Institute of Southeast Asian Studies Publishing
Strategic Currents
-
Edited by:
About this book
This volume focuses on the theme of Human Security - a phenomenon increasingly in the news in Asia. The issues revolve around the security of the individual as opposed to the security of the state. They encompass some of the latest developments affecting or having implications for the well-being of the Asian individual since January 2010. Among them are Japan's triple calamity; Wikileaks; the Arab uprisings; and the death of Osama bin Laden. Issues discussed range from climate change and natural disasters; energy security; health, food, and water security to issues of internal challenges such as governance, politics and identity. The role of diplomacy in non-traditional security, as the larger conceptual framework within which human security resides, is also covered. This is the third volume of Strategic Currents, which publishes essays and commentaries first written for RSIS Commentaries by scholars, academics and associates of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University.
Topics
-
Download PDFPublicly Available
Frontmatter
i -
Download PDFPublicly Available
Contents
v -
Download PDFRequires Authentication UnlicensedLicensed
Preface
xi - Chapter I. Climate Change and Natural Disasters
-
Download PDFRequires Authentication UnlicensedLicensed
Japan’s Mega Disaster: Managing Vulnerabilities
3 -
Download PDFRequires Authentication UnlicensedLicensed
Catastrophe in Haiti. A Repeat Lesson for Asia
6 -
Download PDFRequires Authentication UnlicensedLicensed
The Haiti Earthquake: Protecting Small States
11 -
Download PDFRequires Authentication UnlicensedLicensed
From Aceh to Chile: Is ASEAN Prepared for Another Disaster?
14 -
Download PDFRequires Authentication UnlicensedLicensed
Urban Search and Rescue: Boosting Intra-ASEAN Self-Help
17 -
Download PDFRequires Authentication UnlicensedLicensed
Australia and Climate Change: The Changing Weather in Climate Politics
19 -
Download PDFRequires Authentication UnlicensedLicensed
Pakistan’s Flood Disaster: An Unprecedented Humanitarian Crisis
22 -
Download PDFRequires Authentication UnlicensedLicensed
The Indonesian Military and Disaster Relief: Potential Pitfalls and Challenges
25 - CHAPTER II. Energy Security
-
Download PDFRequires Authentication UnlicensedLicensed
Japan Disaster. Nuclear Power after Fukushima
33 -
Download PDFRequires Authentication UnlicensedLicensed
Japan Disaster End of the Nuclear Industry?
36 -
Download PDFRequires Authentication UnlicensedLicensed
Japan and India. Towards Nuclear and Security Cooperation
38 -
Download PDFRequires Authentication UnlicensedLicensed
Nuclear Energy in Southeast Asia. Will it Enhance Human Security?
41 -
Download PDFRequires Authentication UnlicensedLicensed
Nuclear Energy in Southeast Asia. Competition or Cooperation?
43 -
Download PDFRequires Authentication UnlicensedLicensed
Japan-China. Spat Over Nuclear Arsenal?
46 -
Download PDFRequires Authentication UnlicensedLicensed
Environmental Issues. Challenges or Opportunities for Indonesia?
49 -
Download PDFRequires Authentication UnlicensedLicensed
The Yeonpyeong Attack. Shooting Down Denuclearisation
52 -
Download PDFRequires Authentication UnlicensedLicensed
Yeonpyeong. Tough Test for China’s North Korea Policy
55 -
Download PDFRequires Authentication UnlicensedLicensed
A Second Nuclear Age in Asia?
58 - CHAPTER III. Health, Food and Water Security
-
Download PDFRequires Authentication UnlicensedLicensed
Tunisia’s Revolt and Food Insecurity What it Means for Southeast Asia
63 -
Download PDFRequires Authentication UnlicensedLicensed
Global Food Price Spiral. Causes and Consequences
66 -
Download PDFRequires Authentication UnlicensedLicensed
Food Shortages. Urban Food Security in an Age of Constraints
69 -
Download PDFRequires Authentication UnlicensedLicensed
Arsenic Poisoning of Water in Bangladesh
72 -
Download PDFRequires Authentication UnlicensedLicensed
Infectious Disease. Outbreaks Crafting a Response
75 -
Download PDFRequires Authentication UnlicensedLicensed
China and Global Food Security. Conflicting Notions
78 -
Download PDFRequires Authentication UnlicensedLicensed
Water Insecurity in the Himalayas. Emerging Tensions and Lessons for ASEAN
81 -
Download PDFRequires Authentication UnlicensedLicensed
Pulp Friction. Southern Environment or Western Agenda?
84 -
Download PDFRequires Authentication UnlicensedLicensed
Water Disputes in South Asia
87 - CHAPTER IV. Governance, Politics and Identity
-
Download PDFRequires Authentication UnlicensedLicensed
After the Facebook Revolution: Whither Egypt?
93 -
Download PDFRequires Authentication UnlicensedLicensed
Post-Mubarak Egypt: Is Indonesia the Model?
96 -
Download PDFRequires Authentication UnlicensedLicensed
Libya and the United Nations: Whose Responsibility to Protect?
99 -
Download PDFRequires Authentication UnlicensedLicensed
Responsibility to Protect. How should Southeast Asia Respond?
