| |
| |
List of boxes, figures and tables | |
| |
| |
About the contributors | |
| |
| |
Acknowledgments | |
| |
| |
List of abbreviations | |
| |
| |
| |
Security Studies: An Introduction | |
| |
| |
| |
What is security studies? A very short overview | |
| |
| |
Defining a field of inquiry: Four fundamental questions | |
| |
| |
What is security? | |
| |
| |
Whose security? | |
| |
| |
What is a security issue? | |
| |
| |
How can security be achieved? | |
| |
| |
How to use this book | |
| |
| |
| |
Theoretical Approaches | |
| |
| |
| |
Realisms | |
| |
| |
| |
Introduction | |
| |
| |
Classical realism | |
| |
| |
Neorealism: Waltz's Theory of International Politics | |
| |
| |
Defensive structural realism | |
| |
| |
Offensive structural realism | |
| |
| |
Rise and fall realism | |
| |
| |
Neoclassical realism | |
| |
| |
Realisms and the rise of China | |
| |
| |
Conclusion | |
| |
| |
| |
Liberalisms | |
| |
| |
| |
Introduction | |
| |
| |
Traditional or Kantian liberalism | |
| |
| |
Douce commerce | |
| |
| |
The democratic peace thesis | |
| |
| |
Neoliberal institutionalism | |
| |
| |
Conclusion | |
| |
| |
| |
Game Theory | |
| |
| |
| |
Introduction | |
| |
| |
Primitive concepts | |
| |
| |
Strategic-form games and Nash equilibria | |
| |
| |
Extensive-form games, backwards induction and subgame perfect equilibria | |
| |
| |
Applications of game theory in security studies | |
| |
| |
Coda | |
| |
| |
| |
Constructivisms | |
| |
| |
| |
Introduction: Constructivism and security | |
| |
| |
Constructivism: Central tenets and shared assumptions | |
| |
| |
Security as social construction: identity and norms | |
| |
| |
Negotiation and contestation | |
| |
| |
Agents, structures and change | |
| |
| |
The Copenhagen School and securitization | |
| |
| |
Conclusion | |
| |
| |
| |
Peace Studies | |
| |
| |
| |
Introduction: What is peace studies? | |
| |
| |
Peace Studies: A brief history | |
| |
| |
Peace research as science | |
| |
| |
From peace research to peace studies | |
| |
| |
Key concepts | |
| |
| |
Positive and negative peace | |
| |
| |
Structural violence | |
| |
| |
Cultural violence | |
| |
| |
The future of peace studies? | |
| |
| |
| |
Critical Theory | |
| |
| |
| |
Introduction: the need for a critical perspective | |
| |
| |
Rethinking security | |
| |
| |
Critical theory Theory/practice | |
| |
| |
The 'Aberystwyth School' of critical security studies | |
| |
| |
Emancipation | |
| |
| |
Conclusion | |
| |
| |
| |
Feminisms | |
| |
| |
| |
Introduction | |
| |
| |
Feminist approaches in international security | |
| |
| |
Women, gender and security: The impacts of armed conflict | |
| |
| |
Women, gender and security: Action and activism | |
| |
| |
Women, gender and security: Talking and making weapons and war | |
| |
| |
Conclusions | |
| |
| |
| |
International Political Sociology | |
| |
| |
| |
Introduction | |
| |
| |
Interdisciplinarity, relations and practices | |
| |
| |
An international political sociology of security | |
| |
| |
Episteme | |
| |
| |
Methods | |
| |
| |
Major findings | |
| |
| |
Conclusion | |
| |
| |
| |
Key Concepts | |
| |
| |
| |
Uncertainty | |
| |
| |
| |
Introduction | |
| |
| |
The house of uncertainty | |
| |
| |
The quintessential dilemma | |
| |
| |
Three logics | |
| |
| |
The security dilemma in the twenty-first century | |
| |
| |
Towards a new agenda for security, studies | |
| |
| |
| |
Polarity | |
| |
| |
| |
The debates about polarity | |
| |
| |
Polarity during the Cold War | |
| |
| |
Polarity after the Cold War | |
| |
| |
The problem with polarity | |
| |
| |
The future of polarity | |
| |
| |
Conclusion: The utility of polarity | |
| |
| |
| |
Culture | |
| |
| |
| |
Introduction | |
| |
| |
States behaving badly | |
| |
| |
Culture | |
| |
| |
Cultures in security | |
| |
| |
Strategic culture | |
| |
| |
Peacekeeping cultures | |
| |
| |
Conclusion | |
| |
| |
| |
War | |
| |
| |
| |
Introduction | |
| |
| |
Three philosophies of war | |
| |
| |
The functions of war | |
| |
| |
Trends in armed conflicts since 1945 | |
| |
| |
Who fights? Who dies? | |
| |
| |
Is the nature of warfare changing? | |
