Security studies: an introduction
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
London [u.a.]
Routledge
2008
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXIV, 552 S. graph. Darst. |
ISBN: | 0415425611 041542562X 9780415425612 9780415425629 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023257523 | ||
003 | DE-604 | ||
005 | 20160929 | ||
007 | t | ||
008 | 080415s2008 xxud||| |||| 00||| eng d | ||
010 | |a 2007048272 | ||
020 | |a 0415425611 |c hardback |9 0-415-42561-1 | ||
020 | |a 041542562X |c pbk. |9 0-415-42562-X | ||
020 | |a 9780415425612 |c hardback |9 978-0-415-42561-2 | ||
020 | |a 9780415425629 |c pbk. |9 978-0-415-42562-9 | ||
035 | |a (OCoLC)230094352 | ||
035 | |a (DE-599)BVBBV023257523 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-M481 |a DE-739 |a DE-29 | ||
050 | 0 | |a JZ5588 | |
082 | 0 | |a 355/.033 | |
084 | |a MF 9400 |0 (DE-625)122810: |2 rvk | ||
084 | |a MF 9500 |0 (DE-625)122811: |2 rvk | ||
084 | |a POL 730f |2 stub | ||
245 | 1 | 0 | |a Security studies |b an introduction |c ed. by Paul D. Williams |
250 | |a 1. publ. | ||
264 | 1 | |a London [u.a.] |b Routledge |c 2008 | |
300 | |a XXIV, 552 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Internationale Politik | |
650 | 4 | |a International relations | |
650 | 4 | |a Security, International | |
650 | 0 | 7 | |a Internationale Politik |0 (DE-588)4072885-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Strategische Stabilität |0 (DE-588)4240956-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 1 | |a Internationale Politik |0 (DE-588)4072885-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Strategische Stabilität |0 (DE-588)4240956-1 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Williams, Paul |d 1975- |e Sonstige |0 (DE-588)14175950X |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 0-203-92660-9 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-203-92660-4 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016442777&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016442777 |
Datensatz im Suchindex
_version_ | 1807956331742625792 |
---|---|
adam_text |
Contents
List of boxes, figures and tables
xi
Notes on contributors
xv
Acknowledgements
xix
List of abbreviations
xxi
1
SECURITY STUDIES:
AN INTRODUCTION
1
Paul D. Williams
What is security studies? A very
short overview
2
Defining a field of inquiry: four
fundamental questions
5
What is security?
5
Whose security?
7
What is a security issue?
8
How can security be achieved?
9
How to use this book
10
Part
1
Theoretical
approaches
13
2
REALISM
15
Colin Elman
Introduction
15
Classical realism
17
Neorealism:
Waltz's Theory of
International Politics
18
Defensive structural realism
20
Offensive structural realism
22
Rise and fall realism
24
Neoclassical realism
25
Conclusion
26
3
LIBERALISM
29
Cornelia Navari
Introduction
29
Traditional or Kantian liberalism
30
Douce commerce
32
The democratic peace thesis
36
Neoliberal institutionalism
39
Conclusion
43
4
GAME THEORY
44
Frank C.
Zagare
Introduction
44
Primitive concepts
45
Strategic-form games and Nash
equilibria
46
Extensive-form games, backwards
induction and
subgame
perfect
equilibria
51
Applications of game theory in
security studies
53
Coda
56
5
CONSTRUCTIVISM
59
Matt McDonald
Introduction: constructivism and
security
59
Constructivism: central tenets
and shared assumptions
60
Security as social construction:
identity and norms
61
Negotiation and contestation
64
Agents, structures and change
66
The Copenhagen School
68
Conclusion
72
6
PEACE STUDIES
73
Peter Lawler
Introduction: What is peace studies?
74
Peace studies:
abrief
history
75
Peace research as science
77
From peace research to peace
studies
79
Key concepts
80
Positive and negative peace
81
Structural violence
83
CONTENTS
Cultural
violence
85
The
filture
of peace studies?
