Mr. Humayun Javed is an Independent researcher and an undergraduate degree holder in International Relations from the Department of International Relations, National Defence University, Islamabad, Pakistan.
DOI: http://DOI Number
Keywords: refugee management, comprehensive security,
Rohingya, Bangladesh, non-traditional challenges
The refugee crisis in Bangladesh due to the massive inflow of Rohingya refugees in 2017 has posed serious challenges to the non-traditional (non-military) sectors of security for the refugee population and host community. State-centred, narrow view of traditional security studies is deficient in comprehensively analysing the non-military (political, economic, societal and environmental) sources of threats due to the refugee influx. This study, incorporating a widened conceptualization of security issues, uses a comprehensive framework for security to comprehend the broader security aspects of refugee settlements in Bangladesh. A widened framework of security— with the inclusion of political, economic, societal, and environmental threats to security—inclusively conceptualizes security across a wide range of issues in the refugee-host relationship. The paper outlines major political, economic, societal, and environmental threats to Rohingya refugee settlements and the Bangladesh government. It argues that the host-refugee relationship analysed from an inclusive security framework shows that refugee management could not be effectively carried out with a state-centric approach. A broader approach to security, incorporating non-military sectors, is required to effectively deal with the refugee problem, given the serious challenges faced by non-traditional sectors of security.
June 25, 2022
How to Cite
Humayun Javed, “Non-Traditional Security Challenges to Refugee Management in Bangladesh: A Comprehensive Security Analysis,” Regional Studies 40, no.1 (Summer 2022): 61-82, https://regionalstudies.com.pk/wp/article/non-traditional-security-challenges-to-refugee-management-in-bangladesh-a-comprehensive-security-analysis/.
Volume 40, Issue 1