Modern piracy : regional cooperative security : Southeast Asia and the Middle East Public Deposited

http://ir.library.oregonstate.edu/concern/graduate_thesis_or_dissertations/5425kg10d

Descriptions

Attribute NameValues
Creator
Abstract or Summary
  • Over the past ten years, reports of piracy and other forms of maritime violence have been dramatically on the rise. As these reports increase, so too does international attention toward how to solve this. This thesis examines the development of cooperative maritime security efforts in both Southeast Asia and the Middle East, paying particular attention to the Horn of Africa and Gulf of Aden region, as they pertain to turning the tide of violence in their respective maritime domains. Recent regional efforts to combat maritime security threats in the Gulf of Aden, and maritime piracy in particular, have drawn comparisons to similar efforts undertaken in the Straits of Malacca in the early parts of the past decade. However, such comparisons fail to address the unique nature of the politics and history of security cooperation in the Horn of Africa, particularly the way states in the region tend to rely upon external security support from more powerful nations, such as the United States and Japan. Additionally, often times these experts fail to discuss the cultural idiosyncrasies of the various nations. Despite some similarities shared between the two regions, the states of the Horn of Africa must deal with issues of prioritization, regional animosities, and external dependence before they can attempt to develop cooperative maritime security arrangements akin to those existing in Southeast Asia. Success will require a concerted effort by states in the region and realization by the United States of its role in supporting effective security cooperation in the region.
Resource Type
Date Available
Date Copyright
Date Issued
Degree Level
Degree Name
Degree Grantor
Commencement Year
Advisor
Committee Member
Non-Academic Affiliation
Keyword
Rights Statement
Language
Replaces
Additional Information
  • description.provenance : Submitted by Adam Christensen (surface@oregonstate.edu) on 2011-05-19T22:26:02Z No. of bitstreams: 3 ChristensenAdamK2011.pdf: 1875306 bytes, checksum: 5f1f362a94ff30d349db508cfdad6ddf (MD5) license_rdf: 19767 bytes, checksum: ceb4edef23b495a9e84712ca6ebee872 (MD5) license_text: 20539 bytes, checksum: 1c474fa3b0dfbff784464c41b9d53728 (MD5)
  • description.provenance : Approved for entry into archive by Laura Wilson(laura.wilson@oregonstate.edu) on 2011-05-26T21:06:45Z (GMT) No. of bitstreams: 3 ChristensenAdamK2011.pdf: 1875306 bytes, checksum: 5f1f362a94ff30d349db508cfdad6ddf (MD5) license_rdf: 19767 bytes, checksum: ceb4edef23b495a9e84712ca6ebee872 (MD5) license_text: 20539 bytes, checksum: 1c474fa3b0dfbff784464c41b9d53728 (MD5)
  • description.provenance : Made available in DSpace on 2011-05-26T21:06:45Z (GMT). No. of bitstreams: 3 ChristensenAdamK2011.pdf: 1875306 bytes, checksum: 5f1f362a94ff30d349db508cfdad6ddf (MD5) license_rdf: 19767 bytes, checksum: ceb4edef23b495a9e84712ca6ebee872 (MD5) license_text: 20539 bytes, checksum: 1c474fa3b0dfbff784464c41b9d53728 (MD5)
  • description.provenance : Approved for entry into archive by Julie Kurtz(julie.kurtz@oregonstate.edu) on 2011-05-26T16:34:11Z (GMT) No. of bitstreams: 3 ChristensenAdamK2011.pdf: 1875306 bytes, checksum: 5f1f362a94ff30d349db508cfdad6ddf (MD5) license_rdf: 19767 bytes, checksum: ceb4edef23b495a9e84712ca6ebee872 (MD5) license_text: 20539 bytes, checksum: 1c474fa3b0dfbff784464c41b9d53728 (MD5)

Relationships

Parents:

This work has no parents.

Last modified

Downloadable Content

Download PDF

Items