Contemporary security studies:
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford, United Kingdom
Oxford University Press
[2022]
|
Ausgabe: | Sixth edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxxi, 549 Seiten Illustrationen |
ISBN: | 9780198862192 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV047855154 | ||
003 | DE-604 | ||
005 | 20220609 | ||
007 | t | ||
008 | 220225s2022 xxka||| |||| 00||| eng d | ||
020 | |a 9780198862192 |c paperback : £37.99 |9 978-0-19-886219-2 | ||
035 | |a (OCoLC)1310245958 | ||
035 | |a (DE-599)KXP1780468563 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxk |c XA-GB | ||
049 | |a DE-824 |a DE-703 |a DE-706 |a DE-473 |a DE-29 |a DE-898 |a DE-19 |a DE-188 | ||
082 | 0 | |a 327.17 | |
084 | |a MF 9500 |0 (DE-625)122811: |2 rvk | ||
084 | |a MK 3000 |0 (DE-625)123042: |2 rvk | ||
245 | 1 | 0 | |a Contemporary security studies |c edited by Alan Collins |
250 | |a Sixth edition | ||
264 | 1 | |a Oxford, United Kingdom |b Oxford University Press |c [2022] | |
300 | |a xxxi, 549 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 0 | 7 | |a Internationale Politik |0 (DE-588)4072885-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Politische Wissenschaft |0 (DE-588)4076229-4 |2 gnd |9 rswk-swf |
653 | 0 | |a Security, International | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 1 | |a Internationale Politik |0 (DE-588)4072885-7 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 1 | 1 | |a Politische Wissenschaft |0 (DE-588)4076229-4 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Collins, Alan |d 1967- |0 (DE-588)136785689 |4 edt | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033237911&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-033237911 |
Datensatz im Suchindex
_version_ | 1804183422327848960 |
---|---|
adam_text | Brief Contents Notes on Contributors xix List of Figures xxiii List of Tables xxiv List of Boxes xxv How to use this book xxix Online Resources xxxii I Introduction: What is Security Studies? I Alan Collins PART I Approaches to Security 2 Realism II 13 Charles L Glaser 3 Liberalism and Liberal Internationalism 30 Patrick Morgan, with Alan Collins A Historical Materialism 47 Eric Herring 5 Peace Studies 60 Paul Rogers 6 Social Constructivism 73 Christine Agius 7 Critical Security Studies: A Schismatic History 90 David Mutimer, with Derek Verbakel 8 Critical Security Studies II—Narratives of Security: Other Stories, Other Actors 111 J. Marshall Beier 9 Postcolonialism 126 Mark Laffey and Suthaharan Nadarajah 10 Human Security 144 Randolph B. Persaud 11 Gender and Security 159 Caroline Kennedy-Рфе and Sophia Dingli 12 Securitization Theory Stephane Baele and Catarina Thomson 13 Popular Culture and Security Galia Press-Bamathan 173
Brief Contents PART 2 Deepening and Broadening Security 14 Military Security 201 203 Michael Sheehan 15 Regime Security Andreas Krieg 16 Societal Security 233 Paul Roe 17 Environmental Security ^ Geoff Dabelko 18 Economic Security Gary M. Shiffman 19 Globalization, Development, and Security 278 Nana K. Роки and Jacqueline Therkelsen PART 3 Traditional and Non-Traditional Security 295 20 Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts Peter Viggo Jakobsen 297 21 Weapons of Mass Destruction 312 James J. Wirtz 22 Terrorism 329 Brenda Lutz and James Lutz 23 Humanitarian Intervention 346 Alex J. Bellamy and Stephen McLaughlin 24 Energy Security 362 Sam Raphael and Doug Stokes 25 The Weapons Trade 37¿ Suzette R. Grillot 26 Health and Security jşq Stefan Elbe and Eva Hilberg 27 Transnational Crime Nathan P. Jones 28 Cyber-Security 404 ^ Myriam Dunn Cavelty 29 After the Return to Theory: The Past, Present, and Future of Security Studies 437 Ole Wæver and Barry Buzan Glossary References Index 4S9 479
