ebook img

Security studies : an introduction PDF

657 Pages·2013·3.808 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Security studies : an introduction

n S S ECURITY TUDIES Security Studies is the most comprehensive textbook available on security studies. Comprehensively revised for the new edition including new chapters on Polarity, Culture, Intelligence, and the Academic and Policy Worlds, it continues to give students a detailed overview of the major theoretical approaches, key themes and most significant issues within security studies. n Part 1 explores the main theoretical approaches currently used within the field from realism to international political sociology. n Part 2 explains the central concepts underpinning contemporary debates from the security dilemma to terrorism. n Part 3 presents an overview of the institutional security architecture currently influencing world politics using international, regional and global levels of analysis. n Part 4 examines some of the key contemporary challenges to global security from the arms trade to energy security. n Part 5 discusses the future of security. Security Studiesprovides a valuable teaching tool for undergraduates and MA students by collecting these related strands of the field together into a single coherent textbook. Paul D. Williamsis Associate Professor in the Elliott School of International Affairs at the George Washington University, USA. S S ECURITY TUDIES A I N NTRODUCTION 2nd edition n Edited by Paul D. Williams First edition published 2008 by Routledge Second edition published 2013 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN Simultaneously published in the USA and Canada by Routledge 711 Third Avenue, New York, NY 10017 Routledge is an imprint of the Taylor & Francis Group, an informa business © 2013 Paul D. Williams for editorial and selected matter; contributors, their contributions The right of Paul D Williams to be identified as Editor of this work has been asserted by him in accordance with the Copyright, Designs and Patent Act 1988. All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging in Publication Data Security studies: an introduction/edited by Paul D. Williams. –2nd ed. p. cm. Includes bibliographical references and index. 1. Security, International. I. Williams, Paul, 1975– JZ5588.S4297 2012 355′.033—dc23 2011041150 ISBN: 978–0-415–78280–7 (hbk) ISBN: 978–0-415–78281–4 (pbk) ISBN: 978–0-203–12257–0 (ebk) Typeset in Adobe Garamond by Florence Production Ltd, Stoodleigh, Devon n C ONTENTS List of boxes, figures and tables xi 4 GAME THEORY 48 About the contributors xiv Frank C. Zagare Acknowledgments xvii Introduction List of abbreviations xviii Primitive concepts Strategic-form games and Nash 1 SECURITY STUDIES: equilibria AN INTRODUCTION 1 Extensive-form games, backwards Paul D. Williams induction and subgame perfect equilibria What is security studies? A very Applications of game theory in short overview Defining a field of inquiry: Four security studies fundamental questions Coda What is security? Whose security? What is a security issue? 5 CONSTRUCTIVISMS 63 How can security be achieved? Matt McDonald How to use this book Introduction: Constructivism and security Part 1 Theoretical Constructivism: Central tenets and Approaches 13 shared assumptions Security as social construction: 2 REALISMS 15 identity and norms Colin Elman and Michael Jensen Negotiation and contestation Introduction Agents, structures and change Classical realism The Copenhagen School and Neorealism: Waltz’s Theory of securitization International Politics Conclusion Defensive structural realism Offensive structural realism Rise and fall realism 6 PEACE STUDIES 77 Neoclassical realism Peter Lawler Realisms and the rise of China Introduction: What is peace Conclusion studies? Peace Studies: A brief history 3 LIBERALISMS 32 Peace research as science Cornelia Navari From peace research to peace Introduction studies Traditional or Kantian liberalism Key concepts Douce commerce Positive and negative peace The democratic peace thesis Structural violence Neoliberal institutionalism Cultural violence Conclusion The future of peace studies? v CONTENTS 7 CRITICAL THEORY 90 Three logics Pinar Bilgin The security dilemma in the twenty-first century Introduction: the need for a Towards a new agenda for security critical perspective studies Rethinking security Critical theory Theory/practice 11 POLARITY 155 The ‘Aberystwyth School’ of Barry Buzan critical security studies Emancipation The debates about polarity Conclusion Polarity during the Cold War Polarity after the Cold War The problem with polarity 8 FEMINISMS 107 The future of polarity Sandra Whitworth Conclusion: The utility of polarity Introduction Feminist approaches in 12 CULTURE 170 international security Michael N. Barnett Women, gender and security: The impacts of armed conflict Introduction Women, gender and security: States behaving badly Action and activism Culture Women, gender and security: Cultures in security Talking and making weapons Strategic culture and war Peacekeeping cultures Conclusions Conclusion 9 INTERNATIONAL POLITICAL 13 WAR 187 Paul D. Williams SOCIOLOGY 120 Didier Bigo Introduction Three philosophies of war Introduction The functions of war Interdisciplinarity, relations and Trends in armed conflicts since practices 1945 An international political sociology Who fights? Who dies? of security Is the nature of warfare changing? Episteme The idea of total war Methods The ‘new wars’ debate Major findings The contemporary Western way Conclusion of war Conclusion