102 -
Download PDFRequires Authentication UnlicensedLicensed
Our Road Out of Afghanistan
105 -
Download PDFRequires Authentication UnlicensedLicensed
Religion and Identity in Malaysia
108 -
Download PDFRequires Authentication UnlicensedLicensed
When Islamists Play by the Rules Yet Change the Game
111 -
Download PDFRequires Authentication UnlicensedLicensed
Countering India’s Maoist Insurgency. The Need for Strategy, not Operations
114 -
Download PDFRequires Authentication UnlicensedLicensed
More than a Cake Party: Evolving Protest in Malaysia
117 -
Download PDFRequires Authentication UnlicensedLicensed
Indonesian Islam: What Went Right
120 - CHAPTER V. Terrorism, Cyber Security and Cyberspace
-
Download PDFRequires Authentication UnlicensedLicensed
After Osama bin Laden: Will Al Qaeda Survive?
125 -
Download PDFRequires Authentication UnlicensedLicensed
Diplomatic Confidentiality: The Real Lesson of Wikileaks
128 -
Download PDFRequires Authentication UnlicensedLicensed
The MSK Family Affair: Is Blood Thicker than Water?
131 -
Download PDFRequires Authentication UnlicensedLicensed
Chink in Jakarta’s Armour. Tightening Counter-Terrorist Financing
134 -
Download PDFRequires Authentication UnlicensedLicensed
Whither e-Jihad: Evaluating the Threat of Internet Radicalisation
137 -
Download PDFRequires Authentication UnlicensedLicensed
Self-Radicalisation and the Awlaki Connection
140 -
Download PDFRequires Authentication UnlicensedLicensed
Cyber War in the 21st Century: The Emerging Security Challenge
143 -
Download PDFRequires Authentication UnlicensedLicensed
Countering Internet Radicalisation: The Need for a Holistic Approach
146 -
Download PDFRequires Authentication UnlicensedLicensed
The Internet and Women: Avenue for Female Jihadists
149 -
Download PDFRequires Authentication UnlicensedLicensed
The SAF in Cyberspace: The Image of Defence and the Internet
152 - CHAPTER VI. Maritime Security and Piracy
-
Download PDFRequires Authentication UnlicensedLicensed
Somalia Two Years On: Making the Anti-Piracy Drive More Effective
157 -
Download PDFRequires Authentication UnlicensedLicensed
Fighting Piracy: Another First for the SAF
160 -
Download PDFRequires Authentication UnlicensedLicensed
Killing Pirates: Dilemma of Counter-Piracy
163 -
Download PDFRequires Authentication UnlicensedLicensed
The Malacca Strait: Will It Remain Safe?
166 -
Download PDFRequires Authentication UnlicensedLicensed
The Bay of Bengal: A New Sea of Troubles?
169 -
Download PDFRequires Authentication UnlicensedLicensed
The South China Sea: Worsening Dispute or Growing Clarity in Claims?
172 -
Download PDFRequires Authentication UnlicensedLicensed
The South China Sea: When the Elephants Dance
175 -
Download PDFRequires Authentication UnlicensedLicensed
The South China Sea: Problems and Progress in China’s Position
178 -
Download PDFRequires Authentication UnlicensedLicensed
The South China Sea: Emerging China-Taiwan Cooperation
181 -
Download PDFRequires Authentication UnlicensedLicensed
Piracy in the South China Sea: Lessons from the Gulf of Aden
184 - CHAPTER VII. Diplomacy and Non- Traditional Security
-
Download PDFRequires Authentication UnlicensedLicensed
The G20 Summit: How Asia Can Strengthen Its Voice
189 -
Download PDFRequires Authentication UnlicensedLicensed
The G20: Should Europe Give Way to Asia?
191 -
Download PDFRequires Authentication UnlicensedLicensed
The ASEAN Regional Forum at 17: The Curse of Ad Hoc-ism?
194 -
Download PDFRequires Authentication UnlicensedLicensed
Embracing Myanmar: India’s Foreign Policy Realism
197 -
Download PDFRequires Authentication UnlicensedLicensed
The Singapore Global Dialogue: Heated Start to Strategic Debates
200 -
Download PDFRequires Authentication UnlicensedLicensed
Indonesia-Malaysia Relations: Baggage of Blood Brotherhood
203 -
Download PDFRequires Authentication UnlicensedLicensed
Railway Land Swap: New Light on an Old Issue
206 -
Download PDFRequires Authentication UnlicensedLicensed
Is Indonesia Outgrowing ASEAN?
209 -
Download PDFRequires Authentication UnlicensedLicensed
East Asian Security: The United States Wants a Bigger Indian Role
212 -
Download PDFRequires Authentication UnlicensedLicensed
ADMM Plus Defence Cooperation: Rise of a New Player
215 -
Download PDFRequires Authentication UnlicensedLicensed
ADMM Plus. New Twist to Old Security Issues
218 -
Download PDFRequires Authentication UnlicensedLicensed
The East Asia Summit 2010: Big Step Forward, or Business-as-Usual?
221 -
Download PDFRequires Authentication UnlicensedLicensed
Indonesia, the U.S. and Australia: New Age, New Issues
224 -
Download PDFRequires Authentication UnlicensedLicensed
Our Contributors
227