Contemporary Security Studies / Edition 2

Paperback (Print)
Rent from
(Save 59%)
Est. Return Date: 07/27/2015
Buy New
Buy New from
Buy Used
Buy Used from
(Save 34%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $2.49
Usually ships in 1-2 business days
(Save 95%)
Other sellers (Paperback)
  • All (12) from $2.49   
  • New (1) from $70.00   
  • Used (11) from $2.49   


This major new textbook brings together key scholars to introduce students to the fast-evolving field of security studies. The book is divided into three sections: differing approaches to the study of security; the broadening and deepening of security; and a range of traditional and non-traditional issues that have emerged on the security agenda.
Read More Show Less

Product Details

  • ISBN-13: 9780199548859
  • Publisher: Oxford University Press
  • Publication date: 3/5/2010
  • Edition description: Second Edition
  • Edition number: 2
  • Pages: 572
  • Product dimensions: 7.40 (w) x 9.70 (h) x 1.00 (d)

Meet the Author

Dr Alan Collins is Senior Lecturer in the Department of Politics and International Relations at the University of Wales, Swansea

Read More Show Less

Table of Contents

Notes on Contributors     xvi
List of Figures     xix
List of Tables     xx
List of Boxes     xxi
Guided Tour of Learning Features     xxiv
Guided Tour of the Online Resource Centre     xxvi
Introduction: What is Security Studies?   Alan Collins     1
Introduction     2
Definition of security     2
Structure     4
Conclusion     9
Approaches to Security     11
Security in International Politics: Traditional Approaches   Patrick Morgan     13
Introduction: states as central actors     14
The realist perspective     16
Realist disputes     22
Difficulties with realist analysis     24
The liberalist perspective     25
A liberalist age?     29
Liberalist issues     30
Intellectual problems     31
Conclusion     32
Questions     33
Further reading     33
Important websites     34
Peace Studies   Paul Rogers     35
Introduction     36
Origins and early years     36
Evolutionamidst controversy     39
What is peace studies now?     42
Responding to the new security challenges     45
Conclusion     50
Questions     51
Further reading     51
Important websites     52
Critical Security Studies: A Schismatic History   David Mutimer     53
Introduction: 'Follow the sign of the gourd'     54
Toronto desire: Critical Security Studies     56
Copenhagen distinctions     60
Aberystwyth exclusions     62
Constructing security     65
Everyone's other: post-structuralism and security     67
Conclusion: Contemporary (Critical) Security Studies     71
Questions     72
Further reading     72
Important websites     74
Gender and Security   Caroline Kennedy-Pipe     75
Introduction     76
Discursive representations     76
Practical contexts     80
Contradictions: biology and security     83
Women as victims     84
Women as peaceable     85
Women as warriors     86
Changing roles: changing perceptions      87
Conclusion     88
Questions     89
Further reading     90
Important websites     90
Human Security   Pauline Kerr     91
Introduction: intellectual and empirical purpose     92
Is human security a valuable analytical and policy framework?     94
Reconciling tensions     98
Human security and state-centric security     100
Utility for practitioners     103
Conclusion     105
Questions     107
Further reading     107
Important websites     108
Securitization   Ralf Emmers     109
Introduction     110
Securitization model     111
Limitations of the securitization model     116
Cases of securitization     117
Conclusion     123
Questions     124
Further reading     124
Important websites     125
Deepening and Broadening Security     127
Military Security   Eric Herring     129
Introduction: the scope of the military security agenda     130
Military strategy and military security: traditional security studies      132
Securitization     134
Constructivism     137
Debating Colombia     140
Conclusion: military security, self and world politics     142
Questions     143
Further reading     143
Important websites     144
Regime Security   Richard Jackson     146
Introduction     147
The weak state insecurity dilemma     149
Security strategies in weak states     153
Explaining insecurity in weak states     157
Conclusion: prospects for the weak state     160
Questions     161
Further reading     162
Important websites     162
Societal Security   Paul Roe     164
Introduction     165
A duality of state and societal security     165