Part 2 Key Concepts 135 10 UNCERTAINTY 137 14 COERCION 206 Ken Booth and Nicholas J. Wheeler Lawrence Freedman and Srinath Raghavan Introduction The house of uncertainty Introduction The quintessential dilemma Strategy vi CONTENTS Deterrence and compellence 18 ETHNIC CONFLICT 264 Designing coercive strategies Stuart J. Kaufman Punishment and denial Introduction Types of costs What is ethnic conflict? Multiple audiences An overview of ethnic conflicts Reputations Causes of violent ethnic conflict Long-term impact Sudan Conclusion Yugoslavia International security dimensions of ethnic conflicts 15 TERRORISM 221 Resolution of ethnic civil wars Paul Rogers Introduction 19 HUMAN SECURITY 279 Terrorism in perspective Fen Osler Hampson Definitions Introduction State and sub-state terror Understanding the scope of human Responding to terrorism security The 9/11 response and the war Setting the boundaries of human on terror security Trends in terrorism Ongoing debates and unresolved Conclusion issues Human security and ‘failed’ states The dilemmas of humanitarian 16 INTELLIGENCE 235 intervention Richard J. Aldrich Human security risk assessment Introduction Governance and human security What is intelligence? Towards a theory of human Warning, surprise and ‘failure’ security Intelligence, uncertainty and Conclusion stability Covert action, disruption and 20 POVERTY 295 event-shaping Caroline Thomas with Intelligence cooperation Paul D. Williams Security and global surveillance Introduction Conclusion Is poverty an appropriate concern for security studies? 17 GENOCIDE AND CRIMES Whose poverty? Whose security? AGAINST HUMANITY 250 What do we know about the Adam Jones poverty-security nexus? What do we know about the poverty- Introduction violent conflict nexus? Genocide Effect of poverty on conflict Challenges of intervention Effect of conflict on poverty Understanding crimes against The diplomatic agenda on poverty and humanity security Conclusion Conclusion vii CONTENTS 21 CLIMATE CHANGE AND Contemporary challenges ENVIRONMENTAL SECURITY 311 Peace operations Simon Dalby Terrorism and WMD Assessing the growth of regional Introduction: Security and security institutions environment Conclusion Armed conflict and environmental change Climate change and security 25 THE UNITED NATIONS 374 Scenarios of doom Thomas G. Weiss and Danielle Security planning and risk analysis Zach Climate wars? Introduction The Security Council 22 HEALTH 324 The General Assembly Colin McInnes The Secretariat Other UN organs and actors Introduction Twenty-first-century challenges The emergence of health as a Changes in the nature of war and national security issue UN responses The spread of infectious disease Terrorism HIV/AIDS Disarmament and non-proliferation Bioterrorism Conclusion A not so perfect partnership? Conclusion 26 PEACE OPERATIONS 393 Michael Pugh Part 3 Institutions 337 Introduction 23 ALLIANCES 339 Language and meaning John S. Duffield Surge, retraction, resurgence Reforms Introduction: Why study alliances? Brahimi’s report Definitions: What is an alliance? Guéhenno goals Explanations of alliance persistence Ban’s plans and collapse Standards and principles The case of NATO after the Hybrid operations Cold War Public security gaps Conclusion: Alliance theory and Conclusion: Future prospects the future of NATO 24 REGIONAL INSTITUTIONS 355 27 THE NUCLEAR DISARMAMENT Louise Fawcett AND NON-PROLIFERATION REGIME 409 Introduction Waheguru Pal Singh Sidhu Definitions The origins and development of Introduction regional security institutions Three caveats Regional security institutions in Non-proliferation regime the Cold War Three challenges Regional security institutions since Three approaches the Cold War Way forward viii CONTENTS 28 PRIVATE SECURITY 425 The role of military force in Deborah D. Avant counterinsurgency Learning on the ground Introduction Counterinsurgency in the media age Private security and the control Similarities to post-conflict of force peacebuilding A transnational market for military Conclusion and security services The current market compared Why the current market? 32 THE RESPONSIBILITY TO PROTECT 486 Conclusion Alex J. Bellamy Introduction Part 4 Contemporary Sovereignty and responsibility Challenges 439 R2P and international politics R2P in action 29 THE INTERNATIONAL ARMS TRADE 441 Kenya William D. Hartung Libya Introduction Conclusion Three channels for arms transfers Arms sales take off: The 1970s and 1980s 33 TRANSNATIONAL ORGANIZED Post-Cold War dynamics CRIME 503 Post-9/11 arms exports Phil Williams The trade in small arms and light Introduction weapons Organized crime as a security threat Dangers of dual use: The A.Q. Khan What is transnational organized network crime? Prospects for restraint Conclusion Globalization, governance and the rise of organized crime Transnational criminal 30 COUNTERTERRORISM 457 organizations Paul R. Pillar Illicit markets Responses to transnational crime Introduction Basic elements Defence 34 POPULATION MOVEMENTS 520 Going on the offensive Sita Bali Law enforcement and military force Issues and choices Introduction Population movements as a security issue 31 COUNTERINSURGENCY 471 Population movements categorized Joanna Spear Population movements and violent Introduction: The current discourse conflict on counterinsurgency Population movements and foreign The state of the field policy The problem that counterinsurgency Population movement and internal responds to – insurgency security ‘Hearts and minds’ Conclusion ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.