Authors: Alan Collins
ISBN-13: 9780199548859, ISBN-10: 0199548854
Format: Paperback
Publisher: Oxford University Press, USA
Date Published: March 2010
Edition: 2nd Edition
Dr Alan Collins is Senior Lecturer in the Department of Politics and International Relations at the University of Wales, Swansea
Book Synopsis
Bringing together selections from key scholars, Contemporary Security Studies, Second Edition, provides a highly readable, engaging introduction to the fast-evolving field of security studies. Now in its second edition, the text incorporates seven brand-new chapters. In addition, the up-to-date Companion Website contains case studies, web links, multiple choice questions, a flashcard glossary, and PowerPoint-based lecture slides.
FEATURES
* Broad coverage of contemporary security studies
• Assumes no background knowledge, making it accessible to students new to the subject
• Carefully edited contributions from international experts
• Excellent learning features to support students, including readers' guides, key points, questions, guide to further reading, web links, boxes, and glossary
NEW TO THIS EDITION
• Seven brand-new chapters (see the Table of Contents)
• Up-to-date Companion Website (www.oup.com/uk/orc/bin/9780199548859) contains case studies, web links,
multiple choice questions, a flashcard glossary, and PowerPoint lecture slides
Table of Contents
Notes on Contributors xvi
List of Figures xix
List of Tables xx
List of Boxes xxi
Guided Tour of Learning Features xxiv
Guided Tour of the Online Resource Centre xxvi
Introduction: What is Security Studies? Alan Collins 1
Introduction 2
Definition of security 2
Structure 4
Conclusion 9
Approaches to Security 11
Security in International Politics: Traditional Approaches Patrick Morgan 13
Introduction: states as central actors 14
The realist perspective 16
Realist disputes 22
Difficulties with realist analysis 24
The liberalist perspective 25
A liberalist age? 29
Liberalist issues 30
Intellectual problems 31
Conclusion 32
Questions 33
Further reading 33
Important websites 34
Peace Studies Paul Rogers 35
Introduction 36
Origins and early years 36
Evolutionamidst controversy 39
What is peace studies now? 42
Responding to the new security challenges 45
Conclusion 50
Questions 51
Further reading 51
Important websites 52
Critical Security Studies: A Schismatic History David Mutimer 53
Introduction: 'Follow the sign of the gourd' 54
Toronto desire: Critical Security Studies 56
Copenhagen distinctions 60
Aberystwyth exclusions 62
Constructing security 65
Everyone's other: post-structuralism and security 67
Conclusion: Contemporary (Critical) Security Studies 71
Questions 72
Further reading 72
Important websites 74
Gender and Security Caroline Kennedy-Pipe 75
Introduction 76
Discursive representations 76
Practical contexts 80
Contradictions: biology and security 83
Women as victims 84
Women as peaceable 85
Women as warriors 86
Changing roles: changing perceptions 87
Conclusion 88
Questions 89
Further reading 90
Important websites 90
Human Security Pauline Kerr 91
Introduction: intellectual and empirical purpose 92
Is human security a valuable analytical and policy framework? 94
Reconciling tensions 98
Human security and state-centric security 100
Utility for practitioners 103
Conclusion 105
Questions 107
Further reading 107
Important websites 108
Securitization Ralf Emmers 109
Introduction 110
Securitization model 111
Limitations of the securitization model 116
Cases of securitization 117
Conclusion 123
Questions 124
Further reading 124
Important websites 125
Deepening and Broadening Security 127
Military Security Eric Herring 129
Introduction: the scope of the military security agenda 130
Military strategy and military security: traditional security studies 132
Securitization 134
Constructivism 137
Debating Colombia 140
Conclusion: military security, self and world politics 142
Questions 143
Further reading 143
Important websites 144
Regime Security Richard Jackson 146
Introduction 147
The weak state insecurity dilemma 149
Security strategies in weak states 153
Explaining insecurity in weak states 157
