Home Strategic Currents
book: Strategic Currents
Book
Licensed
Unlicensed Requires Authentication

Strategic Currents

Issues in Human Security in Asia
  • Edited by: Yang Razali Kassim
Language: English
Published/Copyright: 2011
View more publications by ISEAS Publishing

About this book

This volume focuses on the theme of Human Security - a phenomenon increasingly in the news in Asia. The issues revolve around the security of the individual as opposed to the security of the state. They encompass some of the latest developments affecting or having implications for the well-being of the Asian individual since January 2010. Among them are Japan's triple calamity; Wikileaks; the Arab uprisings; and the death of Osama bin Laden. Issues discussed range from climate change and natural disasters; energy security; health, food, and water security to issues of internal challenges such as governance, politics and identity. The role of diplomacy in non-traditional security, as the larger conceptual framework within which human security resides, is also covered. This is the third volume of Strategic Currents, which publishes essays and commentaries first written for RSIS Commentaries by scholars, academics and associates of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University.


Publicly Available Download PDF
i

Publicly Available Download PDF
v

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
xi
Chapter I. Climate Change and Natural Disasters

Mely Caballero-Anthony and Sofiah Jamil
Requires Authentication Unlicensed

Licensed
Download PDF
3

Paul Tapponnier and Kerry Sieh
Requires Authentication Unlicensed

Licensed
Download PDF
6

Alan Chong
Requires Authentication Unlicensed

Licensed
Download PDF
11

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
14

Nah Liang Tuang
Requires Authentication Unlicensed

Licensed
Download PDF
17

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
19

Sania Nishtar
Requires Authentication Unlicensed

Licensed
Download PDF
22

Evan A. Laksmana
Requires Authentication Unlicensed

Licensed
Download PDF
25
CHAPTER II. Energy Security

Barry Desker
Requires Authentication Unlicensed

Licensed
Download PDF
33

Alvin Chew
Requires Authentication Unlicensed

Licensed
Download PDF
36

C. Raja Mohan
Requires Authentication Unlicensed

Licensed
Download PDF
38

Ryan Clarke, Nur Azha Putra, Mely Caballero-Anthony and Rajesh Basrur
Requires Authentication Unlicensed

Licensed
Download PDF
41

Alvin Chew
Requires Authentication Unlicensed

Licensed
Download PDF
43

Joshy M. Paul
Requires Authentication Unlicensed

Licensed
Download PDF
46

Eric Frécon
Requires Authentication Unlicensed

Licensed
Download PDF
49

Koh Swee Lean Collin
Requires Authentication Unlicensed

Licensed
Download PDF
52

You Ji
Requires Authentication Unlicensed

Licensed
Download PDF
55

Kwa Chong Guan
Requires Authentication Unlicensed

Licensed
Download PDF
58
CHAPTER III. Health, Food and Water Security

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
63

Paul P. S. Teng
Requires Authentication Unlicensed

Licensed
Download PDF
66

P. K. Hangzo
Requires Authentication Unlicensed

Licensed
Download PDF
69

Arpita Mathur
Requires Authentication Unlicensed

Licensed
Download PDF
72

Bill Durodié
Requires Authentication Unlicensed

Licensed
Download PDF
75

Zhang Hongzhou
Requires Authentication Unlicensed

Licensed
Download PDF
78

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
81

Bill Durodié
Requires Authentication Unlicensed

Licensed
Download PDF
84

Arpita Mathur
Requires Authentication Unlicensed

Licensed
Download PDF
87
CHAPTER IV. Governance, Politics and Identity

Mushahid Ali
Requires Authentication Unlicensed

Licensed
Download PDF
93

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
96

Iftekhar Ahmed Chowdhury and Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
99

