• Nu S-Au Găsit Rezultate



Academic year: 2022


Arată mai multe ( pagini)

Text complet




P O L I T I C A L S C I E N C E S S P E C I A L I Z A T I O N &

C E N T E R O F P O S T - C O M M U N I S T P O L I T I C A L S T U D I E S ( C E S P O - C E P O S )



N O . 42 • 2014





& &



- -


( ( C C E E S S P P O O - - C C E E P P O O S S ) )

Revista de Ştiinţe Politice.

Revue des Sciences Politiques

No. 42 • 2014


- E D I T O R I A L B O A R D -

Editor in chief: ANCA PARMENA OLIMID

Deputy editor in chief: CĂTĂLINA MARIA GEORGESCU Managing editor: COSMIN LUCIAN GHERGHE





Professor, University of Craiova, Faculty of Law and Social Sciences, Romania

(Chairman of the International Advisory Board) M I H A I C I M P O I

P r e s i d e nt o f t h e A c a d e my o f t h e R e p u b l i c o f M o l d a v i a , M o l d o v a


P r o f e s s o r, U n i v e r s i t y o f J e r u s a l e m, I s r a e l , P r e s i d e nt, C e n t e r f o r M o n i t o r i n g t h e I mp a c t o f Pe a c e ( C M I P)


P r o f e s s o r, U n i v e r s i t y o f T r i e s t e , I t a l y P A T R I C I A G O N ZA L E Z- A L D E A P r o f e s s o r, Universidad Carlos III de Madrid, M a d r i d , Sp a i n


P r o f e s s o r, U n i v e r s i t y o f M a l t a , M a l t a C R I S T I N A B E J A N ,

Wa d h a m C o l l e g e , O x f o r d , G r e a t B r i t a i n SL A V C O A L MĂJ A N

Professor, University of Novi Sad, Serbia N I C U C I O B A N U

P r e s i d e nt, „ L i b e r t a t e a ” Pu b l i s h i n g H o u s e , N o v i Sa d , Se r b i a


Se ni o r E c o no m i s t, Vienna Institute for International Economic Studies (WIIW), Austria


P r o f e s s o r, D e p a r t me n t o f Po l i t i c a l Sc i e n c e , U n i v e r s i t y o f M i a mi , U S A H A S A N J A SH A R I

P r o f e s s o r, So u t h E a s t E u r o p e a n U n i v e r s i t y , T e t o v o , M a c e d o n i a J O N U Z A B D U L L A I

P r o f e s s o r, So u t h E a s t E u r o p e a n U n i v e r s i t y , T e t o v o , M a c e d o n i a So nj a B U NČIČ

P r o f e s s o r, U n i v e r s i t y U n i o n , Fa c u l t y o f L a w , B e l g r a d e , Se r b i a


P r o f e s s o r, C u k u r o v a U n i v e r s i t y , A d a n a , T u r k e y


P r o f e s s o r, So u t h E a s t E u r o p e a n U n i v e r s i t y , T e t o v o , M a c e d o n i a K L A U S M Ü L L E R,

P r o f e s s o r, A G H U n i v e r s i t y o f Sc i e n c e

& T e c h n o l o g y , K r a k ó w , Po l a n d ST E V E N D . R O P E R

P r o f e s s o r, U n i v e r s i t y o f I l l i n o i s , U S A L I L L I A N B A R R I A

P r o f e s s o r, U n i v e r s i t y o f I l l i n o i s , U S A F R A N C E S C O G U I D A

P r o f e s s o r, Universitá degli Studi Roma Tre, Rome, Italy

CONTACT: REVISTA DE STIINTE POLITICE. REVUE DES SCIENCES POLITIQUES University of Craiova, 13th A. I. Cuza Street, Craiova, 200585, Dolj, Romania.

Phone /Fax: +40251418515, Email: [email protected], [email protected].


© 2014 – All rights reserved to Universitaria Publishing House The Journal is published quarterly.

(Online) - ISSN 2344 – 4452 ISSN–L 1584 – 224X


No. 42 • 2014

Revista de Ştiinţe Politice.

Revue des Sciences Politiques


© 2014 – All rights reserved to Universitaria Publishing House.

Copyright transfer

Authors are fully responsible for the entire content of their papers. The articles published in Revista de Ştiinţe Politice.

Revue des Sciences Politiques represent the personal opinion of the author(s). The procedure of the article submission for reviewing and publication implies that the work has never been published before (excepting published courses, academic lectures, academic thesis), that is or was not considered for reviewing and publication elsewhere (in English or in other language), that its publication is assumed by the author(s) and its possible acknowledgements were obtained with the consent of the authorities for publication.


Single photocopies of single/ multiple articles may be done for personal use under the provisions of the national copyright laws.

Electronic storage of the articles contents

Permission from the Editorial Board is required in case of electronic storage or use electronically of any material (article, editors’ notes, reviews etc.) contained in this journal (entirely or partially).

N O T E o f t h e E D I T O R I A L B O A R D Revista de Ştiinţe Politice. Revue des Sciences Politiques

is abstracted by / indexed in:


Political Sciences Complete ● Situation January-February 2014 http://www.ebscohost.com/titleLists/poh-coverage.pdf (page 43/ 50)

ProQuest Central

Proquest Title List, Accurate as of 19 April 2014 (position 17651) and also ProQuest Political Sciences, ● Professional Proquest Central ● Proquest Research Library ● ProQuest 5000 International ● Proquest

Central K12


http://jml2012.indexcopernicus.com/REVISTA+DE+STIINTE+POLITICE+R EVUE+DES+SCIENCES+POLITIQUES,p1331,3.html

DOAJ Directory of Open Access Journals http://doaj.org/toc/5bd3cf0f9a874a8e84ee7ba56818fda7

Intute: Social Sciences


KVK Catalogue

Karlsruhe Institut für Technologie

http://primo.bibliothek.kit.edu/primo_library/libweb/action/search.do?mode=Basic&vi d=KIT&vl%28freeText0%29=REVISTA+DE+STIINTE+POLITICE&vl%28freeText0%29=REVI


Gale Cengage Learning

Report Generated 21 April 2014 (position 13456)


Revista de Ştiinţe Politice. Revue des Sciences Politiques RS R SP P • No. 42 • 2014

Special Issue:

