Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
List of boxes, figures and tables | p. xi |
About the contributors | p. xiv |
Acknowledgments | p. xvii |
List of abbreviations | p. xviii |
Security Studies: An Introduction | p. 1 |
What is security studies? A very short overview | |
Defining a field of inquiry: Four fundamental questions | |
What is security? | |
Whose security? | |
What is a security issue? | |
How can security be achieved? | |
How to use this book | |
Theoretical Approaches | p. 13 |
Realisms | p. 15 |
Introduction | |
Classical realism | |
Neorealism: Waltz's Theory of International Politics | |
Defensive structural realism | |
Offensive structural realism | |
Rise and fall realism | |
Neoclassical realism | |
Realisms and the rise of China | |
Conclusion | |
Liberalisms | p. 32 |
Introduction | |
Traditional or Kantian liberalism | |
Douce commerce | |
The democratic peace thesis | |
Neoliberal institutionalism | |
Conclusion | |
Game Theory | p. 48 |
Introduction | |
Primitive concepts | |
Strategic-form games and Nash equilibria | |
Extensive-form games, backwards induction and subgame perfect equilibria | |
Applications of game theory in security studies | |
Coda | |
Constructivisms | p. 63 |
Introduction: Constructivism and security | |
Constructivism: Central tenets and shared assumptions | |
Security as social construction: identity and norms | |
Negotiation and contestation | |
Agents, structures and change | |
The Copenhagen School and securitization | |
Conclusion | |
Peace Studies | p. 77 |
Introduction: What is peace studies? | |
Peace Studies: A brief history | |
Peace research as science | |
From peace research to peace studies | |
Key concepts | |
Positive and negative peace | |
Structural violence | |
Cultural violence | |
The future of peace studies? | |
Critical Theory | p. 90 |
Introduction: the need for a critical perspective | |
Rethinking security | |
Critical theory Theory/practice | |
The 'Aberystwyth School' of critical security studies | |
Emancipation | |
Conclusion | |
Feminisms | p. 107 |
Introduction | |
Feminist approaches in international security | |
Women, gender and security: The impacts of armed conflict | |
Women, gender and security: Action and activism | |
Women, gender and security: Talking and making weapons and war | |
Conclusions | |
International Political Sociology | p. 120 |
Introduction | |
Interdisciplinarity, relations and practices | |
An international political sociology of security | |
Episteme | |
Methods | |
Major findings | |
Conclusion | |
Key Concepts | p. 135 |
Uncertainty | p. 137 |
Introduction | |
The house of uncertainty | |
The quintessential dilemma | |
Three logics | |
The security dilemma in the twenty-first century | |
Towards a new agenda for security, studies | |
Polarity | p. 155 |
The debates about polarity | |
Polarity during the Cold War | |
Polarity after the Cold War | |
The problem with polarity | |
The future of polarity | |
Conclusion: The utility of polarity | |
Culture | p. 170 |
Introduction | |
States behaving badly | |
Culture | |
Cultures in security | |
Strategic culture | |
Peacekeeping cultures | |
Conclusion | |
War | p. 187 |
Introduction | |
Three philosophies of war | |
The functions of war | |
Trends in armed conflicts since 1945 | |
Who fights? Who dies? | |
Is the nature of warfare changing? | |
The idea of total war | |
The 'new wars' debate | |
The contemporary Western way of war | |
Conclusion | |
Coercion | p. 206 |
Introduction | |
Strategy | |
Deterrence and compellence | |
Designing coercive strategies | |
Punishment and denial | |
Types of costs | |
Multiple audiences | |
Reputations | |
Long-term impact | |
Conclusion | |
Terrorism | p. 221 |
Introduction | |
Terrorism in perspective | |
Definitions | |
State and sub-state terror | |
Responding to terrorism | |
The 9/11 response and the war on terror | |
Trends in terrorism | |
Conclusion | |
Intelligence | p. 235 |
Introduction | |
What is intelligence? | |
Warning, surprise and 'failure' | |
Intelligence, uncertainty and stability | |
Covert action, disruption and event-shaping | |
Intelligence cooperation | |
Security and global surveillance | |
Conclusion | |
Genocide and Crimes Against Humanity | p. 250 |
Introduction | |
Genocide | |
Challenges of intervention | |
Understanding crimes against humanity | |
Conclusion | |
Ethnic Conflict | p. 264 |
Introduction | |
What is ethnic conflict? | |
An overview of ethnic conflicts | |
Causes of violent ethnic conflict | |
Sudan | |
Yugoslavia | |
International security dimensions of ethnic conflicts | |
Resolution of ethnic civil wars | |
Human Security | p. 279 |
Introduction | |
Understanding the scope of human security | |
Setting the boundaries of human security | |
Ongoing debates and unresolved issues | |
Human security and 'failed' states | |
The dilemmas of humanitarian intervention | |
Human security risk assessment | |
Governance and human security | |
Towards a theory of human security | |
Conclusion | |
Poverty | p. 295 |
Introduction | |
Is poverty an appropriate concern for security studies? | |
Whose poverty? Whose security? | |
What do we know about the poverty-security nexus? | |
What do we know about the poverty-violent conflict nexus? | |
Effect of poverty on conflict | |
Effect of conflict on poverty | |
The diplomatic agenda on poverty and security | |
Conclusion | |
Climate Change and Environmental Security | p. 311 |
Introduction: Security and environment | |
Armed conflict and environmental change | |
Climate change and security | |
Scenarios of doom | |
Security planning and risk analysis | |
Climate wars? | |
Health | p. 324 |
Introduction | |
The emergence of health as a national security issue | |
The spread of infectious disease HIV/AIDS | |
Bioterrorism | |
A not so perfect partnership? | |
Conclusion | |
Institutions | p. 337 |
Alliances | p. 339 |
Introduction: Why study alliances? | |
Definitions: What is an alliance? | |
Explanations of alliance persistence and collapse | |
The case of NATO after the Cold War | |
Conclusion: Alliance theory and the future of NATO | |
Regional Institutions | p. 355 |
Introduction | |
Definitions | |
The origins and development of regional security institutions | |
Regional security institutions in the Cold War | |
Regional security institutions since the Cold War | |
Contemporary challenges | |
Peace operations | |
Terrorism and WMD | |
Assessing the growth of regional security institutions | |
Conclusion | |
The United Nations | p. 374 |
Introduction | |
The Security Council | |
The General Assembly | |
The Secretariat | |
Other UN organs and actors | |
Twenty-first-century challenges | |
Changes in the nature of war and UN responses | |
Terrorism | |
Disarmament and non-proliferation | |
Conclusion | |
Peace Operations | p. 393 |
Introduction | |
Language and meaning | |
Surge, retraction, resurgence | |
Reforms | |
Brahimi's report | |
Guehénno goals | |
Ban's plans | |
Standards and principles | |
Hybrid operations | |
Public security gaps | |
Conclusion: Future prospects | |
The Nuclear Disarmament and Non-Proliferation Regime | p. 409 |
Introduction | |
Three caveats | |
Non-proliferation regime | |
Three challenges | |
Three approaches | |
Way forward | |
Private Security | p. 425 |
Introduction | |
Private security and the control of force | |
A transnational market for military and security services | |
The current market compared | |
Why the current market? | |
Conclusion | |
Contemporary Challenges | p. 439 |
The International Arms Trade | p. 441 |
Introduction | |
Three channels for arms transfers | |
Arms sales take off: The 1970s and 1980s | |
Post-Cold War dynamics | |
Post-9/11 arms exports | |
The trade in small arms and light weapons | |
Dangers of dual use: The A.Q. Khan network | |
Prospects for restraint | |
Conclusion | |
Counterterrorism | p. 457 |
Introduction | |
Basic elements | |
Defence | |
Going on the offensive | |
Law enforcement and military force | |
Issues and choices | |
Counterinsurgency | p. 471 |
Introduction: The current discourse on counterinsurgency | |
The state of the field | |
The problem that counterinsurgency responds to ù insurgency | |
'Hearts and minds' | |
The role of military force in counterinsurgency | |
Learning on the ground | |
Counterinsurgency in the media age | |
Similarities to post-conflict peacebuilding | |
Conclusion | |
The Responsibility to Protect | p. 486 |
Introduction | |
Sovereignty and responsibility | |
R2P and international politics | |
R2P in action | |
Kenya | |
Libya | |
Conclusion | |
Transnational Organized Crime | p. 503 |
Introduction | |
Organized crime as a security threat | |
What is transnational organized crime? | |
Globalization, governance and the rise of organized crime | |
Transnational criminal organizations | |
Illicit markets | |
Responses to transnational crime | |
Population Movements | p. 520 |
Introduction | |
Population movements as a security issue | |
Population movements categorized | |
Population movements and violent conflict | |
Population movements and foreign policy | |
Population movement and internal security | |
Conclusion | |
Energy Security | p. 535 |
Introduction | |
Understanding energy security Why now? | |
Intimations of global petroleum insufficiency | |
A shift in the centre of gravity of world oil production | |
Oil facilities as a target of attack | |
Addressing energy (in)security | |
Conclusions | p. 553 |
The Academic and Policy Worlds | p. 555 |
Introduction | |
What is policy-relevant knowledge? | |
Cold War nuclear experts | |
Realism and liberalism after the Cold War | |
Conclusion | |
What Future for Security Studies? | p. 568 |
Introduction: Context and scope | |
Locating security studies | |
Future directions in the sub-field | |
Future directions in the sub-discipline | |
Security studies, porous boundaries and the struggle for coherence | |
References | p. 581 |
Index | p. 621 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.