Yang Razali Kassim and Nur Azha Putra
Requires Authentication Unlicensed

Licensed
Download PDF
102

Samuel Chan
Requires Authentication Unlicensed

Licensed
Download PDF
105

Joseph Chinyong Liow and Farish A. Noor
Requires Authentication Unlicensed

Licensed
Download PDF
108

Chan Wen Ling
Requires Authentication Unlicensed

Licensed
Download PDF
111

Akanksha Mehta
Requires Authentication Unlicensed

Licensed
Download PDF
114

Choong Pui Yee
Requires Authentication Unlicensed

Licensed
Download PDF
117

Adri Wanto
Requires Authentication Unlicensed

Licensed
Download PDF
120
CHAPTER V. Terrorism, Cyber Security and Cyberspace

Rohan Gunaratna
Requires Authentication Unlicensed

Licensed
Download PDF
125

Alan Chong
Requires Authentication Unlicensed

Licensed
Download PDF
128

Kumar Ramakrishna
Requires Authentication Unlicensed

Licensed
Download PDF
131

Arabinda Acharya and Fatima Astuti
Requires Authentication Unlicensed

Licensed
Download PDF
134

Mohamed Abdul Saddiq
Requires Authentication Unlicensed

Licensed
Download PDF
137

Kumar Ramakrishna
Requires Authentication Unlicensed

Licensed
Download PDF
140

Ashok Sawhney
Requires Authentication Unlicensed

Licensed
Download PDF
143

Yeap Suyin and Jenna Park
Requires Authentication Unlicensed

Licensed
Download PDF
146

Tuty Raihanah Mostarom and Nur Azlin Mohamed Yasin
Requires Authentication Unlicensed

Licensed
Download PDF
149

Samuel Chan
Requires Authentication Unlicensed

Licensed
Download PDF
152
CHAPTER VI. Maritime Security and Piracy

Ashok Sawhney
Requires Authentication Unlicensed

Licensed
Download PDF
157

Samuel Chan
Requires Authentication Unlicensed

Licensed
Download PDF
160

Sam Bateman
Requires Authentication Unlicensed

Licensed
Download PDF
163

Joshua Ho
Requires Authentication Unlicensed

Licensed
Download PDF
166

Sam Bateman
Requires Authentication Unlicensed

Licensed
Download PDF
169

Robert Beckman
Requires Authentication Unlicensed

Licensed
Download PDF
172

Sam Bateman
Requires Authentication Unlicensed

Licensed
Download PDF
175

Yang Fang
Requires Authentication Unlicensed

Licensed
Download PDF
178

Li Mingjiang
Requires Authentication Unlicensed

Licensed
Download PDF
181

Joshua Ho
Requires Authentication Unlicensed

Licensed
Download PDF
184
CHAPTER VII. Diplomacy and Non- Traditional Security

Pradumna B. Rana
Requires Authentication Unlicensed

Licensed
Download PDF
189

Barry Desker
Requires Authentication Unlicensed

Licensed
Download PDF
191

Tan See Seng
Requires Authentication Unlicensed

Licensed
Download PDF
194

C. Raja Mohan
Requires Authentication Unlicensed

Licensed
Download PDF
197

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
200

Joseph Chinyong Liow
Requires Authentication Unlicensed

Licensed
Download PDF
203

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
206

Barry Desker
Requires Authentication Unlicensed

Licensed
Download PDF
209

C. Raja Mohan
Requires Authentication Unlicensed

Licensed
Download PDF
212

Barry Desker
Requires Authentication Unlicensed

Licensed
Download PDF
215

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
218

Tan See Seng
Requires Authentication Unlicensed

Licensed
Download PDF
221

Yang Razali Kassim
Requires Authentication Unlicensed

Licensed
Download PDF
224

Requires Authentication Unlicensed

Licensed
Download PDF
227

Publishing information
Pages and Images/Illustrations in book
eBook published on:
July 18, 2011
eBook ISBN:
9789814345491
Pages and Images/Illustrations in book
Main content:
232
Downloaded on 7.9.2025 from https://www.degruyterbrill.com/document/doi/10.1355/9789814345491/html
Scroll to top button