292
Views
1
CrossRef citations to date
0
Altmetric
Articles

Norm localisation in the process of crafting national security strategies – the case of the Visegrád countries

ORCID Icon
Pages 210-232 | Received 30 Mar 2022, Accepted 10 Sep 2022, Published online: 20 Sep 2022

References

  • Acharya, A., 2004. How ideas spread: whose norms matter? Norm localization and institutional change in Asian regionalism. International organization, 58 (2), 239–275.
  • Acharya, A., 2011. Norm subsidiarity and regional orders: sovereignty, regionalism, and rule-making in the third world. International studies quarterly, 55 (1), 95–123.
  • ACSS, 2021. National security strategy development in Africa. Toolkit for drafting and consultation. Africa Center for Strategic Studies. January, [online]. Available from: https://africacenter.org/wp-content/uploads/2021/01/National-Security-Strategy-Development-in-Africa-Toolkit-for-Drafting-and-Consultation-Africa-Center-for-Strategic-Studies-2022-01.pdf.
  • Auerswald, D., 2017. Legislatures and civil-military relations in the United States and the United Kingdom. West European politics, 40 (1), 42–61.
  • Batt, J., 2001. European identity and national identity in Central and Eastern Europe. In: W. Helen, ed. Interlocking dimensions of European integration. London: Palgrave Macmillan, 247–262.
  • Bornio, J., 2020. Poland updates its security strategy. The Jamestown Foundation. 11 February [online]. Available from: https://jamestown.org/program/poland-updates-its-security-strategy/.
  • Cancian, M.F., 2017. Formulating National Security Strategy. Past experience and future choices. Center for Strategic & International Studies. October [Online]. Available from: https://csis-website-prod.s3.amazonaws.com/s3fs-public/publication/171006_CSIS_NationalSecurityStrategyFormulation_FINAL_0.pdf.
  • Capie, D., 2012. The responsibility to protect norm in Southeast Asia: framing, resistance and the localisation myth. The pacific review, 25 (1), 75–93.
  • Colucci, L., 2006. The national security doctrines of American presidency: how they shape our present and future. Santa Barbera: Praeger.
  • Cragg, A., 1995. The partnership for peace planning and review process. NATO. [online]. Available from: https://www.nato.int/docu/review/1995/9506-5.htm#s1.
  • Csiki, T., and Tálas, P., 2020. Magyarország új nemzeti biztonsági stratégiájáról. Nemzet és biztonság, 13 (3), 89–112.
  • Čižik, T., 2021. Security perception and security policy of the Slovak Republic, 1993-2018. Defence & security analysis, 37 (1), 23–37.
  • De France, O., and Whitney, N., 2013. Europe’s strategic cacaphony. European Council on Foreign Relations. [online]. Available from: https://ecfr.eu/archive/page/-/ECFR77_SECURITY_BRIEF_AW.pdf.
  • Doeser, F., 2018. Historical experiences, strategic culture, and strategic behavior: Poland in the anti-ISIS coalition. Defence studies, 18 (4), 457–474.
  • Doyle, R.B., 2007. The US National Security Strategy: policy, process, problems. Public administration review, 67 (4), 624–629.
  • Drew, D.M., and Snow, D.M., 1988. Making strategy. An introduction to national security processes and problems. Alabama: Air University Press.
  • Dumont, M., 2019. Elements of national security strategy. Atlantic Council. [online]. Available from: https://www.atlanticcouncil.org/content-series/strategy-consortium/elements-of-national-security-strategy/.
  • Dunay, P., 2003. Security sector expert formation: achievements and needs in the Visegrad countries. In: P.H. Fluri and D.M. Law, eds. Security sector expert formation: achievements and needs in south east Europe. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 275–309.
  • Ettinger, A., 2017. US national security strategies: patterns of continuity and change, 1987-2015. Comparative strategy, 36 (2), 115–128.
  • Gorka, S., 2005. Security sector reform: suggestion of a ‘minimum criteria’ approach. In: W.N. Germann and A. Karkoszka, eds. Security sector reform in central and Eastern Europe. Baden Baden: Nomos, 325–330.
