Despite there being much speculation on how the events during the July 15, 2016 military uprising and the resultant mass purges and military reforms disrupted the operational effectiveness of the Turkish Armed Forces (TAF), no analytical piece assessing the TAF’s effectiveness and relying on field-related facts and insights derived from primary sources has appeared

Africa’s Security Problems and Possible Remedies

Africa’s security problems, Democracy and Human Rights, Economic Development, Terrorism, Transparency and Corruption. For a researcher of international relations, the African continent is only a very rich laboratory where it will be possible to analyze all the problems facing, at the present, the international community.
Since the September 11 attacks, counter-terrorism (CT) has gained prominence and become a central issue throughout the world. Given the growing transnational character of terrorism, counter-measures also entailed a collective nature. At this point, the role of global and regional organizations to bring the efforts of the individual countries into a meaningful action become much more important.
Border security ensures sustainable development of a state. Pakistan has the longest border with Afghanistan known as “Durand Line.“ The borderland is rugged, mountainous and porous unable to control the transition of people across the frontier. Both countries are having a history of strained relations but in the past forty years, there were two mass migrations of Afghan people to Pakistan.
Introduction: The Conceptualisation of Terrorism The concept of security historically based on the emergence of human society is also an ambiguity concept both in International Relations discipline and in daily usage. On the one hand while discussions about defining and specifying of the scope of the concept is continuing, on the other hand it is frequently

Impact of Media on Security

Today’s media is no longer limited to newspaper, television or radio but modern media, in written or audio-video form, has become fast, effective and accessible as it can share information worldwide in no time. Everything can be saved electronically in computers, mobiles or other digital devices. Digital media has great impact on states and societies with some good and bad sides.
The rapid advancement of Information and Communication Technologies (ICT) since the mid-1980s has revolutionized the Information Infrastructure (II), which comprises communications networks and associated software and facilitates interaction among people and organizations. The prevalence of information at all levels of a society-individual,
NATO Allies on the both sides of the Atlantic have been witnessing various ongoing crises: from mass refugee influx to rising concerns over emboldening Russian maneuvers in Ukraine and Syria, and nowadays the strategic consequences of Brexit for Euro-Atlantic relations. Evidently, these interrelated challenges are of transnational and hybrid nature involving state and nonstate actors alike. These threats of hybrid nature posed by

Border Security

The ‘Border Security and Control’ is an important function of ‘State Sovereignty’. “Sovereignty of state is one of the key feature of the Westphalian order.”1 It is also accepted as the supreme legitimate authority within the territorial boundaries of the state.2
Soft power has become an increasingly important part of effective foreign policy strategies as the 21. Century is distinguished by transnational interactions and dispersion of power at local, national and international levels. The rise of networks
The China advocates an authoritarian liberal policy in the administration of the communist party, far from democracy, human rights and a western-style government. On the other hand, China, which is fully integrated with the world, is increasing its presence in the regions it chooses such as Africa and Middle East and North Africa. Keywords: China, Middle East, North Africa, Military, Economic Power, Diplomacy, Soft Power
Autonomous Weapons Systems (AWS) enable operating almost independent from human intervention by providing continuous monitoring, data collection, and processing great mount of data in a short-time period. In that respect, AWS have been desired for Indigenous Defense Industry Countries (IDIC) such as India, Israel, and Turkey. Key Words: Autonomous Weapons, Indigenization, Defense Industries, Regional Security, Military
Introduction Nowadays, it is obvious that the over-demands of the consumption society are not entirely met and can not be satisfied by many people especially in the poor and developing ountries. This is not a sustainable way of life. It can not be denied that it has caused great human migrations, insurrections and conflicts for centuries that eventually feed terrorism.

Are we Ready for Future Cyber Wars?

Do cyber wars pose threats to national or global security? What is the impact of the privatization of intelligence in cyber sector? How can cyber wars ruin people’s daily lives? Is it really possible to attribute cybercrimes to their rightful perpetrators? Will information warfare be bloodless or do virtual acts have the potential to shed real blood?

Areas

Continents ( 5 Fields )
Action
 Contents ( 411 ) Actiivities ( 173 )
Areas
Africa 66 136
Asia 75 211
Europe 13 29
Latin America & Carribean 12 30
North America 7 5
Regions ( 4 Fields )
Action
 Contents ( 167 ) Actiivities ( 45 )
Areas
Balkans 22 92
Middle East 19 56
Black Sea and Caucasus 2 15
Mediterranean 2 4
Identity Fields ( 2 Fields )
Action
 Contents ( 172 ) Actiivities ( 66 )
Areas
Islamic World 51 143
Turkish World 15 29
Turkey ( 1 Fields )
Action
 Contents ( 205 ) Actiivities ( 54 )
Areas
Turkey 54 205

Last Added