87
7
CRITICAL THEORY
89
Pinar Bilgin
Introduction: the need for a
critical perspective
89
Rethinking security
90
Critical theory
92
Theory/practice
96
The 'Welsh School' of critical
security studies
98
Emancipation
100
Conclusion
102
8
FEMINIST PERSPECTIVES
103
Sandra Whitworth
Introduction
103
Feminist approaches in
international security
104
Women, gender and security
-
the impacts of armed conflict
107
Women, gender and security
—
action and activism
110
Women, gender and security
—
talking and making weapons
and war
112
Conclusions
114
9
INTERNATIONAL POLITICAL
SOCIOLOGY
116
Didier
Bigo
Introduction
117
Security studies within
IR:
bordering and debordering what
security means
118
From security sectors to
(inbecuritization,
a
constructivist
stance
123
Is (inbecuritization only a speech
act enacting exception? The role
of routines and technologies
126
Conclusion
128
Part
2
Key concepts
131
10
UNCERTAINTY
133
Ken Booth and Nicholas J. Wheeler
Introduction
133
The house of uncertainty
134
The quintessential dilemma
136
Three logics
139
The security dilemma in the
twenty-first century
143
Towards a nev? agenda for security
studies
146
11
WAR
151
Paul D. Williams
Introduction
152
Three philosophies of war
152
Trends in armed conflicts since
1945 156
Who fights? Who dies?
161
Is the nature of warfare
changing?
163
The idea of total war
163
The 'new wars' debate
165
The contemporary Western way
of war
167
Conclusion
169
12
TERRORISM
171
Paul Rogers
Introduction
171
Terrorism in perspective
172
Definitions
173
State and sub-state terror
174
Responding to terrorism
175
The
9/11
response and the War
on Terror
178
Trends in terrorism
182
Terrorism and insurgency
182
Internationalism
182
Suicide terrorism
183
Speed of learning
183
Media developments
183
Economic targeting
183
VI
CONTENTS
Mass casualty attacks and weapons
of mass destruction
184
Conclusion
13
GENOCIDE AND MASS KILLING
Adam Jones
184
185
Setting the boundaries of human
security
Ongoing debates and unresolved
issues
Human security risk assessment
Governance and human security
232
233
238
240
Introduction
185
Genocide: key cases
188
Challenges of intervention
190
Conclusion: the way forward
-
and back
194
14
ETHNIC CONFLICT
200
Stuart J. Kaufman
Introduction
201
What is ethnic conflict?
202
An overview of ethnic conflicts
204
Causes of violent ethnic conflict
206
Sudan
208
Yugoslavia
209
International security dimensions
Towards a theory of human security
241
Conclusion
242
17
POVERTY
244
Caroline Thomas
Introduction
245
Is poverty an appropriate concern
for security studies?
246
Whose poverty? Whose security?
Placing human beings at the
centre of our concern
247
What do we know about the
poverty—security nexus?
249
What do we know about
poverty-violent conflict?
254
Effect of poverty on conflict
254
oř
ethnic conflicts
210
Effect of conflict on poverty
255
Resolution of ethnic civil wars
213
The diplomatic agenda on
poverty and security
256
15
COERCION
216
Conclusion
258
Lawrence Freedman and
Srinath Raghavan
18
ENVIRONMENTAL CHANGE
260
Introduction
216
Simon
Dalby
Strategy
217
Introduction
261
Deterrence and compelience
217
Environmental security
261
Designing coercive strategies
219
Robert Kaplan's 'coming anarchy'
262
Punishment and denial
220
Environmental threat: science?
264
Types of costs
222
Environmental threat: policy
Multiple audiences
224
options?
266
Reputations
225
Ten years after: the Pentagon
Long-term impact
226
climate scenario
268
Conclusion
227
Human security and global
ecology
270
16
HUMAN SECURITY
229
Fen Osier Hampson
19
HEALTH
274
Introduction
229
Colin Mclnnes
Understanding the scope of human
Introduction
274
security
230
Health as a security issue
276
VII
CONTENTS
The spread of infectious disease
278
HIV/AIDS as a security issue
279
Bioterrorism
282
A not so perfect partnership?
284
Conclusion
286
Part3 Institutions
289
20
ALLIANCES
291
John S. Duffield with Cynthia Michota
and Sara Ann Miller
Introduction: Why study alliances?
