Societal Security and National Identity Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Societal security differs from the traditional approaches on various levels. Unlike the traditional approach to security, a new concept argues that security can be based on economy, environmental protection and politics. Societal security focuses on how to preserve the society against infiltration, invasion and military actions from foreigners (Panić 2009). In addition, societal security is best analyzed from an international and individual perspective.

Therefore, international systems, subsystems, units and subunits are critical to the analysis of societal security (Panić 2009). Compared to the traditional approach, societal security does not focus on territorial sovereignty. Instead, societal security focuses on collective identity ranging from politics, economy, institutions, and the environment to individuals. Therefore, preservation of elements that compose national identity is the hallmark of societal security.

Reconceptualising security

Security as the survival of the society rather than of the state

In recent times, security is viewed as a survival of the society and not the state. From this perspective, the concepts of security from a national perspective focus on protecting the sovereignty of the state (Brauch 2008). Major threats for national security means include countries, terrorism and guerrilla groups. From state security, a focus on national and societal groups becomes imperative. The main aim of societal security is to preserve national unity and identity (Brauch 2008). In this context, threats against national identity are derived from immigrants and foreign cultures. Human security refers to survival for individual or mankind.

However, human survival refers to the quality of life that may be threatened by nature, terrorism and globalization (Brauch 2008). Environmental security refers to the sustainability of the ecosystem that is normally threatened by mankind through pollution and socioeconomic activities. In other instances, human survival can be determined by gender security. In this context, indigenous people, gender relations, racial minorities, mature adult and children are subject to insecurity (Brauch 2008). The idea of providing gender security is to promote equality, equity, identity and social representations that are threatened by totalitarian institutions, intolerance, elites, violence and religion.

Societal security as a threat to collective identity

National, ethnic and religious identities

As the need for societal security grows with time, countries become sources of self-threat, especially on national, ethnic and religious matters. For example, as countries prevent invasions from other nations, the consequences result in the creation of inter-regional conflicts. Therefore, acts of war and similar provocations by the government may endanger the citizens and the country from external attacks. Moreover, the need to have a collective identity may cause inter-ethnic conflicts due to lack of intolerance. The same intolerance may threaten freedom of worship and human rights, especially on religious matters.

Unrest in Tibet

The outbreak of unrest in Tibet in 2008 was a classic example of how societal security threatens peace in the region (Topgyal 2011). China’s threats against Tibet’s affected the region’s economic, political, environmental and individual arrangements. In fact, China’s invasion in Tibet and the subsequent colonization was an example of how the country is intolerant to other societies’ way of life. On the other hand, the uprising in Tibet justified the right to self-protection against societal insecurities (Topgyal 2011).

From this perspective, using civil rights movements, guerrilla warfare and nonviolence mechanisms to protect territorial integrity was necessary. Moreover, the unrest in Tibet was driven by the need for improved quality of life from the oppressive Chinese government (Topgyal 2011). Moreover, the Tibetans requested equal treatment and social representation of the society in the region’s economic and socio-political aspects.

References

Brauch, H G 2008, ‘Introduction: Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century’, Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century, pp. 27-43.

Panić, B 2009, ‘Societal security–security and identity,’ Western Balkans Security Observer-English Edition, no.13, pp. 28-39.

Topgyal, T 2011, ‘Insecurity dilemma and the Tibetan uprising in 2008,’ Journal of Contemporary China, vol. 20, no. 69, pp. 183-203.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, November 25). Societal Security and National Identity. https://ivypanda.com/essays/societal-security-and-national-identity/

Work Cited

"Societal Security and National Identity." IvyPanda, 25 Nov. 2020, ivypanda.com/essays/societal-security-and-national-identity/.

References

IvyPanda. (2020) 'Societal Security and National Identity'. 25 November.

References

IvyPanda. 2020. "Societal Security and National Identity." November 25, 2020. https://ivypanda.com/essays/societal-security-and-national-identity/.

1. IvyPanda. "Societal Security and National Identity." November 25, 2020. https://ivypanda.com/essays/societal-security-and-national-identity/.


Bibliography


IvyPanda. "Societal Security and National Identity." November 25, 2020. https://ivypanda.com/essays/societal-security-and-national-identity/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1