Question

In: Economics

Explain two theoretical explanations as to why we need security and Identify the two main types...

Explain two theoretical explanations as to why we need security and Identify the two main types of security and explain why they are important.

Solutions

Expert Solution

The two main types of security that we needa are

Human Security: The human security approach broadens the
scope of security analysis and policy from territorial security to the security of people.Human security relates to much more than security from violence and crime. Security of people’s include livelihoods economic, food, environment or health security might apply a human security approach Human security can also be used to look into personal, community and political security. Thus human security is important to protect the right of people ie. Human being form criminals, violence, harassment, starvation, poverty etc.

Women Security: Women are at risk of violence both in public and private spheres, in and around the home, in neighbourhoods and at city level. Risk is influenced by urban design choices and the organisation of public services including transport and energy, amongst other things. Women experience a higher degree of insecurity which can restrict their access and “use of the city”. Many women and girls face domestic violence not only in their homes and in relationships, but also in public spaces due to poor choices in urban design and poor management of those spaces. In practical terms this can relate to factors such as inadequate street lighting, unsafe underpasses, ineffective community policing and lack of rehabilitation programmes for those involved in antisocial use of public spaces. During times of conflict or social unrest, those factors can further exacerbate the risk of gender-based violence. So women security is must and important to protect them from gender base violence, child abuse, rape, harassment, domestic voliance etc.


Related Solutions

Explain why Siemens need to identify needs assessment for their staff. Your explanations should be based...
Explain why Siemens need to identify needs assessment for their staff. Your explanations should be based on Training and HRD Process Model
A) state the complete Central Limit Theorem (CLT) B) explain why we need the theoretical idea...
A) state the complete Central Limit Theorem (CLT) B) explain why we need the theoretical idea of sampling distributions in a hypothesis test even though we only take one sample to decide between the hypothesis. C) relate each part of the formula r= X-Mean0 / S/ square root of n D) Explain what type 1 and type 2 errors are E) explain how it is possible to conduct the correct test flawlessly using a simple random sample of sufficient size...
Why bother with theory? Do we need a theoretical approach to global politics?
Why bother with theory? Do we need a theoretical approach to global politics?
What are the theoretical explanations for the environmental Kuznets curve, and why is empirical evidence on...
What are the theoretical explanations for the environmental Kuznets curve, and why is empirical evidence on the existence of such a relationship so mixed?
3. Name two types of common attacks on security and explain how we can test them.
3. Name two types of common attacks on security and explain how we can test them.
identify two types of nontherapeutic questions, give exemples for each and explain why they are nontherapeutic
identify two types of nontherapeutic questions, give exemples for each and explain why they are nontherapeutic
Why do we need security personnel, and do they contribute to our welfare? Could we make...
Why do we need security personnel, and do they contribute to our welfare? Could we make everyone at least as well-off if we would all cooperate so that we could reallocate some protective labor to more productive activity? Could this be an example of a prisoner’s dilemma? Diagram the game and explain where the US economy rests.
Explain the two main types of scaling. Discuss any two types of comparative scaling techniques with...
Explain the two main types of scaling. Discuss any two types of comparative scaling techniques with examples.
Identify one important money market security. What is the need for this security and who are...
Identify one important money market security. What is the need for this security and who are the major participants in this security's market.
Name two main types of access control methods in a security system. Sub-categorize each of them...
Name two main types of access control methods in a security system. Sub-categorize each of them separately by four sub-types. For each main type access control methods you named, compare and contrast the four sub-types you have listed. Use tables to present their respective advantages and disadvantages. Based on your discussion in earlier parts or otherwise, propose access control(s) system for a domestic airport terminal building.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT