Security Studies/ (Record no. 176735)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 09596nam a2200145Ia 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 041542562X |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 355.033 |
Item number | WIL/S |
245 #0 - TITLE STATEMENT | |
Title | Security Studies/ |
Sub title | An Introduction |
Statement of responsibility, etc. | Williams, Paul D.[ed.] |
250 ## - EDITION STATEMENT | |
Edition statement | 1st.ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | London: |
Name of publisher, distributor, etc. | Routledge, |
Date of publication, distribution, etc. | 2008. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 552 |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | 1 SECURITY STUDIES:<br/>AN INTRODUCTION<br/>Paul D. Williams<br/>Wliat is security studies? A very<br/>short overview<br/>Defining a field of inquiry: four<br/>fundamental questions<br/>What is security? 5<br/>Whose security? 7<br/>What is a security issue? 8<br/>How can security be achieved? 9<br/>How to use this book<br/>Part 1 Theoretical<br/>approaches<br/>2 REALISM<br/>Colin Elman<br/>Introduction<br/>Classical realism<br/>Neorealism: Waltz's Theory of<br/>Internatioual Politics<br/>Defensive structural realism<br/>Offensive structural realism<br/>Rise and fall realism<br/>Neoclassical realism<br/>Conclusion<br/>3 LIBERALISM<br/>Cornelia Navari<br/>Introduction<br/>Traditional or Kantian liberalism<br/>Douce commerce<br/>The democratic peace thesis<br/>Neoliberal institutionalism<br/>Conclusion<br/>4 GAM.E THEORY<br/>Prank C. Zagare<br/>Introduction<br/>Primitive concepts<br/>Strategic-form games and Nash<br/>equilibria<br/>Extensive-form games, backwards<br/>induction and subgame perfect<br/>equilibria<br/>Applications of game theor)' in<br/>securit)' studies<br/>Coda<br/>5 CONSTRUCTIVISM<br/>Matt McDonald<br/>Introduction: constructivism and<br/>security<br/>Constructivism: central tenets<br/>and shared assumptions<br/>Securit}' as social construction:<br/>identity and norms 61<br/>Negotiation and contestation 64<br/>Agents, structures and change 66<br/>The Copenhagen School<br/>Conclusion<br/>6 PEACE STUDIES<br/>Peter Lawler<br/>Introduction: What is peace studies?<br/>Peace studies: a brief history<br/>Peace researcii as science 77<br/>From peace research to peace<br/>studies 79<br/>Key concepts<br/>Positive and negative peace 81<br/>Structural violence 83<br/>Cultural violence 85<br/>The future of peace studies?<br/>7 CRITICAL THEORY<br/>Pinar Bilgin<br/>Introduction: the need for a<br/>critical perspective<br/>Rethinking security<br/>Critical theory<br/>Theory/practice<br/>The 'Welsh School' of critical<br/>securit)' studies<br/>Emancipation<br/>Conclusion<br/>8 FEMINIST PERSPECTIVES<br/>Sandra Whirvvorth<br/>Introduction<br/>Feminist approaches in<br/>international security<br/>Women, gender and security -<br/>the impacts of armed conflict<br/>Women, gender and security —<br/>action and activism<br/>Women, gender and security —<br/>talking and making weapons<br/>and war<br/>Conclusions<br/>9 INTERNATIONAL POLITICAL<br/>SOCIOLOGY<br/>Didier Bigo<br/>Introduction<br/>Security studies within IR;<br/>bordering and debordering what<br/>security means<br/>From security sectors to<br/>(inlsecuritization, a constructivist<br/>stance<br/>Is (in)securitization only a speech<br/>act enacting exception? The role<br/>of routines and technologies<br/>Conclusion<br/>Part 2 Key concepts<br/>10 UNCERTAINTY<br/>Ken Binuh and Nicholas J. Whcclcr<br/>Introduction<br/>The house of uncertainty<br/>The quintessential dilemma<br/>Three logics<br/>The securit)' dilemma in the<br/>tsventj'-first centur)'<br/>Towards a new agenda for security<br/>studies<br/>11 WAR<br/>Paul D. Williams<br/>Introduction<br/>Three philosophies of war<br/>Trends in armed conflicts since<br/>1945<br/>Who fights? Who dies? 161<br/>Is the nature of warfare<br/>changing?