Post-War Security Transitions/
- New York: Routledge, 2012.
General introduction ByVÉRONIQUE DUDOUET , HANS J . GIESSMANN AND
Part I: Post-war security promotion: state-of-the-art
Chapter 1|13 pages DDR and SSR: Conventional approaches to international peacebuilding assistance ByMARK KNIGHT
Chapter 2|11 pages Deficits and blind spots in existing approaches to post- war security promotion ByVÉRONIQUE DUDOUET , HANS J . GIESSMANN AND
Chapter 3|18 pages The M19’s reinsertion process: challenges and lessons learnt ByOTTY PATIÑO, VERA GRABE
Chapter 4|10 pages Political and security negotiations and security sector transformation in South Africa ByGAVIN CAWTHRA
Chapter 5|12 pages South Africa’s experience of military integration through interactive negotiation and planning ByABOOBAKER ISMAIL
Chapter 6|14 pages The guarantees of security: The FMLN and the Salvadoran peace process ByJULIO MARTÍNEZ
Chapter 7|18 pages Agents of change – ex- prisoners, ex- combatants and conflict transformation in Northern Ireland ByKIERAN MCEVOY
Chapter 8|12 pages Demobilising and integrating a liberation army in the context of state formation: Kosovo’s perspective on security transition ByRAMADAN QEHAJA, KOSUM KOSUMI, FLORIAN QEHAJA
Chapter 9|18 pages The process of security transition in Burundi: challenges in security sector reform and combatant integration ByJULIEN NIMUBONA, GÉRARD BIRANTAMIJE
Chapter 10|14 pages Linking DDR, security sector development and transitional justice in Southern Sudan ByWILLIAM DENG DENG
Chapter 11|11 pages Guns, soldiers and votes: lessons from the DDR process in Aceh ByAGUS WANDI
Chapter 12|15 pages The reintegration of ex- combatants in post- war Aceh: remaining challenges to a gender- blind planning and implementation process BySHADIA MARHABAN
Chapter 13|8 pages The challenges of security sector restructuring in Nepal ByKHAGENDRA NEUPANE
Chapter 14|12 pages Challenges of combatants’ rehabilitation and army integration: perspectives from Maoist cantonments in Nepal ByKIYOKO OGURA
Part XI: Comparative analysis and lessons learnt
Security transitions in perspective ByVÉRONIQUE DUDOUET, KATRIN PLANTA
General conclusion ByVÉRONIQUE DUDOUET , HANS J . GIESSMANN AND