Differences in the local perception of EULEX and KFOR in their security-related tasks

被引:0
|
作者
Mahr, Ewa [1 ]
机构
[1] Maastricht Univ, Fac Arts & Social Sci, Dept Polit Sci, Campus Brussels, Maastricht, Netherlands
关键词
EULEX; KFOR; CSDP; peacebuilding; local perceptions of crisis management; Kosovo; EUROPEAN-UNION RULE; LAW MISSION; LEGITIMACY; AUTHORITY; LEVERAGE;
D O I
10.1080/09662839.2020.1815192
中图分类号
K9 [地理];
学科分类号
0705 ;
摘要
This article compares the local perceptions of the EU Rule of Law Mission in Kosovo (EULEX) with those of NATO's mission Kosovo Force (KFOR) and investigates the reasons for observed differences. It focuses on an oft-overlooked aspect of EULEX: its broadly defined security-related tasks. Until recently, EULEX could be seen as a prominent security actor, thanks to its robust police component and its function as a second respondent. EULEX coexists in Kosovo with KFOR; while the former is civilian and the latter military, both play complementary roles in the security realm and some of their tasks are similar. However, the local perceptions of EULEX and KFOR regarding their execution of security-related tasks have differed, with only KFOR enjoying local acceptance. This article argues that such differences are caused by the missions' differently perceived powers over local actors, as manifested through their ability to exert compliance and cooperation from local actors through coercion, the ability to offer rewards and legitimacy. By going beyond the well-researched initial gratitude of Kosovo Albanians to NATO/US for intervening in 1999, this article offers a more fine-grained analysis of Kosovo Albanian and Kosovo Serbian perceptions of EULEX and KFOR.
引用
收藏
页码:43 / 64
页数:22
相关论文
共 50 条
  • [31] Challenges to terahertz counter-terrorism and security-related applications
    Cummins, Howard
    TERAHERTZ FREQUENCY DETECTION AND IDENTIFICATION OF MATERIALS AND OBJECTS, 2007, : 205 - 224
  • [32] The Transformation of the Levant Region: Security-Related Changes in a Turbulent Region
    Schmoll, Melanie Carina
    JOURNAL OF MILITARY AND STRATEGIC STUDIES, 2015, 16 (03): : 10 - 22
  • [33] Security-related concerns with geographic information systems and geographic mapping
    Forcht, Karen A.
    Information Management and Computer Security, 2000, 8 (05): : 218 - 221
  • [34] Supplement of security-related parts of ISO/IEC TR 15504
    Kim, S
    Leem, C
    Kim, T
    Kim, J
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 1084 - 1089
  • [35] Taxonomy of Security-related Issues in Android Apps: An Empirical Study
    Das, Teerath
    Ali, Adam
    Mikkonen, Tommi
    PROCEEDINGS OF THE 2024 WORKSHOP ON REPLICATIONS AND NEGATIVE RESULTS, RENE 2024, 2024, : 8 - 14
  • [36] Eyes wide open: The role of situational information security awareness for security-related behaviour
    Jaeger, Lennart
    Eckhardt, Andreas
    INFORMATION SYSTEMS JOURNAL, 2021, 31 (03) : 429 - 472
  • [37] SECURITY-RELATED COMMENTS REGARDING MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    ADAMS, CM
    MEIJER, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 224 - 228
  • [38] Analysis of physical and cyber security-related events in the chemical and process industry
    Moreno, Valeria Casson
    Reniers, Genserik
    Salzano, Ernesto
    Cozzani, Valerio
    PROCESS SAFETY AND ENVIRONMENTAL PROTECTION, 2018, 116 : 621 - 631
  • [39] Security-related design patterns for intelligent sensors requiring measurable assurance
    Bialas, Andrzej
    PRZEGLAD ELEKTROTECHNICZNY, 2009, 85 (07): : 92 - 99
  • [40] SECURITY-RELATED COMMENTS REGARDING MCELIECE PUBLIC-KEY CRYPTOSYSTEM
    ADAMS, CM
    MEIJER, H
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1989, 35 (02) : 454 - 455