Citizenship, Elections and Security: An Analytical Puzzle CONTENTS


Anca Parmena OLIMID, Cătălina Maria GEORGESCU, Cosmin Lucian GHERGHE,

Note of the Editors of the Revista de Ştiinţe Politice. Revue des Sciences Politiques



Recent Advances in Security Research and Management. Analytical Concepts Determining Paradigm Shift in Security Policy Agenda in the 2000’s

11 Attila NAGY,

North Kosovo as a Political and Administrative Phenomenon 25 Adrian NICOLESCU,

The role of decentralization in the Romanian public administration system: analysis, theory and models

34 Laura Antoaneta SAVA, Nichita-Iulian BUŞOI,

The reparation of moral damages suffered by individuals and legal persons during and after the comunist period. A study on doctrine and jurisprudence

46 Elena OANCEA,

Coverage of the Impartiality of Magistrates in the New Romanian Code of Criminal Procedure


Recent Developments of the Lithuanian and Romanian “Testate Successions”

(Terminological Peculiarities)


Legal Interpretation: A ‘Janus-Faced’ Concept 79

Roxana Cristina RADU, Marius Cristian NEAMŢU, Marina Loredana BELU, Oana Maria NEAMŢU,

Control Method of Granting and Taking Medical Leave in the Romanian Legislation - between the French and the Italian Solution

89 Anna ŁACH,

Science in the Polish popular press – between Eastern and Western colonialism? 100 Ecaterina Sarah FRĂSINEANU,

The necessity to develop competencies in the field of cultural and intercultural education to the level of the students - prospective teachers 112



Sociology of Reforms and Perspectives in Higher Education 124 Cătălina Maria GEORGESCU,

Europeanization Theories Revisited through Historical Institutionalism. EU as a Public Policy Role Model for Post-Communist South-Eastern Europe in the Field of Security



Reconfiguring the international system. The 1989 events and the fall of an ideology 147 Darren ATKINSON,

The Development of Left-Wing Political Thought and Organisation in Afghanistan 157 Karolina TRACZYK,

The representation of Poland and the Polish during Communism in Polish coursebooks for foreigners

169 Mihaela IVĂNESCU,

Evolutions of the Romanian electoral legislation after 1990. Do we need another electoral law?

180 Mihaela BARBIERU,

The electoral policy in 2012: the local and parliamentary elections from Dolj County (Romania)

190 Georgeta GHIONEA,

The 2012 Romanian Local Elections. An Analysis of the Local Strategies, Voting Choices and Final Results in Drăgăşani (Vâlcea County)

201 Kujtim RAMADANI, Jonuz ABDULLAI, Afrim TRESI,

The Role of the President in Policy-making in Macedonia 216

Măriuca MACOVEI,

Identity, Belonging and Diversity. Dynamic Aspects of Citizenship in a Globalization Era

228 Wedad Andrada QUFFA,

The effects of international migration on post-decembrist Romanian society 238 Faisal AL-TAMIMI,

Jurisdictional competence of private international law in the matter of civil status actions in accordance with the rules of the European Union


RSP Manuscript Submission 262


Editors’ Note

Note of the Editors of the Revista de Ştiinţe Politice.

Revue des Sciences Politiques

Anca Parmena Olimid


, Cătălina Maria Georgescu**,

Cosmin Lucian Gherghe***

Revista de Ştiinte Politice. Revue des Sciences Politiques (hereinafter RSP) is a quarterly peer reviewed academic journal focusing on publishing original papers about the theory, practice, concepts and methods of research in the field of social sciences.

Since its first appearance in 2004, RSP focused on enriching the interdisciplinary research in the field of social sciences by highlighting the new topics of the international and regional developments such as: political participation and collective action, political theory in transition; Euro-atlantic and regional security; party fragmentation and political systems in former communist countries; the quality of democracy building in Central and Eastern Europe; the threats to political pluralism and liberal society; the European and Euro-Atlantic integration; economic and social challenges; journalism, communication and civic society participation in Eastern hybrid societies.

However, due to recent challenging evolutions of the regional political and social systems, RSP New Editorial Board launched the initiative of focusing in 2014 on the emergent topics of the Eastern Europe arena. Therefore, the first issue for 2014, issue 41/ 2014 (with a new cover andanew design) was a special issue entitled: East & West Post-Communist Encounters: Ideologies, Policies, Institutions Under Scrutiny.

* Associate Professor, PhD, University of Craiova, Faculty of Law and Social Sciences, Political Sciences specialization, CEPOS Staff, Member of the Board of Directors of the CEPOS Conference 2014; Phone: 0040251418515, E-mail: [email protected]

** Lecturer, PhD, University of Craiova, Faculty of Law and Social Sciences, Political Sciences specialization, CEPOS Staff, Member of the Board of Directors of the CEPOS Conference 2014Phone: 0040251418515, E-mail: [email protected].

*** Lecturer, PhD, University of Craiova, Faculty of Law and Social Sciences, Political Sciences specialization, CEPOS Staff, Member of the Board of Directors of the CEPOS Conference 2014Phone: 0040251418515, E-mail: [email protected].


The second issue entitled Citizenship, Elections and Security: An Analytical Puzzle rejoins 22 articles (264 pages published) is the second of the four special issues edition published this year in order to celebrate 25 years of post-comunist experience.

In this innovative editorial initiative, beginning with issue 42/2014, RSP Editorial Board is honored and pleased to announce the occupancy of the vacancy for the position of Chairman of the International Advisory Board by Professor Dan Claudiu Dănişor, Ph.D., professor of Law and Political Institutions at the University of Craiova, Faculty of Law and Social Sciences and member of the Centre de Recherche et d’Etude en Droit et Science Politique de Dijon, University of Bourgogne, Dijon, France.

The contents of RSP issue 42/2014 includes original papers focusing on: the recent advances in security research and management in the 2000’s; the political and administrative phenomenon in Kosovo; the role of descentralization in the Romanian public administration system; the study on doctrine and jursiprudence in the challenging context of the reparation of moral demages suffered by individuals and legal persons during and after the communist period; the coverage and legal interpretation of the impartiality of magistrates in the new Romanian Code of Criminal Procedure; comparative post-communist legislation; recent developments in the field of Europeanization, intercultural education, the local and parliamentary elections in the region; ideology, identity and belonging in the globalization era.

The cover of the first issue 41/2014 (print version), is entitled “After 25 years:

Pinpointing East and West Encounter Arena”. The cover of the second issue 42/2014 is entitled ”Identity and Belonging in Post-Communism” and is designed to encounter the analytical puzzle of identity-citizenship-collective choices-elections-security in post-communist Eastern Europe.







