This work is licensed under a
Creative Commons Attribution 4.0 International License
[1] M. Schrover (Ed.), Illegal migration and gender in a global and historical perspective, Amsterdam University Press, 2008.
[2] M. Paspalanova, Undocumented vs. illegal migrant: Towards terminological coherence, Migraciones internacionales. 4(3) (2008) 79-90.
[3] IOM. 2011, Glossary on Migration, International Migration Law Series.
[4] Frontex.europa.eu. (2016). Frontex. Risk analysis. [Online]. Available: http://frontex.europa.eu/intelligence/risk-analysis/.
[5] International Organization for Migration, Migration and Border Management Assessments, International Organization for Migration. 9 Feb. 2015. Web. 25 Jan. 2018. Available: https://www.iom.int/migration-and-border-management-assessments.
DOI: https://doi.org/10.18356/5dafc9af-en[6] R. Paris, Human Security: Paradigm Shift or Hot Air?, International Security. 26(2) (2001). 87–102.
DOI: https://doi.org/10.1162/016228801753191141[7] N. Thomas, W.T. Tow, The utility of human security: sovereignty and humanitarian intervention, Security Dialogue. 33(2) (2002) 177-192.
DOI: https://doi.org/10.1177/0967010602033002006[8] P. Pirolli et al., Evaluation of a computer support tool for analysis of competing hypotheses, Palo Alto, CA: Palo Alto Research Center (UIR Technical Report), 2004.
[9] M. Valtorta et al., Extending Heuer’s analysis of competing hypotheses method to support complex decision analysis, 2005. Available at http://www. cse. sc. edu/~ mgv/reports/IA-05. pdf.
[10] S. Pope, A. Josang, Analysis of competing hypotheses using subjective logic, Queensland Univ Brisbane (Australia), 2005.
[11] R.J. Heuer Jr, Psychology of Intelligence Analysis. Washington, DC: Central Intelligence Agency, Center for the Study of Intelligence, 1999.
[12] Security and Immigration: Toward a Critique of the Governmentality of Unease. 2002 Didier Bigo Vol 27, Issue 1_suppl, pp. 63 – 92. https://doi.org/10.1177/03043754020270S105
DOI: https://doi.org/10.1177/03043754020270s105[13] United Nations, Department of Economic and Social Affairs, 2013. Probabilistic Population Projections based on the World Population Projects: The 2012 Revision.
[14] W. Karioth, Detlef. Border Management Issues: Border Security and Humanitarian Aspects. 10 Dec. 2014. Web. 25 Jan. 2018.
[15] T. Hayter, Open borders: The case against immigration controls, London: Pluto Press, 2000.
[16] R. Cohen, The guiding principles on internal displacement: An innovation in international standard setting, Global Governance. 10(4) (2004) 459-480.
DOI: https://doi.org/10.1163/19426720-01004006[17] "Ministry of Foreign Affairs". www.mfa.gov.mk.". Retrieved 25 January, 2018.
[18] W. Walters, Mapping Schengenland: denaturalizing the border, Environment and Planning D: Society and Space. 20(5) (2002) 561-580.
DOI: https://doi.org/10.1068/d274t[19] Guide on article 5 – Right to liberty and security. Council of Europe/European Court of Human Rights, 2014. Accessed January 26 2018. http://www.echr.coe.int/Documents/Guide_Art_5_ENG.pdf.
[20] K. Nohl, H. Plötz, Establishing Security Best Practices in Access Control, 2009.
[21] C. Böck, „Ostbanden“ im „Sicherfühlland“ Der politischeDiskurs um Kriminalität „ausOsteuropa“, 2017. Institute for Advanced Studies (IHS). Available: http://irihs.ihs.ac.at/2192/1/rs105.pdf.
[22] N. Thomas, W.T. Tow, The utility of human security: sovereignty and humanitarian intervention, Security Dialogue. 33(2) (2002) 177-192.
DOI: https://doi.org/10.1177/0967010602033002006[23] Support to participation of South-Eastern European countries in the stabilization and association process ("Closed programme").
[24] House, Freedom. Freedom in the world 2014: The annual survey of political rights and civil liberties. Rowman& Littlefield, 2014.
[25] N.P. De Genova, Migrant “illegality” and deportability in everyday life, Annual Review of Anthropology. 31(1) (2002) 419-447.
DOI: https://doi.org/10.1146/annurev.anthro.31.040402.085432[26] International Organization for Migration. "Integrated Border Management." International Organization for Migration. 9 Feb. 2015. Web. 25 Jan. 2018. https://www.iom.int/integrated-border-management
[27] Universal Declaration of Human Rights, Un.org. 6 Oct. 2015. Web. 25 Jan. 2018. Available: http://www.un.org/en/universal-declaration-human-rights/.
DOI: https://doi.org/10.9783/9780812295474-007[28] Council of Europe. European Court of Human Rights. 14 Feb. 2017. Web. 25 Jan. 2018. Available: http://www.echr.coe.int/Documents/Convention_ENG.pdf.
[29] D. Phulwary, Refugee Rights Vis-A-Vis Security Of State: Striking A Balance.
[30] J. Garriaud-Maylam, Committee On The Civil Dimension Of Security, 2017. Available: www.nato-pa.int.
[31] Article 1, The 1951 Convention related to the status of refugees and its 1967 Protocol, published by UNHCR, September 2011, p.3 available at http://www.unhcr.org/pages/49da0e466.html
[32] Van Dijk et al., Theory and practice of the European Convention on Human Rights. Martinus Nijhoff Publishers, 1998.
[33] Council Regulation (EC), No 343/2003, 18 February 2003.
[34] Law on Asylum and Temporary Protection, published in the Official Gazette No. 54 on 15 April 2013. Available: http://www.slvesnik.com.mk/Issues/3dff1ee8f23e4547ad198661fe794149.pdf. Accessed: 28.01.2018.
[35] O. Kosevaliska, B. Tusevska, A.N. Krstevska, Migration crisis: Macedonia on crossroads, 2015.
[36] Article 33 of the LATP. Available: http://eprints.ugd.edu.mk/16515/1/Migration%20crisis.%20Macedonia%20at%20crossroads.pdf.
[37] Article 3 from the Law on Foreigners, published in the Official Gazette of the Republic of Macedonia No. 35 on 25 March 2006.
[38] Criminal Procedure Code, published in the Official gazette No. 150 on 18 November 2010, entered into force on 01.12.2013.
[39] F. Shanty, Criminal Enterprises and Sources of Financing, Organized crime: from trafficking to terrorism, 2007, p. 169.
[40] C. Veigel et al., The ‘Gazi Baba’ Reception Centre for Foreigners in Macedonia: migrants caught at the crossroad between hypocrisy and complying with the rule of law, The International Journal of Human Rights. 21(2) (2017) 103-119.
DOI: https://doi.org/10.1080/13642987.2016.1257987[41] Heuer Jr, Richards J., Psychology of Intelligence Analysis. Washington, DC: Central Intelligence Agency, Center for the Study of Intelligence, 1999.
[42] M. Valtorta et al., Extending Heuer’s analysis of competing hypotheses method to support complex decision analysis, in: Proceedings of the 2005 international conference on intelligence analysis (IA-05)(CDROM), 2005. Available: http://www. cse. sc. edu/~ mgv/reports/IA-05. pdf.
[43] W. Walters, Migration and security. The handbook of new security studies, 2010, pp. 217-228.
[44] S.P. Bradley, A.C. Hax, T.L. Magnanti, Applied mathematical programming, 1977.