  • Hettyey, A., 2020. The Europeanization of Hungarian Foreign Policy and the Hungarization of European Foreign Policy, 2010-18. Journal of contemporary European studies, 29 (1), 125–138.
  • Hill, C., 2016. Foreign policy in the twenty-first century. Second ed. London: Palgrave.
  • Houghton, D.P., 2013. The decision point: six cases in US foreign policy decision making. Oxford: Oxford University Press.
  • Janos, A.C., 2000. East Central Europe in the modern world. The politics of Borderlands from pre- to postcommunism. Stanford: Stanford University Press.
  • Jireš, J., 2005. Czech Republic: lessons from the break-up of a federation. In: W. N. Germann and A. Karkoszk, eds. Security sector reform in central and Eastern Europe. difficult paths towards success. Baden Baden: Nomos, 13–54.
  • Jireš, J., et al., 2013. Czech Republic. In: H. Biehl, ed. Strategic cultures in Europe – security and defence policies across the continent. Potsdam: Springer VS, 69–84.
  • Jogtár. 2020. 1163/2020. (IV. 21.) Korm. határozat Magyarország Nemzeti Biztonsági Stratégiájáról, [online]. Available from: https://net.jogtar.hu/jogszabaly?docid = A20H1163.KOR&txtreferer = 00000001.txt.
  • Jokubaitis, A., 2018. The Other Europe: Identity Problems of Central Europe. Politeja, 57 (6), 81–89.
  • Karkoszka, A., 2005. Poland: the challenge of overcoming the cohabitation hurdle. In: W. N. Germann and A. Karkoszk, eds. Security sector reform in central and Eastern Europe. difficult paths towards success. Baden Baden: Nomos, 85–114.
  • Karman, M.M., et al., 2020. Challenges in norm-localization at the city level: the case of localising the human rights city concept in Bandung, Indonesia. Asian affairs: an American review, 1–27. doi:10.1080/00927678.2020.1850222.
  • Kelemen, Z., and Sz, Máté, 2019. Constructing the Borderland: the legacy of Versailles and the small states of central Europe. Corvinus journal of international affairs, 4 (2–4), 51–60.
  • Kříž, Z., 2021. The security perception and security policy of the Czech Republic, 1993-2018. Defense & security analysis, 37 (1), 38–52.
  • Kuus, M., 2007. Geopolitics renamed. Security and identity in Europe’s eastern enlargement. London: Palgrave Macmillan.
  • Lindsay, J.M., and Ripley, R.B., 1992. Foreign and defense policy in congress: a research agenda for the 1990s. Legislative studies quarterly, 17 (3), 417–449.
  • Martel, W., 2015. Grand strategy in theory and practice. The need for an effective American foreign policy. Cambridge: Cambridge University Press.
  • Martinusz, Z., 2005. Hungary: reform under a strong parliament. In: W. N. Germann and A. Karkoszka, eds. Security sector reform in central and Eastern Europe. difficult paths towards success. Baden Baden: Nomos, 55–84.
  • Minkina, M., 2011. Evolution of the perception of threats to the security of the Republic of Poland in Polish strategic documents. The journal of slavic military studies, 24 (4), 621–647.
  • Miskimmon, A., et al., 2017. Introduction. In: A. Miskimmon, ed. Forging the world. Strategic narratives and international relations. Michigan: University of Michigan Press, 1–22.
  • National Security Bureau. 2020. National Security Strategy of the Republic of Poland 2020, [online]. Available from: https://www.bbn.gov.pl/ftp/dokumenty/National_Security_Strategy_of_the_Republic_of_Poland_2020.pdf.
  • National Security Strategy Archive. 2022. 50 USC § 404 A- Annual National Security Strategy Report, [online]. Available from: https://nssarchive.us/50-usc-%c2%a7-404a-annual-national-security-strategy-report/.
  • NATO. 1999. Membership Action Plan (MAP), [online]. Available from: https://www.nato.int/cps/en/natohq/official_texts_27444.htm.
  • NATO. 2022a. Strategic Concepts, [online]. Available from: https://www.nato.int/cps/en/natohq/topics_56626.htm.
  • NATO. 2022b. Partnership for Peace: Framework Document, [online]. Available from: https://www.nato.int/docu/comm/49-95/c940110b.htm.