Recent Advances in Security Research and Management.

Analytical Concepts Determining Paradigm Shift in Security Policy Agenda in the 2000’s

Anca Parmena Olimid



Although the concept of “security research” is often used in international security studies, there is no literature consensus regarding this analytical concept and patterns. The present article discusses different theoretical aspects that configure the concept of security research and the application determining paradigm shift in security policy agenda over the last twenty years. The analytical approach of the study may be employed to indicate the basic and applied research and to compare the defining characteristics of contemporary literature. Furthermore, the article deals with the concept of “security research” as a complex and influent one. The article deals also with the security methodology and settings due to the fact that there is still a lack of analytical and empirical approach with regard how scientific method and evaluation research influence the security policy agenda. The analytical approach of the study may be employed to indicate basic and applied research and to compare the defining characteristics of security information policy and management. The present paper also argues that security research covers a wide range of paradigms and research methods aiming to fulfill the function and control in the security policy agenda since 2001. The development and implementation of plans, strategies and methods is conducted within different levels of conceptualization and observation of reality. In conclusion, the article suggests that the task of security research is to provide accurate information and tools for effective policy decision making-process.

Keywords: security, data information, security information, security policy agenda, organization

* Associate Professor, PhD, University of Craiova, Faculty of Law and Social Sciences, Political Sciences S pecialization, Phone: 0040251418515, E-mail: [email protected]


Security research has evolved over the last decade with a variety of concepts and patterns such as: data security, information security, data system management, risk management, security administration and governance, political security, political decision-making process (Cai, 2013: 755-795; Kivimäki, 2012: 419-447). These conceptualized tools are reflective of the emergent resource reallocation of the security system. Whatever conceptualizing structure is organized and employed, the primary focus of the security research is to recognize and extent the dominant patterns of the security policy agenda. Furthermore, a mutual consensus maps the relationships between the security policy agenda, the national/ international security and the international relations namely, and the policy-making process which applies in the context of constructive redefinition of the concepts of power and peace (Emmerson, 2008: 135- 154; Blokker, 2000: 135-154).

In this direction, the study aims to identify the shortcomings in the recent theories and concepts of security research leading to proposing alternative interpretations and extents meeting the causality between research-decision-explanation. This system cycle is a formal approach to look at the indicators of security research reconsidered and depending on security policy agenda since 2001. The issue of causality must of course be analyzed in relation to the challenges of international security system and the sources of security methodology and scientific method.

The analysis of the standard items and indicators on security policy agenda reveals a variety of phases and formal approaches beginning with the information evaluated during the monitoring and investigation phase. In the literature on security policy, this indicator of analysis refers to the ability of an organization to a feasibility analysis (Barnard-Wills, 2013: 170-180; Muñoz, Gonzalez, Maña, 2012: 979-994).

Through a qualitative analysis of the security research methodology and information, the study examines the variety of research squaring the security policy agenda in the last twenty years, aiming to categorize the types of the proposed principles and its contributions to a better understanding of the role of security research, techniques and functions for the political environment. With special reference to the security risk management framework, the research is conducted with the expectation that applied research is required to provide conclusive political decisions. While focusing on basic and applied security research, the article discusses the various implications of the descriptive research focusing on describing the characteristics of the security phenomena.

The scope of the security research is squared by one’s definition of “security”. In last few years emerging security research evidence has indicated that basic and applied research in the field of policy arena is often within the scope of “international security”

(Robinson, 2008: 1-4). Each definition gives researchers the opportunity to expand scientific knowledge about theories on security implying “the absence of threat”. Other security research findings about the international security system point out the dilemma facing 2000’s of the causal and objective investigation of security strategies and environment (David, 2006: 2-3). The analytical approach of the study may be employed to indicate basic and applied research and to compare the defining characteristics of contemporary literature.

Security research covers a wide range of paradigms and research methods aiming to fulfill the function of knowledge and prediction in the security policy agenda. The development and implementation of plans, strategies and methods is conducted within


different theoretical and functional areas. This assumption suggests that the task of security research is to provide accurate information and tools for effective decision making. As mentioned above, the security research shifts from predictive analysis assumptions gathering to ongoing security settings (Robinson, 2008: 3). This argumentation is significant because it highlights the importance of security research engagement in last twentz years. Past researches on these issues have focused on evaluations of how much security challenges influence the actors behaviour, largely ignoring the changing parameters of needs, perceptions, understandings, attitudes of subgroups. Although the security research engenders the distinction between many organizational behavior on security policy agenda issue, the conclusive evidence on te preliminary data selection is yet to be collected (Kostakopoulou, 2008: 317-342;

Thomas, Dhillon, 2012: 1148-1156).

Security research can be defined as the ongoing process of investigating, gathering, enabling and reassessing facts and data required by the making policy decisions. This definition points that the primary research data is neither subjective nor spontaneous included. As previously noted, security policy agenda can take various forms, but systematic security inquiry is a common, objective and important tool for decision- making facts and activities.

This definition is not squared to the need for objectivity, but it cleverly states that security research may generate and provide the accurate information upon which policy decisions makers’ shift from subjective and preconceived area of decision entering to objective course of action. By reducing the proportion of subjectivity of decision, security research process is associated and connected with the systematic analysis and thematic interpretation of “international security”.

Basic and applied security research

Designing the basic and applied research in security studies means dealing with questions and answers of analysis and interpretation beyond the simple identification of cause-and-effect relationship between various variables viewed as “normally cause- and-effect relationship security studies”.

The present discussion starts from the assumption that in security research it is typical to establish an expectation of the relationship to be offered, such as identifying the influence of actors and organizational behavior, political-decision making process and conclusive decisions. To analyze the linking between basic and applied research means to broadly conceptualize the three above archetypes using the elements of

“political influence” and the challenges of the inferring causality between research subject-causal factors-alternative plausible explanations (Hasegawa, 2007: 1-20;

Deakin, Wilkinson, 1991: 125-148).

One reason for investigating and analyzing pattern theories and definitions for security research is to generate and develop new finding aimed to enrich the potential of research knowledge in the field. The above assumption does not point out that the basic research is applied exclusively in the field scientific knowledge. Basic research is developed and conducted to investigate the objectivity of a given theory and the acceptability of a base decision (Blockmans, Wessel, 2009: 265-308; Wessel, 2003: 265- 288; King, 1999: 313-337).

