TY - JOUR KW - Asymmetric Threats KW - Comprehensive security KW - Counter-terrorism KW - Critical Infrastructure KW - cross-sectoral approach KW - inter-organisational cooperation KW - multidimensional security KW - Risk Assessment KW - threat assessment AU - Iztok Prezelj AB -
The changing security environment has led to the development of com¬prehensive security approaches, strategies and policies. The ‘Holistic approach’ has become an academic and practical mantra. This paper argues, however, that comprehensive security approaches face serious obstacles to their practical implementation. The critical evaluation of several examples confirms that the implementation phase is a weakness of comprehensive approaches and that a truly comprehensive and holistic approach seems to be beyond the implemental capacities of our security systems. Multi-sectoral and multi-level comprehensive approaches become less comprehensive when implemented in practice or even cannot be implemented due to existing narrow perceptions of security or narrow and short-term interests. The trans-sectoral second-, third- and fourth-order effects of proposed security measures are hardly considered or not considered at all. There is no consensus on what exactly comprehensive means, while prioritisation of some areas in the national security policy leads to de-prioritisation of other areas and new vulnerabilities, inter-organisational and cross-sectoral cooperation faces serious limits, threat, risk and vulnerability assessments are not really comprehensive, etc. This paper finishes with recommendations on what to do about these serious limits on the implementation of comprehensive security.
BT - Information & Security: An International Journal DA - 2015 DO - http://dx.doi.org/10.11610/isij.3301 IS - 1 N2 -The changing security environment has led to the development of com¬prehensive security approaches, strategies and policies. The ‘Holistic approach’ has become an academic and practical mantra. This paper argues, however, that comprehensive security approaches face serious obstacles to their practical implementation. The critical evaluation of several examples confirms that the implementation phase is a weakness of comprehensive approaches and that a truly comprehensive and holistic approach seems to be beyond the implemental capacities of our security systems. Multi-sectoral and multi-level comprehensive approaches become less comprehensive when implemented in practice or even cannot be implemented due to existing narrow perceptions of security or narrow and short-term interests. The trans-sectoral second-, third- and fourth-order effects of proposed security measures are hardly considered or not considered at all. There is no consensus on what exactly comprehensive means, while prioritisation of some areas in the national security policy leads to de-prioritisation of other areas and new vulnerabilities, inter-organisational and cross-sectoral cooperation faces serious limits, threat, risk and vulnerability assessments are not really comprehensive, etc. This paper finishes with recommendations on what to do about these serious limits on the implementation of comprehensive security.
PY - 2015 SP - 13 EP - 34 T2 - Information & Security: An International Journal TI - Comprehensive Security and Some Implemental Limits VL - 33 ER -