Counter-Piracy, Communities of Practice and New Security Alignments
Sažetak
Contemporary global and regional security relations are no longer predominantly characterized by formal organizational structures, but increasingly made up of informal and often diffused problem centered alignments. Following the hypothesis that new security problems produce new forms of security alignment, I scrutinize in this paper how one problem, maritime piracy, is addressed by different forms of alignments. I outline a perspective of how to study the range of new forms of security alignments which have risen to counter piracy. Investigating the United Nations contact group, the military mechanism SHADE and two regional agreements I argue, firstly, that these new forms of security alignments are glued together by notions (or better boundary objects) of best practices, information sharing and training. Rather than formal institutions, the alignments are best understood as organized around practical activities which revolve around projects of creating a common repertoire of knowledge, a joint epistemic infrastructure and shared practices. Secondly, the cases indicate that new alignments produce new (cognitive) regions which can be observed through the spatial practices underlying them.
Reference
Abrahamsen, Rita, and Michael C. Williams. 2009. “Security Beyond the State: Global Security Assemblages in International Politics.” International Political Sociology 3 (1): 1–17.
Adler, Emanuel, and Patricia Greve. 2009. “When security community meets balance of power: overlapping regional mechanisms of security governance.” Review of International Studies 35 (S1): 59–84.
Adler, Emanuel. 2008. “The Spread of Security Communities: Communities of Practice, Self-Restraint, and NATO’s Post-Cold War Transformation.” European Journal of International Relations 14 (2): 195–230.
Adler, Emanuel. 1997. “Imagined (security) communities: Cognitive regions in international relations.” Millennium: Journal of International Studies 26 (2): 249–277.
Albert, Mathias, Oliver Kessler, and Stephan Stetter. 2008. “On order and conflict: International Relations and the “communicative turn.” Review of International Studies 34 (S1): 43–67.
Bigo, Didier. 2008. “The Emergence of a Consensus: Global Terrorism, Global Insecurity, and Global Security.” In Immigration, Integration and Security: America and Europe in Comparative Perspective, edited by Ariane Chebel D’Appollonia and Simon Reich, 67–94. Pittsburgh, PA.: University of Pittsburgh Press.
Bueger, Christian. 2011. The New Public Face of the Contact Group, Piracy-Studies. org Blog, October 2011, http://piracy-studies.org/2011/the-new-public-face-of-the- contact-group/
Bueger, Christian. 2013a. “Responses to Contemporary Piracy: Disentangling the Organizational Field.” in Modern Piracy: Legal Challenges and Responses, edited by Douglas Guilfoyle, 91−116. Cheltenham: Edward Elgar.
Bueger, Christian. 2013b. “Orchestrating the Response: Somali Piracy and Ontological Complexity.” Global Policy 4 (1): 86−93.
Bueger, Christian and Jan Stockbruegger. 2012. “Security Communities, Alliances and Macro-securitization: The Practices of Counter-Piracy Governance,” in Maritime Piracy and the Construction of Global Governance, edited by Michael J. Struett, Mark T. Nance and Jon D. Carlson, 98−124 . London: Routledge.
Bueger, Christian and Mohanvir S. Saran. 2012. Finding a Regional Solution to Piracy: Is the Djibouti Process the Answer? Piracy-Studies.org Blog, August 2012 http://piracy-studies.org/2012/finding-a-regional-solution-to-piracy-is-the-djibouti- process-the-answer/
Deutsch, Karl. 1988. The Analysis of International Relations, 3d ed. London: Prentice- Hall.
Guilfoyle, Douglas. 2013. “The Contact Group on Piracy off the Coast of Somalia: piracy, governance and international law.” Global Policy 4 (1): 73−79.
Ho, Joshua. 2009. “Combating piracy and armed robbery in Asia: The ReCAAP Information Sharing Centre (ISC).” Marine Policy 33 (2), 432–434.
Kennedy, David. 2001. “The Politics of Invisible College: International Governance and the Politics of Expertise.” European Human Rights Law Review (5): 463–497.
Khalid, Nazery. 2009. “With a Little Help from My Friends: Maritime Capacity- Building Measures in the Straits of Malacca.” Contemporary Southeast Asia 31 (3): 424–446.
Krahmann, Elke. 2003. “Conceptualizing Security Governance.: Cooperation and Conflict 38 (1): 5–26.
Kraska, James. 2011. Contemporary Maritime Piracy: International Law, Strategy, and Diplomacy at Sea. Santa Barbara, Cal.: Praeger Publishers.
Storey, Ian. 2008. “Securing Southeast Asia’s Sea Lanes: A Work in Progress.” Asia Policy 6 (1): 95–128.
Tsing, Anna. 2000. “The Global Situation.” Cultural Anthropology 15 (3): 327–360. Wenger, Etienne. 1998. Communities of Practice: Learning, Meaning and Identity. Cambridge: Cambridge University Press.
Wilkins, Thomas S. 2011. “Alignment”, not “alliance” – the shifting paradigm of international security cooperation: toward a conceptual taxonomy of alignment. Review of International Studies 38 (1): 53–76.
Authors retain copyright of the published papers and grant to the publisher the non-exclusive right to publish the article, to be cited as its original publisher in case of reuse, and to distribute it in all forms and media.
The published articles will be distributed under the Creative Commons Attribution 4.0 International License (CC BY). It is allowed to copy and redistribute the material in any medium or format, and remix, transform, and build upon it for any purpose, even commercially, as long as appropriate credit is given to the original author(s), a link to the license is provided and it is indicated if changes were made. / The published articles will be distributed under the Creative Commons Attribution ShareAlike 4.0 International license (CC BY-SA). It is allowed to copy and redistribute the material in any medium or format, and remix, transform, and build upon it for any purpose, even commercially, as long as appropriate credit is given to the original author(s), a link to the license is provided, it is indicated if changes were made and the new work is distributed under the same license as the original.
Users are required to provide full bibliographic description of the original publication (authors, article title, journal title, volume, issue, pages), as well as its DOI code. In electronic publishing, users are also required to link the content with both the original article published in Journal of Regional Security and the licence used.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted to deposit author’s pre-print / author’s post-print (accepted version) / publisher's version (PDF) of their work in an institutional repository, subject-based repository, author's personal website (including social networking sites, such as ResearchGate, Academia.edu, etc.), and/or departmental website prior or during the submission process / at any time after the acceptance of the manuscript / at any time after publication.
Full bibliographic information (authors, article title, journal title, volume, issue, pages) about the original publication must be provided and links must be made to the article's DOI and the license.