Detailed Contents Notes on Contributors xix List Of Figures χχΐϋ List of Tables χχ1γ List of Boxes xxv How to use this book xxix xxx¡¡ Online Resources I Introduction: What isSecurity Studies? I Alan Collins 1.1 Introduction ՜ I 1.2 Definition of security | 1.3 Structure շ 1.4 Conclusion PARTI Approaches to Security 2 Realism 10 II 13 Charles L Glaser 2.1 Introduction 14 2.2 What is realism? 14 2.3 Waltz’s structural realism і8 2.4 Offensive realism 19 2.5 Defensive realism 21 2.6 Motivational realism 25 2.7 Realism and war 26 2.8 Conclusion 27 3 Liberalism and Liberal Internationalism 30 Patrick Morgan, with Alan Collins 3.1 Introduction 31 3.2 Characteristic features of liberalism and liberal internationalism 31 3.3 Central elements in liberalism thinking: commercial liberalism 32 3.4 Pursuit of human rights 33 3.5 Liberalism and international organizations 34 3.6 Liberalism and democracy 36 3.7 Tracing liberal internationalism’s rise and fall: the Cold War and after 37
XII Detailed Contents 3 8 Liberalism and liberalist internationalism now—under severe strain 43 3.9 Conclusion 4 Historical Materialism 47 Eric Herring 4.1 An overview of historical materialism 4.2 Capitalism and neoliberalism: insecurity for labour, security for capital 49 4 3 Historical materialism, (in)security, and Security Studies 53 4.4 Conclusion 58 5 Peace Studies Paul Rogers 5.1 Introduction ^ 5.2 The early years ^ 5.3 Evolution amidst controversy ^ 5.4 What is peace studies now? 5.5 Responding to the newsecurity challenges 87 5.6 Conclusion 78 6 Social Constructivism 73 Christine Agius 6.1 Introduction 74 6.2 Definitions and key concepts 76 6.3 Wendt’s three cultures of anarchy 82 6.4 Conventional and critical constructivism 83 6.5 Critiques of constructivism 85 6.6 Conclusion 87 7 Critical Security Studies: A Schismatic History 90 David Mutimer, with Derek Verbakel 7.1 Introduction: ‘Follow the sign of the gourd’ 91 7.2 Toronto desire: Critical Security Studies 92 7.3 Copenhagen distinctions 95 7.4 Aberystwyth exclusions 95 7.5 Constructing security I qq 7.6 Everyone’s other: poststructuralism and security ЮІ 7.7 Beyond divisions? CASEing the joint or returning the gift? 195 7.8 Conclusion løg 8 Critical Security Studies II—Narratives of Security: Other Stories, Other Actors 111 J. Marshall Beier 8.1 Introduction 8.2 Secret agents and power bases 8.3 The subject of ‘smart’ bombs 8.4 Complicated subjects: children 8.5 Indigenous peoples and a cautionary tale 112 I 14 II6 118 121 8.6 Conclusion 123
Detailed Contents 9 Postcolonialism l26 Mark Laffey and Suthaharan Nadarajah 9.1 Introduction 127 9.2 A view from elsewhere: genealogies of the postcolonial 128 9.3 Security and the colonizer’s view of the world 132 9.4 Decolonizing security: strategies 135 9.5 Conclusion: should we‘forget security studies’? 141 10 Human Security 144 Randolph B. Persaud 10.1 11 Introduction 145 10.2 Arguments for human security 146 10.3 The genealogy of human security: what’s new? 151 10.4 Critiques of human security 154 10.5 Conclusion 156 Gender and Security 159 Caroline Kennedy-Pipe and Sophia Dingli 11.1 Introduction 160 11.2 Representations 160 11.3 Practical context I: war 165 11.4 Practical context II: civilian life 167 11.5 Practical context III: the post-conflict environment 169 11.6 Multiple perceptions, same realities? 170 11.7 Conclusion 171 12 Securitization Theory 173 Stephane Baele and Catarina Thomson 12.1 Introduction 174 12.2 From Copenhagen to the world: The evolution of securitization theory from the 1980s to the 2020s 12.3 Main empirical cases in securitization research 175 179 12.4 Challenges and critiques facing securitization theory 182 12.5 Conclusion 184 13 Popular Culture and Security 186 Galia Press-Barnathan 13.1 Introduction 187 13.2 What do we mean by popular culture? 187 13.3 What makes popular culture so politically relevant? 188 13.4 The expansion of Security Studies and the growing interest in popular culture 189 13.5 The role of popular culture in conflict management 190 13.6 Popular culture and the struggle over ‘soft power’ 192 13.7 Popular culture and
the making of peace 196 13.8 Conclusion 198 xiii
