𝔖 Scriptorium
✦   LIBER   ✦

📁

Security Studies: An Introduction

✍ Scribed by Paul D. Williams (editor)


Publisher
Routledge
Year
2012
Tongue
English
Leaves
657
Edition
2
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Security Studies is the most comprehensive textbook available on security studies.

Comprehensively revised for the new edition including new chapters on Polarity, Culture, Intelligence, and the Academic and Policy Worlds, it continues to give students a detailed overview of the major theoretical approaches, key themes and most significant issues within security studies.

    • Part 1 explores the main theoretical approaches currently used within the field from realism to international political sociology.
    • Part 2 explains the central concepts underpinning contemporary debates from the security dilemma to terrorism.
    • Part 3 presents an overview of the institutional security architecture currently influencing world politics using international, regional and global levels of analysis.
    • Part 4 examines some of the key contemporary challenges to global security from the arms trade to energy security.
    • Part 5 discusses the future of security.

      Security Studies provides a valuable teaching tool for undergraduates and MA students by collecting these related strands of the field together into a single coherent textbook.

      Contributors:Richard J. Aldrich, Deborah D. Avant, Sita Bali, Michael N. Barnett, Alex J. Bellamy, Didier Bigo, Pinar Bilgin, Ken Booth, Barry Buzan, Stuart Croft, Simon Dalby, John S. Duffield, Colin Elman, Louise Fawcett, Lawrence Freedman, James M. Goldgeier, Fen Osler Hampson, William D. Hartung, Michael Jensen, Adam Jones, Danielle Zach Kalbacher, Stuart J. Kaufman, Michael T. Klare, Peter Lawler, Matt McDonald, Colin McInnes, Cornelia Navari, Michael Pugh, Paul R. Pillar, Srinath Raghavan, Paul Rogers, Waheguru Pal Singh Sidhu, Joanna Spear, Caroline Thomas, Thomas G. Weiss, Nicholas J. Wheeler, Sandra Whitworth, Paul D. Williams, Phil Williams and Frank C. Zagare.

