Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
225,971
result(s) for
"Security forces"
Sort by:
Fighting for peace in Somalia : a history and analysis of the African Union Mission (AMISOM), 2007-2017.
Fighting for Peace in Somalia provides the first comprehensive analysis of the African Union Mission in Somalia (AMISOM), an operation deployed in 2007 to stabilize the country and defend its fledgling government from one of the world's deadliest militant organizations, Harakat al-Shabaab.00The book's two parts provide a history of the mission from its genesis in an earlier, failed regional initiative in 2005 up to mid-2017, as well as an analysis of the mission's six most important challenges, namely, logistics, security sector reform, civilian protection, strategic communications, stabilization, and developing a successful exit strategy. These issues are all central to the broader debates about how to design effective peace operations in Africa and beyond.
Response of Kenya Security Forces to Terrorist Attacks in the Post-Westgate Period
2023
The article describes how Kenya, through its security forces, responded to significant terrorist attacks carried out by terrorist organization Al-Shabaab on the territory of Kenya alongside how those attacks contributed to the development of counter-terrorism measures. The measures are analyzed from a legislative, technical and security point of view. The article is based on a conceptual analysis of P.C. Sederberg, combined with the United Nations Global Counter-Terrorism Strategy and argues that three significant terrorist attacks on Westgate in 2013, Garissa in 2015 and Dusit D2 in 2019 were key factors of the development and adoption of complex counter-terrorism measures. Those measures were based on the adoption of appropriate laws, development of the institutional structure and implementation of military and police counter-terrorism measures. However, changes were gradual, reactive instead of proactive. The country has learned to build the state’s capacity to combat terrorism but struggled with conflict prevention and respect for the rule of law. It succeeded with a build-up of counter-terrorism security forces able to respond effectively and on time. But, finding and eliminating the causes of the conflict, they were far behind. All three significant terrorist attacks showed the need for an appropriate combination of counter-terrorism measures. They cannot be put in use separately, otherwise, it can lead to unintended results.
Journal Article
Johor Military Force (Jmf): The Only Royal Security Force in Malaysia
2021
The unique feature of the state of Johor that distinguishes it from other states in Malaysia is the existence of its own royal security force known as the Johor Military Force (JMF) or ‘Askar Timbalan Setia Negeri Johor’ (ATSN). The JMF was established in 1886 by the late Maharaja Abu Bakar as contained in the Loyalty Agreement signed by the Johor state government with the British government at the Colonial Office, London. The JMF once served as a state defense fortress besides assisting the police in ensuring security in the state of Johor. With the inclusion of Johor into the Federation of Malaya, JMF has remained until now but its role has shifted to the security of the family of Sultan of Johor and its assets only. Now, after a century, today's generation is less knowledgeable about the role and historical value that exists with this JMF team that needs to be known and preserved. This article aims to provide an explanation on the existence of the JMF team in more depth to the current and future generations. Library research was used with reference to the printed documents housed in the National Archives of Johor Branch and the Johor Royal Museum in addition to the research on digital media through the ‘History Channel’ documentary. The results of the study show that the existence of this team needs to be fully preserved and further research needs to be done thoroughly to ensure that its historical value continues to be preserved from time to time.
Journal Article
Preventing Coups d’état
2018
Although coups remain a pressing concern for rulers across the globe, the mechanisms through which common coup-prevention strategies operate have not been well theorized or rigorously tested. This article analyzes how “counterbalancing” the military with other security forces prevents coups. Using new cross-national timeseries data on state security forces along with evidence from sixteen case studies, the article demonstrates that counterbalancing reduces the likelihood that coup attempts will succeed and that it does so primarily by creating incentives for some soldiers to resist the coup, rather than by creating barriers to coordination between forces. However, counterbalancing is not associated with fewer coup attempts. In fact, the creation of a new security force increases the odds of a coup attempt in the following year. These findings highlight potential costs associated with counterbalancing and explain why it is not more widespread.
Journal Article
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
2011
There has been significant recent interest in game-theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game model. Among the major applications are the ARMOR program deployed at LAX Airport and the IRIS program in use by the US Federal Air Marshals (FAMS). The foundational assumption for using Stackelberg games is that security forces (leaders), acting first, commit to a randomized strategy; while their adversaries (followers) choose their best response after surveillance of this randomized strategy. Yet, in many situations, a leader may face uncertainty about the followers surveillance capability. Previous work fails to address how a leader should compute her strategy given such uncertainty.
We provide five contributions in the context of a general class of security games. First, we show that the Nash equilibria in security games are interchangeable, thus alleviating the equilibrium selection problem. Second, under a natural restriction on security games, any Stackelberg strategy is also a Nash equilibrium strategy; and furthermore, the solution is unique in a class of security games of which ARMOR is a key exemplar. Third, when faced with a follower that can attack multiple targets, many of these properties no longer hold. Fourth, we show experimentally that in most (but not all) games where the restriction does not hold, the Stackelberg strategy is still a Nash equilibrium strategy, but this is no longer true when the attacker can attack multiple targets. Finally, as a possible direction for future research, we propose an extensive-form game model that makes the defenders uncertainty about the attackers ability to observe explicit.
Journal Article
Mechanical equipment based on hall three-dimensional structure study on the application of security forces
2020
For informatization under the condition of complex mechanical equipment support difficult problems in our country, absorb method of hall three dimensions structure theory, this paper constructs the mechanical equipment support strength using the architecture, methods on the use of the security forces, security requirements, security tasks, security model, implementation steps and method innovation, scheme evaluation system comprehensive study.
Journal Article