Detailed Contents FART 2 Deepening and Broadening Security 14 Military Security Michael Sheehan 203 14.1 Introduction 204 ^ 14.2 Approaches tomilitary security ^ 14 3 Traditional military-security studies И, ѴЙГ 14.5 Alliances and neutrality “ ^ 14.6 Deterrence 14.7 Cooperative security and arms control 14.8 The cost of military security 14.9 Conclusion 2(6 15 Regime Security Andreas Krieg 218 15.1 Introduction 219 15.2 Public versus regime security 219 15.3, Threats to regime security 220 15.4 The regime insecurity loop 221 15.5 Security strategies of patrimonial regimes Ύ1Ύ 15.6 Anatomy of a weak state: Assad’s Syria 15.7 Prospects for regimes in the developing world 22® 15.8 Conclusion: The need for sustainable governance 229 16 Societal Security Paul Roe 222 16.1 Introduction 234 16.2 A duality of state and societal security 234 16.3 Society and societal identity 235 16.4 Threats to societal identity 237 16.5 Defending societal identity 241 16.6 Conclusion 243 17 Environmental Security Geoff Dabelko 247 17.1 Introduction 248 17.2 The origins of environmental security 248 17.3 Major interpretations of environmental security 251 17.4 Environmental change and violent conflict 253 17.5 Environmental change and national security 254 12-6 Armed forces, war, and the environment 256 17.7 Environmental change and human security 247
Detailed Contents 17.8 Environment or security? 259 17.9 Conclusion 250 18 Economic Security 253 Gory M. Shiftman 18.1 Introduction 253 18.2 Economic science of security 264 18.3 Economic tools of security policy 269 18.4 Conclusion 276 19 Globalization, Development, and Security 278 Nono К Роки and Jacqueline Therkelsen 19.1 Introduction 19.2 Globalization as a neoliberal ideologyfor development 279 19.3 Neoliberalism and the fostering of inequality 283 19.4 Global inequality as a threat to global security 286 19.5 Conclusion 290 PART 3 20 279 Traditional and Non-Traditional Security Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts 295 297 Peter Viggo Jakobsen 20.1 Introduction 20.2 What is coercive diplomacy? 21 298 299 20.3 Requirements for success 302 20.4 The challenge of defining success 303 20.5 The importance of the strategic context 306 20.6 Conclusion 307 Weapons of Mass Destruction 312 James J. Wirtz 21.1 Introduction 312 21.2 Nuclear weapons 314 21.3 Chemical weapons 319 21.4 22 Biological weapons 323 21.5 Conclusion 327 Terrorism 329 Brenda Lutz and James Lutz 22.1 Introduction 329 22.2 Concepts and definitions 331 22.3 Types and causes of terrorism 335 22.4 Security measures 338 22.5 Conclusion 342 XV
XVI Detailed Contents 23 Humanitarian Intervention Alex J. Bellamy and Stephen McLoughlin 23.1 Introduction 347 350 23.2 The case for humanitarian intervention 23.3 The case against humanitarian intervention 352 23.4 The Responsibility to Protect 3^ 23.5 Conclusion 3 ^* 24 Energy Security 362 Sam Raphael and Doug Stokes 24.1 Introduction 362 24.2 The problem of energy security 364 24.3 Energy security and International Relations theory 365 24.4 Energy security and human insecurity 367 24.5 Energy security and the United States 370 24.6 Conclusion 373 25 The Weapons Trade 376 Suzette R. Grillot 25.1 Introduction 376 25.2 History and shifting dynamics of the defence trade 377 25.3 Contemporary trends in the weaponstrade 378 25.4 The illicit arms trade 381 25.5 Controlling the weapons trade 384 25.6 Conclusion 387 26 Health and Security 390 Stefan Elbe and Eva Hilberg 26.1 Introduction 391 26.2 Health and human security 391 26.3 Health and national security 393 26.4 Health and bio-security 399 26.5 Conclusion 4QI 27 Transnational Crime 404 Nathan P. Jones 27.1 Introduction 405 27.2 Definitions and key concepts 27.3 ‘Crime-terror nexus 27.4 Organized crime and the state 27.5 Case study: organized crime in Mexico 412 413 41 27.6 State responses to transnational crime 27.7 Conclusion 418 419
Detailed Contents 28 Cyber-Security 422 Myriam Dunn Cavelty 28.1 Introduction 423 28.2 Security and cyberspace 423 28.3 Types of cyber-threats 425 28.4 The reality of cyber-conflict 43 ( 28.5 Reducing cyber-in-security 432 28.6 Conclusion 434 29 After the Return to Theory: The Past, Present, and Future of Security Studies 437 O/e Wæver and Barry Buzan 29.1 Introduction 438 29.2 The origins and institutional structureof security studies 439 29.3 The Golden Age of security studies 441 29.4 Institutionalization and stagnation 443 29.5 Disciplinary questioning and theoretical relaunch 446 29.6 Conclusion: the powers of theory and thechallenges of the future 452 Glossary 459 References 479 Index 527 xvii