291
Definitions: What is an alliance?
292
Explanations of alliance persistence
and collapse
294
Theories of alliance formation
295
Alliance institutionalization and
socialization
298
The case of NATO after the
Cold War
300
Background: NATO's origins and
evolution during the Cold War
300
The puzzle of NATO's post-Cold War
persistence
301
Explaining NATO's persistence
302
Conclusion: alliance theory and the
future of NATO
304
21
REGIONAL INSTITUTIONS
Louise Fawcett
307
308
Introduction
Organization of the chapter
310
Note on terms
311
The origins and development of
regional security institutions
311
Regional security institutions in
the Cold War
313
Regional
securit)'
institutions since
the Cold War
316
Contemporary challenges
318
Peace operations
319
The post-2001 security environment
321
Assessing the growth of regional
security institutions
322
22
THE UNITED NATIONS
Thomas G. Weiss and
Danielle
Zach Kaibacher
325
Introduction
325
The Security Council
327
Composition
327
Powers
329
The Security Council's task
expansion
329
US hegemony
331
Increased access by actors other
than states
332
The General Assembly
333
The Secretariat
334
Other UN organs and actors
336
Twenty-first-century challenges
337
Changes in the nature of war and
UN responses
338
Terrorism
340
Disarmament and non-proliferation
341
Conclusion
341
Part
4
Contemporary
challenges
343
345
23
THE INTERNATIONAL ARMS TRADE
William D.
Härtung
Introduction
345
Three channels for arms transfers
346
Arms sales take-off: the
1970s
and
1980s 348
Post-Cold War dynamics
351
Post-9/11 arms exports
352
The trade in small arms and light
weapons
353
Dangers of dual use: the A.Q. Khan
network
357
Prospects for restraint
359
Conclusion
360
24
NUCLEAR PROLIFERATION
Waheguru Pal Singh Sidhu
Introduction
Three caveats
361
361
363
VIII
CONTENTS
25
Non-proliferation regime
Three challenges
Three approaches
Way forward
COUNTERTERRORISM
Paul R. Pillar
Introduction
Basic elements
Defence
Going on the offence
364
364
371
373
376
376
377
380
382
Law enforcement and military force
384
Issues and choices
387
26
COUNTERINSURGENCY
389
Joanna Spear
Introduction: the current discourse
on counterinsurgency
The state of the field
The problem that counterinsurgency
responds to
—
insurgency
'Hearts and minds'
The role of military force in
counterinsurgency
Learning on the ground
What difference does it make to
be doing counterinsurgency in
the media age?
Similarities to post-conflict peace
building
Conclusion
27
PEACE OPERATIONS
Michael Pugh
Introduction
Language and meaning
Surge, retraction, resurgence
Reforms
Brahimis
report
413
Guéhenno's
goals
415
Ban's plans
416
Standards
416
Hybrid operations
417
Public security gap
418
Conclusion: future prospects
28
THE RESPONSIBILITY TO PROTECT
422
Alex
J
.
Bellamy
Introduction
422
Sovereignty and responsibility:
from the American Revolution
to the ICISS report
424
R2P
427
Responsibility to prevent
427
Responsibility to react
429
Responsibility to rebuild
432
From ICISS to the World Summit
433
Turning ideas into actions?
434
Conclusion
436
29
PRIVATE SECURITY
438
Deborah D.
Avant
Introduction
438
JOJ
392
Private security and the control
of force
440
4Q4.
A transnational market for
397
military and security services
441
■J
S
ι
The current market compared
445
398
Why the current market?
448
400
Conclusion
449
30
TRANSNATIONAL ORGANIZED
402
CRIME
453
John T. Picareili
402
Introduction
453
404
Transnational criminal
Af\~7
organizations
454
407
The illicit political economy
456
The big three: drugs, people
407
and arms
457
409
The wide world of crime
459
410
Money laundering and corruption
460
413
The dark side of globalization
461
Transnational crime as a security
issue
462
International security
462
National security
463
Human security
464
Responses to transnational crime
464
419
Conclusion
466
IX
CONTENTS
31 POPULATION
MOVEMENTS
Sita Bali
468
468
Introduction
Population
movements as a
security issue
470
Population movements categorized
471
Population movements and
violent conflict
474
Population movements and foreign
policy
475
Population movements and internal
security
478
Conclusion
480
32
ENERGY SECURITY
483
Michael T.
