Buch, Englisch, 106 Seiten, Format (B × H): 145 mm x 222 mm, Gewicht: 278 g
Reihe: Routledge Advances in International Relations and Global Politics
Buch, Englisch, 106 Seiten, Format (B × H): 145 mm x 222 mm, Gewicht: 278 g
Reihe: Routledge Advances in International Relations and Global Politics
ISBN: 978-0-367-42412-1
Verlag: Routledge
Unlike other analyses which aim to explain the notion of national security in Mexico and at the same time address the security challenges facing the country, this short text describes the distinction between national, internal and public security in Mexico. It is the first book to provide detailed analysis on Mexico’s security policy and its long-term consequences.
Former Mexican government official Augustin Maciel-Padilla contends that the absence of a clear understanding of the complexities and sophistication of the concept of security has the potential to aggravate security conditions in Mexico. Achieving a proper understanding allows for a better guidance in confronting the grave insecurity facing the country, and for addressing other issues such as human rights, democracy and the country’s international exposure. Maciel-Padilla reasons that Mexico is required to formulate a comprehensive, long-term, security strategy, and with this book he proposes a contribution towards that long-term goal.
Understanding Mexico’s Security Conundrum will be essential for scholars, students, and policy makers.
Autoren/Hrsg.
Fachgebiete
- Sozialwissenschaften Politikwissenschaft Politische Kultur Menschenrechte, Bürgerrechte
- Geisteswissenschaften Geschichtswissenschaft Weltgeschichte & Geschichte einzelner Länder und Gebietsräume Geschichte einzelner Länder Amerikanische Geschichte
- Sozialwissenschaften Politikwissenschaft Internationale Beziehungen
Weitere Infos & Material
Introduction 1. National Security and its external dimension 2. Obstacles to understanding national security in Mexico 3. Conceptualization: Who defines national security? 4. Execution: How national security is implemented? 5. A complex security context and the reasons for change 6. Conclusion