ISTANBUL SECURITY CONFERENCE 2018

Similar documents
ISTANBUL SECURITY CONFERENCE 2016

CONVENTIONAL WARS: EMERGING PERSPECTIVE

ISTANBUL SECURITY CONFERENCE 2017 New Security Ecosystem and Multilateral Cost

Militarization of Cities: The Urban Dimension of Contemporary Security.

CIVIL GLOBAL PROGRAM Economy & Ecosystem of the Future Discovering the Potential

International Security Problems and Solutions by Patrick M. Morgan (Washington, D.C.: CQ Press, 2006)

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

HEMISPHERIC STRATEGIC OBJECTIVES FOR THE NEXT DECADE

Report of the 10th International Student/Young Pugwash (ISYP) Conference. Astana, Kazakhstan, August 2017

Chapter 8: The Use of Force

CHANGE IN STATE NATURE WORKSHOP

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH

icd - institute for cultural diplomacy

The European Union Global Strategy: How Best to Adapt to New Challenges? By Helga Kalm with Anna Bulakh, Jüri Luik, Piret Pernik, Henrik Praks

Conventional Deterrence: An Interview with John J. Mearsheimer

Migration Network for Asylum seekers and Refugees in Europe and Turkey

MIGRATION IN TURKEY CONFERENCE Transformation of Opportunity and Risks in the Country from Emigrant to Immigrant

H.E. President Abdullah Gül s Address at the Pugwash Conference

The changing character of organized violence

Executive Summary. Dealing With Today s Asymmetric Threat to U.S. and Global Security Symposium Three: Employing Smart Power

Statement by. President of the Republic of Latvia

DOCTORAL DISSERTATION

GOVT International Security. Spring George Mason University. Time: Wednesday 7:20pm Office: Robinson A 219

Strategic priority areas in the Foreign Service

There are a few books every senior geopolitical

Nato s continuing non-proliferation role

COUNTERING AND PREVENTING RADICALIZATION IN THE MENA REGION AND THE EU

4 th WORLD TURKIC FORUM Public Diplomacy, Media, Information

Statement of Dennis C. Blair before The Senate Select Committee on Intelligence United States Senate January 22, 2009

Organization for Security and Co-operation in Europe

Role of women and young people in promoting peace and preventing violent extremism in the Euro-Mediterranean region.

GOV 108 Introduction to International Politics

Course Descriptions Political Science

Colloquium Brief DEFENSE, DEVELOPMENT, AND DIPLOMACY (3D): CANADIAN AND U.S. MILITARY PERSPECTIVES

Internet Governance and G20

A Role for the Private Sector in 21 st Century Global Migration Policy

Analysis of the Draft Defence Strategy of the Slovak Republic 2017

Transnational Radical Party (TRP) FILLING THE "DEMOCRATIC DIGITAL DIVIDE"

INTERNATIONAL RELATIONS 74 United States Foreign Policy

Terrorism^ % in the Tw<$$fy-First

Conflating Terrorism and Insurgency

Globalization and a new World Order: Consequences for Security. Professor Kjell A. Eliassen Centre for European and Asian Studies

Violent Politics: A History Of Insurgency, Terrorism, And Guerrilla War, From The American Revolution To Iraq By William R. Polk

Terrorism in Africa: Challenges and perspectives

POST-CONFLICT OPERATIONS A COOPERATIVE EFFORT Lucian ISPAS, Aurelian RATIU, Mihai-Marcel NEAG

Russia s uncivil society : The threat, sources, and policy recommendations

4 PHD POSITIONS PRACTICAL INFORMATION. Faculty of Law and Criminology Human Rights Center

by Vera-Karin Brazova

Milton Wolf Seminar 2015 Triumphs and Tragedies: Media and Global Events in 2014 Vienna, Austria, April 19 April 21, 2015

PAGE PAGE PAGE PAGE PAGE PAGE

CONTEMPORARY SECURITY AND STRATEGY

Civil War and Political Violence. Paul Staniland University of Chicago

Finland's response

Role of Security Sector and Civil Society in Responding to and Preventing VE

CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

EMERGING SECURITY CHALLENGES IN NATO S SOUTH: HOW CAN THE ALLIANCE RESPOND?

PEACEKEEPING CHALLENGES AND THE ROLE OF THE UN POLICE

PICUM Five-Point Action Plan for the Strategic Guidelines for Home Affairs from 2015

STRUCTURE APPENDIX D APPENDIX D

Theory and the Levels of Analysis

the new wars: an introduction

Theory and the Levels of Analysis

NIRMA UNIVERSITY INSTITUTE OF LAW

Centre for Constitution and Public Policy (CCPP), University Institute of Legal Studies (UILS) Panjab University, Chandigarh. in Collaboration with

Making Sense of the Present and Future Operating Environment: Hybrid Threats and Hybrid Strategies in a Historical Context

What Happened To Human Security?

