Security studies: an applied introduction
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London ; Thousand Oaks, California ; New Delhi ; Singapore
Sage
[2024]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xxix, 598 Seiten Illustrationen, Karten |
ISBN: | 9781529774610 9781529774603 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049605658 | ||
003 | DE-604 | ||
005 | 20240709 | ||
007 | t | ||
008 | 240311s2024 a||| |||| 00||| eng d | ||
020 | |a 9781529774610 |c hardback |9 978-1-5297-7461-0 | ||
020 | |a 9781529774603 |c paperback |9 978-1-5297-7460-3 | ||
035 | |a (OCoLC)1430763233 | ||
035 | |a (DE-599)BVBBV049605658 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-824 |a DE-188 |a DE-473 |a DE-739 | ||
084 | |a MF 9500 |0 (DE-625)122811: |2 rvk | ||
245 | 1 | 0 | |a Security studies |b an applied introduction |c edited by Norma Rossi & Malte Riemann |
264 | 1 | |a London ; Thousand Oaks, California ; New Delhi ; Singapore |b Sage |c [2024] | |
300 | |a xxix, 598 Seiten |b Illustrationen, Karten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Rossi, Norma |0 (DE-588)1227235747 |4 edt | |
700 | 1 | |a Riemann, Malte |d 1982- |0 (DE-588)1216964831 |4 edt | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034950001&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034950001 |
Datensatz im Suchindex
_version_ | 1814170327247224832 |
---|---|
adam_text |
Contents About the editors and authors Preface Acknowledgements Online resources Part I Whose security?: History, theories andinstitutions 1 Introducing security studies: An applied introduction Nonna Rossi and Malte Riemann xvii xxiii xxxi xxxiii 1 3 2 Security: When? Where? From what? Of what? For whom? R.B.J. Walker 25 3 International security Pinar Bilgin 41 4 State security Aine Bennett and Laura Sjoberg 59 5 Human security Annick Wibben and Jenny Hedström 75 6 Security beyond the human Audra Mitchell 89 Part II Security challenges 7 War and militarism Victoria Μ. Basham 107 109 8 Genocide and crimes against humanity Benjamin Meiches and Jonathan White 131 9 Terrorism Ben Whitham and Nadya Ali 151 10 The global arms trade and its control Anna Stairianakis 175 11 Weapons of mass destruction Shampa Biswas 195 12 Street gangs and urban violence Kieran Mitton 217
Contents 13 Global development Maria Stern 237 14 Migration Aoileann Ni Mhurchù 261 15 Race and security Anna Μ. Agathangelou 283 16 Conflict and gendered violence Johny Arokiaraj P and Soumita Basu 311 17 Organised crime Anna Sergi 335 18 Cybersecurity Tim Stevens 353 19 Financial crises and security Aida A. Hozid 375 20 Climate change Maria Julia Trombetta 397 21 Health security Joao Nunes 421 22 Resource security Johannes Kester 443 23 Maritime security Christian Bueger and Timothy Edmunds 465 24 Space security Sarah Lieberman and Jana Fey 489 Glossary References Index 513 525 585
Extended contents About the editors and authors Preface Acknowledgements Online resources xvii xxiii xxxi xxxiii Part I Whose security?: History, theoriesand institutions 1 1 Introducing security studies:An applied introduction Norma Rossi and Malte Riemann 3 Chapter overview Introduction Whose security? Theories of (in)security Theory and practice of security: A guide to the textbook Review questions Further reading 4 4 5 7 21 24 24 2 Security: When? Where? From what? Of what? For whom? 25 R.BJ. Walker 26 26 27 29 33 36 39 39 Chapter overview Key learning goals Security as a question Pluralized sources of insecurity Pluralized subjects of security So who is now to be secured? Review questions Further readings 41 3 International security Pinar Bilgin Chapter overview Key learning goals Introduction International as a space where inter-state security dynamics take place International as a security referent 42 42 42 43 46
Extended contents The international as a challengeto security for some International as hierarchy amidst anarchy Conclusion Review questions Further reading 48 52 56 57 57 4 State security 59 Aine Bennett and Laura Sjoberg Chapter overview Key learning goals Introduction What is the state? The (auto)biographies of the state The state and state security in sovereignty cartels The state as a security threat Conclusion Review questions Further reading 60 60 60 61 64 66 68 72 73 73 5 Human security 75 Annick Wibben and fenny Hedström Chapter overview Key learning goals Introduction Broadening, deepening and opening security Human security in practice Three framings of the human as security referent Human security for whom? The case of Agnes Conclusion Review questions Further reading 76 76 76 78 79 81 85 87 88 88 6 Security beyond the human 89 Audra Mitchell Chapter overview Key learning goals Knowledge systems, nonhumans and security Nonhuman rights and security More-than-human frameworks of security Nonhuman security threats and post-humanist thought Conclusions 90 90 91 92 94 99 103