<br/>The idea ol total war 163<br/>The 'new wars' debate 165<br/>The contemporary Western way<br/>ol war 167<br/>Conclusion<br/>12 TERRORISM<br/>Paul Rogers<br/>Introduction<br/>Terrorism in perspective<br/>Definitions<br/>State and sub-state terror<br/>Responding to terrorism<br/>The 9/11 response and the War<br/>on Terror<br/>Trends in terrorism<br/>Terrorism and insurgency 182<br/>Internationalism 182<br/>Suicide terrorism 183<br/>Speed of learning 183<br/>Media developments 183<br/>P.conomic targeting 183<br/>Mass casualty attacks and weapons<br/>of mass destruction 184<br/>Conclusion<br/>13 GENOCIDE AND MASS KILLING<br/>Adam Jones<br/>Introduction<br/>Genocide: key cases<br/>Challenges of intervention<br/>Conclusion: the way forward -<br/>and back<br/>14 ETHNIC CONFLICT<br/>Stuart J. Kaufman<br/>Introduction<br/>What is ethnic conflict?<br/>An overview of ethnic conflicts<br/>Causes of violent ethnic conflict<br/>Sudan 208<br/>Yugoslavia 209<br/>International security dimensions<br/>of ethnic conflicts<br/>Resolution of ethnic civil wars<br/>15 COERCION<br/>Lawrence Freedman and<br/>Srinath Raghavan<br/>Introduction<br/>Strategy<br/>Deterrence and compellence<br/>Designing coercive strategies<br/>Punishment and denial<br/>Types of costs<br/>Multiple audiences<br/>Reputations<br/>Long-term impact<br/>Conclusion<br/>16 HUMAN SECURITY<br/>Fen Osier Hampson<br/>Introduction<br/>Understanding the scope of human<br/>security<br/>Setting the boundaries of human<br/>security<br/>Ongoing debates and unresolved<br/>issues<br/>Human security risk assessment<br/>Governance and human security<br/>Towards a theorj' of human security<br/>Conclusion<br/>17 POVERTY<br/>Caroline Thomas<br/>Introduction<br/>Is poverty an appropriate concern<br/>for security studies?<br/>Whose poverty? Whose security?<br/>Placing human beings at the<br/>centre of our concern<br/>What do we know about the<br/>poverty-security nexus?<br/>What do we know about<br/>poverty-violent conflict?<br/>Effect of poverty on conflict 254<br/>Effect of conflict on poverty 255<br/>The diplomatic agenda on _<br/>poverty and security<br/>Conclusion<br/>18 ENVIRONMENTAL CHANGE<br/>Simon Dalby<br/>Introduction<br/>Environmental security<br/>Robert Kaplan's 'coming anarchy<br/>Environmental threat: science?<br/>Environmental threat: policy<br/>options?<br/>Ten years alter: the Pentagon<br/>climate scenario<br/>Human security and global<br/>ecology<br/>19 HEALTH<br/>Colin Mclnnes<br/>Introduction<br/>Health as a security issue<br/>The spread of infeccious disease<br/>HIV/AIDS as a security issue<br/>Biocerrorism<br/>A not so perfect partnership?<br/>Conclusion<br/>Part 3 Institutions<br/>20 ALLIANCES<br/>John S. Duffieid with (Cynthia Michota<br/>and Sara Ann Miller<br/>Introduction: Why study alliances?<br/>Definitions: What is an alliance?<br/>Explanations of alliance persistence<br/>and collapse<br/>Theories of alliance formation 295<br/>Alliance Institutionalizarion and<br/>socialization 298<br/>The case of NATO after the<br/>Cold War<br/>Background: NATO's origins and<br/>evolution during the Cold War 300<br/>The puzzle of NATO's post-Cold War<br/>persistence 301<br/>Explaining NATO's persistence 302<br/>Conclusion: alliance theory and the<br/>future of NATO<br/>21 REGIONAL INSTITUTIONS<br/>Louise Fawcett<br/>Introduction<br/>Organization of the chapter 310<br/>Note on terms 311<br/>The origins and development of<br/>regional security institutions<br/>Regional securit)' institutions in<br/>the Cold War 313<br/>Regional security institutions since<br/>the Cold War 316<br/>Contemporary challenges<br/>Peace operations 319<br/>The post-2001 security environment<br/>Assessing the growth of regional<br/>security institutions<br/>22 THE UNITED NATIONS<br/>T hoiiKis Ci. Weiss and<br/>Danielle Zach Kalbacher<br/>Introduction<br/>The Securit)' Council<br/>Coniposiiioa 327<br/>I'nwers 329<br/>The Securit)' Councils task<br/>expansion<br/>US hegemony<br/>Increased access by actors other<br/>than states<br/>The General Assembly<br/>The Secretariat<br/>Other UN organs and actors<br/>Twenty-first-century