top of page
INT204 INTERNATIONAL SECURITY
![](https://static.wixstatic.com/media/06a92c_7249eb2326a94b5f8b9b308f758f5ca6~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/06a92c_7249eb2326a94b5f8b9b308f758f5ca6~mv2.webp)
![Resilience and Resistance: The Mapuche Struggle for Justice and Recognition in Chile](https://static.wixstatic.com/media/06a92c_7249eb2326a94b5f8b9b308f758f5ca6~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/06a92c_7249eb2326a94b5f8b9b308f758f5ca6~mv2.webp)
Alisha Chandranath
May 4, 2024
Resilience and Resistance: The Mapuche Struggle for Justice and Recognition in Chile
Fig. 1. Activists take part in a rally last month against Columbus Day in Santiago, Chile, with a placard calling for an end to the...
1 comment
![](https://static.wixstatic.com/media/d3a2a7_ab712581dc394049b959efdb44ea7e60~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/d3a2a7_ab712581dc394049b959efdb44ea7e60~mv2.webp)
![CLASH OF THEORIES: HACKTIVISM VS SURVEILLANCE](https://static.wixstatic.com/media/d3a2a7_ab712581dc394049b959efdb44ea7e60~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/d3a2a7_ab712581dc394049b959efdb44ea7e60~mv2.webp)
ts4360
May 1, 2024
CLASH OF THEORIES: HACKTIVISM VS SURVEILLANCE
One of the most important ideas in the field of international relations has always been security. People and communities have sought...
1 comment
![(In)Security for Immigrants: A Closer Look at the UK’s Immigration Policies](https://static.wixstatic.com/media/1e4510_187eca1962db4803b607674039280452~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/1e4510_187eca1962db4803b607674039280452~mv2.webp)
Shivanshi .
Apr 30, 2024
(In)Security for Immigrants: A Closer Look at the UK’s Immigration Policies
Following a referendum in 2016, the British electorate decided to leave the European Union with a vote of 52% to 48%. The withdrawal of...
3 comments
![](https://static.wixstatic.com/media/669171_2f7fe66a36684ab680b179b92d027510~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/669171_2f7fe66a36684ab680b179b92d027510~mv2.webp)
![Anatomy of a Conflict: Decoding Securitization, Biopolitics, and Gender Dynamics in the Israel-Palestine Conflict](https://static.wixstatic.com/media/669171_2f7fe66a36684ab680b179b92d027510~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/669171_2f7fe66a36684ab680b179b92d027510~mv2.webp)
Varalika
Apr 30, 2024
Anatomy of a Conflict: Decoding Securitization, Biopolitics, and Gender Dynamics in the Israel-Palestine Conflict
Ole Waever's securitization theory emphasizes the significance of presenting a problem as an existential danger in order to justify...
13 comments
![](https://static.wixstatic.com/media/6c59e9_acfc51e355e8435ca426f2278b41cf19~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6c59e9_acfc51e355e8435ca426f2278b41cf19~mv2.webp)
![Securitizing the Uyghur Community: Understanding Violence and Repression in China](https://static.wixstatic.com/media/6c59e9_acfc51e355e8435ca426f2278b41cf19~mv2.jpg/v1/fill/w_454,h_266,fp_0.50_0.50,q_90,enc_auto/6c59e9_acfc51e355e8435ca426f2278b41cf19~mv2.webp)
Pavithra Sr
Apr 29, 2024
Securitizing the Uyghur Community: Understanding Violence and Repression in China
China as a state has been known for its retaining of culture and ethnicity for a long time. The Chinese communist party (CCP) in the...
9 comments
!["Beyond Borders: Redefining Security in the Kashmir Conflict."](https://static.wixstatic.com/media/f7b559_85e679ccdd584fcc85f281506f41af71~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/f7b559_85e679ccdd584fcc85f281506f41af71~mv2.webp)
Venica Aggarwal
Apr 25, 2024
"Beyond Borders: Redefining Security in the Kashmir Conflict."
Traditional emphasis of security studies on state defense against external military threats have reinforced a hindered understanding of...
11 comments
![](https://static.wixstatic.com/media/579857_d37c066ace554e96bfbc3d53162ac223~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/579857_d37c066ace554e96bfbc3d53162ac223~mv2.webp)
![Subjugation of Women's Rights in Afghanistan: A Critical Analysis through various Theoretical Frameworks](https://static.wixstatic.com/media/579857_d37c066ace554e96bfbc3d53162ac223~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/579857_d37c066ace554e96bfbc3d53162ac223~mv2.webp)
Priyansh Goyal
Apr 22, 2024
Subjugation of Women's Rights in Afghanistan: A Critical Analysis through various Theoretical Frameworks
The Matter of this blog is a true example of a tussle between the importance of collective and individual security. Today, if you would...