Klare
Introduction
483
Understanding energy security
484
Why now?
488
Intimations of global petroleum
insufficiency
489
A shift in the centre of gravity of
world oil production
Oil facilities as a target of attack
Addressing energy (insecurity
Conclusion
33
WHAT FUTURE FOR SECURITY
STUDIES?
Stuart Croft
491
492
493
497
499
Introduction: context and scope
499
Locating security studies
500
Future directions in the subfield
503
Future directions in the
subdiscipline
507
Security studies, porous boundaries,
and the struggle for coherence
510
Bibliography
Index
512
540 |
adam_txt |
Contents
List of boxes, figures and tables
xi
Notes on contributors
xv
Acknowledgements
xix
List of abbreviations
xxi
1
SECURITY STUDIES:
AN INTRODUCTION
1
Paul D. Williams
What is security studies? A very
short overview
2
Defining a field of inquiry: four
fundamental questions
5
What is security?
5
Whose security?
7
What is a security issue?
8
How can security be achieved?
9
How to use this book
10
Part
1
Theoretical
approaches
13
2
REALISM
15
Colin Elman
Introduction
15
Classical realism
17
Neorealism:
Waltz's Theory of
International Politics
18
Defensive structural realism
20
Offensive structural realism
22
Rise and fall realism
24
Neoclassical realism
25
Conclusion
26
3
LIBERALISM
29
Cornelia Navari
Introduction
29
Traditional or Kantian liberalism
30
Douce commerce
32
The democratic peace thesis
36
Neoliberal institutionalism
39
Conclusion
43
4
GAME THEORY
44
Frank C.
Zagare
Introduction
44
Primitive concepts
45
Strategic-form games and Nash
equilibria
46
Extensive-form games, backwards
induction and
subgame
perfect
equilibria
51
Applications of game theory in
security studies
53
Coda
56
5
CONSTRUCTIVISM
59
Matt McDonald
Introduction: constructivism and
security
59
Constructivism: central tenets
and shared assumptions
60
Security as social construction:
identity and norms
61
Negotiation and contestation
64
Agents, structures and change
66
The Copenhagen School
68
Conclusion
72
6
PEACE STUDIES
73
Peter Lawler
Introduction: What is peace studies?
74
Peace studies:
abrief
history
75
Peace research as science
77
From peace research to peace
studies
79
Key concepts
80
Positive and negative peace
81
Structural violence
83
CONTENTS
Cultural
violence
85
The
filture
of peace studies?
87
7
CRITICAL THEORY
89
Pinar Bilgin
Introduction: the need for a
critical perspective
89
Rethinking security
90
Critical theory
92
Theory/practice
96
The 'Welsh School' of critical
security studies
98
Emancipation
100
Conclusion
102
8
FEMINIST PERSPECTIVES
103
Sandra Whitworth
Introduction
103
Feminist approaches in
international security
104
Women, gender and security
-
the impacts of armed conflict
107
Women, gender and security
—
action and activism
110
Women, gender and security
—
talking and making weapons
and war
112
Conclusions
114
9
INTERNATIONAL POLITICAL
SOCIOLOGY
116
Didier
Bigo
Introduction
117
Security studies within
IR:
bordering and debordering what
security means
118
From security sectors to
(inbecuritization,
a
constructivist
stance
123
Is (inbecuritization only a speech
act enacting exception? The role
of routines and technologies
126
Conclusion
128
Part
2
Key concepts
131
10
UNCERTAINTY
133
Ken Booth and Nicholas J. Wheeler
Introduction
133
The house of uncertainty
134
The quintessential dilemma
136
Three logics
139
The security dilemma in the
twenty-first century
143
Towards a nev? agenda for security
studies
146
11
WAR
151
Paul D. Williams
Introduction
152
Three philosophies of war
152
Trends in armed conflicts since
1945 156
Who fights? Who dies?
161
Is the nature of warfare
changing?
