Differences in the local perception of EULEX and KFOR in their security-related tasks

被引:0
|
作者
Mahr, Ewa [1 ]
机构
[1] Maastricht Univ, Fac Arts & Social Sci, Dept Polit Sci, Campus Brussels, Maastricht, Netherlands
关键词
EULEX; KFOR; CSDP; peacebuilding; local perceptions of crisis management; Kosovo; EUROPEAN-UNION RULE; LAW MISSION; LEGITIMACY; AUTHORITY; LEVERAGE;
D O I
10.1080/09662839.2020.1815192
中图分类号
K9 [地理];
学科分类号
0705 ;
摘要
This article compares the local perceptions of the EU Rule of Law Mission in Kosovo (EULEX) with those of NATO's mission Kosovo Force (KFOR) and investigates the reasons for observed differences. It focuses on an oft-overlooked aspect of EULEX: its broadly defined security-related tasks. Until recently, EULEX could be seen as a prominent security actor, thanks to its robust police component and its function as a second respondent. EULEX coexists in Kosovo with KFOR; while the former is civilian and the latter military, both play complementary roles in the security realm and some of their tasks are similar. However, the local perceptions of EULEX and KFOR regarding their execution of security-related tasks have differed, with only KFOR enjoying local acceptance. This article argues that such differences are caused by the missions' differently perceived powers over local actors, as manifested through their ability to exert compliance and cooperation from local actors through coercion, the ability to offer rewards and legitimacy. By going beyond the well-researched initial gratitude of Kosovo Albanians to NATO/US for intervening in 1999, this article offers a more fine-grained analysis of Kosovo Albanian and Kosovo Serbian perceptions of EULEX and KFOR.
引用
收藏
页码:43 / 64
页数:22
相关论文
共 50 条
  • [1] Update on security-related lawsuits
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (06) : 430 - 431
  • [2] Security-related policy and law in Japan
    Kiyotani, T
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 1998, 49 (01) : 123 - 124
  • [3] Security views - Update on information security-related legislation
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (07) : 510 - 511
  • [4] Analyzing and Assessing the Security-Related Defects
    Bansal, Ankita
    Malhotra, Ruchika
    Raje, Kimaya
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 21 - 25
  • [5] Security-related Provisions in IPR Laws in India
    Gupta, V. K.
    DESIDOC JOURNAL OF LIBRARY & INFORMATION TECHNOLOGY, 2007, 27 (04): : 5 - 14
  • [6] Information Security Maintenance Issues for Big Security-Related Data
    Miloslavskaya, Natalia
    Senatorov, Mikhail
    Tolstoy, Alexander
    Zapechnikov, Sergey
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 361 - 366
  • [7] Network Security-related Technology Research and Implementation
    Ruan, Jun
    Zhang, Pan
    Ding, Hongbi
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1720 - 1723
  • [8] Update on controversial security-related legislation in US
    不详
    COMPUTERS & SECURITY, 2002, 21 (08) : 687 - 688
  • [9] Investigation of Security-related Commits in Android Apps
    Das, Teerath
    Ali, Adam
    Mikkonen, Tommi
    27TH INTERNATIONAL CONFERENCE ON EVALUATION AND ASSESSMENT IN SOFTWARE ENGINEERING, EASE 2023, 2023, : 259 - 260
  • [10] SECURITY-RELATED BEHAVIOR OF PC USERS IN ORGANIZATIONS
    FRANK, J
    SHAMIR, B
    BRIGGS, W
    INFORMATION & MANAGEMENT, 1991, 21 (03) : 127 - 135