Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Notes on Contributors | p. xvi |
List of Figures | p. xix |
List of Tables | p. xx |
List of Boxes | p. xxi |
Guided Tour of Learning Features | p. xxiv |
Guided Tour of the Online Resource Centre | p. xxvi |
Introduction: What is Security Studies? | p. 1 |
Introduction | p. 2 |
Definition of security | p. 2 |
Structure | p. 4 |
Conclusion | p. 9 |
Approaches to Security | p. 11 |
Security in International Politics: Traditional Approaches | p. 13 |
Introduction: states as central actors | p. 14 |
The realist perspective | p. 16 |
Realist disputes | p. 22 |
Difficulties with realist analysis | p. 24 |
The liberalist perspective | p. 25 |
A liberalist age? | p. 29 |
Liberalist issues | p. 30 |
Intellectual problems | p. 31 |
Conclusion | p. 32 |
Questions | p. 33 |
Further reading | p. 33 |
Important websites | p. 34 |
Peace Studies | p. 35 |
Introduction | p. 36 |
Origins and early years | p. 36 |
Evolution amidst controversy | p. 39 |
What is peace studies now? | p. 42 |
Responding to the new security challenges | p. 45 |
Conclusion | p. 50 |
Questions | p. 51 |
Further reading | p. 51 |
Important websites | p. 52 |
Critical Security Studies: A Schismatic History | p. 53 |
Introduction: 'Follow the sign of the gourd' | p. 54 |
Toronto desire: Critical Security Studies | p. 56 |
Copenhagen distinctions | p. 60 |
Aberystwyth exclusions | p. 62 |
Constructing security | p. 65 |
Everyone's other: post-structuralism and security | p. 67 |
Conclusion: Contemporary (Critical) Security Studies | p. 71 |
Questions | p. 72 |
Further reading | p. 72 |
Important websites | p. 74 |
Gender and Security | p. 75 |
Introduction | p. 76 |
Discursive representations | p. 76 |
Practical contexts | p. 80 |
Contradictions: biology and security | p. 83 |
Women as victims | p. 84 |
Women as peaceable | p. 85 |
Women as warriors | p. 86 |
Changing roles: changing perceptions | p. 87 |
Conclusion | p. 88 |
Questions | p. 89 |
Further reading | p. 90 |
Important websites | p. 90 |
Human Security | p. 91 |
Introduction: intellectual and empirical purpose | p. 92 |
Is human security a valuable analytical and policy framework? | p. 94 |
Reconciling tensions | p. 98 |
Human security and state-centric security | p. 100 |
Utility for practitioners | p. 103 |
Conclusion | p. 105 |
Questions | p. 107 |
Further reading | p. 107 |
Important websites | p. 108 |
Securitization | p. 109 |
Introduction | p. 110 |
Securitization model | p. 111 |
Limitations of the securitization model | p. 116 |
Cases of securitization | p. 117 |
Conclusion | p. 123 |
Questions | p. 124 |
Further reading | p. 124 |
Important websites | p. 125 |
Deepening and Broadening Security | p. 127 |
Military Security | p. 129 |
Introduction: the scope of the military security agenda | p. 130 |
Military strategy and military security: traditional security studies | p. 132 |
Securitization | p. 134 |
Constructivism | p. 137 |
Debating Colombia | p. 140 |
Conclusion: military security, self and world politics | p. 142 |
Questions | p. 143 |
Further reading | p. 143 |
Important websites | p. 144 |
Regime Security | p. 146 |
Introduction | p. 147 |
The weak state insecurity dilemma | p. 149 |
Security strategies in weak states | p. 153 |
Explaining insecurity in weak states | p. 157 |
Conclusion: prospects for the weak state | p. 160 |
Questions | p. 161 |
Further reading | p. 162 |
Important websites | p. 162 |
Societal Security | p. 164 |
Introduction | p. 165 |
A duality of state and societal security | p. 165 |
Society and societal identity | p. 167 |
Threats to societal identity | p. 169 |
Defending societal identity | p. 172 |
Societal security dilemmas | p. 174 |
Conclusion | p. 178 |
Questions | p. 180 |
Further reading | p. 180 |
Useful websites | p. 181 |
Environmental Security | p. 182 |
Introduction | p. 183 |
The origins of environmental security | p. 184 |
Major interpretations of environmental security | p. 188 |
Environmental change and violent conflict | p. 190 |
Environmental change and national security | p. 192 |