In common with most fields of scientific research, security studies seem to face a crisis of analysis and “discourse” focusing only on monitoring, evaluation and


investigation of recent political events. It is easy to notice why talk of a “crisis of discourse” has abounded since September 2001. In particular, placing the 2001events in the context of the security research reveals a complex environment in which one criterion that must be established is that appropriate causal order causes behavior change and sequence of events.

The past decade, however, has been a marked increase of researches concerning the concomitant variation between the presumed cause in the security system and the assumed effects. For several reasons, recent papers have alternatively analyzed an occurrence of two phenomena or events: the presence or absence of explanations and the exploratory relationship between actors-organization-system. At the same time, all these studies conceptualize the influence of inferring causality in security research, involving: (1) the causal order; (2) the cause-and-effect political alternation; (3) the alternative explanations. More important, the issue of inferring causality is particularly significant to security research requiring causal definitions and explanations.

A more important feature of the recent literature deals with issues of the stages in security research. At the same time, we may consider the relationships between the backward security linkages implied to influence the applied research. Applied research is identified and conducted regardless a current of recent problem or opportunity. Applied research encompasses a particular action, fact or policy determining the nature of a situation and identifying and implementing a particular course of information and action, and evaluating and analyzing the generated actions occurrences.

Scientific method and evaluation research in security research

The article deals also with the security methodology and settings due to the fact that there is still a lack of analytical and empirical approach with regard how scientific method and evaluation research influence the security policy agenda. The procedures and tools utilized by basic and applied security research focus on political inquiry, causal functions and particular factors explaining particular types of mechanisms and outcomes. This reasoning raises and increases general correlations and findings in the security policy agenda. However, the exclusion of additional variables (such as subjective and discursive conceptions) generates ineffective decision-making process. In basic security research, first implementing the general correlations and findings and then testing and managing the particular observations about the applied research lead to the problem-solving of security policy agenda paradigm (Bourne, Bulley, 2011: 453-471; John, 2006: 975-986).

Other accounts of the different strategies and points of view in security policy agenda comes from the historians and analysts which preferred the management approach and description of the decision-making process as subjects of analysis of the particular item of rights and obligations in the policy agenda (Gherghe, 2005: 58-62). Use of scientific method in applied security research gains insight into the development and implementation of a decision-making that will contribute in evaluating the opportunity for alternative security conceptions or hypothesis.

Once security research identifies the challenges and opportunities, an important aspect is to determine the nature of situation and the planning information required for evaluation research in that particular field of study. Security research is essentially process of monitoring, analyzing and implementing information security data and policies as increasing higher levels of general propositions and principles of explanation.


Figure 1. Levels of conceptualization in the field of security theory

Levels of conceptualization in the field of security theory Course of action

Security policies

Security Theories

Operational Definitions


Course of action

Observation and conceptualization of reality

Source: author’s own compilation

A key element of the empirical research of the security field is the “course of action”

as a new dimension of the conceptualization of reality. Thus, concepts and operational definitions in the field of security research become the basic units of security theory development engendering a categorical course of action. The security theories require that the relationship between its concepts and operational definitions be understood and inter- related. In this direction, scientific method is the use of assumed procedures in order to establish and acknowledge theoretical statements about security policy agenda.

Nevertheless, the concepts and operational definitions in the field of security research are required to develop the theoretical framework and the hypothetic and deductive process on certain phenomena and their relationship with others. Both the concepts and operational definition flow logically from the hypothesis area in research method area (the link between the concepts and operational definitions in the field of security research).

Security methodologies may be evaluated through the use of various “security business proposals” or “security master plans” criteria. A major course of action to develop and provide a security program or plan is through planned activities. Planned activities have various meanings, interpretations and explanations. In its most basic definitions and implementing, planned activities and operations are evaluated through empirical validity which is the formal and objective measurement and appraisal of a given project, program or master plan. In other words, security research may provide completed plans and programs according to their objectives or major factors influencing the integrative aspect security strategies.

Risk analysis and security methodology

There are many informal, subjective methodologies and measurements to which a given risk analysis has applied its objectives. Variations and extensions exist among practitioners, academics and researchers regarding the risk analysis, the definition of terms, procedures and methodology, definitions of concepts, metrics and reporting


performance levels. Whatever type of security methodology and risk-analysis methodology may be used to describe a specific security problem, performance- monitoring processes should be considered in this exploratory-monitoring action. For the security research management, the term “exploratory-monitoring action” provides feedback for the monitoring, evaluation and control of actions, programs and plans.

Figure 2. Concepts and operational definitions in the field of security theory

Source: author’s own compilation

Apart from the traditional monitoring, evaluation and control of actions, programs and plans, the management of security risks embodies the fact the security risk must focus on integrating protective measures and crisis management planning. In some circumstances, risk-management framework requires considerable regulation and reliance on information and environmental conditions (Bourne, Bulley, 2011: 453-471).

Performance-monitoring action, as source of security covers topics ranging from high-range planning to the most interdependent decisions and operations such as: the threat of terrorism, globalization and transnational risks, technologies research and information condition etc. The fundamental paradigm shifts from the systematic and progressive process of gathering and collecting, and analyzing data to selecting data for final decision. The objective of risk-management framework is not an objective itself but rather a tactical decision which supports and generates the tactical decisions. Given the similarities between concepts and theories in recent literature, we should adopt the idea that the basic or primary security research is also a conducting security research in all stages if the performing security (John, 2006: 975-986). We identify four main features of a performing security that seem problematic for their analysis of the practice of the


concepts such as: decision alternatives, problem identification and definition, direction of monitoring and evaluation, area of research and advertising themes.

Essentially, security methodology engenders all decision-making stages: to define and integrate the security issue, to explore standards and requirements and the effectiveness of methods used. As part of this process, one task of security research is to focus on a particular form of proposed theoretical propositions.

To maintain a suitable set of based security guidelines, organization and institutions involved in risk management should review and evaluate the standards and responsibilities of public awareness, including: security planning, particulars of priorities, objectives and management system, allocation of tasks and duties, information on targets and performance indicators; common activities and procedures for monitoring and evaluation of the security system.

For much of the past twenty years analysts and academics have debated whether the decision alternatives in research process suffers from a “crisis of discourse” combined analysis and tabular stages (Lüthi, 2011: 207-214). Security research methods provide reliable information if security data are collected and analyzed in a systematic and correct manner. Security research becomes the “management tool” that institutional actors use to avoid or reduce uncertainty.