163
The idea of total war
163
The 'new wars' debate
165
The contemporary Western way
of war
167
Conclusion
169
12
TERRORISM
171
Paul Rogers
Introduction
171
Terrorism in perspective
172
Definitions
173
State and sub-state terror
174
Responding to terrorism
175
The
9/11
response and the War
on Terror
178
Trends in terrorism
182
Terrorism and insurgency
182
Internationalism
182
Suicide terrorism
183
Speed of learning
183
Media developments
183
Economic targeting
183
VI
CONTENTS
Mass casualty attacks and weapons
of mass destruction
184
Conclusion
13
GENOCIDE AND MASS KILLING
Adam Jones
184
185
Setting the boundaries of human
security
Ongoing debates and unresolved
issues
Human security risk assessment
Governance and human security
232
233
238
240
Introduction
185
Genocide: key cases
188
Challenges of intervention
190
Conclusion: the way forward
-
and back
194
14
ETHNIC CONFLICT
200
Stuart J. Kaufman
Introduction
201
What is ethnic conflict?
202
An overview of ethnic conflicts
204
Causes of violent ethnic conflict
206
Sudan
208
Yugoslavia
209
International security dimensions
Towards a theory of human security
241
Conclusion
242
17
POVERTY
244
Caroline Thomas
Introduction
245
Is poverty an appropriate concern
for security studies?
246
Whose poverty? Whose security?
Placing human beings at the
centre of our concern
247
What do we know about the
poverty—security nexus?
249
What do we know about
poverty-violent conflict?
254
Effect of poverty on conflict
254
oř
ethnic conflicts
210
Effect of conflict on poverty
255
Resolution of ethnic civil wars
213
The diplomatic agenda on
poverty and security
256
15
COERCION
216
Conclusion
258
Lawrence Freedman and
Srinath Raghavan
18
ENVIRONMENTAL CHANGE
260
Introduction
216
Simon
Dalby
Strategy
217
Introduction
261
Deterrence and compelience
217
Environmental security
261
Designing coercive strategies
219
Robert Kaplan's 'coming anarchy'
262
Punishment and denial
220
Environmental threat: science?
264
Types of costs
222
Environmental threat: policy
Multiple audiences
224
options?
266
Reputations
225
Ten years after: the Pentagon
Long-term impact
226
climate scenario
268
Conclusion
227
Human security and global
ecology
270
16
HUMAN SECURITY
229
Fen Osier Hampson
19
HEALTH
274
Introduction
229
Colin Mclnnes
Understanding the scope of human
Introduction
274
security
230
Health as a security issue
276
VII
CONTENTS
The spread of infectious disease
278
HIV/AIDS as a security issue
279
Bioterrorism
282
A not so perfect partnership?
284
Conclusion
286
Part3 Institutions
289
20
ALLIANCES
291
John S. Duffield with Cynthia Michota
and Sara Ann Miller
Introduction: Why study alliances?
291
Definitions: What is an alliance?
292
Explanations of alliance persistence
and collapse
294
Theories of alliance formation
295
Alliance institutionalization and
socialization
298
The case of NATO after the
Cold War
300
Background: NATO's origins and
evolution during the Cold War
300
The puzzle of NATO's post-Cold War
persistence
301
Explaining NATO's persistence
302
Conclusion: alliance theory and the
future of NATO
304
21
REGIONAL INSTITUTIONS
Louise Fawcett
307
308
Introduction
Organization of the chapter
310
Note on terms
311
The origins and development of
regional security institutions
311
Regional security institutions in
the Cold War
313
Regional
securit)'
institutions since
the Cold War
316
Contemporary challenges
318
Peace operations
319
The post-2001 security environment
321
Assessing the growth of regional
security institutions
322
22
THE UNITED NATIONS
Thomas G. Weiss and
Danielle
Zach Kaibacher
325
Introduction
325
The Security Council
327
Composition
327
Powers
329
The Security Council's task
expansion
329
US hegemony
331
Increased access by actors other
than states
332
The General Assembly
333
The Secretariat
334
Other UN organs and actors
336
Twenty-first-century challenges
337
Changes in the nature of war and
UN responses
338
Terrorism
340
Disarmament and non-proliferation
341
Conclusion
341
Part
4
Contemporary
challenges
343
345
23
THE INTERNATIONAL ARMS TRADE
William D.