Armed forces and the environment | p. 195 |
Environmental change and human security | p. 197 |
Environment, or security? | p. 199 |
Conclusion | p. 200 |
Questions | p. 201 |
Further reading | p. 202 |
Important websites | p. 202 |
Economic Security | p. 204 |
Introduction | p. 205 |
Contemporary thinking on economic security | p. 205 |
A new conceptual approach to economic security | p. 210 |
Conclusion | p. 219 |
Questions | p. 220 |
Further reading | p. 220 |
Important websites | p. 221 |
Traditional and Non-Traditional Security | p. 223 |
Coercive Diplomacy | p. 225 |
Introduction | p. 226 |
What is coercive diplomacy? | p. 227 |
Theories and requirements for success | p. 229 |
The challenge of defining success | p. 233 |
Western use of coercive diplomacy 1990-2005 | p. 235 |
Why coercive diplomacy is hard | p. 236 |
Conclusion | p. 245 |
Questions | p. 246 |
Further reading | p. 246 |
Important websites | p. 247 |
The Role of Intelligence in National Security | p. 248 |
Introduction | p. 249 |
Definitions and theory of intelligence | p. 250 |
Intelligence services of different nations | p. 251 |
Intelligence collection disciplines | p. 253 |
The intelligence process | p. 255 |
Intelligence and security since the Second World War | p. 258 |
Legal and ethical issues involving intelligence | p. 260 |
Covert action | p. 261 |
Terrorism, Iraq, and the contemporary security condition | p. 263 |
Conclusion | p. 265 |
Questions | p. 268 |
Further reading | p. 268 |
Important websites | p. 269 |
Weapons of Mass Destruction | p. 270 |
Introduction | p. 271 |
Nuclear weapons | p. 272 |
Chemical weapons | p. 277 |
Biological weapons | p. 281 |
Conclusion: the future of WMD | p. 286 |
Questions | p. 287 |
Further reading | p. 287 |
Important websites | p. 287 |
Terrorism | p. 289 |
Introduction | p. 290 |
Concepts and definitions | p. 291 |
Types and causes of terrorism | p. 298 |
Security measures | p. 303 |
Conclusion | p. 307 |
Questions | p. 308 |
Further reading | p. 308 |
Important websites | p. 309 |
The Defence Trade | p. 311 |
Introduction | p. 312 |
Explaining the arms dynamic | p. 312 |
Trends in defence expenditure | p. 316 |
The content of the contemporary defence trade | p. 325 |
Conclusion | p. 328 |
Questions | p. 328 |
Further reading | p. 329 |
Important websites | p. 330 |
HIV/AIDS and Security | p. 331 |
Introduction | p. 332 |
The global HIV/AIDS pandemic | p. 332 |
HIV/AIDS and human security | p. 334 |
HIV/AIDS and national security | p. 336 |
HIV/AIDS and international security | p. 340 |
Conclusion | p. 343 |
Questions | p. 344 |
Further reading | p. 344 |
Important websites | p. 345 |
Transnational Crime | p. 346 |
Introduction | p. 347 |
Is transnational crime a threat to national security? | p. 348 |
Definitions and key concepts | p. 350 |
The increase in transnational crime | p. 353 |
The organization of transnational crime: competing visions | p. 356 |
Transnational crime and terrorism | p. 359 |
Government responses | p. 361 |
Conclusion | p. 363 |
Questions | p. 364 |
Further reading | p. 365 |
Important websites | p. 366 |
Children and War | p. 367 |
Introduction: children in global politics | p. 368 |
Which children-whose security? | p. 368 |
Children as security? | p. 370 |
Children at war: vulnerable and valuable | p. 371 |
Young soldiers | p. 373 |
Post conflict-post children? | p. 377 |
Infant power and soft tactics | p. 378 |
Conclusion | p. 380 |
Questions | p. 381 |
Further reading | p. 381 |
Important websites | p. 382 |
After the Return to Theory: The Past, Present, and Future of Security Studies | p. 383 |
Introduction | p. 384 |
The origins and institutional structure of security studies | p. 386 |
Security studies' 'Golden Age' | p. 387 |
Institutionalization and stagnation | p. 390 |
Disciplinary questioning and theoretical re-launch | p. 393 |
Conclusion: the powers of theory and the challenges of the future | p. 399 |
Questions | p. 400 |
Further reading | p. 401 |
Important websites | p. 402 |
Bibliography | p. 403 |
Glossary | p. 418 |
Index | p. 433 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.