challenges<br/>Changes in the nature of war and<br/>UN responses 338<br/>Terrorism 340<br/>Disarmament and non-proliferation<br/>Conclusion<br/>Part 4 Contemporary<br/>challenges<br/>23 THE INTERNATIONAL ARMS TRADE<br/>William D. Hartung<br/>Introduction<br/>Three channels for arms transfers<br/>Arms sales talce-off: the 1970s<br/>and 1980s<br/>Post-Cold War dynamics<br/>Post-9/11 arms exports<br/>The trade in small arms and light<br/>weapons<br/>Dangers of dual use: the A.Q. Khan<br/>network<br/>Prospects for restraint<br/>Conclusion<br/>24 NUCLEAR PROLIFERATION<br/>Waheguru Pal Singh Sidhu<br/>Introduction<br/>Three caveats<br/>Non-proliferation regime<br/>Three challenges<br/>Three approaches<br/>Way forward<br/>25 COUNTERTERRORISM<br/>I'aul R. Pillar<br/>Introduction<br/>Basic elements<br/>Defence<br/>Going on the offence<br/>Law enforcement and military force<br/>Issues and choices<br/>26 COUNTERINSURGENCY<br/>Joanna Spear<br/>Introduction: the current discourse<br/>on counterinsurgency<br/>The state of the field<br/>The problem that counterinsurgency<br/>responds to - insurgency<br/>'Hearts and minds'<br/>The role of military force in<br/>counterinsurgency<br/>Learning on the ground<br/>What difference does it make to<br/>be doing counterinsurgency in<br/>the media age?<br/>Similarities to post-conflict peace<br/>building<br/>Conclusion<br/>27 PEACE OPERATIONS<br/>Michael Pugh<br/>Introduction<br/>Language and meaning<br/>Surge, retraction, resurgence<br/>Reforms<br/>Brahimi's report 413<br/>Guehenno's goals 415<br/>Ban's plans 416<br/>Standards 416<br/>Hybrid operations 417<br/>Public security gap 418<br/>Conclusion: future prospects<br/>THE RESPONSIBILITY TO PROTECT<br/>AltxJ. Bellamy<br/>Introduction<br/>Sovereignty and responsibility:<br/>from the American Revolution<br/>to the ICISS report<br/>R2P<br/>Responsibility to prevent 427<br/>Rcsponsibilit)' to react 429<br/>Responsibility to rebuild 432<br/>From ICISS to the World Summit<br/>Turning ideas into actions?<br/>Conclusion<br/>PRIVATE SECURITY<br/>Deborah D. Avanc<br/>Introduction<br/>Private security and the control<br/>of force<br/>A transnational market for<br/>military and security services<br/>The current market compared<br/>Why the current market?<br/>Conclusion<br/>TRANSNATIONAL ORGANIZED<br/>CRIME<br/>John T. Picarelli<br/>Introduction<br/>Transnational criminal<br/>organizations<br/>The illicit political economy<br/>The big three: drugs, people<br/>and arms<br/>The wide world of crime<br/>Money laundering and corruption<br/>The dark side of globalization<br/>Transnational crime as a security<br/>issue<br/>InrernationaJ security<br/>National security<br/>Human security<br/>Responses to transnational crime<br/>Conclusion<br/>31 POPULATION MOVEMENTS<br/>Sita Bali<br/>Introduction<br/>Population movements as a<br/>security issue<br/>Population movements categorized<br/>Population movements and<br/>violent conflict<br/>Population movements and foreign<br/>policy<br/>Population movements and internal<br/>security<br/>Conclusion<br/>32 ENERGY SECURITY<br/>Michael T. Klarc<br/>Introduction<br/>Understanding energy security<br/>Why now?<br/>Intimations of global petroleum<br/>insufficiency<br/>A shift in the centre of gravit)' of<br/>world oil production<br/>Oil facilities as a target of attack<br/>Addressing energy (in)securir\'<br/>Conclusion<br/>33 WHAT FUTURE FOR SECURITY<br/>STUDIES?<br/>Stuart Croft<br/>Introduction: context and scope<br/>Locating security studies<br/>Future directions in the subfield<br/>Future directions in the<br/>suhdiscipline<br/>Security studies, porous boundaries,<br/>and the struggle for coherence |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | AC Sinha Collection |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession number | Date last seen | Date last checked out | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | General Book Section | 29/08/2016 | 355.033 WIL/S | P31737 | 12/06/2024 | 08/05/2024 | General Books |