      ✦ Table of Contents


      Cover
      Security Studies An Introduction
      Copyright
      Contents
      Boxes
      Figures
      Tables
      Contributors
      Acknowledgments
      List of Abbreviations
      Chapter 1: Security Studies
      What Is Security Studies? A Very Short Overview
      Defining A Field Of Inquiry: Four Fundamentalz Questions
      What Is Security?
      Whose Security?
      What Is A Security Issue?
      How Can Security Be Achieved?
      How To Use This Book
      Part 1: Theoretical Approaches
      Chapter 2: Realisms
      Introduction
      Classical Realism
      Neorealism: Waltz’s Theory Of Internationalz Politics
      Defensive Structural Realism
      Offensive Structural Realism
      Rise And Fall Realism
      Neoclassical Realism
      Realisms And The Rise Of China
      Conclusion
      Chapter 3: Liberalisms
      Introduction
      Traditional Or Kantian Liberalism
      Douce Commerce
      The Democratic Peace Thesis
      Neoliberal Institutionalism
      Conclusion
      Chapter 4: Game Theory
      Introduction
      Primitive Concepts
      Strategic-form Games And Nash Equilibria
      Extensive-form Games, Backwards Induction Andz Subgame Perfect Equilibria
      Applications of Game Theory In Security Studies
      Coda
      Chapter 5: Constructivisms
      Introduction: Constructivism And Security
      Constructivism: Central Tenets And Sharedz Assumptions
      The Copenhagen School And Securitization
      Conclusion
      Chapter 6: Peace Studies
      Introduction: What Is Peace Studies?
      Peace Studies: A Brief History
      Peace research as science
      From peace research to peace studies
      Key Concepts
      Positive and negative peace
      Structural violence
      Cultural violence
      The Future Of Peace Studies?
      Chapter 7: Critical Theory
      Introduction: The Need For A Critical Perspective
      Rethinking Security
      Critical Theory
      Theory/practice
      The ‘aberystwyth School’ Of Critical Securityz Studies
      Emancipation
      Conclusion
      Chapter 8: Feminisms
      Introduction
      Feminist Approaches In International Security
      Women, Gender And Security: The Impactsz Of Armed Conflict
      Women, Gender And Security: Action And Activism
      Women, Gender And Security: Talking Andz Making Weapons And War
      Conclusions
      Chapter 9 International Political Sociology
      Introduction
      Interdisciplinarity, Relations And Practices
      An International Political Sociology Of Security
      Episteme
      Methods
      Major findings
      Conclusion
      Part 2: Key Concepts
      Chapter 10: Uncertainty
      Introduction
      The House Of Uncertainty
      He Quintessential Dilemma
      Three Logics
      The Security Dilemma In The Twenty-first Century
      Towards A New Agenda For Security Studies
      Chapter 11: Polarity
      The Debates About Polarity
      Polarity during the Cold War
      Polarity after the Cold War
      The Problem With Polarity
      The Future Of Polarity
      Conclusion: The Utility Of Polarity
      Chapter 12: Culture
      Introduction
      States Behaving Badly
      Culture
      Cultures In Security
      Strategic culture
      Peacekeeping cultures
      Conclusion
      Chapter13: War
      Introduction
      Three Philosophies Of War
      The Functions Of War
      Trends In Armed Conflicts Since 1945
      Who Fights? Who Dies?
      Is The Nature Of Warfare Changing?
      The idea of total war
      The ‘new wars’ debate
      The contemporary Western way of war
      Conclusion
      Chapter 14: Coercion
      Introduction
      Strategy
      Deterrence And Compellence
      Designing Coercive Strategies
      Punishment And Denial
      Types Of Costs
      Multiple Audiences
      Reputations
      Long-term Impact
      Conclusion
      Chapter 15: Terrorism
      Introduction
      Terrorism In Perspective
      Definitions
      State And Sub-state Terror
      Responding To Terrorism
      The 9/11 Response And The War On Terror
      Trends In Terrorism
      Conclusion
      Chapter 16: Intelligence
      Introduction
      What is intelligence?
      Warning, surprise and ‘failure’
      Intelligence, uncertainty and stability
      Covert action, disruption and event-shaping
      Intelligence cooperation
      Security and global surveillance
      Conclusion
      Chapter 17: Genocide Andcrimes Against Humanity
      Introduction
      Genocide
      Challenges Of Intervention
      Understanding Crimes Against Humanity
      Conclusion
      Chapter 18: Ethnic Conflict
      Introduction
      What Is Ethnic Conflict?
      An Overview Of Ethnic Conflicts
      Causes Of Violent Ethnic Conflict
      Sudan
      Yugoslavia
      International Security Dimensions Of Ethnic Conflicts
      Resolution Of Ethnic Civil Wars
      Chapter 19: Human Security
      Introduction
      Understanding The Scope Of Human Security
      Setting The Boundaries Of Human Security
      Ongoing Debates And Unresolved Issues
      Human Security And ‘failed’ States
      The Dilemmas Of Humanitarian Intervention
      Human Security Risk Assessment
      Governance And Human Security
      Towards A Theory Of Human Security
      Conclusion
      Chapter 20: Poverty
      Introduction
      Is Poverty An Appropriate Concern For Securityz Studies?
      Whose Poverty? Whose Security?
      What Do We Know About The Poverty–security Nexus?
      What Do We Know About The Poverty–violentz Conflict Nexus?
      Effect of poverty on conflict
      Effect of conflict on poverty
      The Diplomatic Agenda On Poverty And Security
      Conclusion
      Chapter 21: Climate Change And Environmental Security
      Introduction: Security And Environment
      Armed Conflict And Environmental Change
      Climate Change And Security
      Scenarios Of Doom
      Security Planning And Risk Analysis
      Climate Wars?
      Chapter 22: Health
      Introduction
      The Emergence Of Health As A National Securityz Issue
      The Spread Of Infectious Disease
      Hiv/aids
      Bioterrorism
      A Not So Perfect Partnership?
      Conclusion
      Part 3: Institutions
      Chapter 23: Alliances
      Introduction: Why Study Alliances?
      Definitions: What Is An Alliance?
      Explanations Of Alliance Persistence And Collapse
      The Case Of Nato After The Cold War
      Conclusion: Alliance Theory And The Future Of Nato
      Chapter 24: Regional Institutions
      Introduction
      Definitions
      The Origins And Development Of Regional Securityz Institutions
      Regional security institutions in the Cold War
      Regional security institutions since the Cold War
      Contemporary Challenges
      Peace operations
      Terrorism and WMD
      Assessing The Growth Of Regional Security Institutions
      Conclusion
      Chapter 25: The United Nations
      Introduction
      The Security Council
      The General Assembly
      The Secretariat
      Other Un Organs And Actors
      Twenty-first Century Challenges
      Changes in the nature of war and UN responses
      Terrorism
      Disarmament and nonproliferation
      Conclusion
      Chapter 26: Peace Operations
      Introduction
      Language And Meaning
      Surge, Retraction, Resurgence
      Reforms
      Brahimi’s report
      Guéhenno goals
      Ban’s plans
      Standards and principles
      Hybrid operations
      Public security gaps
      Conclusion: Future Prospects
      Chapter 27: The Nuclear Disarmament And Non-proliferation Regime
      Introduction
      Three Caveats
      Non-proliferation Regime
      Three Challenges
      Three Approaches
      Way Forward
      Chapter 28: Private Security
      Introduction
      Private Security And The Control Of Force
      A Transnational Market For Military And Securityz Services
      The Current Market Compared
      Why The Current Market?
      Conclusion
      Part 4: Contemporary Challenges
      Chapter 29: The International Arms Trade
      Introduction
      Three Channels For Arms Transfers
      Arms Sales Take Off: The 1970s And 1980s
      Post-cold War Dynamics
      Post-9/11 Arms Exports
      The Trade In Small Arms And Light Weapons
      Dangers Of Dual Use: The A.q. Khan Network
      Prospects For Restraint
      Conclusion
      Chapter 30: Counterterrorism
      Introduction
      Basic Elements
      Defence
      Going On The Offensive
      Law Enforcement And Military Force
      Issues And Choices
      Chapter 31: Counterinsurgency
      Introduction: The Current Discourse Onz Counterinsurgency
      The State Of The Field
      The Problem That Counterinsurgency Respondsz To – Insurgency
      Hearts And Minds’
      The Role Of Military Force In Counterinsurgency
      Learning On The Ground
      Counterinsurgency In The Media Age
      Similarities To Post-conflict Peacebuilding
      Conclusion
      Chapter 32: The Responsibility To Protect
      Introduction
      Sovereignty And Responsibility
      R2p And International Politics
      R2p In Action
      Kenya
      Libya
      Conclusion
      Chapter 33: Transnational Organized Crime
      Introduction
      Organized Crime As A Security Threat
      What Is Transnational Organized Crime?
      Globalization, Governance And The Rise Ofz Organized Crime
      Transnational Criminal Organizations
      Illicit Markets
      Responses To Transnational Crime
      Chapter 34: Population Movements
      Introduction
      Population Movements As A Security Issue
      Population Movements Categorized
      Population Movements And Violent Conflict
      Population Movements And Foreign Policy
      Population Movement And Internal Security
      Conclusion
      Chapter 35: Energy Security
      Introduction
      Understanding Energy Security
      Why Now?
      Intimations Of Global Petroleum Insufficiency
      A Shift In The Centre Of Gravity Of World Oil Production
      Oil Facilities As A Target Of Attack
      Addressing Energy (in)security
      Part 5: Conclusions
      Chapter : 36 The Academic And Policy Worlds
      Introduction
      What Is Policy-relevant Knowledge?
      Cold War Nuclear Experts
      Realism And Liberalism After The Cold War
      Conclusion
      Chapter 37: What Future For Security Studies?
      Introduction: Context And Scope
      Locating Security Studies
      Future Directions In The Sub-field
      Future Directions In The Sub-discipline
      Security Studies, Porous Boundaries And Thez Struggle For Coherence
      References
      Index