Society and societal identity     167
Threats to societal identity     169
Defending societal identity     172
Societal security dilemmas     174
Conclusion     178
Questions     180
Further reading     180
Useful websites     181
Environmental Security   Jon Barnett      182
Introduction     183
The origins of environmental security     184
Major interpretations of environmental security     188
Environmental change and violent conflict     190
Environmental change and national security     192
Armed forces and the environment     195
Environmental change and human security     197
Environment, or security?     199
Conclusion     200
Questions     201
Further reading     202
Important websites     202
Economic Security   Christopher M. Dent     204
Introduction     205
Contemporary thinking on economic security     205
A new conceptual approach to economic security     210
Conclusion     219
Questions     220
Further reading     220
Important websites     221
Traditional and Non-Traditional Security     223
Coercive Diplomacy   Peter Viggo Jakobsen     225
Introduction     226
What is coercive diplomacy?     227
Theories and requirements for success     229
The challenge of defining success     233
Western use of coercive diplomacy 1990-2005     235
Why coercive diplomacy is hard     236
Conclusion     245
Questions     246
Further reading     246
Important websites     247
The Role of Intelligence in National Security   Stan A. Taylor     248
Introduction     249
Definitions and theory of intelligence     250
Intelligence services of different nations     251
Intelligence collection disciplines     253
The intelligence process     255
Intelligence and security since the Second World War     258
Legal and ethical issues involving intelligence     260
Covert action     261
Terrorism, Iraq, and the contemporary security condition     263
Conclusion     265
Questions     268
Further reading     268
Important websites     269
Weapons of Mass Destruction   James Wirtz     270
Introduction     271
Nuclear weapons     272
Chemical weapons     277
Biological weapons     281
Conclusion: the future of WMD     286
Questions     287
Further reading     287
Important websites     287
Terrorism   Brenda Lutz   James Lutz     289
Introduction     290
Concepts and definitions     291
Types and causes of terrorism     298
Security measures     303
Conclusion     307
Questions     308
Further reading     308
Important websites     309
The Defence Trade   Joanna Spear   Neil Cooper     311
Introduction     312
Explaining the arms dynamic     312
Trends in defence expenditure     316
The content of the contemporary defence trade     325
Conclusion     328
Questions     328
Further reading     329
Important websites     330
HIV/AIDS and Security   Stefan Elbe     331
Introduction     332
The global HIV/AIDS pandemic     332
HIV/AIDS and human security     334
HIV/AIDS and national security     336
HIV/AIDS and international security     340
Conclusion     343
Questions     344
Further reading      344
Important websites     345
Transnational Crime   Jeanne Giraldo   Harold Trinkunas     346
Introduction     347
Is transnational crime a threat to national security?     348
Definitions and key concepts     350
The increase in transnational crime     353
The organization of transnational crime: competing visions     356
Transnational crime and terrorism     359
Government responses     361
Conclusion     363
Questions     364
Further reading     365
Important websites     366
Children and War   Helen Brocklehurst     367
Introduction: children in global politics     368
Which children-whose security?     368
Children as security?     370
Children at war: vulnerable and valuable     371
Young soldiers     373
Post conflict-post children?     377
Infant power and soft tactics     378
Conclusion     380
Questions     381
Further reading     381
Important websites     382
After the Return to Theory: The Past, Present, and Future of Security Studies   Ole Waever   Barry Buzan     383
Introduction     384
The origins and institutional structure of security studies     386
Security studies' 'Golden Age'     387
Institutionalization and stagnation     390
Disciplinary questioning and theoretical re-launch     393
Conclusion: the powers of theory and the challenges of the future     399
Questions     400
Further reading     401
Important websites     402
Bibliography     403
Glossary     418
Index     433
Read More Show Less

Customer Reviews

Average Rating 3
( 2 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)