This situation is considered to play two key roles for security. Firstly, it is part of the security decision-making plan. Security data provide effectiveness of current security strategies and it also provides insights for fundamental changes in security policy agenda.

Secondly, data security is the principal instrument for identifying and empowering new availabilities and opportunities in security policy agenda and identifying potential risk situations.

Data security uptake

Data security also serves other purposes. It delineates a research area that combines an analytical concept – data – with a fundamental concept of the international security policy agenda – security. It conceptualize security as a relation between two components:

“data” and ”security policy agenda”.

Data security has been a central concept in recent literature, and it often is conceived and defined as privacy measures and protection of data from unauthorized access (Walter, 2006: 105-135). Other authors have made a brief reference with regard to the concepts of

“power” and “international power hierarchy” (Smith, 2010: 51-54).

In an extension of data security theory and argumentation, Tipton and Krause (eds.) have developed an information security and risk management multilevel framework.

Instead of exploring one direction of research focused on building an effective program of information security policy, the data security system consists of a series of parallels between information security, security management, change control process and management data classification and custody of data, security management risk, security management planning, access control and evaluation (Tipton, Krause (eds.), 2007).

Information security management function according to the same argumentation as a structure of processes, relationships, measures, standards and procedures appropriately directed to determine the effectiveness of security governance. (Tang, 2011: 511-536).


Descriptive security research uploading and maintenance

The orientation of the security research towards a broader context of analysis allows the possibility to seek and identify the linkage between the five stages charted by the scientific investigation since 2001: 1) defining the security problem; 2) planning a security research framework; 3) security data collection and investigation; 4) analyzing the data security; 5) formulating conclusions for policy decision-making process.

Figure 3. Descriptive security research uploading and maintenance

Source: author’s own compilation

The literature argued that the recognition of security “as an industrial tool” structure belongs to a single category of scientific concepts. One may call it the category of

“scientific management” required by the system performs and the “technical” analysis of security marketplace. Seen alone, the information security management and the security marketplace emphasize that an orderly definition of the security research framework gives a sense of direction to investigation and monitoring (Ahmad, 1991: 105-127). The question of the information security management and security marketplace is probably the most difficult problem of the security field recently expanded into a more comprehensive list of alternatives characteristics and values including information classification, investigation confidentiality, secure data security storage, investigation and monitoring of security policies. Although these characteristics and stages of the security research process are probably the most important phases, they are frequently the foremost sources of research concern. Security research has proved to be a stumbling block, from the process of achieving objectives between the coordination and completion of tasks, through the process of collecting and processing information up to the alternatives approaches and resolving conflicts, policy dilemmas, or regional challenges (Osano,


1999: 273-302). Pre-eminently, by assembling some of the more significant facts concerned the basic form of security management, we understand the many roles to play within international actors and organizations. Broadly speaking, neither in the practical experience nor in security theory, the three tasks of security management: informational task, inter-organizational role, the decisional role including and the control function of security research and the monitoring process of security organization cannot be absolutely separated (Jeong, Sauveron, Park, 2013: 274-277). Establishing the influence domains of security research in policy decision-making process within the security policy agenda, one therefore admits the principles of information security management. This selection is comprehensive׃ the knowledge area of security area is driven by the need of rethinking information and policies. The situation in which data security find itself since 2001 necessitates special efforts to explain the fundamental components of information security.

These questions complicate an already complex research, adding a new challenge to the initial stage of the research process. There is in fact a common perception of the preliminary activities undertaken to refine the data security analysis into a researchable one need to be technical or formal: a progressive investigation of the knowledgeable operational and tactical planning of the organizational strategy (Pantazis, Pemberton, 2012: 651-667). Consequently, the specific research objectives on information strategy in creates a strategic plan focusing on a number of secondary or historical variables regarding the impact of research techniques conditions. Above all, in this perspective, the studies design the relevance of secondary security data analysis, pattern cases, case studies and experiences surveys are based on the exploratory conditions of the formal investigation. Most current debate about the security research deficit squares the information-security-alternatives risks, the limits security resources, policy compliance, security methodology, security organizational structure, security standards, signature procedures, and information security implementation (James, 1998: 271-301). In using historical conditionality, many authors set the adoption of the security implementation rules and practices as conditions that the security systems developments have to fulfill a rapid application development (Tupakula, Varadharajan, 2012: 397-409).

Figure 4. The structure and format of security research

Source: author’s own compilation


What conclusions can be drawn if we sum up all arguments? During the security research process, one of the most challenging findings is that the planning phases provide specific frameworks ensuring that all areas of security policies are operational. Moreover, there are many interlinked categories of security research management influencing the security policy agenda.

Information Security Policies

Most fundamentally, the concept of “information security policies” highlights a combination of three dilemmas: first, a broad definition of information security policies, second, the role of information security policies in security decision-making process and third, the facts and factors determining and motivating the organizational behavior to undertake a specific security policy (Hankey, Clunaigh, 2013: 535-547). A real theoretical debate has to concentrate different key themes in the recent literature based on sub-dividing security policies and empirical investigations as a balance between structural differences and the overall framework of formal security policies approach. The lack of accurate security policies application and features appears inadequate in the light of security administration.

Taking into consideration this requirement any security policy has to develop and pursue its plan actions leading to the strengthening of its contribution to all security policies and to the implementation of a new mentality aiming to fulfill the condition of

“mutual involvement” of all security information users and organizations. This new information security environment has to explore the relationship between the information security management and information security policy. Recently, a number of authors have emphasized the importance of this linkage uploading and developing (Georgescu, 2014:

250-261). The most reasonable analysis for the information security policy has to estimate the “geometry” of formulation and implementation in an organization. This selection depends on the level of security that an organization considers necessary׃ the security policies resulting in a new security administration driven by the need of rethinking new tactical applications, policies and capabilities. Consequently, the 2000’s exposed the prevalence of “the case”, its “discussion” and the best practices. Second of all, to oversimplify, the challenge of the security research was to develop and improve a strategy for constant improvement of purposes and practices.

There is also the support for a link analysis between the security research- information security measure-data security and after-implementation security activities.

The implementation process of data security creates a new dimension for information security policy by the continuous improvement of specific links and reflecting the growing interdependence between the research agenda and security management (Niemetz, 2014: 69-88).