Härtung
Introduction
345
Three channels for arms transfers
346
Arms sales take-off: the
1970s
and
1980s 348
Post-Cold War dynamics
351
Post-9/11 arms exports
352
The trade in small arms and light
weapons
353
Dangers of dual use: the A.Q. Khan
network
357
Prospects for restraint
359
Conclusion
360
24
NUCLEAR PROLIFERATION
Waheguru Pal Singh Sidhu
Introduction
Three caveats
361
361
363
VIII
CONTENTS
25
Non-proliferation regime
Three challenges
Three approaches
Way forward
COUNTERTERRORISM
Paul R. Pillar
Introduction
Basic elements
Defence
Going on the offence
364
364
371
373
376
376
377
380
382
Law enforcement and military force
384
Issues and choices
387
26
COUNTERINSURGENCY
389
Joanna Spear
Introduction: the current discourse
on counterinsurgency
The state of the field
The problem that counterinsurgency
responds to
—
insurgency
'Hearts and minds'
The role of military force in
counterinsurgency
Learning on the ground
What difference does it make to
be doing counterinsurgency in
the media age?
Similarities to post-conflict peace
building
Conclusion
27
PEACE OPERATIONS
Michael Pugh
Introduction
Language and meaning
Surge, retraction, resurgence
Reforms
Brahimis
report
413
Guéhenno's
goals
415
Ban's plans
416
Standards
416
Hybrid operations
417
Public security gap
418
Conclusion: future prospects
28
THE RESPONSIBILITY TO PROTECT
422
Alex
J
.
Bellamy
Introduction
422
Sovereignty and responsibility:
from the American Revolution
to the ICISS report
424
R2P
427
Responsibility to prevent
427
Responsibility to react
429
Responsibility to rebuild
432
From ICISS to the World Summit
433
Turning ideas into actions?
434
Conclusion
436
29
PRIVATE SECURITY
438
Deborah D.
Avant
Introduction
438
JOJ
392
Private security and the control
of force
440
4Q4.
A transnational market for
397
military and security services
441
■J
S
ι
The current market compared
445
398
Why the current market?
448
400
Conclusion
449
30
TRANSNATIONAL ORGANIZED
402
CRIME
453
John T. Picareili
402
Introduction
453
404
Transnational criminal
Af\~7
organizations
454
407
The illicit political economy
456
The big three: drugs, people
407
and arms
457
409
The wide world of crime
459
410
Money laundering and corruption
460
413
The dark side of globalization
461
Transnational crime as a security
issue
462
International security
462
National security
463
Human security
464
Responses to transnational crime
464
419
Conclusion
466
IX
CONTENTS
31 POPULATION
MOVEMENTS
Sita Bali
468
468
Introduction
Population
movements as a
security issue
470
Population movements categorized
471
Population movements and
violent conflict
474
Population movements and foreign
policy
475
Population movements and internal
security
478
Conclusion
480
32
ENERGY SECURITY
483
Michael T.
Klare
Introduction
483
Understanding energy security
484
Why now?
488
Intimations of global petroleum
insufficiency
489
A shift in the centre of gravity of
world oil production
Oil facilities as a target of attack
Addressing energy (insecurity
Conclusion
33
WHAT FUTURE FOR SECURITY
STUDIES?