6 comments
![](https://static.wixstatic.com/media/06a92c_a1a8be8fc5c34c58a8825b60e649ee4d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/06a92c_a1a8be8fc5c34c58a8825b60e649ee4d~mv2.webp)
![Navigating Contradictions and Ambiguities:The Complexities of 'SlutWalk' Protests in Modern Feminist Discourse](https://static.wixstatic.com/media/06a92c_a1a8be8fc5c34c58a8825b60e649ee4d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/06a92c_a1a8be8fc5c34c58a8825b60e649ee4d~mv2.webp)
Alisha Chandranath
Apr 20, 2024
Navigating Contradictions and Ambiguities:The Complexities of 'SlutWalk' Protests in Modern Feminist Discourse
Fig.1. Credit: Kelly Yeo, Daily Bruin. Fig.2. Credit: Josh Reynolds, AP News. Fig.3. Credit: Neha Chauhan, Legally India. Fig. 4 & 5....
6 comments
![](https://static.wixstatic.com/media/6c8762_d1378a2e84414f7bb65ed5d96821b77f~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/6c8762_d1378a2e84414f7bb65ed5d96821b77f~mv2.webp)
!['Prick Waving': How the US Securitized the War on Terror](https://static.wixstatic.com/media/6c8762_d1378a2e84414f7bb65ed5d96821b77f~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/6c8762_d1378a2e84414f7bb65ed5d96821b77f~mv2.webp)
Akash Tripathi
Apr 18, 2024
'Prick Waving': How the US Securitized the War on Terror
Wæver defines securitization as portraying a problem as an existential risk, requiring extreme measures and suspending regular politics....
6 comments
![](https://static.wixstatic.com/media/0d3055_5bcbfc66d1d348cb815ece1cc3855c22~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/0d3055_5bcbfc66d1d348cb815ece1cc3855c22~mv2.webp)
![Disability, Security, and Rights: A critical analysis of the lost autonomy of disabled women on their bodies](https://static.wixstatic.com/media/0d3055_5bcbfc66d1d348cb815ece1cc3855c22~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/0d3055_5bcbfc66d1d348cb815ece1cc3855c22~mv2.webp)
Ayushi Raghvendram
Apr 18, 2024
Disability, Security, and Rights: A critical analysis of the lost autonomy of disabled women on their bodies
Source: European disability form report Sterilization is the permanent method to control birth in human beings which leaves the human...
7 comments
![](https://static.wixstatic.com/media/e78797_d1a549fb1cd4450797a1607bf3399593~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/e78797_d1a549fb1cd4450797a1607bf3399593~mv2.webp)
![Gender Insecurity: Afghanistan's Struggle Through Post-Colonial and Feminist Lens](https://static.wixstatic.com/media/e78797_d1a549fb1cd4450797a1607bf3399593~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/e78797_d1a549fb1cd4450797a1607bf3399593~mv2.webp)
Gaurav Kumar
Apr 17, 2024
Gender Insecurity: Afghanistan's Struggle Through Post-Colonial and Feminist Lens
Since NATO's initial airstrikes in Afghanistan on October 7, 2001, the country has endured ongoing conflict marked by the Taliban's...
1 comment
![](https://static.wixstatic.com/media/e78797_95409d04937541dd909fc82345ffe373~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/e78797_95409d04937541dd909fc82345ffe373~mv2.webp)
![Liberia's Security: A Feminist & Biopolitical Perspective](https://static.wixstatic.com/media/e78797_95409d04937541dd909fc82345ffe373~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/e78797_95409d04937541dd909fc82345ffe373~mv2.webp)
Gaurav Kumar
Apr 17, 2024
Liberia's Security: A Feminist & Biopolitical Perspective
Introduction - Liberia has a tumultuous history marked by conflict, but it is currently in a phase of reconstruction. we aim to...
0 comments
![](https://static.wixstatic.com/media/077f78_6be1364085864bfeb56fed5da8cb9b72~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/077f78_6be1364085864bfeb56fed5da8cb9b72~mv2.webp)
![INDIA’S TIPPING POINT: A BJP MASTERCLASS](https://static.wixstatic.com/media/077f78_6be1364085864bfeb56fed5da8cb9b72~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/077f78_6be1364085864bfeb56fed5da8cb9b72~mv2.webp)
ap7946
Apr 17, 2024
INDIA’S TIPPING POINT: A BJP MASTERCLASS
Analyzing the current state of the Indian polity, I thought it was only right to examine, from the perspective of various securitization...