Not surprisingly, information security policy research agenda has been the spotlight of relatively little attention. Indeed, for the past two decades, it has been argued that a

“security policy research agenda” is prevailing upon all aspects of the relationships established at the international level. Most recent studies on the concept „information security policy research agenda” commence with a few comments on structure, format and key terms. Other studies indicate that the information security research was formulated on the special conditions and approaches following the 2001’s events. These contributions to the debate can be made by research exploring the policies including goals, beliefs, morality and ethics. A third group of studies seek to clarify and categorize


the relationship between the primary theory of security as it is applied from in the challenging debate on public vs. private spaces and the post-2001 experience by undertaking the ownership of data security with the view of three approaches: information technology, environmental ethics and security policy research and behavioral ethics.

Figure 5. Public vs. private space debate and the ownership of data security

Source: author’s own compilation

The first set of objective considerations influencing the debate on ownership of data security concerns the balancing link between the information security policy and the ownership of data. It is often argued that the information security system and data- processing must be considered when balancing public-private spaces. To achieve balance that is to operate data security that satisfies the needs of individual behavior and the professional one. From an empirical point of view, it is often argued that a successful information security implementation is likely to result from the system administration, that is, from a bottom-up approach (information technology → behavioral ethics → public/ private space). In recent years there has been an increased interest in analyzing the effects of information security implementation and the availability of data security in security research. However, in spite of this mounting interest, the absence of adequate information suggests that value of security research depends on the nature of the political decision-making process. However, in the new security policy agenda, where system configuration and its continuous monitoring are still in question, the literature fall into two groups to explain the variation in the security systems development organization and development: features of specific threats and particular types of control (type of action, risk management, security planning, organization’s composition and structure) and institutional features (phases of security development, implementation of information security) (Trcek, 2010: 1106-1112).

Advocates of this functionality theory argue that the features of specific threats, the particular types of control and the institutional features enable efficient implementation of security information. To perform effectively, information or data security are primarily concerned with identifying the data classification standards. Taking as a starting point the claim that information security standards provide the basic and fundamental


developments, the security research underlines the idea that the data security goals and techniques owes the general and decisive duty to square the organizational design.

Indeed, there is a powerful relationship between the data security goals and purposes and the security management from the decision-making perspective. The answer to this issue composes the beginning of a critical analysis of the new security policy agenda. The diverse standards, purposes and activities undertaken illustrate effective design-to- implementation security policies to which security research is engaged in a new type of information security policy. This pre-planned security policy crucially performs the function of framework for the management and implementation of security information.

The central argument in this pre-planned security policy is to find the key issues of the organizational security context by focusing on knowledge and practice areas. The scope and extension of this formulation is required to provide a suitable risk-management framework.

As security policies evolve and risk-management increases, it is needed to face a more complex regulatory framework including the analysis of the social, legal and security practice and the ability of institutions and organizations to reach its purposes.

Developments in the evolving security theory and research directly influence the pattern of security information and related regulations. To conclude this approach, there are four important tendencies in the security policy approach since 2001: 1) the security theory fragmentation; 2) high political instability and the ideological challenge; 3) the increasing confidence of the relationship risk management-standards-principles and strategies; 4) the rise of the organizational values and ethics and the improvement of security management system links.

In conclusion, the twofollowing specific hypothesis are related to security policy research agenda: 1) under risk-management challenge, increasing security theories are to be expected; 2) risk-management still may be predicted, given the following analysis:

understanding the reasons behind the security policy research agenda, frequently changes of security agenda, are important in the post-2001 international context. The variations of the information security monitoring and investigation have a significant effect on the level of data collection and implementation. In concluding this article it is important to notice that not surprisingly, the trajectory of the security research agenda emphasis a recent re- theorizing of the security course of action rather than a ideological or practical turn.


Ahmad E. (1991). Social Security and the Poor: Choices for Developing Countries. World Bank Res. Obs., (6): 105 - 127.

Barnard-Wills D. (2013). Security, privacy and surveillance in European policy documents.

International Data Privacy Law, (3): 170 - 180.

Blokker N. (2000). Is the authorization authorized? Powers and practice of the UN Security Council to authorize the use of force by 'coalitions of the able and willing' Eur J Int Law, 2000; 11: 541 - 568.

Blockmans S., Wessel R.A. (2009). The European Union and Crisis Management: Will the

Lisbon Treaty Make the EU More Effective?

J Conflict Security Law, (14): 265 - 308.

Bourne, M., Bulley, D. (2011). Securing the human in critical security studies: the insecurity of a secure ethics. European Security. (20): 453-471.


Cai, C. (2013). New Great Powers and International Law in the 21st Century. Eur J Int Law, (24): 755 - 795.

David R. A. (2006). Introduction. In Amass S. F., Chaturvedi A. R. E., Peeta S., Guiding future homeland security policy: directions for scientific inquiry, West Lafayettte: Purdue University Press.

Deakin S., Wilkinson F.(1991). Labour law, social security and economic inequality. Camb.

J. Econ., (15): 125 - 148.

Emmerson A. (2008). Conceptualizing Security Exceptions: Legal Doctrine or Political Excuse? J Int Economic Law, (11): 135 - 154.

Georgescu C. M. (2014). Interpreting Continuity and Change in Post-Communist Policy- Making: Applying the New Historical Institutionalist Approach to the Study of Public Organizations. Revista de Ştiinţe Politice. Revue des Sciences Politiques, (41): 250-261.

Gherghe C. L. (2005). The Defense of Human Rights in the European Union. Revista de Ştiinţe Politice. Revue des Sciences Politiques, (8): 58-62

Hankey S., Ó Clunaigh D. (2013). Rethinking Risk and Security of Human Rights Defenders in the Digital Age. J Human Rights Practice, (5): 535 - 547.

Hasegawa Y. (2007). Is a Human Security Approach Possible? Compatibility between the Strategies of Protection and Empowerment. Journal of Refugee Studies, (20): 1 - 20.

James E. (1998). New Models for Old-Age Security: Experiments, Evidence, and Unanswered Questions. World Bank Res. Obs., (13): 271 - 301.

Jeong Y.-S., Sauveron D., Park J. H. (2013). Advanced Security Technologies and Services for Future Computing Environments.The Computer Journal, October 2013; 56: 1151 - 1153.

John P. (2006). The policy agendas project: a review. Journal of European Public Policy (13): 975-986

King T. (1999). Human rights in European foreign policy: success or failure for post- modern diplomacy? Eur J Int Law, (10): 313 - 337.