|
adam_txt |
Brief Contents Notes on Contributors xix List of Figures xxiii List of Tables xxiv List of Boxes xxv How to use this book xxix Online Resources xxxii I Introduction: What is Security Studies? I Alan Collins PART I Approaches to Security 2 Realism II 13 Charles L Glaser 3 Liberalism and Liberal Internationalism 30 Patrick Morgan, with Alan Collins A Historical Materialism 47 Eric Herring 5 Peace Studies 60 Paul Rogers 6 Social Constructivism 73 Christine Agius 7 Critical Security Studies: A Schismatic History 90 David Mutimer, with Derek Verbakel 8 Critical Security Studies II—Narratives of Security: Other Stories, Other Actors 111 J. Marshall Beier 9 Postcolonialism 126 Mark Laffey and Suthaharan Nadarajah 10 Human Security 144 Randolph B. Persaud 11 Gender and Security 159 Caroline Kennedy-Рфе and Sophia Dingli 12 Securitization Theory Stephane Baele and Catarina Thomson 13 Popular Culture and Security Galia Press-Bamathan 173
Brief Contents PART 2 Deepening and Broadening Security 14 Military Security 201 203 Michael Sheehan 15 Regime Security Andreas Krieg 16 Societal Security 233 Paul Roe 17 Environmental Security ^ Geoff Dabelko 18 Economic Security Gary M. Shiffman 19 Globalization, Development, and Security 278 Nana K. Роки and Jacqueline Therkelsen PART 3 Traditional and Non-Traditional Security 295 20 Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts Peter Viggo Jakobsen 297 21 Weapons of Mass Destruction 312 James J. Wirtz 22 Terrorism 329 Brenda Lutz and James Lutz 23 Humanitarian Intervention 346 Alex J. Bellamy and Stephen McLaughlin 24 Energy Security 362 Sam Raphael and Doug Stokes 25 The Weapons Trade 37¿ Suzette R. Grillot 26 Health and Security jşq Stefan Elbe and Eva Hilberg 27 Transnational Crime Nathan P. Jones 28 Cyber-Security 404 ^ Myriam Dunn Cavelty 29 After the Return to Theory: The Past, Present, and Future of Security Studies 437 Ole Wæver and Barry Buzan Glossary References Index 4S9 479
Detailed Contents Notes on Contributors xix List Of Figures χχΐϋ List of Tables χχ1γ List of Boxes xxv How to use this book " xxix xxx¡¡ Online Resources I Introduction: What isSecurity Studies? I Alan Collins 1.1 Introduction ՜ I 1.2 Definition of security | 1.3 Structure շ 1.4 Conclusion PARTI Approaches to Security 2 Realism 10 II 13 Charles L Glaser 2.1 Introduction 14 2.2 What is realism? 14 2.3 Waltz’s structural realism і8 2.4 Offensive realism 19 2.5 Defensive realism 21 2.6 Motivational realism 25 2.7 Realism and war 26 2.8 Conclusion 27 3 Liberalism and Liberal Internationalism 30 Patrick Morgan, with Alan Collins 3.1 Introduction 31 3.2 Characteristic features of liberalism and liberal internationalism 31 3.3 Central elements in liberalism thinking: commercial liberalism 32 3.4 Pursuit of human rights 33 3.5 Liberalism and international organizations 34 3.6 Liberalism and democracy 36 3.7 Tracing liberal internationalism’s rise and fall: the Cold War and after 37
XII Detailed Contents 3 8 Liberalism and liberalist internationalism now—under severe strain 43 3.9 Conclusion 4 Historical Materialism 47 Eric Herring 4.1 An overview of historical materialism 4.2 Capitalism and neoliberalism: insecurity for labour, security for capital 49 4 3 Historical materialism, (in)security, and Security Studies 53 4.4 Conclusion 58 5 Peace Studies Paul Rogers 5.1 Introduction ^ 5.2 The early years ^ 5.3 Evolution amidst controversy ^ 5.4 What is peace studies now? 5.5 Responding to the newsecurity challenges 87 5.6 Conclusion 78 6 Social Constructivism 73 Christine Agius 6.1 Introduction 74 6.2 Definitions and key concepts 76 6.3 Wendt’s three cultures of anarchy 82 6.4 Conventional and critical constructivism 83 6.5 Critiques of constructivism 85 