| |
| |
The idea of total war | |
| |
| |
The 'new wars' debate | |
| |
| |
The contemporary Western way of war | |
| |
| |
Conclusion | |
| |
| |
| |
Coercion | |
| |
| |
| |
Introduction | |
| |
| |
Strategy | |
| |
| |
Deterrence and compellence | |
| |
| |
Designing coercive strategies | |
| |
| |
Punishment and denial | |
| |
| |
Types of costs | |
| |
| |
Multiple audiences | |
| |
| |
Reputations | |
| |
| |
Long-term impact | |
| |
| |
Conclusion | |
| |
| |
| |
Terrorism | |
| |
| |
| |
Introduction | |
| |
| |
Terrorism in perspective | |
| |
| |
Definitions | |
| |
| |
State and sub-state terror | |
| |
| |
Responding to terrorism | |
| |
| |
The 9/11 response and the war on terror | |
| |
| |
Trends in terrorism | |
| |
| |
Conclusion | |
| |
| |
| |
Intelligence | |
| |
| |
| |
Introduction | |
| |
| |
What is intelligence? | |
| |
| |
Warning, surprise and 'failure' | |
| |
| |
Intelligence, uncertainty and stability | |
| |
| |
Covert action, disruption and event-shaping | |
| |
| |
Intelligence cooperation | |
| |
| |
Security and global surveillance | |
| |
| |
Conclusion | |
| |
| |
| |
Genocide and Crimes Against Humanity | |
| |
| |
| |
Introduction | |
| |
| |
Genocide | |
| |
| |
Challenges of intervention | |
| |
| |
Understanding crimes against humanity | |
| |
| |
Conclusion | |
| |
| |
| |
Ethnic Conflict | |
| |
| |
| |
Introduction | |
| |
| |
What is ethnic conflict? | |
| |
| |
An overview of ethnic conflicts | |
| |
| |
Causes of violent ethnic conflict | |
| |
| |
Sudan | |
| |
| |
Yugoslavia | |
| |
| |
International security dimensions of ethnic conflicts | |
| |
| |
Resolution of ethnic civil wars | |
| |
| |
| |
Human Security | |
| |
| |
| |
Introduction | |
| |
| |
Understanding the scope of human security | |
| |
| |
Setting the boundaries of human security | |
| |
| |
Ongoing debates and unresolved issues | |
| |
| |
Human security and 'failed' states | |
| |
| |
The dilemmas of humanitarian intervention | |
| |
| |
Human security risk assessment | |
| |
| |
Governance and human security | |
| |
| |
Towards a theory of human security | |
| |
| |
Conclusion | |
| |
| |
| |
Poverty | |
| |
| |
| |
Introduction | |
| |
| |
Is poverty an appropriate concern for security studies? | |
| |
| |
Whose poverty? Whose security? | |
| |
| |
What do we know about the poverty-security nexus? | |
| |
| |
What do we know about the poverty-violent conflict nexus? | |
| |
| |
Effect of poverty on conflict | |
| |
| |
Effect of conflict on poverty | |
| |
| |
The diplomatic agenda on poverty and security | |
| |
| |
Conclusion | |
| |
| |
| |
Climate Change and Environmental Security | |
| |
| |
| |
Introduction: Security and environment | |
| |
| |
Armed conflict and environmental change | |
| |
| |
Climate change and security | |
| |
| |
Scenarios of doom | |
| |
| |
Security planning and risk analysis | |
| |
| |
Climate wars? | |
| |
| |
| |
Health | |
| |
| |
| |
Introduction | |
| |
| |
The emergence of health as a national security issue | |
| |
| |
The spread of infectious disease HIV/AIDS | |
| |
| |
Bioterrorism | |
| |
| |
A not so perfect partnership? | |
| |
| |
Conclusion | |
| |
| |
| |
Institutions | |
| |
| |
| |
Alliances | |
| |
| |
| |
Introduction: Why study alliances? | |
| |
| |
Definitions: What is an alliance? | |
| |
| |
Explanations of alliance persistence and collapse | |
| |
| |
The case of NATO after the Cold War | |
| |
| |
Conclusion: Alliance theory and the future of NATO | |
| |
| |
| |
Regional Institutions | |
| |
| |
| |
Introduction | |
| |
| |
Definitions | |
| |
| |
The origins and development of regional security institutions | |
| |
| |
Regional security institutions in the Cold War | |
| |
| |
Regional security institutions since the Cold War | |
| |
| |
Contemporary challenges | |
| |
| |
Peace operations | |
| |
| |
Terrorism and WMD | |
| |
| |
Assessing the growth of regional security institutions | |
| |
| |
Conclusion | |
| |
| |
| |
The United Nations | |
| |
| |
| |
Introduction | |
| |
| |
The Security Council | |
| |
| |
The General Assembly | |
| |
| |
The Secretariat | |
| |
| |
Other UN organs and actors | |