Identifying the Enemy: Civilian Participation in Armed Conflict

CALL FOR ARTICLES THE CARIBBEAN SECURITY AND STRATEGY CONFERENCE. and

FUNDAMENTAL RIGHTS FORUM

Global Affairs (GLA) Global Affairs (GLA) Courses. Global Affairs (GLA)

USING SOCIAL JUSTICE, PUBLIC HEALTH, AND HUMAN RIGHTS TO PREVENT VIOLENCE IN SOUTH AFRICA. Garth Stevens

Nbojgftup. kkk$yifcdyub#`yzh$cf[

IRMO BRIE F IRMO. Hybrid Warfare

Foreword to Killing by Remote Control (edited by Bradley Jay Strawser, Oxford University Press, 2012) Jeff McMahan

OSCE Office for Democratic Institutions and Human Rights (ODIHR)

GOVT International Security. Fall George Mason University. Time: Monday 4:30pm Office: Robinson A 219

The 2 nd Communication Management Forum 2017 international conference

ener.: ..., EU counter-terrorism policy: Main achievements and future challenges 9 th February 2011 Presentation by Rokhsana Fiaz, ENER Director

NORTH ATLANTIC TREATY ORGANIZATION SUPREME ALLIED COMMANDER TRANSFORMATION. SACT s remarks to National University of Public Service

STATEMENT BY AMBASSADOR ROGELIO PFIRTER DIRECTOR-GENERAL OF THE

LEBOHANG MATSOSO TOPIC: BOOK REVIEW OF LAW AND WAR

Thought Leader Summary. Heather Conley SVP for Europe, Eurasia, and the Arctic; and Director, Europe Program, CSIS

CCSP CLIMATE CHANGE AND SECURITY PROJECT BACKGROUNDER AND RECOMMENDED READING. WORKSHOP on THE CLIMATE CHANGE-SECURITY NEXUS:

Remarks by Ms. Izumi Nakamitsu at the opening meeting of the 72nd session of the First Committee of the General Assembly

Following the Money to Combat Terrorism, Crime and Corruption

INDIA IN THE 21 ST CENTURY: GOVERNANCE AND FOREIGN POLICY IMPERATIVES

Security in Eurasia: A View from the OSCE

Speech at NATO MC/CS

Joint Keynote Exploring a Just Peace in a Fragmented World

DRAFTING LEGISLATION AGAINST TERRORISM AND VIOLENT EXTREMISM

GLOBAL WASATIYYAH SUMMIT Kuala Lumpur, Malaysia July 31 August 2, 2015

In the second half of the century most of the killing took place in the developing world, especially in Asia.

Examiners Report June GCE Government and Politics 6GP03 3D

INTERNATIONAL LAW AND INSTITUTIONS International Law Regarding the Conduct of War - Mark A. Drumbl INTERNATIONAL LAW REGARDING THE CONDUCT OF WAR

9th Slovenian Social Science Conference on Social Transformations: the Global and the Local

Masters in Terrorism and Political Violence - Full time programme

Organization for Security and Co-operation in Europe. Asia-Europe Counter-Terrorism Dialogue Singapore, 31 October-1 November, 2016

30 June 1 July 2015, Hofburg, Vienna

Transnationally networked armed conflict. Associate Professor Greg Rose

Transcription:

CALL FOR PAPER ISTANBUL SECURITY CONFERENCE 2018 "Security of the Future" ( 07-09 November 2018, Istanbul ) Having defined in the First World War, "Security" has begun to take place on the basis of international affairs. These deductions, which were re-defined in the Second World War, took its latest form with the Cold War; institutionalized the security system that is established and managed by the international system. Last but not least, the traditional security approach has been interpreted by the United States' announcement of its strategy to combat global terrorism after the September 11 attacks and the fact that all stakeholders in the system have been part and practitioner of this strategy. The radical changes in the international system since the 1990s and the technological developments brought about by globalization, have led to the emergence of new threats in modern times and the current threats to undergo a change in shape. With the inclusion of nonstate actors and non-military threats in the international system, the current security environment has become multidimensional, and in parallel, the need to update the methods of struggle has become a necessity. The terms "war", "power" and "peace" contain the most effective descriptions to understanding of the security environment until after the Cold War. The predecessors of traditional security assume that the concept of the violent tendency of the past will continue in the future. Besides, they think that the only way to deal with the security environment of the future is only possible to take the lessons from the past, and evaluate that the maximizing of the power, will maximize the security as well as. With the end of the Cold War, concepts and patterns that constitute the security perception of this period have also been transformed, and the terms used in defining the traditional understanding of security have been changed along with globalization and technological developments.