6.6 Conclusion 87 7 Critical Security Studies: A Schismatic History 90 David Mutimer, with Derek Verbakel 7.1 Introduction: ‘Follow the sign of the gourd’ 91 7.2 Toronto desire: Critical Security Studies 92 7.3 Copenhagen distinctions 95 7.4 Aberystwyth exclusions 95 7.5 Constructing security I qq 7.6 Everyone’s other: poststructuralism and security ЮІ 7.7 Beyond divisions? CASEing the joint or returning the gift? 195 7.8 Conclusion løg 8 Critical Security Studies II—Narratives of Security: Other Stories, Other Actors 111 J. Marshall Beier 8.1 Introduction 8.2 Secret agents and power bases 8.3 The subject of ‘smart’ bombs 8.4 Complicated subjects: children 8.5 Indigenous peoples and a cautionary tale 112 I 14 II6 118 121 8.6 Conclusion 123
Detailed Contents 9 Postcolonialism l26 Mark Laffey and Suthaharan Nadarajah 9.1 Introduction 127 9.2 A view from elsewhere: genealogies of the postcolonial 128 9.3 Security and the colonizer’s view of the world 132 9.4 Decolonizing security: strategies 135 9.5 Conclusion: should we‘forget security studies’? 141 10 Human Security 144 Randolph B. Persaud 10.1 11 Introduction 145 10.2 Arguments for human security 146 10.3 The genealogy of human security: what’s new? 151 10.4 Critiques of human security 154 10.5 Conclusion 156 Gender and Security 159 Caroline Kennedy-Pipe and Sophia Dingli 11.1 Introduction 160 11.2 Representations 160 11.3 Practical context I: war 165 11.4 Practical context II: civilian life 167 11.5 Practical context III: the post-conflict environment 169 11.6 Multiple perceptions, same realities? 170 11.7 Conclusion 171 12 Securitization Theory 173 Stephane Baele and Catarina Thomson 12.1 Introduction 174 12.2 From Copenhagen to the world: The evolution of securitization theory from the 1980s to the 2020s 12.3 Main empirical cases in securitization research 175 179 12.4 Challenges and critiques facing securitization theory 182 12.5 Conclusion 184 13 Popular Culture and Security 186 Galia Press-Barnathan 13.1 Introduction 187 13.2 What do we mean by popular culture? 187 13.3 What makes popular culture so politically relevant? 188 13.4 The expansion of Security Studies and the growing interest in popular culture 189 13.5 The role of popular culture in conflict management 190 13.6 Popular culture and the struggle over ‘soft power’ 192 13.7 Popular culture and
the making of peace 196 13.8 Conclusion 198 xiii
Detailed Contents FART 2 Deepening and Broadening Security 14 Military Security Michael Sheehan 203 14.1 Introduction 204 ^ 14.2 Approaches tomilitary security ^ 14 3 Traditional military-security studies И, ѴЙГ 14.5 Alliances and neutrality “ ^ 14.6 Deterrence 14.7 Cooperative security and arms control 14.8 The cost of military security 14.9 Conclusion 2(6 15 Regime Security Andreas Krieg 218 15.1 Introduction 219 15.2 Public versus regime security 219 15.3, Threats to regime security 220 15.4 The regime insecurity loop 221 15.5 Security strategies of patrimonial regimes Ύ1Ύ 15.6 Anatomy of a weak state: Assad’s Syria 15.7 Prospects for regimes in the developing world 22® 15.8 Conclusion: The need for sustainable governance 229 16 Societal Security Paul Roe 222 16.1 Introduction 234 16.2 A duality of state and societal security 234 16.3 Society and societal identity 235 16.4 Threats to societal identity 237 16.5 Defending societal identity 241 16.6 Conclusion 243 17 Environmental Security Geoff Dabelko 247 17.1 Introduction 248 17.2 The origins of environmental security 248 17.3 Major interpretations of environmental security 251 17.4 Environmental change and violent conflict 253 17.5 Environmental change and national security 254 12-6 Armed forces, war, and the environment 256 17.7 Environmental change and human security 247
