Strategic Currents
-
Edited by:
Yang Razali Kassim
About this book
This volume focuses on the theme of Human Security - a phenomenon increasingly in the news in Asia. The issues revolve around the security of the individual as opposed to the security of the state. They encompass some of the latest developments affecting or having implications for the well-being of the Asian individual since January 2010. Among them are Japan's triple calamity; Wikileaks; the Arab uprisings; and the death of Osama bin Laden. Issues discussed range from climate change and natural disasters; energy security; health, food, and water security to issues of internal challenges such as governance, politics and identity. The role of diplomacy in non-traditional security, as the larger conceptual framework within which human security resides, is also covered. This is the third volume of Strategic Currents, which publishes essays and commentaries first written for RSIS Commentaries by scholars, academics and associates of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University.
Topics
Publicly Available Download PDF |
i |
Publicly Available Download PDF |
v |
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
xi |
Chapter I. Climate Change and Natural Disasters
|
|
Mely Caballero-Anthony and Sofiah Jamil Requires Authentication Unlicensed Licensed Download PDF |
3 |
Paul Tapponnier and Kerry Sieh Requires Authentication Unlicensed Licensed Download PDF |
6 |
Alan Chong Requires Authentication Unlicensed Licensed Download PDF |
11 |
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
14 |
Nah Liang Tuang Requires Authentication Unlicensed Licensed Download PDF |
17 |
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
19 |
Sania Nishtar Requires Authentication Unlicensed Licensed Download PDF |
22 |
Evan A. Laksmana Requires Authentication Unlicensed Licensed Download PDF |
25 |
CHAPTER II. Energy Security
|
|
Barry Desker Requires Authentication Unlicensed Licensed Download PDF |
33 |
Alvin Chew Requires Authentication Unlicensed Licensed Download PDF |
36 |
C. Raja Mohan Requires Authentication Unlicensed Licensed Download PDF |
38 |
Ryan Clarke, Nur Azha Putra, Mely Caballero-Anthony and Rajesh Basrur Requires Authentication Unlicensed Licensed Download PDF |
41 |
Alvin Chew Requires Authentication Unlicensed Licensed Download PDF |
43 |
Joshy M. Paul Requires Authentication Unlicensed Licensed Download PDF |
46 |
Eric Frécon Requires Authentication Unlicensed Licensed Download PDF |
49 |
Koh Swee Lean Collin Requires Authentication Unlicensed Licensed Download PDF |
52 |
You Ji Requires Authentication Unlicensed Licensed Download PDF |
55 |
Kwa Chong Guan Requires Authentication Unlicensed Licensed Download PDF |
58 |
CHAPTER III. Health, Food and Water Security
|
|
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
63 |
Paul P. S. Teng Requires Authentication Unlicensed Licensed Download PDF |
66 |
P. K. Hangzo Requires Authentication Unlicensed Licensed Download PDF |
69 |
Arpita Mathur Requires Authentication Unlicensed Licensed Download PDF |
72 |
Bill Durodié Requires Authentication Unlicensed Licensed Download PDF |
75 |
Zhang Hongzhou Requires Authentication Unlicensed Licensed Download PDF |
78 |
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
81 |
Bill Durodié Requires Authentication Unlicensed Licensed Download PDF |
84 |
Arpita Mathur Requires Authentication Unlicensed Licensed Download PDF |
87 |
CHAPTER IV. Governance, Politics and Identity
|
|
Mushahid Ali Requires Authentication Unlicensed Licensed Download PDF |
93 |
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
96 |
Iftekhar Ahmed Chowdhury and Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
99 |
Yang Razali Kassim and Nur Azha Putra Requires Authentication Unlicensed Licensed Download PDF |
102 |
Samuel Chan Requires Authentication Unlicensed Licensed Download PDF |
105 |
Joseph Chinyong Liow and Farish A. Noor Requires Authentication Unlicensed Licensed Download PDF |
108 |
Chan Wen Ling Requires Authentication Unlicensed Licensed Download PDF |
111 |
Akanksha Mehta Requires Authentication Unlicensed Licensed Download PDF |
114 |
Choong Pui Yee Requires Authentication Unlicensed Licensed Download PDF |
117 |
Adri Wanto Requires Authentication Unlicensed Licensed Download PDF |
120 |
CHAPTER V. Terrorism, Cyber Security and Cyberspace
|
|
Rohan Gunaratna Requires Authentication Unlicensed Licensed Download PDF |
125 |
Alan Chong Requires Authentication Unlicensed Licensed Download PDF |
128 |
Kumar Ramakrishna Requires Authentication Unlicensed Licensed Download PDF |
131 |
Arabinda Acharya and Fatima Astuti Requires Authentication Unlicensed Licensed Download PDF |
134 |
Mohamed Abdul Saddiq Requires Authentication Unlicensed Licensed Download PDF |
137 |
Kumar Ramakrishna Requires Authentication Unlicensed Licensed Download PDF |
140 |
Ashok Sawhney Requires Authentication Unlicensed Licensed Download PDF |
143 |
Yeap Suyin and Jenna Park Requires Authentication Unlicensed Licensed Download PDF |
146 |
Tuty Raihanah Mostarom and Nur Azlin Mohamed Yasin Requires Authentication Unlicensed Licensed Download PDF |
149 |
Samuel Chan Requires Authentication Unlicensed Licensed Download PDF |
152 |
CHAPTER VI. Maritime Security and Piracy
|
|
Ashok Sawhney Requires Authentication Unlicensed Licensed Download PDF |
157 |
Samuel Chan Requires Authentication Unlicensed Licensed Download PDF |
160 |
Sam Bateman Requires Authentication Unlicensed Licensed Download PDF |
163 |
Joshua Ho Requires Authentication Unlicensed Licensed Download PDF |
166 |
Sam Bateman Requires Authentication Unlicensed Licensed Download PDF |
169 |
Robert Beckman Requires Authentication Unlicensed Licensed Download PDF |
172 |
Sam Bateman Requires Authentication Unlicensed Licensed Download PDF |
175 |
Yang Fang Requires Authentication Unlicensed Licensed Download PDF |
178 |
Li Mingjiang Requires Authentication Unlicensed Licensed Download PDF |
181 |
Joshua Ho Requires Authentication Unlicensed Licensed Download PDF |
184 |
CHAPTER VII. Diplomacy and Non- Traditional Security
|
|
Pradumna B. Rana Requires Authentication Unlicensed Licensed Download PDF |
189 |
Barry Desker Requires Authentication Unlicensed Licensed Download PDF |
191 |
Tan See Seng Requires Authentication Unlicensed Licensed Download PDF |
194 |
C. Raja Mohan Requires Authentication Unlicensed Licensed Download PDF |
197 |
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
200 |
Joseph Chinyong Liow Requires Authentication Unlicensed Licensed Download PDF |
203 |
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
206 |
Barry Desker Requires Authentication Unlicensed Licensed Download PDF |
209 |
C. Raja Mohan Requires Authentication Unlicensed Licensed Download PDF |
212 |
Barry Desker Requires Authentication Unlicensed Licensed Download PDF |
215 |
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
218 |
Tan See Seng Requires Authentication Unlicensed Licensed Download PDF |
221 |
Yang Razali Kassim Requires Authentication Unlicensed Licensed Download PDF |
224 |
Requires Authentication Unlicensed Licensed Download PDF |
227 |