Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
216 result(s) for "Internal security Case studies."
Sort by:
Secession and Security
Since World War II, separatist conflicts have been the most common and deadly types of war in international politics. Such wars result from a simple incongruity: ethno-nationalist groups desire a homeland, but on territory that is controlled by states unwilling to give it up. This book examines states’ strategies, particularly their use of violence, when confronted by separatist movements. Using more than 110 interviews, American and British diplomatic archives, and newspaper archives, this book’s emphasis on external security can account for separatist violence, or its lack thereof, in a variety of historical contexts including Pakistan's treatment of Bengali secessionists; India’s treatment of separatism in Assam, Punjab, and Jammu and Kashmir; interactions between the Ottoman Empire and Armenia; and Israel's attitudes toward Palestine.
Survival Migration
International treaties, conventions, and organizations to protect refugees were established in the aftermath of World War II to protect people escaping targeted persecution by their own governments. However, the nature of cross-border displacement has transformed dramatically since then. Such threats as environmental change, food insecurity, and generalized violence force massive numbers of people to flee states that are unable or unwilling to ensure their basic rights, as do conditions in failed and fragile states that make possible human rights deprivations. Because these reasons do not meet the legal understanding of persecution, the victims of these circumstances are not usually recognized as \"refugees,\" preventing current institutions from ensuring their protection. In this book, Alexander Betts develops the concept of \"survival migration\" to highlight the crisis in which these people find themselves. Examining flight from three of the most fragile states in Africa-Zimbabwe, the Democratic Republic of Congo, and Somalia-Betts explains variation in institutional responses across the neighboring host states. There is massive inconsistency. Some survival migrants are offered asylum as refugees; others are rounded up, detained, and deported, often in brutal conditions. The inadequacies of the current refugee regime are a disaster for human rights and gravely threaten international security. InSurvival Migration, Betts outlines these failings, illustrates the enormous human suffering that results, and argues strongly for an expansion of protected categories.
Weapons of Mass Migration
At first glance, the U.S. decision to escalate the war in Vietnam in the mid-1960s, China's position on North Korea's nuclear program in the late 1990s and early 2000s, and the EU resolution to lift what remained of the arms embargo against Libya in the mid-2000s would appear to share little in common. Yet each of these seemingly unconnected and far-reaching foreign policy decisions resulted at least in part from the exercise of a unique kind of coercion, one predicated on the intentional creation, manipulation, and exploitation of real or threatened mass population movements. In Weapons of Mass Migration , Kelly M. Greenhill offers the first systematic examination of this widely deployed but largely unrecognized instrument of state influence. She shows both how often this unorthodox brand of coercion has been attempted (more than fifty times in the last half century) and how successful it has been (well over half the time). She also tackles the questions of who employs this policy tool, to what ends, and how and why it ever works. Coercers aim to affect target states' behavior by exploiting the existence of competing political interests and groups, Greenhill argues, and by manipulating the costs or risks imposed on target state populations. This \"coercion by punishment\" strategy can be effected in two ways: the first relies on straightforward threats to overwhelm a target's capacity to accommodate a refugee or migrant influx; the second, on a kind of norms-enhanced political blackmail that exploits the existence of legal and normative commitments to those fleeing violence, persecution, or privation. The theory is further illustrated and tested in a variety of case studies from Europe, East Asia, and North America. To help potential targets better respond to-and protect themselves against-this kind of unconventional predation, Weapons of Mass Migration also offers practicable policy recommendations for scholars, government officials, and anyone concerned about the true victims of this kind of coercion-the displaced themselves. At first glance, the U.S. decision to escalate the war in Vietnam in the mid-1960s, China's position on North Korea's nuclear program in the late 1990s and early 2000s, and the EU resolution to lift what remained of the arms embargo against Libya in the mid-2000s would appear to share little in common. Yet each of these seemingly unconnected and far-reaching foreign policy decisions resulted at least in part from the exercise of a unique kind of coercion, one predicated on the intentional creation, manipulation, and exploitation of real or threatened mass population movements. In Weapons of Mass Migration , Kelly M. Greenhill offers the first systematic examination of this widely deployed but largely unrecognized instrument of state influence. She shows both how often this unorthodox brand of coercion has been attempted (more than fifty times in the last half century) and how successful it has been (well over half the time). She also tackles the questions of who employs this policy tool, to what ends, and how and why it ever works. Coercers aim to affect target states' behavior by exploiting the existence of competing political interests and groups, Greenhill argues, and by manipulating the costs or risks imposed on target state populations. This \"coercion by punishment\" strategy can be effected in two ways: the first relies on straightforward threats to overwhelm a target's capacity to accommodate a refugee or migrant influx; the second, on a kind of norms-enhanced political blackmail that exploits the existence of legal and normative commitments to those fleeing violence, persecution, or privation. The theory is further illustrated and tested in a variety of case studies from Europe, East Asia, and North America. To help potential targets better respond to-and protect themselves against-this kind of unconventional predation, Weapons of Mass Migration also offers practicable policy recommendations for scholars, government officials, and anyone concerned about the true victims of this kind of coercion-the displaced themselves.