Conclusion: prospects for the weak state 160
Questions 161
Further reading 162
Important websites 162
Societal Security Paul Roe 164
Introduction 165
A duality of state and societal security 165
Society and societal identity 167
Threats to societal identity 169
Defending societal identity 172
Societal security dilemmas 174
Conclusion 178
Questions 180
Further reading 180
Useful websites 181
Environmental Security Jon Barnett 182
Introduction 183
The origins of environmental security 184
Major interpretations of environmental security 188
Environmental change and violent conflict 190
Environmental change and national security 192
Armed forces and the environment 195
Environmental change and human security 197
Environment, or security? 199
Conclusion 200
Questions 201
Further reading 202
Important websites 202
Economic Security Christopher M. Dent 204
Introduction 205
Contemporary thinking on economic security 205
A new conceptual approach to economic security 210
Conclusion 219
Questions 220
Further reading 220
Important websites 221
Traditional and Non-Traditional Security 223
Coercive Diplomacy Peter Viggo Jakobsen 225
Introduction 226
What is coercive diplomacy? 227
Theories and requirements for success 229
The challenge of defining success 233
Western use of coercive diplomacy 1990-2005 235
Why coercive diplomacy is hard 236
Conclusion 245
Questions 246
Further reading 246
Important websites 247
The Role of Intelligence in National Security Stan A. Taylor 248
Introduction 249
Definitions and theory of intelligence 250
Intelligence services of different nations 251
Intelligence collection disciplines 253
The intelligence process 255
Intelligence and security since the Second World War 258
Legal and ethical issues involving intelligence 260
Covert action 261
Terrorism, Iraq, and the contemporary security condition 263
Conclusion 265
Questions 268
Further reading 268
Important websites 269
Weapons of Mass Destruction James Wirtz 270
Introduction 271
Nuclear weapons 272
Chemical weapons 277
Biological weapons 281
Conclusion: the future of WMD 286
Questions 287
Further reading 287
Important websites 287
Terrorism Brenda Lutz James Lutz 289
Introduction 290
Concepts and definitions 291
Types and causes of terrorism 298
Security measures 303
Conclusion 307
Questions 308
Further reading 308
Important websites 309
The Defence Trade Joanna Spear Neil Cooper 311
Introduction 312
Explaining the arms dynamic 312
Trends in defence expenditure 316
The content of the contemporary defence trade 325
Conclusion 328
Questions 328
Further reading 329
Important websites 330
HIV/AIDS and Security Stefan Elbe 331
Introduction 332
The global HIV/AIDS pandemic 332
HIV/AIDS and human security 334
HIV/AIDS and national security 336
HIV/AIDS and international security 340
Conclusion 343
Questions 344
Further reading 344
Important websites 345
Transnational Crime Jeanne Giraldo Harold Trinkunas 346
Introduction 347
Is transnational crime a threat to national security? 348
Definitions and key concepts 350
The increase in transnational crime 353
The organization of transnational crime: competing visions 356
Transnational crime and terrorism 359
Government responses 361
Conclusion 363
Questions 364
Further reading 365
Important websites 366
Children and War Helen Brocklehurst 367
Introduction: children in global politics 368
Which children-whose security? 368
Children as security? 370
Children at war: vulnerable and valuable 371
Young soldiers 373
Post conflict-post children? 377
Infant power and soft tactics 378
Conclusion 380
Questions 381
Further reading 381
Important websites 382
After the Return to Theory: The Past, Present, and Future of Security Studies Ole Waever Barry Buzan 383
Introduction 384
The origins and institutional structure of security studies 386
Security studies' 'Golden Age' 387
Institutionalization and stagnation 390
Disciplinary questioning and theoretical re-launch 393
Conclusion: the powers of theory and the challenges of the future 399
Questions 400
Further reading 401
Important websites 402
Bibliography 403
Glossary 418
Index 433
Subjects