The concepts of army, facade, arms, and battlefield of traditional security concept have been exposed to extraordinary changes and transformations, and the whole world has almost become a tug of war. This has led to the creation of a "multi-dimensional" field of "security" that is open to the asymmetric threats that are difficult, even hardly predictable, of the source, time and shape. Along with the new security concept; risks such as; international terrorism, organized crime syndicates, non-state armed actors, cyber terrorism, aggressive intentional states, and the proliferation of conventional and weapons of mass destruction pose a threat to national physical existence. When we consider the war within the definition of Clausewitz as the "continuity of politics with other means", it is evident that the conflict and war environment will continue as long as there is political space, even though it has evolved as mentioned. In the evolution of war, there is no doubt that technology has played the most decisive role. Developments in electronics, communication and material technologies in the second half of the 20th century have made significant advances in the military field. The reflections of these developments in the 21st century have radically changed the way in which war was carried out. The development of communication technologies, geopolitical developments and the emergence of non-state actors (organizations, micro-nationalism, terrorism, etc.) rather than nation states; has caused the war to be carried out with new procedures, tactics and systems. In this new approach, called the "Fourth Generation War" much smaller, more mobile, interconnected units in a network-centered structure has been used as a part of political, economic and social operations. In the first concrete examples of the Fourth Generation War such as the Libyan War, the Syrian Civil War, Afghanistan War, it is seen that states used non-state actors for their political and military goals and that the wars were carried out in the form of a "proxy war" rather than openly declared or waging in battlefields. Guerrilla warfare, irregular warfare strategies step forward. Psychological warfare, electronic warfare, cyber warfare are used for tactical and strategic results. In today's world where technology has not yet deactivated the human factor, at a point where technology is providing support services for security activities, types of equipment that can empower people ten times more than people have, merged facilities that do not miss the threat during the observation and sophisticated means of destruction for human use, can be seen as the constantly updated form of the humanitarian strategies that planed against humans, which are longstanding.

The first examples of the unmanned security areas that we currently witness, will be the most common phenomenon we will encounter in the near future. It is necessary that the facts, targets, paths and even the results should be re-evaluated in different ways when the vehicles get unmanned, and then the battles and finally the areas to be evaluated in the whole security and defense are changed. The security of the future will, in fact, be shaped around the future needs and generalized living conditions. In a study carried out on the internet, one of daily indispensables, even in a publication published in 1996, "a network of non-governmental actors (such as the internet) will take advantage of the information revolution and a new kind of social conflict that will continue to be formless, low-intensity, oriented towards the institutions will be raised thesis can be put forward. The blurred positioning of the subject matter of ''security'' brought by globalization and has long been debated on the individual-society-state scale will be acutely better positioned in near future. Although the technology and individual needs are known to have an effect on this positioning, the point at which to bring it is not clear. It can be seen that the change in the social and public acceptance of the concepts of high/low politics will determine the scope and means of security, which is part of the concepts.. Beyond the approaches built on a futuristic imagination, the securitization of the phenomenon of future is the rational re-evaluation of the foreseen future conditions before human-society and state within the context of security phenomenon. Actually, the future should be assessed in terms of qualification of the point of planning and shaping to prioritize subject matter.. It is clear today's day-to-day rescue or chasing the current has no place in the concept of security. For this reason, Istanbul Security Conference 2018 with the main theme of "Security of the Future", will be held by TASAM and National Defense and Security Institute. The agenda of the conference which broad participation of social scientists and academicians, government representatives, policymakers, experts, members of think tanks, members of security institutions, bureaucrats, and other interested parties are expected with full open-mindedness, two-sided and multi-disciplinary evaluation, are as follows:

Main Them Security of the Future Sub-Themes (Panels) Industry 4.0 in the Future s Security Artificial Intelligence in the Future s Security Robotic and Humanoid Robots Future s Ballistic, Conventional Defense and Space Industry Security Organization of the Future and NATO Security Organization of the Future and SCO Security Organization of the Future and New Armies Intelligence Management of the Future Data Ecology, Network Security and Cyber Threats Cyber Army Races Digital Economy and the Future s Security Border Problems Management in the Future Security Dilemma in the Future Pitched Battle of Unmanned Vehicles' UAV, ULV, USV Securitization of Future New Media, Data Ecosystem and Security Future s Smart Cities and Security Governance Soft Power Components of the Future

SUBMISSION of ABSTRACT If you are interested in submitting a paper for to attend to Istanbul Security Conference 2018 as a speaker, you need to submit via igk2018@istanbulguvenlikkonferansi.org with an MS Word document include follows: Title of your paper 300 words abstract, 5 keywords Affiliation and short biography (not detailed CV) Important Dates: Deadline for submission of abstract : 15.09.2018 Successful authors will be notified by : 01.10.2018 Deadline for submission of full text : 07-09.11.2018 Deadline for submission of revised full text : 30.11.2018 Background Information: Abstract Book will be prepared before the conference and published online. All full texts complying with the abstract and accepted as scientific proficiency will be published as a compilation book. There is no charge for the submitted abstract and presentation of accepted papers. Transportation, accommodation and local expenses are provide by the participants.