the true victims of this kind
of coercion-the displaced themselves.
Local peacebuilding and national peace : interaction between grassroots and elite processes
\"Local Peacebuilding and National Peace is a collection of essays that examines the effects of local peacebuilding efforts on national peace initiatives. The book looks at violent and protracted struggles in which local people have sought to make their own peace with local combatants in a variety of ways, and how such initiatives have affected and have been affected by national level strategies. Chapters on theories of local and national peacemaking are combined with chapters on recent efforts to carry out such processes in warn torn societies such as Africa, Asia, and South America, with essays contributed by experts who were actually actively involved in the peacemaking process. With its unique focus on the interaction of peacemaking at local and national levels, the book will fill a gap in the literature. It will be of interest to students and researchers in such fields as peace studies, conflict resolution, international relations, postwar recovery and development.\" -- Publisher's website.
Benzodiazepine prescribing patterns and deaths from drug overdose among US veterans receiving opioid analgesics: case-cohort study
by
Saitz, Richard
,
Bohnert, Amy S B
,
Ganoczy, Dara
in
Analgesics
,
Analgesics, Opioid - administration & dosage
,
Analgesics, Opioid - adverse effects
2015
Objective To study the association between benzodiazepine prescribing patterns including dose, type, and dosing schedule and the risk of death from drug overdose among US veterans receiving opioid analgesics.Design Case-cohort study.Setting Veterans Health Administration (VHA), 2004-09.Participants US veterans, primarily male, who received opioid analgesics in 2004-09. All veterans who died from a drug overdose (n=2400) while receiving opioid analgesics and a random sample of veterans (n=420 386) who received VHA medical services and opioid analgesics.Main outcome measure Death from drug overdose, defined as any intentional, unintentional, or indeterminate death from poisoning caused by any drug, determined by information on cause of death from the National Death Index.Results During the study period 27% (n=112 069) of veterans who received opioid analgesics also received benzodiazepines. About half of the deaths from drug overdose (n=1185) occurred when veterans were concurrently prescribed benzodiazepines and opioids. Risk of death from drug overdose increased with history of benzodiazepine prescription: adjusted hazard ratios were 2.33 (95% confidence interval 2.05 to 2.64) for former prescriptions versus no prescription and 3.86 (3.49 to 4.26) for current prescriptions versus no prescription. Risk of death from drug overdose increased as daily benzodiazepine dose increased. Compared with clonazepam, temazepam was associated with a decreased risk of death from drug overdose (0.63, 0.48 to 0.82). Benzodiazepine dosing schedule was not associated with risk of death from drug overdose.Conclusions Among veterans receiving opioid analgesics, receipt of benzodiazepines was associated with an increased risk of death from drug overdose in a dose-response fashion.
Journal Article
How Western soldiers fight : organizational routines in multinational missions
\"This book examines three questions. The first is descriptive: how have soldiers of Western democracies dealt with unconventional problems in post-Cold War missions? The second question is explanatory: why do militaries respond differently to rioters, militias, criminals, or insurgents? The third question is about policy impact: how does military behavior impact local populations?\"--Provided by publisher.
Applying systematic review search methods to the grey literature: a case study examining guidelines for school-based breakfast programs in Canada
by
Leatherdale, Scott T.
,
Godin, Katelyn
,
Stapleton, Jackie
in
Abstracting and Indexing
,
Biomedicine
,
Breakfast
2015
Background
Grey literature is an important source of information for large-scale review syntheses. However, there are many characteristics of grey literature that make it difficult to search systematically. Further, there is no ‘gold standard’ for rigorous systematic grey literature search methods and few resources on how to conduct this type of search. This paper describes systematic review search methods that were developed and applied to complete a case study systematic review of grey literature that examined guidelines for school-based breakfast programs in Canada.
Methods
A grey literature search plan was developed to incorporate four different searching strategies: (1) grey literature databases, (2) customized Google search engines, (3) targeted websites, and (4) consultation with contact experts. These complementary strategies were used to minimize the risk of omitting relevant sources. Since abstracts are often unavailable in grey literature documents, items’ abstracts, executive summaries, or table of contents (whichever was available) were screened. Screening of publications’ full-text followed. Data were extracted on the organization, year published, who they were developed by, intended audience, goal/objectives of document, sources of evidence/resources cited, meals mentioned in the guidelines, and recommendations for program delivery.
Results
The search strategies for identifying and screening publications for inclusion in the case study review was found to be manageable, comprehensive, and intuitive when applied in practice. The four search strategies of the grey literature search plan yielded 302 potentially relevant items for screening. Following the screening process, 15 publications that met all eligibility criteria remained and were included in the case study systematic review. The high-level findings of the case study systematic review are briefly described.
Conclusions
This article demonstrated a feasible and seemingly robust method for applying systematic search strategies to identify web-based resources in the grey literature. The search strategy we developed and tested is amenable to adaptation to identify other types of grey literature from other disciplines and answering a wide range of research questions. This method should be further adapted and tested in future research syntheses.
Journal Article