Detailed Contents 17.8 Environment or security? 259 17.9 Conclusion 250 18 Economic Security 253 Gory M. Shiftman 18.1 Introduction 253 18.2 Economic science of security 264 18.3 Economic tools of security policy 269 18.4 Conclusion 276 19 Globalization, Development, and Security 278 Nono К Роки and Jacqueline Therkelsen 19.1 Introduction 19.2 Globalization as a neoliberal ideologyfor development 279 19.3 Neoliberalism and the fostering of inequality 283 19.4 Global inequality as a threat to global security 286 19.5 Conclusion 290 PART 3 20 279 Traditional and Non-Traditional Security Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts 295 297 Peter Viggo Jakobsen 20.1 Introduction 20.2 What is coercive diplomacy? 21 298 299 20.3 Requirements for success 302 20.4 The challenge of defining success 303 20.5 The importance of the strategic context 306 20.6 Conclusion 307 Weapons of Mass Destruction 312 James J. Wirtz 21.1 Introduction 312 21.2 Nuclear weapons 314 21.3 Chemical weapons 319 21.4 22 Biological weapons 323 21.5 Conclusion 327 Terrorism 329 Brenda Lutz and James Lutz 22.1 Introduction 329 22.2 Concepts and definitions 331 22.3 Types and causes of terrorism 335 22.4 Security measures 338 22.5 Conclusion 342 XV
XVI Detailed Contents 23 Humanitarian Intervention Alex J. Bellamy and Stephen McLoughlin 23.1 Introduction 347 350 23.2 The case for humanitarian intervention 23.3 The case against humanitarian intervention 352 23.4 The Responsibility to Protect 3^ 23.5 Conclusion 3 ^* 24 Energy Security 362 Sam Raphael and Doug Stokes 24.1 Introduction 362 24.2 The problem of energy security 364 24.3 Energy security and International Relations theory 365 24.4 Energy security and human insecurity 367 24.5 Energy security and the United States 370 24.6 Conclusion 373 25 The Weapons Trade 376 Suzette R. Grillot 25.1 Introduction 376 25.2 History and shifting dynamics of the defence trade 377 25.3 Contemporary trends in the weaponstrade 378 25.4 The illicit arms trade 381 25.5 Controlling the weapons trade 384 25.6 Conclusion 387 26 Health and Security 390 Stefan Elbe and Eva Hilberg 26.1 Introduction 391 26.2 Health and human security 391 26.3 Health and national security 393 26.4 Health and bio-security 399 26.5 Conclusion 4QI 27 Transnational Crime 404 Nathan P. Jones 27.1 Introduction 405 27.2 Definitions and key concepts 27.3 ‘Crime-terror nexus' 27.4 Organized crime and the state 27.5 Case study: organized crime in Mexico 412 413 41 27.6 State responses to transnational crime 27.7 Conclusion 418 419
Detailed Contents 28 Cyber-Security 422 Myriam Dunn Cavelty 28.1 Introduction 423 28.2 Security and cyberspace 423 28.3 Types of cyber-threats 425 28.4 The reality of cyber-conflict 43 ( 28.5 Reducing cyber-in-security 432 28.6 Conclusion 434 29 After the Return to Theory: The Past, Present, and Future of Security Studies 437 O/e Wæver and Barry Buzan 29.1 Introduction 438 29.2 The origins and institutional structureof security studies 439 29.3 The Golden Age of security studies 441 29.4 Institutionalization and stagnation 443 29.5 Disciplinary questioning and theoretical relaunch 446 29.6 Conclusion: the powers of theory and thechallenges of the future 452 Glossary 459 References 479 Index 527 xvii |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author2 | Collins, Alan 1967- |
author2_role | edt |
author2_variant | a c ac |
author_GND | (DE-588)136785689 |
author_facet | Collins, Alan 1967- |
building | Verbundindex |
bvnumber | BV047855154 |
classification_rvk | MF 9500 MK 3000 |
ctrlnum | (OCoLC)1310245958 (DE-599)KXP1780468563 |
dewey-full | 327.17 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.17 |
dewey-search | 327.17 |
dewey-sort | 3327.17 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
discipline_str_mv | Politologie |