      📜 SIMILAR VOLUMES


      Security Studies: An Introduction
      ✍ Paul D. Williams 📂 Library 📅 2008 🏛 Routledge 🌐 English

      <P><EM>Security Studies</EM> is the most comprehensive textbook available on security studies.</P> <P></P> <P>It gives students a detailed overview of the major theoretical approaches, key themes and most significant issues within security studies.</P> <P></P> <UL> <UL> <P></P></UL> <LI>Part

      Security Studies: An Introduction
      ✍ Paul Williams 📂 Library 📅 2008 🌐 English

      Security Studies is the most comprehensive textbook available on security studies. It gives students a detailed overview of the major theoretical approaches, key themes and most significant issues within security studies. Part 1 explores the main theoretical approaches currently used wit

      Security Studies: An Introduction
      ✍ Paul D. Williams 📂 Library 📅 2008 🏛 Routledge 🌐 English

      Security Studies is the most comprehensive textbook available on security studies. It gives students a detailed overview of the major theoretical approaches, key themes and most significant issues within security studies. Part 1 explores the main theoretical approaches currently used within th

      Security studies : an introduction
      ✍ Williams, Paul D. 📂 Library 📅 2013 🏛 Routledge 🌐 English

      "Comprehensively revised for the new edition including new chapters on Polarity, Culture, Intelligence, and the Academic and Policy Worlds, it continues to give students a detailed overview of the major theoretical approaches, key themes and most significant issues within security studies. Part 1