Stuart Croft
491
492
493
497
499
Introduction: context and scope
499
Locating security studies
500
Future directions in the subfield
503
Future directions in the
subdiscipline
507
Security studies, porous boundaries,
and the struggle for coherence
510
Bibliography
Index
512
540 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)14175950X |
building | Verbundindex |
bvnumber | BV023257523 |
callnumber-first | J - Political Science |
callnumber-label | JZ5588 |
callnumber-raw | JZ5588 |
callnumber-search | JZ5588 |
callnumber-sort | JZ 45588 |
callnumber-subject | JZ - International Relations |
classification_rvk | MF 9400 MF 9500 |
classification_tum | POL 730f |
ctrlnum | (OCoLC)230094352 (DE-599)BVBBV023257523 |
dewey-full | 355/.033 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355/.033 |
dewey-search | 355/.033 |
dewey-sort | 3355 233 |
dewey-tens | 350 - Public administration and military science |
discipline | Politologie Militärwissenschaft |
discipline_str_mv | Politologie Militärwissenschaft |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV023257523</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160929</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080415s2008 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007048272</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0415425611</subfield><subfield code="c">hardback</subfield><subfield code="9">0-415-42561-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">041542562X</subfield><subfield code="c">pbk.</subfield><subfield code="9">0-415-42562-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780415425612</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-415-42561-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780415425629</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-0-415-42562-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)230094352</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023257523</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-M481</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-29</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">JZ5588</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355/.033</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MF 9400</subfield><subfield code="0">(DE-625)122810:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MF 9500</subfield><subfield code="0">(DE-625)122811:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">POL 730f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security studies</subfield><subfield code="b">an introduction</subfield><subfield code="c">ed. by Paul D. Williams</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London [u.a.]</subfield><subfield code="b">Routledge</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 552 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internationale Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">International relations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security, International</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationale Politik</subfield><subfield code="0">(DE-588)4072885-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Strategische Stabilität</subfield><subfield code="0">(DE-588)4240956-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internationale Politik</subfield><subfield code="0">(DE-588)4072885-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Strategische Stabilität</subfield><subfield code="0">(DE-588)4240956-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Williams, Paul</subfield><subfield code="d">1975-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)14175950X</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">0-203-92660-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-203-92660-4</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016442777&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016442777</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV023257523 |
illustrated | Illustrated |
index_date | 2024-07-02T20:30:21Z |
indexdate | 2024-08-21T00:51:58Z |
institution | BVB |
isbn | 0415425611 041542562X 9780415425612 9780415425629 |
language | English |
lccn | 2007048272 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016442777 |
oclc_num | 230094352 |
open_access_boolean | |
owner | DE-12 DE-M481 DE-739 DE-29 |
owner_facet | DE-12 DE-M481 DE-739 DE-29 |
physical | XXIV, 552 S. graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Routledge |
record_format | marc |
spelling | Security studies an introduction ed. by Paul D. Williams 1. publ. London [u.a.] Routledge 2008 XXIV, 552 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Internationale Politik International relations Security, International Internationale Politik (DE-588)4072885-7 gnd rswk-swf Strategische Stabilität (DE-588)4240956-1 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf 1\p (DE-588)4143413-4 Aufsatzsammlung gnd-content Sicherheitspolitik (DE-588)4116489-1 s Internationale Politik (DE-588)4072885-7 s DE-604 Strategische Stabilität (DE-588)4240956-1 s 2\p DE-604 Williams, Paul 1975- Sonstige (DE-588)14175950X oth Erscheint auch als Online-Ausgabe 0-203-92660-9 Erscheint auch als Online-Ausgabe 978-0-203-92660-4 Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016442777&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Security studies an introduction Internationale Politik International relations Security, International Internationale Politik (DE-588)4072885-7 gnd Strategische Stabilität (DE-588)4240956-1 gnd Sicherheitspolitik (DE-588)4116489-1 gnd |
subject_GND | (DE-588)4072885-7 (DE-588)4240956-1 (DE-588)4116489-1 (DE-588)4143413-4 |
title | Security studies an introduction |
title_auth | Security studies an introduction |
title_exact_search | Security studies an introduction |
title_exact_search_txtP | Security studies an introduction |
title_full | Security studies an introduction ed. by Paul D. Williams |
title_fullStr | Security studies an introduction ed. by Paul D. Williams |
title_full_unstemmed | Security studies an introduction ed. by Paul D. Williams |
title_short | Security studies |
title_sort | security studies an introduction |
title_sub | an introduction |
topic | Internationale Politik International relations Security, International Internationale Politik (DE-588)4072885-7 gnd Strategische Stabilität (DE-588)4240956-1 gnd Sicherheitspolitik (DE-588)4116489-1 gnd |
topic_facet | Internationale Politik International relations Security, International Strategische Stabilität Sicherheitspolitik Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016442777&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT williamspaul securitystudiesanintroduction |