did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780199284696

Contemporary Security Studies

by
  • ISBN13:

    9780199284696

  • ISBN10:

    0199284695

  • Format: Paperback
  • Copyright: 2007-02-08
  • Publisher: Oxford University Press
  • View Upgraded Edition

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $69.33 Save up to $17.33
  • Buy Used
    $52.00
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This major new textbook brings together key scholars to introduce students to the fast-evolving field of security studies. The book is divided into three sections: differing approaches to the study of security; the broadening and deepening of security; and a range of traditional andnon-traditional issues that have emerged on the security agenda. The study of international security has undergone dramatic changes since the end of the Cold War. While war and the threat to use force is part of the security equation it is not exclusively so. Security studies encompasses dangers that range from pandemics, such as HIV/AIDS, and environmentaldegradation through to the more readily associated security concerns of direct violence, such as terrorism and inter-state armed conflict. Accessible and easy to use, Contemporary Security Studies is essential reading for all students new to international security.The book is accompanied by an Online Resource Centre.Student resources:Case studies on the Iraq War, Zimbabwe, migration and North KoreaWeb links Multiple Choice QuestionsFlashcard glossaryLecturer resources:PowerPoint slides

Author Biography


Dr Alan Collins is Senior Lecturer in the Department of Politics and International Relations at the University of Wales, Swansea