Local peacebuilding and national peace : interaction between grassroots and elite processes
\"Local Peacebuilding and National Peace is a collection of essays that examines the effects of local peacebuilding efforts on national peace initiatives. The book looks at violent and protracted struggles in which local people have sought to make their own peace with local combatants in a variety of ways, and how such initiatives have affected and have been affected by national level strategies. Chapters on theories of local and national peacemaking are combined with chapters on recent efforts to carry out such processes in warn torn societies such as Africa, Asia, and South America, with essays contributed by experts who were actually actively involved in the peacemaking process. With its unique focus on the interaction of peacemaking at local and national levels, the book will fill a gap in the literature. It will be of interest to students and researchers in such fields as peace studies, conflict resolution, international relations, postwar recovery and development.\" -- Publisher's website.
Benzodiazepine prescribing patterns and deaths from drug overdose among US veterans receiving opioid analgesics: case-cohort study
Objective To study the association between benzodiazepine prescribing patterns including dose, type, and dosing schedule and the risk of death from drug overdose among US veterans receiving opioid analgesics.Design Case-cohort study.Setting Veterans Health Administration (VHA), 2004-09.Participants US veterans, primarily male, who received opioid analgesics in 2004-09. All veterans who died from a drug overdose (n=2400) while receiving opioid analgesics and a random sample of veterans (n=420 386) who received VHA medical services and opioid analgesics.Main outcome measure Death from drug overdose, defined as any intentional, unintentional, or indeterminate death from poisoning caused by any drug, determined by information on cause of death from the National Death Index.Results During the study period 27% (n=112 069) of veterans who received opioid analgesics also received benzodiazepines. About half of the deaths from drug overdose (n=1185) occurred when veterans were concurrently prescribed benzodiazepines and opioids. Risk of death from drug overdose increased with history of benzodiazepine prescription: adjusted hazard ratios were 2.33 (95% confidence interval 2.05 to 2.64) for former prescriptions versus no prescription and 3.86 (3.49 to 4.26) for current prescriptions versus no prescription. Risk of death from drug overdose increased as daily benzodiazepine dose increased. Compared with clonazepam, temazepam was associated with a decreased risk of death from drug overdose (0.63, 0.48 to 0.82). Benzodiazepine dosing schedule was not associated with risk of death from drug overdose.Conclusions Among veterans receiving opioid analgesics, receipt of benzodiazepines was associated with an increased risk of death from drug overdose in a dose-response fashion.
How Western soldiers fight : organizational routines in multinational missions
\"This book examines three questions. The first is descriptive: how have soldiers of Western democracies dealt with unconventional problems in post-Cold War missions? The second question is explanatory: why do militaries respond differently to rioters, militias, criminals, or insurgents? The third question is about policy impact: how does military behavior impact local populations?\"--Provided by publisher.
Applying systematic review search methods to the grey literature: a case study examining guidelines for school-based breakfast programs in Canada
Background Grey literature is an important source of information for large-scale review syntheses. However, there are many characteristics of grey literature that make it difficult to search systematically. Further, there is no ‘gold standard’ for rigorous systematic grey literature search methods and few resources on how to conduct this type of search. This paper describes systematic review search methods that were developed and applied to complete a case study systematic review of grey literature that examined guidelines for school-based breakfast programs in Canada. Methods A grey literature search plan was developed to incorporate four different searching strategies: (1) grey literature databases, (2) customized Google search engines, (3) targeted websites, and (4) consultation with contact experts. These complementary strategies were used to minimize the risk of omitting relevant sources. Since abstracts are often unavailable in grey literature documents, items’ abstracts, executive summaries, or table of contents (whichever was available) were screened. Screening of publications’ full-text followed. Data were extracted on the organization, year published, who they were developed by, intended audience, goal/objectives of document, sources of evidence/resources cited, meals mentioned in the guidelines, and recommendations for program delivery. Results The search strategies for identifying and screening publications for inclusion in the case study review was found to be manageable, comprehensive, and intuitive when applied in practice. The four search strategies of the grey literature search plan yielded 302 potentially relevant items for screening. Following the screening process, 15 publications that met all eligibility criteria remained and were included in the case study systematic review. The high-level findings of the case study systematic review are briefly described. Conclusions This article demonstrated a feasible and seemingly robust method for applying systematic search strategies to identify web-based resources in the grey literature. The search strategy we developed and tested is amenable to adaptation to identify other types of grey literature from other disciplines and answering a wide range of research questions. This method should be further adapted and tested in future research syntheses.