000 | 02137nam a22002417a 4500 | ||
---|---|---|---|
003 | ZW-GwMSU | ||
005 | 20240506095758.0 | ||
008 | 240506b |||||||| |||| 00| 0 eng d | ||
022 | _a23112204 | ||
040 |
_aMSU _bEnglish _cMSU _erda |
||
050 | 0 | 0 | _aHC800.A1 JOU |
100 | 1 |
_aMatseketsa, Besearch Beloved _eauthor |
|
245 | 1 | 0 |
_aRefugees and national security in Zimbabwe : _bemerging issues arising from receiving Africa’s Great Lakes Region (GLR) refugees in Zimbabwe/ _ccreated by Besearch Beloved Matseketsa |
264 | 1 |
_aJohannesburg: _bOSISA, _c2020. |
|
336 |
_2rdacontent _atext _btxt |
||
337 |
_2rdamedia _aunmediated _bn |
||
338 |
_2rdacarrier _avolume _bnc |
||
440 |
_aJournal of public policy in Africa _vVolume 7, number 1 |
||
520 | 3 | _aThe refugee phenomenon has become an international issue prompting academic and professional debate as to the safety of the host states. In the case of Africa and Zimbabwe, in particular, this leads to a national security question regarding the security repercussions as a result of hosting refugees given the evolving non-traditional threats (NTTs) that engulfed the refugee phenomenon post millennium and the advent of Information Communication Technology (ICT). This article applies the Social Networking Theory (SNT) to establish the level of interconnectedness of asylum seekers and refugees from Africa's Great Lakes Region (AGLR) to NTTs which are detrimental to the modern state. Examples of NTTs are, but not limited to, human trafficking, illicit drug trafficking, money laundering, tribal and ethnic orientation, mineral prospecting, gun running and spreading communicable diseases. Findings show that hosting refugees in Zimbabwe is a national security issue with far reaching consequences if a security approach is not adhered to. The results contained herein are microcosmic of security issues that are inherent in other African countries that host refugees and asylum seekers from AGLR. | |
650 |
_aHuman trafficking _vNational traditional threats _xRefugee _zGreat Lakes Region _zZimbabwe |
||
856 | _uhttps://www.jstor.org/stable/26798962 | ||
942 |
_2lcc _cJA |
||
999 |
_c165274 _d165274 |