  • NATO. 2022c. Study of NATO Enlargement, [online]. Available from: https://www.nato.int/cps/en/natohq/official_texts_24733.htm.
  • Newman, D., 2003. On borders and power: a theoretical framework. Journal of borderland studies, 18 (1), 13–25.
  • Nicolini, M., et al., 2013. Slovakia. In: H. Biehl, ed. Strategic cultures in Europe – security and defence policies across the continent. Potsdam: Springer, 307–317.
  • Palczewska, M., 2021. The security perception and security policy of Poland, 1989-2017. Defence & security analysis, 37 (1), 80–95.
  • Peterson, J.W., and Lubecki, J., 2019. Defense policies of east-central European countries after 1989. Creating stability in a time of uncertainty. Manchester: Manchester University Press.
  • Pomorska, K., 2011. Poland. Learning to play the Brussels game. In: R. Wong and C. Hill, eds. National and European foreign policies. Towards Europeanization. New York: Routledge, 167–188.
  • Ranquet, R., 1995. “Think tanks” and the national security strategy formulation process: a comparison of current American and French patterns. National Defense University. [online]. Available from: https://apps.dtic.mil/sti/pdfs/ADA294365.pdf.
  • Rácz, A., 2014. The Visegrad cooperation: Central Europe divided over Russia. L’Europe en formation, 2014 (4), 61–76.
  • Roselle, L., et al., 2017. Strategic narratives and great power identity. In: A. Miskimmon, ed. Forging the world. Strategic narratives and international relations. Michigan: University of Michigan Press, 56–85.
  • Rudalevige, A., 2006. The new imperial presidency. Michigan: University of Michigan Press.
  • Sadowski, A., 2009. The borderland of civilisations is a research category in the sociology of borderlands. IMES: cultural regionalistics, 2 (1), 2–92.
  • Sarkesian, S., 1984. Presidential leadership and national security policy. In: S. J. Cimbala, ed. National security strategy. Choices and limits. New York: Praeger, 299–322.
  • Sejm. 2022. Ustawa z dnia 25 maja 2001 r. o przebudowie i modernizacji technicznej oraz finansowaniu Sił Zbrojnych Rzeczypospolitej Polskiej w latach 2001-2006, [online]. Available from: https://orka.sejm.gov.pl/proc3.nsf/ustawy/2745_u.htm.
  • Snider, D., 1995. The national security strategy: documenting strategic vision. Strategic Studies Institute. [online]. Available from: https://nssarchive.us/wp-content/uploads/2012/05/Snider.pdf.
  • Stafford, R., 1984. Defense planning in NATO: a consensual decision-making process. In: R. Pfaltzgraff and U. Ra’anan, eds. National security policy: the decision-making process. Connecticut: Archon Books, 152–176.
  • Stolberg, A.G., 2012. How nation-states craft national security strategy documents. Strategic Studies Institute. [online]. Available from: https://press.armywarcollege.edu/cgi/viewcontent.cgi?article = 1538&context = monographs
  • Szenes, Z., and Tálas, P., 2012. A magyar biztonság- és védelempolitika fejlődése és haderőreformok, 1989-2011 (I.). Nemzet és Biztonság, 5 (2), 37–49.
  • Tálas, P., Csiki, T., et al., 2013. Hungary. In: H. Biehl, ed. Strategic cultures in Europe – Security and Defence Policies across the continent. Potsdam: Springer, 165–179.
  • Terlikowsk, M., et al., 2013. Poland. In: H. Biehl, ed. Strategic cultures in Europe – Security and Defence Policies across the continent. Potsdam: Springer, 269–280.
  • White House Archives. 2017. National Security Strategy of the United States of America, [online]. Available from: https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.
  • Williams, J.A., 1984. The national security establishment: institutional framework for policymaking. In: S. Cimbala, ed. National security strategy. Choices and limits. New York: Praeger, 323–344.
  • Wiśniewski, R., 2018. Notion of strategic national security management. Security and defence quarterly, 20 (3), 18–41.
  • Wong, R., and Hill, C., 2011. Introduction. In: R. Wong and C. Hill, eds. National and European foreign policies. towards Europeanization. New York: Routledge, 1–18.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.