| |
| |
Twenty-first-century challenges | |
| |
| |
Changes in the nature of war and UN responses | |
| |
| |
Terrorism | |
| |
| |
Disarmament and non-proliferation | |
| |
| |
Conclusion | |
| |
| |
| |
Peace Operations | |
| |
| |
| |
Introduction | |
| |
| |
Language and meaning | |
| |
| |
Surge, retraction, resurgence | |
| |
| |
Reforms | |
| |
| |
Brahimi's report | |
| |
| |
Gueh�nno goals | |
| |
| |
Ban's plans | |
| |
| |
Standards and principles | |
| |
| |
Hybrid operations | |
| |
| |
Public security gaps | |
| |
| |
Conclusion: Future prospects | |
| |
| |
| |
The Nuclear Disarmament and Non-Proliferation Regime | |
| |
| |
| |
Introduction | |
| |
| |
Three caveats | |
| |
| |
Non-proliferation regime | |
| |
| |
Three challenges | |
| |
| |
Three approaches | |
| |
| |
Way forward | |
| |
| |
| |
Private Security | |
| |
| |
| |
Introduction | |
| |
| |
Private security and the control of force | |
| |
| |
A transnational market for military and security services | |
| |
| |
The current market compared | |
| |
| |
Why the current market? | |
| |
| |
Conclusion | |
| |
| |
| |
Contemporary Challenges | |
| |
| |
| |
The International Arms Trade | |
| |
| |
| |
Introduction | |
| |
| |
Three channels for arms transfers | |
| |
| |
Arms sales take off: The 1970s and 1980s | |
| |
| |
Post-Cold War dynamics | |
| |
| |
Post-9/11 arms exports | |
| |
| |
The trade in small arms and light weapons | |
| |
| |
Dangers of dual use: The A.Q. Khan network | |
| |
| |
Prospects for restraint | |
| |
| |
Conclusion | |
| |
| |
| |
Counterterrorism | |
| |
| |
| |
Introduction | |
| |
| |
Basic elements | |
| |
| |
Defence | |
| |
| |
Going on the offensive | |
| |
| |
Law enforcement and military force | |
| |
| |
Issues and choices | |
| |
| |
| |
Counterinsurgency | |
| |
| |
| |
Introduction: The current discourse on counterinsurgency | |
| |
| |
The state of the field | |
| |
| |
The problem that counterinsurgency responds to � insurgency | |
| |
| |
'Hearts and minds' | |
| |
| |
The role of military force in counterinsurgency | |
| |
| |
Learning on the ground | |
| |
| |
Counterinsurgency in the media age | |
| |
| |
Similarities to post-conflict peacebuilding | |
| |
| |
Conclusion | |
| |
| |
| |
The Responsibility to Protect | |
| |
| |
| |
Introduction | |
| |
| |
Sovereignty and responsibility | |
| |
| |
R2P and international politics | |
| |
| |
R2P in action | |
| |
| |
Kenya | |
| |
| |
Libya | |
| |
| |
Conclusion | |
| |
| |
| |
Transnational Organized Crime | |
| |
| |
| |
Introduction | |
| |
| |
Organized crime as a security threat | |
| |
| |
What is transnational organized crime? | |
| |
| |
Globalization, governance and the rise of organized crime | |
| |
| |
Transnational criminal organizations | |
| |
| |
Illicit markets | |
| |
| |
Responses to transnational crime | |
| |
| |
| |
Population Movements | |
| |
| |
| |
Introduction | |
| |
| |
Population movements as a security issue | |
| |
| |
Population movements categorized | |
| |
| |
Population movements and violent conflict | |
| |
| |
Population movements and foreign policy | |
| |
| |
Population movement and internal security | |
| |
| |
Conclusion | |
| |
| |
| |
Energy Security | |
| |
| |
| |
Introduction | |
| |
| |
Understanding energy security Why now? | |
| |
| |
Intimations of global petroleum insufficiency | |
| |
| |
A shift in the centre of gravity of world oil production | |
| |
| |
Oil facilities as a target of attack | |
| |
| |
Addressing energy (in)security | |
| |
| |
| |
Conclusions | |
| |
| |
| |
The Academic and Policy Worlds | |
| |
| |
| |
Introduction | |
| |
| |
What is policy-relevant knowledge? | |
| |
| |
Cold War nuclear experts | |
| |
| |
Realism and liberalism after the Cold War | |
| |
| |
Conclusion | |
| |
| |
| |
What Future for Security Studies? | |
| |
| |
| |
Introduction: Context and scope | |
| |
| |
Locating security studies | |
| |
| |
Future directions in the sub-field | |
| |
| |
Future directions in the sub-discipline | |
| |
| |
Security studies, porous boundaries and the struggle for coherence | |
| |
| |
References | |
| |
| |
Index | |