Kivimäki T. (2012), Sovereignty, hegemony, and peace in Western Europe and in East Asia International Relations of the Asia-Pacific, (12): 419 - 447.

Kostakopoulou D. (2008). How to do Things with Security Post 9/11 Oxford J Legal Studies, (28): 317 - 342.

Lüthi B. (2011). Perspectives on Security in Twentieth-Century Europe and the World.

Contemporary European History, (20): 207-214.

Muñoz, A., Gonzalez, J., Maña A. (2012). A Performance-Oriented Monitoring System for Security Properties in Cloud Computing Applications. The Computer Journal, (55):

979 - 994.

Niemetz M. D. (2014). Empowering Civil Society: How to Increase the Input of NGOs into Security Council Deliberation. J Human Rights Practice, (6): 69 - 88.

Osano. H. (1999). Security Design, Insider Monitoring, and Financial Market Equilibrium.

Review of Finance, (2): 273 - 302.

Pantazis C., Pemberton S. (2012). Reconfiguring Security and Liberty: Political Discourses and Public Opinion in the New Century. Br. J. Criminol., (52): 651 - 667.

Robinson, P. (2008), Dictionary of International Security, Cambridge: Polity Press.

Smith J. (2010). Getting the Right Balance: Information Security and Information Access.

Legal Information Management, (10): 51-54.

Tang S. (2011). The Security dilemma and ethnic conflict: toward a dynamic and integrative theory of ethnic conflict. Review of International Studies, (37): 511-536

Thomas M., Dhillon G. (2012). Interpreting Deep Structures of Information Systems Security. The Computer Journal, (55): 1148 - 1156.

Tipton H. F., Krause M. (eds.) (2007). Information Security Management Handbook (Sixth Edition), Boca Raton: Auerbach Publications.


Trcek D. (2010). Security Metrics Foundations for Computer Security. The Computer Journal, (53): 1106 - 1112.

Tupakula U. K., Varadharajan V. (2012). Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines. The Computer Journal, (55): 397 - 409.

Walter B.F. (2006). Information, Uncertainty, and the Decision to Secede. International Organization, (60): 105-135.

Wessel R. A. (2003). The State of Affairs in EU Security and Defense Policy: The Breakthrough in the Treaty of Nice. J Conflict Security Law, (8): 265 - 288.

Article Info

Received: April 30 2014 Accepted: May 5 2014






North Kosovo as a Political and Administrative Phenomenon

Attila Nagy*



Our goal is to explain and understand the recent political decision which has focused on the region of North Kosovo, the Brussels agreement from April 2013. The tremendous influence this agreement has caused in the region and to both the Serbian and Kosovo government is very big. Our aim is to see how such agreements are understood by everyday people, politicians and other stakeholders not just in the region but broader.

This agreement is binding for Serbia and Kosovo, even more is binding for the people who live on North Kosovo. It is necessary to see how people react to it and how they can benefit, both on North and other parts of Kosovo. The application of the agreement is very broad and in fact can influence more Kosovo inhabitants than just those residing on North Kosovo. The specific situation which we call “Phenomena of North Kosovo”

requires a very careful approach since this region is very popular for its chaotic situation which lasts for many years. The causes of division present here got stock in time and there is no possibility to solve them in a manner of one year. For the better understanding of the political and legal issue after the Brussels agreement present in both Serbia and Kosovo we have examined the legal framework of these states and their Constitutions. The Brussels agreement does change the meaning of some articles of the Constitutions and it can be predicted that this agreement will change and influence these Constitutions.

On the end we see that both states have given up something but at this moment we do not see the exact benefits to people and can’t predict the final date when this agreement will be a part of everyday life on North Kosovo.

Keywords: Kosovo, North Kosovo, Brussels agreement, Constitution of Serbia, EU foreign policy, Municipalities

*LLM International Business Law, Lecturer of Law and Public Administration, International Business College Mitrovica, Mitrovica, E-mail: [email protected]



A long history of political thoughts and decisions was always full of new inventions, agreements and solutions. It is not always easy to understand the new solutions and apply them in practice that is why we try to explain them through some other well known institutions and apply practical outcomes to those political decisions or solutions. In this work we will deal with a certain “phenomena” which is popularly known as North Kosovo, since it covers the territory of four municipalities on the North of The Republic of Kosovo and they have a Serbian majority population.

The establishment of this political entity is going back in time and history and we will not discuss it in this work, the fact is that the Serbian majority is native on the North and is one of the very few regions inhabited by Serbs today in Kosovo. The establishment of this territory as a political subject has its roots in the time when the Republic of Kosovo was established. From that moment a new law, state and political administration has been introduced on the territory of Kosovo which was a part of Serbia and according to Serbian legislation still is today.

From this moment we have an application of two different legal and political systems on the territory of Kosovo, the Serbian and the Kosovo system which has been previously established by the UNMIK (United Nations Mission in Kosovo) administration. So there is no loophole in the sense of the lack of law since there are two laws applicable, or at least applicable on the North Kosovo. This has caused many problems and now or specifically one year ago on April 19th 2014 a considerable effort was put in by both the Serbian and Kosovo governments to reach some agreements. On the end the parties have signed, under the close supervision and control of the EU, the historical “Brussels agreement”. Now this agreement is being implemented and its different parts which were left for further development are still under “construction”

and the final solutions and paths leading to them will be agreed in the future. There are many topics covered in this agreement and we will focus on the ones which are dealing with the political status of North Kosovo as a specific political “phenomena” in the framework of the Association of Serbian Municipalities.

Geographical, statistical and other data

The geographical area of North Kosovo constitutes of four Municipalities from which the newest and the most interesting one is North Mitrovica (Kosovska Mitrovica). It has a territory covering the parts of the city of Mitrovica which are North of the river Ibar, it also comprises of several villages which have a majority population of Albanians (OSCE, Mitrovice/Mitrovica, 2013).The territory is not very big but the density of population is very high, approximately 22,530 inhabitants. At this moment the establishment of the Mitrovica North municipality is in procedure and the Serbs from the city and other parts of North Kosovo can use the services of the Mitrovica North Administrative Office of the Kosovo government. The purpose of this office is to gather all the responsibilities of a municipality and then be able to transfer them to the municipality once it is established. Municipality Zvečan (Zvechan) has a territory of 122 km² and a population of 16,000 Serbs from a total of 17,000 (OSCE, Zvecan/Zvecan Municipal Profile, 2013) and is very close to the city of North Mitrovica, only the big hill of the ancient Zvecan castle is dividing these two cities.