edition | Sixth edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01951nam a22004698c 4500</leader><controlfield tag="001">BV047855154</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220609 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220225s2022 xxka||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780198862192</subfield><subfield code="c">paperback : £37.99</subfield><subfield code="9">978-0-19-886219-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1310245958</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1780468563</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxk</subfield><subfield code="c">XA-GB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-824</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.17</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MF 9500</subfield><subfield code="0">(DE-625)122811:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MK 3000</subfield><subfield code="0">(DE-625)123042:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Contemporary security studies</subfield><subfield code="c">edited by Alan Collins</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Sixth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford, United Kingdom</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxxi, 549 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internationale Politik</subfield><subfield code="0">(DE-588)4072885-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Politische Wissenschaft</subfield><subfield code="0">(DE-588)4076229-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Security, International</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internationale Politik</subfield><subfield code="0">(DE-588)4072885-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Politische Wissenschaft</subfield><subfield code="0">(DE-588)4076229-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Collins, Alan</subfield><subfield code="d">1967-</subfield><subfield code="0">(DE-588)136785689</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033237911&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033237911</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV047855154 |
illustrated | Illustrated |
index_date | 2024-07-03T19:15:57Z |
indexdate | 2024-07-10T09:23:11Z |
institution | BVB |
isbn | 9780198862192 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033237911 |
oclc_num | 1310245958 |
open_access_boolean | |
owner | DE-824 DE-703 DE-706 DE-473 DE-BY-UBG DE-29 DE-898 DE-BY-UBR DE-19 DE-BY-UBM DE-188 |
owner_facet | DE-824 DE-703 DE-706 DE-473 DE-BY-UBG DE-29 DE-898 DE-BY-UBR DE-19 DE-BY-UBM DE-188 |
physical | xxxi, 549 Seiten Illustrationen |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Oxford University Press |
record_format | marc |
spelling | Contemporary security studies edited by Alan Collins Sixth edition Oxford, United Kingdom Oxford University Press [2022] xxxi, 549 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Internationale Politik (DE-588)4072885-7 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Politische Wissenschaft (DE-588)4076229-4 gnd rswk-swf Security, International (DE-588)4143413-4 Aufsatzsammlung gnd-content Sicherheitspolitik (DE-588)4116489-1 s Internationale Politik (DE-588)4072885-7 s DE-604 Politische Wissenschaft (DE-588)4076229-4 s Collins, Alan 1967- (DE-588)136785689 edt Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033237911&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Contemporary security studies Internationale Politik (DE-588)4072885-7 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Politische Wissenschaft (DE-588)4076229-4 gnd |
subject_GND | (DE-588)4072885-7 (DE-588)4116489-1 (DE-588)4076229-4 (DE-588)4143413-4 |
title | Contemporary security studies |
title_auth | Contemporary security studies |
title_exact_search | Contemporary security studies |
title_exact_search_txtP | Contemporary security studies |
title_full | Contemporary security studies edited by Alan Collins |
title_fullStr | Contemporary security studies edited by Alan Collins |
title_full_unstemmed | Contemporary security studies edited by Alan Collins |
title_short | Contemporary security studies |
title_sort | contemporary security studies |
topic | Internationale Politik (DE-588)4072885-7 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Politische Wissenschaft (DE-588)4076229-4 gnd |
topic_facet | Internationale Politik Sicherheitspolitik Politische Wissenschaft Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=033237911&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT collinsalan contemporarysecuritystudies |