Table of contents for Contemporary security studies / edited by Alan Collins.

Bibliographic record and links to related information available from the Library of Congress catalog.

Note: Contents data are machine generated based on pre-publication provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.


Counter
Brief Contents
Notes on Contributors xvi
List of Figures xix
List of Tables xx
List of Boxes xxi
1 Introduction: What is Security Studies? 1
Alan Collins
Part 1 Approaches to Security 11
2 Security in International Politics: Traditional Approaches 13
Patrick Morgan
3 Peace Studies 35
Paul Rogers
4 Critical Security Studies: A Schismatic History 53
David Mutimer
5 Gender and Security 75
Caroline Kennedy-Pipe
6 Human Security 91
Pauline Kerr
7 Securitization 109
Ralf Emmers
Part 2 Deepening and Broadening Security 127
8 Military Security 129
Eric Herring
9 Regime Security 146
Richard Jackson
10 Societal Security 164
Paul Roe
11 Environmental Security 182
Jon Barnett
12 Economic Security 204
Christopher Dent
Part 3 Traditional and Non-Traditional Security 223
13 Coercive Diplomacy 225
Peter Viggo Jakobsen
14 The Role of Intelligence in National Security 248
Stan Taylor
15 Weapons of Mass Destruction 270
James Wirtz
16 Terrorism 289
Brenda Lutz and James Lutz
17 The Defence Trade 311
Joanna Spear and Neil Cooper
18 HIV/Aids and Security 331
Stefan Elbe
19 Transnational Crime 346
Jeanne Giraldo and Harold Trinkunas
20 Children and War 367
Helen Brocklehurst
21 After the Return to Theory: The Past, Present, and Future of Security Studies 383
Ole Wæver and Barry Buzan
Bibliography 403
Glossary 418
Detailed Contents
Notes on Contributors xvi
List of Figures xix
List of Tables xx
List of Boxes xxi
1 Introduction: What is Security Studies? 1
Alan Collins
Introduction 2
Definition of security 2
Structure 4
Conclusion 9
Part 1 Approaches to Security 11
2 Security in International Politics: Traditional Approaches 13
Patrick Morgan
Introduction: states as central actors 14
The realist perspective 16
Realist disputes 22
Difficulties with realist analysis 24
The liberalist perspective 25
A liberalist age? 29
Liberalist issues 30
Intellectual Problems 31
Conclusions 32
Questions 33
Further reading 33
Important web sites 34
3 Peace Studies 35
Paul Rogers
Introduction 36
Origins and early years 36
Evolution amidst controversy 39
What is peace studies now? 42
Responding to the new security challenges 45
Conclusions 50
Questions 51
Further reading 51
Important web sites 52
4 Critical Security Studies: A Schismatic History 53
David Mutimer
Introduction: 'Follow the sign of the gourd' 54
Toronto desire: Critical Security Studies 56
Copenhagen distinctions 60
Aberystwyth exclusions 62
Constructing security 65
Everyone's other: post-structuralism and security 67
Conclusion: contemporary (Critical) Security Studies 71
Questions 72
Further reading 72
Important web sites 74
5 Gender and Security 75
Caroline Kennedy-Pipe
Introduction 76
Discursive representations 76
Practical contexts 80
Contradictions: biology and security 83
Women as victims 84
Women as peaceable 85
Women as warriors 86
Changing roles: changing perceptions 87
Conclusions 88
Questions 89
Further reading 90
Important web sites 90
6 Human Security 91
Pauline Kerr
Introduction: intellectual and empirical purpose 92
Is human Security a valuable analytical and policy framework? 94
Reconciling tensions 98
Human security and state-centric security 100
Utility for practitioners 103
Conclusions 105
Questions 107
Further reading 107
Important web sites 108
7 Securitization 109
Ralf Emmers
Introduction 110
Securitization model 111
Limitations of the securitization model 116
Cases of securitization 117
Conclusions 123
Questions 124
Further reading 124
Important web sites 125
Part 2 Deepening and Broadening Security 127
8 Military Security 129
Eric Herring
Introduction: the scope of the military security agenda 130
Military strategy and military security: traditional security studies 132
Securitization 134
Constructivism 137
Debating Colombia 140
Conclusion: military security,self and world politics 142
Questions 143
Further reading 143
Important web sites 144
9 Regime Security 146
Richard Jackson
Introduction 147
The weak state insecurity dilemma 149
Security strategies in weak states 153