Extended contents Review questions Further reading Part II Security challenges 7 War and militarism 104 104 107 109 Victoria Μ. Basham Key learning goals Introduction Explore: The Yugoslav wars of the 1990s Understand: The study of war and militarism Respond: Responding to war and militarism Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 110 110 110 113 124 126 128 129 129 129 8 Genocide and crimes against humanity 131 Benjamin Meiches and Jonathan White Key learning goals Introduction Explore: Crimes against humanity and genocide in contemporary global politics Understand: Genocide - key concepts Respond: Brazil Conclusion Problem-mapping exercise Review questions Further reading Security beyond the real 9 Terrorism 132 132 133 136 144 147 148 150 150 150 151 Ben Whitham and Nadya AH Key learning goals Introduction Explore: Race and political violence Understand: Terrorism, counterterrorism and supremacism Respond: The social and political functions of 'terrorism' Problem-mapping exercise Conclusion Review questions 152 152 152 155 168 170 172 173
Extended contents Further reading Security beyond the real 173 173 10 The global arms trade and its control 175 Anna Stavrianakis Key learning goals Introduction Explore: Arming the war in Yemen Understand: Challenging dominant approaches Respond: Accountability for arms sales to the Saudi- and UAE-led coalition Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 176 176 176 178 188 190 192 193 193 193 11 Weapons of mass destruction 195 Shampa Biswas Key learning goals Introduction Explore: The 2003 US war in Iraq Understand: Interrogating the WMD category Respond: WMD in the 2003 US war in Iraq Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 196 196 196 198 209 211 210 214 214 214 12 Street gangs and urban violence Kieran Mitton Key learning goals Introduction Explore: Street gangs in Haiti Understand: What is urban violence? How should we define violent urban actors? Respond: Street gangs in Haiti Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 217 218 218 218 219 230 232 234 235 235 235
Extended contents 13 Global development Maria Stern Key learning goals Introduction Explore: The problem of conflict-related sexual violence Understand: CRSV as a threat to security and development. Centering the 'human' and the 'state'? Respond: Mobile courts Problem-mapping exercise Conclusion Review questions Further reading Security beyond the 'real' 14 Migration Aoileann Ni Mhurchû Key learning goals Introduction Explore: The simultaneous deep appreciation and démonisation of migrants Understand: Foregrounding colonialism, rethinking the 'safety' of home, and reflecting on the allure of 'balance' Respond: Striking migrant workers Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 15 Race and security Anna Μ. Agathangelou Key learning goals Introduction Explore: The licit life of racism and in/security Understand: "What is going on?":2 Whiteness as property, war, and climate change Respond: "We are all in this together"? Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 237 238 238 239 243 254 255 257 258 258 258 261 262 262 262 265 276 279 278 282 282 282 283 284 284 284 290 305 306 309 309 309 309
Extended contents 16 Conflict and gendered violence Jolmy Arokiaraj P and Soumita Basu 311 Key learning goals Introduction Explore: Gendered dimensions of Afghan conflict (2001-2021) Understand: Gendered violence and international security Respond: Moving forward in Afghanistan and Ukraine Problem-mapping exercise Conclusion Review questions Further reading Security beyond the 'real' 312 312 312 315 329 330 333 333 333 334 17 Organised crime Anna Sergi Key learning goals Introduction Explore: The maxi-trial Rinascita-Scott and the 'Ndrangheta in Calabria, Italy Understand: Defining organised crime Respond: The maxi-trial Rinascita-Scott and the 'Ndrangheta in Calabria, Italy Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 18 Cybersecurity Tim Stevens Key learning goals Introduction Explore: Cybersecurity Understand: Why is cybersecurity political? Understand: National and international cybersecurity Understand: Cybersecurity beyond the state Understand: Cybersecurity in practice Respond: Colonial Pipeline Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 335 336 336 336 338 346 348 350 351 351 352 353 354 354 354 356 360 364 367 369 370 372 373 373 373
Extended contents 19 Financial crises and security Aida A. Hozic Key learning goals Introduction Explore: Cascading financial and political crises Understand: Recurring crises, war economy, and populist politics Respond: Global financial crisis and its afterlives Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 20 Climate change 375 376 376 376 379 391 392 394 394 395 395 397 Maria Julia Trombetta Key learning goals Introduction Explore: Climate change, security and the UNSC Understand: The climate change-security nexus Respond: The UNSC - climate change as a threat multiplier and the progressive climatization of security Problem-mapping exercise Conclusion Review questions Further readings Security beyond the real 21 Health security Joào Nunes Key learning goals Introduction Explore: The rise of health security Understand: Emergency and neglect Respond: Reclaiming (everyday) health security Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 22 Resource security Johannes Kester Key learning goals Introduction 398 398 399 400 411 414 417 418 418 419 421 422 422 422 425 435 438 440 441 441 441 443 444 444