2 comments
![Bias by Design: AI-powered Predictive Policing and Racial Profiling](https://static.wixstatic.com/media/ce73df_95a5b70e486447c3b1310f07a26fe9d8~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/ce73df_95a5b70e486447c3b1310f07a26fe9d8~mv2.webp)
Nayanika Jha
Apr 15, 2024
Bias by Design: AI-powered Predictive Policing and Racial Profiling
Artificial intelligence (AI) has profoundly impacted society, ushering in the fourth industrial revolution and embedding technology into...
8 comments
![Beyond Statistics: Gendered Impact of Necropolitics in Sudan's Crisis](https://static.wixstatic.com/media/8afd74_132fcef61b05487b80a12b0fffd39f78~mv2.png/v1/fill/w_280,h_180,fp_0.50_0.50,q_95,enc_auto/8afd74_132fcef61b05487b80a12b0fffd39f78~mv2.webp)
Aneesh Panda
Apr 14, 2024
Beyond Statistics: Gendered Impact of Necropolitics in Sudan's Crisis
The crisis in Sudan is multiplex and encompasses economic, humanitarian, social, and political dimensions. Sudan experiences severe...
6 comments
![Sexpionage: Enabler or Disabler of Security](https://static.wixstatic.com/media/260361_ce4ea2b71ee64c85bd69a2b081be4bdb~mv2.png/v1/fill/w_440,h_341,fp_0.50_0.50,q_95,enc_auto/260361_ce4ea2b71ee64c85bd69a2b081be4bdb~mv2.webp)
Ishi Gautam
Apr 14, 2024
Sexpionage: Enabler or Disabler of Security
Honey trapping, a gendered manipulation that has been used as an espionage strategy for centuries, with its strategic use peaking during...
9 comments
![](https://static.wixstatic.com/media/ef8ae4_4571a3bb56b54791a8488f5bd2ef7319~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/ef8ae4_4571a3bb56b54791a8488f5bd2ef7319~mv2.webp)
![Protest, Power, Politics: Analyzing the CAA-NRC Protests Through Multiple Lenses](https://static.wixstatic.com/media/ef8ae4_4571a3bb56b54791a8488f5bd2ef7319~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/ef8ae4_4571a3bb56b54791a8488f5bd2ef7319~mv2.webp)
Naisha Khan
Apr 14, 2024
Protest, Power, Politics: Analyzing the CAA-NRC Protests Through Multiple Lenses
Shaheen Bagh, an unassuming Delhi neighbourhood, was known only by the residents of the city up until 2019 when protests against the...
7 comments
![The Refugee Crisis: Through a Critical and Biopolitical lens.](https://static.wixstatic.com/media/9fbe53_f3d53684e2ad49d388d8a26b13d6c15d~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/9fbe53_f3d53684e2ad49d388d8a26b13d6c15d~mv2.webp)
Gayatri Singh
Apr 14, 2024
The Refugee Crisis: Through a Critical and Biopolitical lens.
Having slightly touched upon the securitization theory's critique of the traditional critical approach’s agenda of deepening and widening...
8 comments
!["Combating Cybersecurity Threats and Security: The Ongoing Issue"](https://static.wixstatic.com/media/75bceb_f6af0a7bdf744bbc9039f9f1ce12c8da~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/75bceb_f6af0a7bdf744bbc9039f9f1ce12c8da~mv2.webp)
Aditya Madan
Apr 13, 2024
"Combating Cybersecurity Threats and Security: The Ongoing Issue"
Introduction As security is a complex idea, comprehending it necessitates a careful analysis from a range of angles. Ole Waever's...
4 comments
![](https://static.wixstatic.com/media/260361_57b8fc1533e44245b519564c3a35ab71~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/260361_57b8fc1533e44245b519564c3a35ab71~mv2.webp)
![Honey, I Have Trapped Your National Secrets: The Cyber Security Threat of Honey Trapping](https://static.wixstatic.com/media/260361_57b8fc1533e44245b519564c3a35ab71~mv2.jpg/v1/fill/w_424,h_341,fp_0.50_0.50,q_90,enc_auto/260361_57b8fc1533e44245b519564c3a35ab71~mv2.webp)
Ishi Gautam
Apr 13, 2024
Honey, I Have Trapped Your National Secrets: The Cyber Security Threat of Honey Trapping
Its strategic use dating as far back as the first world war, honey trapping has long been used as an espionage strategy to retrieve...
8 comments
bottom of page