Gallie explained security as an ‘essentially contested concept’ which is an appropriate analogy when considering this essay. Securitization Theory falls under the umbrella of Critical Security Studies which entered the theoretical mainstream after the post-cold war paradigm shift. Naturally, these ‘critical’ conceptions criticize the traditional...
After United Nations Operation in the Congo (ONUC) which was created in 1960 in order to restore peace and stability following Congo’s independence (Zabeki, 2017), the United Nations intervened again by establishing the United Nations Organization Mission in the Democratic Republic of the Congo (MONUC)...
Republic of Ghana is a West African country; a member of the Commonwealth of Nations; an African Union member; and an African UN member which sends its soldiers to UN Peacekeeping Force. Since 2017, Ghana has a total population of 26,908,262, with Total Military Personnel...
The role of government surveillance in national security has been an prolonged issue in our country. We face a question: is the violation of our privacy really worth the security that could potentially be provided? The beginnings of our current government surveillance come from the...
Introduction In today’s society, technology has grown into one of the most used and most wanted events of the millennium. This essay about Apple vs FBI controversy centers on whether Apple should be forced to create new software that would allow the FBI to access...
The proposed construction of a wall along the US-Mexico border has been a contentious issue, sparking debates over its potential benefits and drawbacks. In this comprehensive analysis, we will delve deeper into the multifaceted aspects of building such a wall, emphasizing the interconnectedness of national...
Digitalization of the medical data involves the use of modern technology to centralise the records and documents of the patient’s medical history into a virtual database. Clinical summary records from different healthcare providers are stored and shared to facilitate the future use from other providers....
Security of information is a matter of prime concern in today’s information based economy. We need to protect our data from hacking. Hacking is a process to utilize weakness in the system and gaining unapproved access to data and system resources. When business connect their...
Introduction In the dark times of World War II, the United States found itself in a conflict that shook its very core principles. One of the most controversial actions during this period was Civilian Exclusion Order No 34, which had serious impacts on Japanese American...
In a world where technology reigns supreme, the importance of cyber security cannot be overstated. The rapid advancement of digital systems and the proliferation of interconnected devices have brought about a new era of vulnerability. As we navigate through the expansive realm of cyberspace, protecting...
The United States Marine Corps has been implementing a new concept known as Expeditionary Force 21 (EF21). This concept represents a significant shift in military strategy, emphasizing the need for a more agile and versatile force capable of responding to a wide range of challenges...