Explaining insecurity in weak states 157
Conclusion: prospects for the weak state 160
Questions 161
Further reading 162
Important web sites 162
10 Societal Security 164
Paul Roe
Introduction 165
A duality of state and societal security 165
Society and societal identity 167
Threats to societal identity 169
Defending societal identity 172
Societal security dilemmas 174
Questions 180
Further reading 180
Useful web sites 181
11 Environmental Security 182
Jon Barnett
Introduction 183
The origins of environmental security 184
Major interpretations of environmental security 188
Environmental change and violent conflict 190
Environmental change and national security 192
Armed forces and the environment 195
Environmental change and human security 197
Environment, or security? 199
Conclusions 200
Questions 201
Further reading 202
Important web sites 202
12 Economic Security 204
Christopher Dent
Introduction 205
Contemporary thinking on economic security 205
A new conceptual approach to economic security 210
Conclusions 219
Questions 220
Further reading 220
Important web sites 221
Part 3 Traditional and Non-Traditional Security 223
13 Coercive Diplomacy 225
Peter Viggo Jakobsen
Introduction 226
What is coercive diplomacy? 227
Theories and requirements for success 229
The challenge of defining success 233
Western use of coercive diplomacy 1990-2005 235
Why coercive diplomacy is hard 241
Conclusions 244
Questions 246
Further reading 246
Important web sites 247
14 The Role of Intelligence in National Security 248
Stan Taylor
Introduction 249
Definitions and theory of intelligence 250
Intelligence services of different nations 251
Intelligence collection disciplines 253
The intelligence process 255
Intelligence and security since the Second World War 258
Legal and ethical issues involving intelligence 260
Covert action 261
Terrorism, Iraq, and the contemporary security condition 263
Conclusions 265
Questions 268
Further reading 268
Important web sites 269
15 Weapons of Mass Destruction 270
James Wirtz
Introduction 271
Nuclear weapons 272
Chemical weapons 277
Biological weapons 281
Conclusion: the future of WMD 286
Questions 287
Further reading 287
Important web sites 287
16 Terrorism 289
Brenda Lutz and James Lutz
Introduction 290
Concepts and definitions 291
Types and causes of terrorism 298
Security measures 303
Conclusions 307
Questions 308
Further reading 308
Important web sites 309
17 The Defence Trade 311
Joanna Spear and Neil Cooper
Introduction 312
Explaining the arms dynamic 312
Trends in defence expenditure 316
The content of the contemporary defence trade 325
Conclusions 328
Questions 328
Further reading 329
Important web sites 330
18 HIV/AIDS and Security 331
Stefan Elbe
Introduction 332
The global HIV/AIDS pandemic 332
HIV/AIDS and human security 334
HIV/AIDS and national security 336
HIV/AIDS and international security 340
Conclusions 343
Questions 344
Further reading 344
Important web sites 345
19 Transnational Crime 346
Jeanne Giraldo and Harold Trinkunas
Introduction 347
Is transnational crime a threat to national security? 348
Definitions and key concepts 350
The increase in transnational crime 353
The organization of transnational crime: competing visions 356
Transnational crime and terrorism 359
Government responses 361
Conclusions 363
Questions 365
Further reading 365
Important web sites 366
20 Children and War 367
Helen Brocklehurst
Introduction: children in global politics 368
Which children-whose security? 368
Children as security? 370
Children at war: vulnerable and valuable 371
Young soldiers 373
Post conflict-post children? 377
Infant power and soft tactics 378
Conclusions 380
Questions 381
Further reading 381
Important web sites 382
21 After the Return to Theory: The Past, Present, and Future of Security Studies 383
Ole Wæver and Barry Buzan
Introduction 384
The origins and institutional structure of security studies 386
Security studies' 'Golden Age' 387
Institutionalization and stagnation 390
Disciplinary questioning and theoretical re-launch 393
Conclusion: the powers of theory and the challenges of the future 399
Questions 400
Further reading 401
Important web sites 402
Bibliography 403
Glossary 418

Library of Congress Subject Headings for this publication:

Security, International.