There is a road connecting the two cities and a railroad as well, the railroad is in


function which is very rare in Kosovo. The once big Trepča (Trepcha) mining factory is lying empty just next by the Zvečan train station.

Municipality Zubin Potok has a territory of 333 km² and is lying on the west from Zvechan, and bordering the municipality of Novi Pazar in Serbia. The road from Zubin Potok is one of the few connections to Serbia via the famous Gazivode lake and the checkpoint Brnjak which is just next to the lake. It has a population of 13,900 Serbs out of 14,900 total where the 1000 inhabitants are Albanians from the village of Chabra/Cabra (OSCE, Zubin Potok, Municipal Profiles, 2013).

Municipality of Leposavic has a territory of 750km² and is lying on the north of Kosovo just next to the Kopaonik Mountain, and a population of 18,000 Serbs out of 18,900 total (OSCE, Leposavic/Leposaviq, Municipal Profiles, 2013). It has a road which is connecting Serbia and Belgrade with North Kosovo via the famous checkpoint Jarinje which was a place of many incidents. The importance of this road is very high and is used to transport goods from Serbia to Kosovo, an alternative road is being build and will connect Prishtina with the Highway in Serbia close to the city of Nish.

Number of citizens on the North Kosovo is a data which can be influenced by many factors and for the purpose of this work we will use the number of voters from the recent elections. These elections have been conducted as part of the Brussels agreement (Voice, 2013) and have been delayed for various reasons. The importance and influence of the region can be understood if we take the number of voters registered in the Kosovo register from recent elections. North Mitrovica according to the Central Election Commission of Kosovo has 27,915 registered voters. The same source is used to determine the number of voters in Zvechan which is 9,986 voters, in Zubin Potok 8,948 and in Leposavic is 31,686 voters. The political decision making power is the most important value of this region and the strength can be clearly seen from the number of the voters. Many people who fled from the South are registered here and are able to vote according to their place of residence. These people do not have a status of refugees but of internally displaced persons since in Serbia they are coming from a southern province of Serbia and in Kosovo they have moved from one part to another.

Similar stands for the Albanians who lived once on North Kosovo.

The most important fact is that the four municipalities are inhabited by ethnic Serbs and is representing the main body of Serbian minority in Kosovo. In some villages and peripheral regions of these municipalities some Albanian villages could be found. There are no mixed and multiethnic communities villages or cities and some notable examples could be found in Mitrovica where the two nations meet in the Bosniak mahala by the eastern bridge, The Three towers settlement close to the main bridge and Micro naselje settlement up on the hill where the famous Mitrovica miners monument stands. These zones are the remains of the once multicultural city and show us how people lived once close to each other. Also these settlements are the places where ethnic conflicts have occurred and are most likely the place where some misunderstandings could happen in the future.

Constitution and legislation in Serbia

The importance of Kosovo issue has called in for action of the Serbian law making bodies and has as one of the steps introduced a new constitution. In 2006 a new constitution was made and one of the most interesting parts was the preamble which deals specifically with the territory of Kosovo and Metohija which was at that time on



(30) students from them to represent the research sample, they were divided into two groups (control and experimental) and by (15) students for each group, where

But let me start by stating in a preliminary way that by ‘The Muslim Question’ — the name is derived from an analogy with the eastern Question which be- devilled statesmen of the

The project is to design and construct AN IOT BASED INTELIIGENT FALL DETECTION AND HEALTH MONITORING SYSTEM for humas which is used for real time monitoring to

mining, standards for representing interactions data, protocols for harvesting data from multiple databases (Open Architecture Initiative). • Processing interactome

In terms of origin, the deposits (Postolache, Genoiu, Ionescu, Manea, Niţă, 2010) and repayable funds must be attracted from the public or from any natural person, legal person or

1(3)C, justice, as just balance, free development of human personality and dignity thus become limits of the modality in which the state may claim defence of

learning the entries in the conditional probabilities tables is similar to (learning the weights of hidden units in) training a neural network with hidden units:. − We can learn

Key words: ethical subject, moral agent, responsibility, self-esteem, the Tree of Life, religious symbol, postmodern ethics, lover of self, God’s love..

a) Successive transport of carriers independent of each other. In this case, each of the carriers concludes separate contracts with the client, self-reliant, for each the

A category equivalence between full subcategories of the category of valuated p-groups and the category of right modules over the endomorphism ring of A is used to investigate

The case study objective is to examine if there can be any correspondence between each of the variables: property (estates, cars etc.), loan_history ( history of payments),

The Ministry of Labor, Social Solidarity and Family is a governmental institution responsible with the domain of social protection, which assures the development and implementation

The first theme, Efficient and interoperable eGovernment services, aims at improving the efficiency and effectiveness of public administrations and facilitating their interactions

Member States have committed themselves to inclusive eGovernment objectives to ensure that by 2010 all citizens, including socially disadvantaged groups, become major beneficiaries

International food trade and foreign travel are increasing, bringing important social and economic benefits. But this also makes the spread of illness around the world easier.

14, issue 41 (Summer 2015) 176 People facing financial difficulties, regardless of religion or citizenship, may benefit from the support offered by these

In the same line, Nistor and Roman (1968b) offer an outstanding survey of the major problems in computational linguistics in the sixties: information retrieval, Chomsky’s

This means that they are an instrument that is only possible due to the fact that ethical maximalism is minimized in postmodern society and, at the same time, becomes the real

Whether intended as a direct or indirect attack on religious institutions or deployed in literature as a motif, discursive strategy, or subversive mechanism, what has been

The usual mathematical operators are overloaded in Chebfun, in order to allow operations with chebfuns, combining existing chebfuns to create a new chebfun.. 1 x = chebfun ( ' x

The paper presented a descriptive analysis of the international migration phenomenon in the EU members, with a special focus on Romania, between 2006 and 2010. Romania,

The number of vacancies for the doctoral field of Medicine, Dental Medicine and Pharmacy for the academic year 2022/2023, financed from the state budget, are distributed to

(1993) Iden- titate, migrație și noua agendă de securitate în Europa (Identity, Migration and the New Security Agenda in Europe), Londra, Pinter; Buzan, Barry, Ole Wæver și Jaap