Extended contents Explore: Food insecurity and the Arab Spring Understand: Securing resources Respond: Food insecurity and the Arab Spring Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 445 448 456 458 461 462 463 463 23 Maritime security Christian Bueger and Timothy Edmunds Key learning goals Introduction Explore: The context for maritime security Understand: The history of the maritime security agenda Respond: Governing maritime security through informality Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real 24 Space security Sarah Lieberman and Jana Fey Key learning goals Introduction: Why is space rubbish a security issue? Explore: Litter at 15,000 mph Understand: Three key lenses for the examination of space debris Respond: Voluntary standards and guidelines Problem-mapping exercise Conclusion Review questions Further reading Security beyond the real Glossary References Index 465 466 466 466 468 481 484 486 486 486 487 489 490 490 490 495 505 508 510 511 511 511 513 525 585 |
adam_txt | |
any_adam_object | 1 |
any_adam_object_boolean | |
author2 | Rossi, Norma Riemann, Malte 1982- |
author2_role | edt edt |
author2_variant | n r nr m r mr |
author_GND | (DE-588)1227235747 (DE-588)1216964831 |
author_facet | Rossi, Norma Riemann, Malte 1982- |
building | Verbundindex |
bvnumber | BV049605658 |
classification_rvk | MF 9500 |
ctrlnum | (OCoLC)1430763233 (DE-599)BVBBV049605658 |
discipline | Politologie |
discipline_str_mv | Politologie |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049605658</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240709</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240311s2024 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781529774610</subfield><subfield code="c">hardback</subfield><subfield code="9">978-1-5297-7461-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781529774603</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-5297-7460-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1430763233</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049605658</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-824</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MF 9500</subfield><subfield code="0">(DE-625)122811:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security studies</subfield><subfield code="b">an applied introduction</subfield><subfield code="c">edited by Norma Rossi & Malte Riemann</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London ; Thousand Oaks, California ; New Delhi ; Singapore</subfield><subfield code="b">Sage</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxix, 598 Seiten</subfield><subfield code="b">Illustrationen, Karten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rossi, Norma</subfield><subfield code="0">(DE-588)1227235747</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Riemann, Malte</subfield><subfield code="d">1982-</subfield><subfield code="0">(DE-588)1216964831</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034950001&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034950001</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Aufsatzsammlung Lehrbuch |
id | DE-604.BV049605658 |
illustrated | Illustrated |
index_date | 2024-07-03T23:35:25Z |
indexdate | 2024-10-28T15:00:46Z |
institution | BVB |
isbn | 9781529774610 9781529774603 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034950001 |
oclc_num | 1430763233 |
open_access_boolean | |
owner | DE-824 DE-188 DE-473 DE-BY-UBG DE-739 |
owner_facet | DE-824 DE-188 DE-473 DE-BY-UBG DE-739 |
physical | xxix, 598 Seiten Illustrationen, Karten |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Sage |
record_format | marc |
spelling | Security studies an applied introduction edited by Norma Rossi & Malte Riemann London ; Thousand Oaks, California ; New Delhi ; Singapore Sage [2024] xxix, 598 Seiten Illustrationen, Karten txt rdacontent n rdamedia nc rdacarrier Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content (DE-588)4123623-3 Lehrbuch gnd-content Sicherheitspolitik (DE-588)4116489-1 s DE-604 Rossi, Norma (DE-588)1227235747 edt Riemann, Malte 1982- (DE-588)1216964831 edt Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034950001&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Security studies an applied introduction Sicherheitspolitik (DE-588)4116489-1 gnd |
subject_GND | (DE-588)4116489-1 (DE-588)4143413-4 (DE-588)4123623-3 |
title | Security studies an applied introduction |
title_auth | Security studies an applied introduction |
title_exact_search | Security studies an applied introduction |
title_exact_search_txtP | Security studies an applied introduction |
title_full | Security studies an applied introduction edited by Norma Rossi & Malte Riemann |
title_fullStr | Security studies an applied introduction edited by Norma Rossi & Malte Riemann |
title_full_unstemmed | Security studies an applied introduction edited by Norma Rossi & Malte Riemann |
title_short | Security studies |
title_sort | security studies an applied introduction |
title_sub | an applied introduction |
topic | Sicherheitspolitik (DE-588)4116489-1 gnd |
topic_facet | Sicherheitspolitik Aufsatzsammlung Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=034950001&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT rossinorma securitystudiesanappliedintroduction AT riemannmalte securitystudiesanappliedintroduction |