Networks and National Security: Dynamics, Effectiveness and Organisation by Chad Whelan
Author:Chad Whelan [Whelan, Chad]
Language: eng
Format: epub
Tags: Political Science, Public Affairs & Administration
ISBN: 9781409476689
Google: 9uKhAgAAQBAJ
Goodreads: 17684678
Publisher: Ashgate Publishing
Published: 2012-01-01T00:00:00+00:00
Network Control and Network Policy
There are many formal policies and procedures associated with organisational networks in the field of counter-terrorism in Australia. These include: intergovernmental agreements between the commonwealth, states and territories;1 policies and procedures that outline requirements for the sharing of information2 as well as the roles and responsibilities of government departments and agencies involved in counter-terrorism;3 and other mechanisms such as a memorandum of understanding and exchange of letters between agencies that support specialised security networks (see Dupont 2004). The effects of these policies and the tensions associated with them will be examined later in this chapter. The important point to note is that many different levels of policy exist in relation to national security and counter-terrorism, many of which can be operative at any one point of time in any network.
Network control is important for all networks (Kenis and Provan 2006), but it is even more important in the context of national security (Brodeur and Dupont 2006). Policies and procedures are one of the most important ways to address the risks of problems arising in networks by keeping network members focused on shared goals rather than individual goals. Some interviewees in this study express the view that it is almost impossible for security networks to operate without at least some working policies to negotiate the different mandates and objectives of government departments and agencies. As a former senior intelligence officer from the Australian Defence Force states:
Each agency has different legislative requirements, they have different policy imperatives, they have different ministers if you want to talk through a government setting, each of which have their own agendas and requirements. You virtually could not work unless you had sat down and agreed a set of procedures to coordinate. ⦠So, it is just absolutely essential and at all levels.
The complex dynamics of security networks, this interviewee argues, mean that an agreed set of procedures between network members is required for a network to operate. Network policy can be developed in a number of ways. For example, as with ânetwork developmentâ, a policy framework can be imposed on networks by government, setting out the procedures according to which a network needs to operate (see Provan et al. 2007). In lead organisation-governed networks, the lead agency that articulates the goals of the network and recruits partner agencies who share these goals may also be in a position to impose formal procedures on other network members. In shared-governed networks, as this interviewee suggests, procedures are established in consultation with all members at the time the network is developed.
A policy framework should minimise the risk that network members will prioritise their own interests over the interests of the network â a recognised problem by organisational network analysts (e.g. Provan and Kenis 2008). A member of the Protective Security Coordination Centre explains: âI think procedures are key because everybody has a common understanding of where they fit, what is expected of them and what the network is forâ. The interviewee also suggests that such
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
| Anthropology | Archaeology |
| Philosophy | Politics & Government |
| Social Sciences | Sociology |
| Women's Studies |
The Secret History by Donna Tartt(18994)
The Social Justice Warrior Handbook by Lisa De Pasquale(12175)
Thirteen Reasons Why by Jay Asher(8870)
This Is How You Lose Her by Junot Diaz(6854)
Weapons of Math Destruction by Cathy O'Neil(6243)
Zero to One by Peter Thiel(5760)
Beartown by Fredrik Backman(5706)
The Myth of the Strong Leader by Archie Brown(5479)
The Fire Next Time by James Baldwin(5408)
How Democracies Die by Steven Levitsky & Daniel Ziblatt(5197)
Promise Me, Dad by Joe Biden(5127)
Stone's Rules by Roger Stone(5065)
A Higher Loyalty: Truth, Lies, and Leadership by James Comey(4937)
100 Deadly Skills by Clint Emerson(4898)
Rise and Kill First by Ronen Bergman(4757)
Secrecy World by Jake Bernstein(4724)
The David Icke Guide to the Global Conspiracy (and how to end it) by David Icke(4679)
The Farm by Tom Rob Smith(4484)
The Doomsday Machine by Daniel Ellsberg(4472)