A Foucauldian governmentality analysis of security sector reform in Tunisia
This thesis adopts Foucauldian genealogical governmentality as a conceptual framework for the examination of the concept of Security Sector Reform (SSR), and for empirical investigation into the effects of SSR practice on security and democratic reform in post-revolutionary Tunisia. This thesis broa...
| Main Author: | Keskes, Hanen |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/72490/ |
Similar Items
Subject to truth: before and after governmentality in Foucault’s 1970s
by: Legg, Stephen
Published: (2016)
by: Legg, Stephen
Published: (2016)
The trap game: neoliberal governmentalities and the origins of Southern hip-hop
by: Knight, James
Published: (2021)
by: Knight, James
Published: (2021)
The policy response to home-grown terrorism: reconceptualising Prevent and Resilience as collective resistance
by: Aly, Anne
Published: (2013)
by: Aly, Anne
Published: (2013)
A Foucauldian investigation of CSR and the concept of responsibility
by: Engel, Cecile
Published: (2015)
by: Engel, Cecile
Published: (2015)
Putting 'the system' into a school autonomy reform: the case of the Independent Public School program
by: Gobby, Brad
Published: (2014)
by: Gobby, Brad
Published: (2014)
University social responsibility and academic social capital in Tunisia
by: Temporin, Simone
Published: (2016)
by: Temporin, Simone
Published: (2016)
US-Pakistan cooperation and Pakistan's security post 9/11
by: Tamana, Aazar
Published: (2010)
by: Tamana, Aazar
Published: (2010)
The microeconomic impact of political instability: firm-level evidence from Tunisia
by: Matta, Samer, et al.
Published: (2018)
by: Matta, Samer, et al.
Published: (2018)
Security detention - United Kingdom practice
by: McGoldrick, Dominic
Published: (2009)
by: McGoldrick, Dominic
Published: (2009)
Of shepherds, sheep and sheepdogs?: governing the adherent self through complementary and competing ‘pastorates’
by: Waring, Justin, et al.
Published: (2017)
by: Waring, Justin, et al.
Published: (2017)
Media reforms in Myanmar and Indonesia: a critical analysis of how power relations and social inequalities are reflected in, impacted by, and shape media reform processes
by: S. Venkiteswaran, Gayathry
Published: (2025)
by: S. Venkiteswaran, Gayathry
Published: (2025)
The role of the military in the Arab uprisings: the cases of Tunisia and Libya
by: Sarihan, Ali
Published: (2016)
by: Sarihan, Ali
Published: (2016)
Outsourcing peace. Private military and security companies. A setback to security sector reform in post conflict and transition states?
by: Mehboob, Cynthia
Published: (2017)
by: Mehboob, Cynthia
Published: (2017)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Countering terrorism through religion, culture, legal and ethical values / Mokhtar Muhammad and Haliza Hasan
by: Muhammad, Mokhtar, et al.
Published: (2020)
by: Muhammad, Mokhtar, et al.
Published: (2020)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Adaptive regulation or governmentality: patient safety and the changing regulation of medicine
by: Waring, J
by: Waring, J
Perceptions of the War Against Terrorism (WAT): a Malaysian
case study
by: Silong, Abu Daud, et al.
Published: (2008)
by: Silong, Abu Daud, et al.
Published: (2008)
Justice and home affairs: impact of the European Union on the internal security of Turkey
by: Bakar, Ayhan
Published: (2011)
by: Bakar, Ayhan
Published: (2011)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
An institutional analysis of British CVE propaganda policy,
2006-2019
by: Porter, David T.B.
Published: (2020)
by: Porter, David T.B.
Published: (2020)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
The definition of "terrorist" under section 2 of the internal security act 1960 (act 82) is insufficient to combat modern forms of terrorism / Azalia Abdullah Abdul Aziz and Iza Dora Md Hanipah
by: Abdul Aziz, Azalia Abdullah, et al.
Published: (2005)
by: Abdul Aziz, Azalia Abdullah, et al.
Published: (2005)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
The impact of the European Union on Turkish counter-terrorism policy towards the Kurdistan Workers Party
by: Ilbiz, Ethem
Published: (2014)
by: Ilbiz, Ethem
Published: (2014)
Financial sector reforms in the ASEAN economies in the 1980s : macromodelling of debt and twin deficits
by: Wan Latifah, W.M.
Published: (1994)
by: Wan Latifah, W.M.
Published: (1994)
Participatory governmentality: social network transitions in Malaysia’s mental healthcare
by: Teoh, Sing Fei
Published: (2022)
by: Teoh, Sing Fei
Published: (2022)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
September the 11th 2001 and security dilemma.
by: Soltani, Fakhreddin, et al.
Published: (2010)
by: Soltani, Fakhreddin, et al.
Published: (2010)
Jordan's National Security Under King Hussein
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
The performance of New Zealand initial public offerings (IPOs): 1995-2000 / Arizza Sapuan
by: Sapuan, Arizza
Published: (2004)
by: Sapuan, Arizza
Published: (2004)
Pastoral power in the community pharmacy: a Foucauldian analysis of services to promote patient adherence to new medicine use
by: Waring, Justin, et al.
Published: (2016)
by: Waring, Justin, et al.
Published: (2016)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
A study on determinants of bond yield in Malaysia / Nurul Jannah Arifin and Nurul Atikah Yaacob
by: Arifin, Nurul Jannah, et al.
Published: (2018)
by: Arifin, Nurul Jannah, et al.
Published: (2018)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Tackling Terrorism in Africa: Post-9/11 US Security Policies and Radicalisation in Kenya
by: Papale, Simone
Published: (2021)
by: Papale, Simone
Published: (2021)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Similar Items
-
Subject to truth: before and after governmentality in Foucault’s 1970s
by: Legg, Stephen
Published: (2016) -
The trap game: neoliberal governmentalities and the origins of Southern hip-hop
by: Knight, James
Published: (2021) -
The policy response to home-grown terrorism: reconceptualising Prevent and Resilience as collective resistance
by: Aly, Anne
Published: (2013) -
A Foucauldian investigation of CSR and the concept of responsibility
by: Engel, Cecile
Published: (2015) -
Putting 'the system' into a school autonomy reform: the case of the Independent Public School program
by: Gobby, Brad
Published: (2014)