U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

SADC: From a System to Community of Security?

NCJ Number
178551
Journal
African Security Review Volume: 7 Issue: 6 Dated: 1998 Pages: 44-61
Author(s)
Agostinho Zacarias
Date Published
1998
Length
18 pages
Annotation
This article argues the process of building a regional security community in Southern Africa requires encouraging strategies that overcome such constraints as power instability, political fragmentation, economic imbalances, and fears.
Abstract
The author points out building security is not only the responsibility of governments but also the responsibility of those who participate in societal development. These persons include state functionaries, civic organizations, individual citizens, and foreign donors. The identification of clear political objectives and the coordination of strategies requires that states function effectively at the domestic level and that supportable regional policies be devised. This support is unlikely to emerge if policies aimed at reducing polarization, fragmentation, and the isolation of domestic communities from each other are not adopted. The process of strengthening regional interdependence also means making the state more legitimate by improving its capacity to respond to the needs of citizens, encouraging governments to consult more with other social actors, and creating institutions capable of assuring the co-existence of order and justice in society. In pluralist societies, responsiveness is increased by empowering different social actors, including cultural, political, civilian, social, and business concerns. Close interaction among these actors is crucial to stability and is an accelerating factor in increased transnational cooperation. The role of the Southern African Development Community in encouraging regional security is discussed. 61 endnotes