Table of Contents

Notes on Contributorsp. xvi
List of Figuresp. xix
List of Tablesp. xx
List of Boxesp. xxi
Guided Tour of Learning Featuresp. xxiv
Guided Tour of the Online Resource Centrep. xxvi
Introduction: What is Security Studies?p. 1
Introductionp. 2
Definition of securityp. 2
Structurep. 4
Conclusionp. 9
Approaches to Securityp. 11
Security in International Politics: Traditional Approachesp. 13
Introduction: states as central actorsp. 14
The realist perspectivep. 16
Realist disputesp. 22
Difficulties with realist analysisp. 24
The liberalist perspectivep. 25
A liberalist age?p. 29
Liberalist issuesp. 30
Intellectual problemsp. 31
Conclusionp. 32
Questionsp. 33
Further readingp. 33
Important websitesp. 34
Peace Studiesp. 35
Introductionp. 36
Origins and early yearsp. 36
Evolution amidst controversyp. 39
What is peace studies now?p. 42
Responding to the new security challengesp. 45
Conclusionp. 50
Questionsp. 51
Further readingp. 51
Important websitesp. 52
Critical Security Studies: A Schismatic Historyp. 53
Introduction: 'Follow the sign of the gourd'p. 54
Toronto desire: Critical Security Studiesp. 56
Copenhagen distinctionsp. 60
Aberystwyth exclusionsp. 62
Constructing securityp. 65
Everyone's other: post-structuralism and securityp. 67
Conclusion: Contemporary (Critical) Security Studiesp. 71
Questionsp. 72
Further readingp. 72
Important websitesp. 74
Gender and Securityp. 75
Introductionp. 76
Discursive representationsp. 76
Practical contextsp. 80
Contradictions: biology and securityp. 83
Women as victimsp. 84
Women as peaceablep. 85
Women as warriorsp. 86
Changing roles: changing perceptionsp. 87
Conclusionp. 88
Questionsp. 89
Further readingp. 90
Important websitesp. 90
Human Securityp. 91
Introduction: intellectual and empirical purposep. 92
Is human security a valuable analytical and policy framework?p. 94
Reconciling tensionsp. 98
Human security and state-centric securityp. 100
Utility for practitionersp. 103
Conclusionp. 105
Questionsp. 107
Further readingp. 107
Important websitesp. 108
Securitizationp. 109
Introductionp. 110
Securitization modelp. 111
Limitations of the securitization modelp. 116
Cases of securitizationp. 117
Conclusionp. 123
Questionsp. 124
Further readingp. 124
Important websitesp. 125
Deepening and Broadening Securityp. 127
Military Securityp. 129
Introduction: the scope of the military security agendap. 130
Military strategy and military security: traditional security studiesp. 132
Securitizationp. 134
Constructivismp. 137
Debating Colombiap. 140
Conclusion: military security, self and world politicsp. 142
Questionsp. 143
Further readingp. 143
Important websitesp. 144
Regime Securityp. 146
Introductionp. 147
The weak state insecurity dilemmap. 149
Security strategies in weak statesp. 153
Explaining insecurity in weak statesp. 157
Conclusion: prospects for the weak statep. 160
Questionsp. 161
Further readingp. 162
Important websitesp. 162
Societal Securityp. 164
Introductionp. 165
A duality of state and societal securityp. 165
Society and societal identityp. 167
Threats to societal identityp. 169
Defending societal identityp. 172
Societal security dilemmasp. 174
Conclusionp. 178
Questionsp. 180
Further readingp. 180
Useful websitesp. 181
Environmental Securityp. 182
Introductionp. 183
The origins of environmental securityp. 184
Major interpretations of environmental securityp. 188
Environmental change and violent conflictp. 190
Environmental change and national securityp. 192
Armed forces and the environmentp. 195
Environmental change and human securityp. 197
Environment, or security?p. 199
Conclusionp. 200
Questionsp. 201
Further readingp. 202
Important websitesp. 202
Economic Securityp. 204
Introductionp. 205
Contemporary thinking on economic securityp. 205
A new conceptual approach to economic securityp. 210
Conclusionp. 219
Questionsp. 220
Further readingp. 220
Important websitesp. 221
Traditional and Non-Traditional Securityp. 223
Coercive Diplomacyp. 225
Introductionp. 226
What is coercive diplomacy?p. 227
Theories and requirements for successp. 229
The challenge of defining successp. 233
Western use of coercive diplomacy 1990-2005p. 235
Why coercive diplomacy is hardp. 236
Conclusionp. 245
Questionsp. 246
Further readingp. 246
Important websitesp. 247
The Role of Intelligence in National Securityp. 248
Introductionp. 249
Definitions and theory of intelligencep. 250
Intelligence services of different nationsp. 251
Intelligence collection disciplinesp. 253
The intelligence processp. 255
Intelligence and security since the Second World Warp. 258
Legal and ethical issues involving intelligencep. 260
Covert actionp. 261
Terrorism, Iraq, and the contemporary security conditionp. 263
Conclusionp. 265
Questionsp. 268
Further readingp. 268
Important websitesp. 269
Weapons of Mass Destructionp. 270
Introductionp. 271
Nuclear weaponsp. 272
Chemical weaponsp. 277
Biological weaponsp. 281
Conclusion: the future of WMDp. 286
Questionsp. 287
Further readingp. 287
Important websitesp. 287
Terrorismp. 289
Introductionp. 290
Concepts and definitionsp. 291
Types and causes of terrorismp. 298
Security measuresp. 303
Conclusionp. 307
Questionsp. 308
Further readingp. 308
Important websitesp. 309
The Defence Tradep. 311
Introductionp. 312
Explaining the arms dynamicp. 312
Trends in defence expenditurep. 316
The content of the contemporary defence tradep. 325
Conclusionp. 328
Questionsp. 328
Further readingp. 329
Important websitesp. 330
HIV/AIDS and Securityp. 331
Introductionp. 332
The global HIV/AIDS pandemicp. 332
HIV/AIDS and human securityp. 334
HIV/AIDS and national securityp. 336
HIV/AIDS and international securityp. 340
Conclusionp. 343
Questionsp. 344
Further readingp. 344
Important websitesp. 345
Transnational Crimep. 346
Introductionp. 347
Is transnational crime a threat to national security?p. 348
Definitions and key conceptsp. 350
The increase in transnational crimep. 353
The organization of transnational crime: competing visionsp. 356
Transnational crime and terrorismp. 359
Government responsesp. 361
Conclusionp. 363
Questionsp. 364
Further readingp. 365
Important websitesp. 366
Children and Warp. 367
Introduction: children in global politicsp. 368
Which children-whose security?p. 368
Children as security?p. 370
Children at war: vulnerable and valuablep. 371
Young soldiersp. 373
Post conflict-post children?p. 377
Infant power and soft tacticsp. 378
Conclusionp. 380
Questionsp. 381
Further readingp. 381
Important websitesp. 382
After the Return to Theory: The Past, Present, and Future of Security Studiesp. 383
Introductionp. 384
The origins and institutional structure of security studiesp. 386
Security studies' 'Golden Age'p. 387
Institutionalization and stagnationp. 390
Disciplinary questioning and theoretical re-launchp. 393
Conclusion: the powers of theory and the challenges of the futurep. 399
Questionsp. 400
Further readingp. 401
Important websitesp. 402
Bibliographyp. 403
Glossaryp. 418
Indexp. 433
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program