Contemporary Security Studies / Edition 2

Contemporary Security Studies / Edition 2

3.0 2
by Alan Collins
     
 

ISBN-10: 0199548854

ISBN-13: 9780199548859

Pub. Date: 03/05/2010

Publisher: Oxford University Press

This major new textbook brings together key scholars to introduce students to the fast-evolving field of security studies. The book is divided into three sections: differing approaches to the study of security; the broadening and deepening of security; and a range of traditional and non-traditional issues that have emerged on the security agenda.  See more details below

Overview

This major new textbook brings together key scholars to introduce students to the fast-evolving field of security studies. The book is divided into three sections: differing approaches to the study of security; the broadening and deepening of security; and a range of traditional and non-traditional issues that have emerged on the security agenda.

Product Details

ISBN-13:
9780199548859
Publisher:
Oxford University Press
Publication date:
03/05/2010
Edition description:
Second Edition
Pages:
572
Product dimensions:
7.40(w) x 9.70(h) x 1.00(d)

Related Subjects

Table of Contents


Notes on Contributors     xvi
List of Figures     xix
List of Tables     xx
List of Boxes     xxi
Guided Tour of Learning Features     xxiv
Guided Tour of the Online Resource Centre     xxvi
Introduction: What is Security Studies?   Alan Collins     1
Introduction     2
Definition of security     2
Structure     4
Conclusion     9
Approaches to Security     11
Security in International Politics: Traditional Approaches   Patrick Morgan     13
Introduction: states as central actors     14
The realist perspective     16
Realist disputes     22
Difficulties with realist analysis     24
The liberalist perspective     25
A liberalist age?     29
Liberalist issues     30
Intellectual problems     31
Conclusion     32
Questions     33
Further reading     33
Important websites     34
Peace Studies   Paul Rogers     35
Introduction     36
Origins and early years     36
Evolutionamidst controversy     39
What is peace studies now?     42
Responding to the new security challenges     45
Conclusion     50
Questions     51
Further reading     51
Important websites     52
Critical Security Studies: A Schismatic History   David Mutimer     53
Introduction: 'Follow the sign of the gourd'     54
Toronto desire: Critical Security Studies     56
Copenhagen distinctions     60
Aberystwyth exclusions     62
Constructing security     65
Everyone's other: post-structuralism and security     67
Conclusion: Contemporary (Critical) Security Studies     71
Questions     72
Further reading     72
Important websites     74
Gender and Security   Caroline Kennedy-Pipe     75
Introduction     76
Discursive representations     76
Practical contexts     80
Contradictions: biology and security     83
Women as victims     84
Women as peaceable     85
Women as warriors     86
Changing roles: changing perceptions      87
Conclusion     88
Questions     89
Further reading     90
Important websites     90
Human Security   Pauline Kerr     91
Introduction: intellectual and empirical purpose     92
Is human security a valuable analytical and policy framework?     94
Reconciling tensions     98
Human security and state-centric security     100
Utility for practitioners     103
Conclusion     105
Questions     107
Further reading     107
Important websites     108
Securitization   Ralf Emmers     109
Introduction     110
Securitization model     111
Limitations of the securitization model     116
Cases of securitization     117
Conclusion     123
Questions     124
Further reading     124
Important websites     125
Deepening and Broadening Security     127
Military Security   Eric Herring     129
Introduction: the scope of the military security agenda     130
Military strategy and military security: traditional security studies      132
Securitization     134
Constructivism     137
Debating Colombia     140
Conclusion: military security, self and world politics     142
Questions     143
Further reading     143
Important websites     144
Regime Security   Richard Jackson     146
Introduction     147
The weak state insecurity dilemma     149
Security strategies in weak states     153
Explaining insecurity in weak states     157
Conclusion: prospects for the weak state     160
Questions     161
Further reading     162
Important websites     162
Societal Security   Paul Roe     164
Introduction     165
A duality of state and societal security     165
Society and societal identity     167
Threats to societal identity     169
Defending societal identity     172
Societal security dilemmas     174
Conclusion     178
Questions     180
Further reading     180
Useful websites     181
Environmental Security   Jon Barnett      182
Introduction     183
The origins of environmental security     184
Major interpretations of environmental security     188
Environmental change and violent conflict     190
Environmental change and national security     192
Armed forces and the environment     195
Environmental change and human security     197
Environment, or security?     199
Conclusion     200
Questions     201
Further reading     202
Important websites     202
Economic Security   Christopher M. Dent     204
Introduction     205
Contemporary thinking on economic security     205
A new conceptual approach to economic security     210
Conclusion     219
Questions     220
Further reading     220
Important websites     221
Traditional and Non-Traditional Security     223
Coercive Diplomacy   Peter Viggo Jakobsen     225
Introduction     226
What is coercive diplomacy?     227
Theories and requirements for success     229
The challenge of defining success     233
Western use of coercive diplomacy 1990-2005     235
Why coercive diplomacy is hard     236
Conclusion     245
Questions     246
Further reading     246
Important websites     247
The Role of Intelligence in National Security   Stan A. Taylor     248
Introduction     249
Definitions and theory of intelligence     250
Intelligence services of different nations     251
Intelligence collection disciplines     253
The intelligence process     255
Intelligence and security since the Second World War     258
Legal and ethical issues involving intelligence     260
Covert action     261
Terrorism, Iraq, and the contemporary security condition     263
Conclusion     265
Questions     268
Further reading     268
Important websites     269
Weapons of Mass Destruction   James Wirtz     270
Introduction     271
Nuclear weapons     272
Chemical weapons     277
Biological weapons     281
Conclusion: the future of WMD     286
Questions     287
Further reading     287
Important websites     287
Terrorism   Brenda Lutz   James Lutz     289
Introduction     290
Concepts and definitions     291
Types and causes of terrorism     298
Security measures     303
Conclusion     307
Questions     308
Further reading     308
Important websites     309
The Defence Trade   Joanna Spear   Neil Cooper     311
Introduction     312
Explaining the arms dynamic     312
Trends in defence expenditure     316
The content of the contemporary defence trade     325
Conclusion     328
Questions     328
Further reading     329
Important websites     330
HIV/AIDS and Security   Stefan Elbe     331
Introduction     332
The global HIV/AIDS pandemic     332
HIV/AIDS and human security     334
HIV/AIDS and national security     336
HIV/AIDS and international security     340
Conclusion     343
Questions     344
Further reading      344
Important websites     345
Transnational Crime   Jeanne Giraldo   Harold Trinkunas     346
Introduction     347
Is transnational crime a threat to national security?     348
Definitions and key concepts     350
The increase in transnational crime     353
The organization of transnational crime: competing visions     356
Transnational crime and terrorism     359
Government responses     361
Conclusion     363
Questions     364
Further reading     365
Important websites     366
Children and War   Helen Brocklehurst     367
Introduction: children in global politics     368
Which children-whose security?     368
Children as security?     370
Children at war: vulnerable and valuable     371
Young soldiers     373
Post conflict-post children?     377
Infant power and soft tactics     378
Conclusion     380
Questions     381
Further reading     381
Important websites     382
After the Return to Theory: The Past, Present, and Future of Security Studies   Ole Waever   Barry Buzan     383
Introduction     384
The origins and institutional structure of security studies     386
Security studies' 'Golden Age'     387
Institutionalization and stagnation     390
Disciplinary questioning and theoretical re-launch     393
Conclusion: the powers of theory and the challenges of the future     399
Questions     400
Further reading     401
Important websites     402
Bibliography     403
Glossary     418
Index     433

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >