Security Studies/ (Record no. 176735)

MARC details
000 -LEADER
fixed length control field 09596nam a2200145Ia 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 041542562X
040 ## - CATALOGING SOURCE
Transcribing agency CUS
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 355.033
Item number WIL/S
245 #0 - TITLE STATEMENT
Title Security Studies/
Sub title An Introduction
Statement of responsibility, etc. Williams, Paul D.[ed.]
250 ## - EDITION STATEMENT
Edition statement 1st.ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. London:
Name of publisher, distributor, etc. Routledge,
Date of publication, distribution, etc. 2008.
300 ## - PHYSICAL DESCRIPTION
Extent 552
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1 SECURITY STUDIES:<br/>AN INTRODUCTION<br/>Paul D. Williams<br/>Wliat is security studies? A very<br/>short overview<br/>Defining a field of inquiry: four<br/>fundamental questions<br/>What is security? 5<br/>Whose security? 7<br/>What is a security issue? 8<br/>How can security be achieved? 9<br/>How to use this book<br/>Part 1 Theoretical<br/>approaches<br/>2 REALISM<br/>Colin Elman<br/>Introduction<br/>Classical realism<br/>Neorealism: Waltz's Theory of<br/>Internatioual Politics<br/>Defensive structural realism<br/>Offensive structural realism<br/>Rise and fall realism<br/>Neoclassical realism<br/>Conclusion<br/>3 LIBERALISM<br/>Cornelia Navari<br/>Introduction<br/>Traditional or Kantian liberalism<br/>Douce commerce<br/>The democratic peace thesis<br/>Neoliberal institutionalism<br/>Conclusion<br/>4 GAM.E THEORY<br/>Prank C. Zagare<br/>Introduction<br/>Primitive concepts<br/>Strategic-form games and Nash<br/>equilibria<br/>Extensive-form games, backwards<br/>induction and subgame perfect<br/>equilibria<br/>Applications of game theor)' in<br/>securit)' studies<br/>Coda<br/>5 CONSTRUCTIVISM<br/>Matt McDonald<br/>Introduction: constructivism and<br/>security<br/>Constructivism: central tenets<br/>and shared assumptions<br/>Securit}' as social construction:<br/>identity and norms 61<br/>Negotiation and contestation 64<br/>Agents, structures and change 66<br/>The Copenhagen School<br/>Conclusion<br/>6 PEACE STUDIES<br/>Peter Lawler<br/>Introduction: What is peace studies?<br/>Peace studies: a brief history<br/>Peace researcii as science 77<br/>From peace research to peace<br/>studies 79<br/>Key concepts<br/>Positive and negative peace 81<br/>Structural violence 83<br/>Cultural violence 85<br/>The future of peace studies?<br/>7 CRITICAL THEORY<br/>Pinar Bilgin<br/>Introduction: the need for a<br/>critical perspective<br/>Rethinking security<br/>Critical theory<br/>Theory/practice<br/>The 'Welsh School' of critical<br/>securit)' studies<br/>Emancipation<br/>Conclusion<br/>8 FEMINIST PERSPECTIVES<br/>Sandra Whirvvorth<br/>Introduction<br/>Feminist approaches in<br/>international security<br/>Women, gender and security -<br/>the impacts of armed conflict<br/>Women, gender and security —<br/>action and activism<br/>Women, gender and security —<br/>talking and making weapons<br/>and war<br/>Conclusions<br/>9 INTERNATIONAL POLITICAL<br/>SOCIOLOGY<br/>Didier Bigo<br/>Introduction<br/>Security studies within IR;<br/>bordering and debordering what<br/>security means<br/>From security sectors to<br/>(inlsecuritization, a constructivist<br/>stance<br/>Is (in)securitization only a speech<br/>act enacting exception? The role<br/>of routines and technologies<br/>Conclusion<br/>Part 2 Key concepts<br/>10 UNCERTAINTY<br/>Ken Binuh and Nicholas J. Whcclcr<br/>Introduction<br/>The house of uncertainty<br/>The quintessential dilemma<br/>Three logics<br/>The securit)' dilemma in the<br/>tsventj'-first centur)'<br/>Towards a new agenda for security<br/>studies<br/>11 WAR<br/>Paul D. Williams<br/>Introduction<br/>Three philosophies of war<br/>Trends in armed conflicts since<br/>1945<br/>Who fights? Who dies? 161<br/>Is the nature of warfare<br/>changing?<br/>The idea ol total war 163<br/>The 'new wars' debate 165<br/>The contemporary Western way<br/>ol war 167<br/>Conclusion<br/>12 TERRORISM<br/>Paul Rogers<br/>Introduction<br/>Terrorism in perspective<br/>Definitions<br/>State and sub-state terror<br/>Responding to terrorism<br/>The 9/11 response and the War<br/>on Terror<br/>Trends in terrorism<br/>Terrorism and insurgency 182<br/>Internationalism 182<br/>Suicide terrorism 183<br/>Speed of learning 183<br/>Media developments 183<br/>P.conomic targeting 183<br/>Mass casualty attacks and weapons<br/>of mass destruction 184<br/>Conclusion<br/>13 GENOCIDE AND MASS KILLING<br/>Adam Jones<br/>Introduction<br/>Genocide: key cases<br/>Challenges of intervention<br/>Conclusion: the way forward -<br/>and back<br/>14 ETHNIC CONFLICT<br/>Stuart J. Kaufman<br/>Introduction<br/>What is ethnic conflict?<br/>An overview of ethnic conflicts<br/>Causes of violent ethnic conflict<br/>Sudan 208<br/>Yugoslavia 209<br/>International security dimensions<br/>of ethnic conflicts<br/>Resolution of ethnic civil wars<br/>15 COERCION<br/>Lawrence Freedman and<br/>Srinath Raghavan<br/>Introduction<br/>Strategy<br/>Deterrence and compellence<br/>Designing coercive strategies<br/>Punishment and denial<br/>Types of costs<br/>Multiple audiences<br/>Reputations<br/>Long-term impact<br/>Conclusion<br/>16 HUMAN SECURITY<br/>Fen Osier Hampson<br/>Introduction<br/>Understanding the scope of human<br/>security<br/>Setting the boundaries of human<br/>security<br/>Ongoing debates and unresolved<br/>issues<br/>Human security risk assessment<br/>Governance and human security<br/>Towards a theorj' of human security<br/>Conclusion<br/>17 POVERTY<br/>Caroline Thomas<br/>Introduction<br/>Is poverty an appropriate concern<br/>for security studies?<br/>Whose poverty? Whose security?<br/>Placing human beings at the<br/>centre of our concern<br/>What do we know about the<br/>poverty-security nexus?<br/>What do we know about<br/>poverty-violent conflict?<br/>Effect of poverty on conflict 254<br/>Effect of conflict on poverty 255<br/>The diplomatic agenda on _<br/>poverty and security<br/>Conclusion<br/>18 ENVIRONMENTAL CHANGE<br/>Simon Dalby<br/>Introduction<br/>Environmental security<br/>Robert Kaplan's 'coming anarchy<br/>Environmental threat: science?<br/>Environmental threat: policy<br/>options?<br/>Ten years alter: the Pentagon<br/>climate scenario<br/>Human security and global<br/>ecology<br/>19 HEALTH<br/>Colin Mclnnes<br/>Introduction<br/>Health as a security issue<br/>The spread of infeccious disease<br/>HIV/AIDS as a security issue<br/>Biocerrorism<br/>A not so perfect partnership?<br/>Conclusion<br/>Part 3 Institutions<br/>20 ALLIANCES<br/>John S. Duffieid with (Cynthia Michota<br/>and Sara Ann Miller<br/>Introduction: Why study alliances?<br/>Definitions: What is an alliance?<br/>Explanations of alliance persistence<br/>and collapse<br/>Theories of alliance formation 295<br/>Alliance Institutionalizarion and<br/>socialization 298<br/>The case of NATO after the<br/>Cold War<br/>Background: NATO's origins and<br/>evolution during the Cold War 300<br/>The puzzle of NATO's post-Cold War<br/>persistence 301<br/>Explaining NATO's persistence 302<br/>Conclusion: alliance theory and the<br/>future of NATO<br/>21 REGIONAL INSTITUTIONS<br/>Louise Fawcett<br/>Introduction<br/>Organization of the chapter 310<br/>Note on terms 311<br/>The origins and development of<br/>regional security institutions<br/>Regional securit)' institutions in<br/>the Cold War 313<br/>Regional security institutions since<br/>the Cold War 316<br/>Contemporary challenges<br/>Peace operations 319<br/>The post-2001 security environment<br/>Assessing the growth of regional<br/>security institutions<br/>22 THE UNITED NATIONS<br/>T hoiiKis Ci. Weiss and<br/>Danielle Zach Kalbacher<br/>Introduction<br/>The Securit)' Council<br/>Coniposiiioa 327<br/>I'nwers 329<br/>The Securit)' Councils task<br/>expansion<br/>US hegemony<br/>Increased access by actors other<br/>than states<br/>The General Assembly<br/>The Secretariat<br/>Other UN organs and actors<br/>Twenty-first-century challenges<br/>Changes in the nature of war and<br/>UN responses 338<br/>Terrorism 340<br/>Disarmament and non-proliferation<br/>Conclusion<br/>Part 4 Contemporary<br/>challenges<br/>23 THE INTERNATIONAL ARMS TRADE<br/>William D. Hartung<br/>Introduction<br/>Three channels for arms transfers<br/>Arms sales talce-off: the 1970s<br/>and 1980s<br/>Post-Cold War dynamics<br/>Post-9/11 arms exports<br/>The trade in small arms and light<br/>weapons<br/>Dangers of dual use: the A.Q. Khan<br/>network<br/>Prospects for restraint<br/>Conclusion<br/>24 NUCLEAR PROLIFERATION<br/>Waheguru Pal Singh Sidhu<br/>Introduction<br/>Three caveats<br/>Non-proliferation regime<br/>Three challenges<br/>Three approaches<br/>Way forward<br/>25 COUNTERTERRORISM<br/>I'aul R. Pillar<br/>Introduction<br/>Basic elements<br/>Defence<br/>Going on the offence<br/>Law enforcement and military force<br/>Issues and choices<br/>26 COUNTERINSURGENCY<br/>Joanna Spear<br/>Introduction: the current discourse<br/>on counterinsurgency<br/>The state of the field<br/>The problem that counterinsurgency<br/>responds to - insurgency<br/>'Hearts and minds'<br/>The role of military force in<br/>counterinsurgency<br/>Learning on the ground<br/>What difference does it make to<br/>be doing counterinsurgency in<br/>the media age?<br/>Similarities to post-conflict peace<br/>building<br/>Conclusion<br/>27 PEACE OPERATIONS<br/>Michael Pugh<br/>Introduction<br/>Language and meaning<br/>Surge, retraction, resurgence<br/>Reforms<br/>Brahimi's report 413<br/>Guehenno's goals 415<br/>Ban's plans 416<br/>Standards 416<br/>Hybrid operations 417<br/>Public security gap 418<br/>Conclusion: future prospects<br/>THE RESPONSIBILITY TO PROTECT<br/>AltxJ. Bellamy<br/>Introduction<br/>Sovereignty and responsibility:<br/>from the American Revolution<br/>to the ICISS report<br/>R2P<br/>Responsibility to prevent 427<br/>Rcsponsibilit)' to react 429<br/>Responsibility to rebuild 432<br/>From ICISS to the World Summit<br/>Turning ideas into actions?<br/>Conclusion<br/>PRIVATE SECURITY<br/>Deborah D. Avanc<br/>Introduction<br/>Private security and the control<br/>of force<br/>A transnational market for<br/>military and security services<br/>The current market compared<br/>Why the current market?<br/>Conclusion<br/>TRANSNATIONAL ORGANIZED<br/>CRIME<br/>John T. Picarelli<br/>Introduction<br/>Transnational criminal<br/>organizations<br/>The illicit political economy<br/>The big three: drugs, people<br/>and arms<br/>The wide world of crime<br/>Money laundering and corruption<br/>The dark side of globalization<br/>Transnational crime as a security<br/>issue<br/>InrernationaJ security<br/>National security<br/>Human security<br/>Responses to transnational crime<br/>Conclusion<br/>31 POPULATION MOVEMENTS<br/>Sita Bali<br/>Introduction<br/>Population movements as a<br/>security issue<br/>Population movements categorized<br/>Population movements and<br/>violent conflict<br/>Population movements and foreign<br/>policy<br/>Population movements and internal<br/>security<br/>Conclusion<br/>32 ENERGY SECURITY<br/>Michael T. Klarc<br/>Introduction<br/>Understanding energy security<br/>Why now?<br/>Intimations of global petroleum<br/>insufficiency<br/>A shift in the centre of gravit)' of<br/>world oil production<br/>Oil facilities as a target of attack<br/>Addressing energy (in)securir\'<br/>Conclusion<br/>33 WHAT FUTURE FOR SECURITY<br/>STUDIES?<br/>Stuart Croft<br/>Introduction: context and scope<br/>Locating security studies<br/>Future directions in the subfield<br/>Future directions in the<br/>suhdiscipline<br/>Security studies, porous boundaries,<br/>and the struggle for coherence
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type AC Sinha Collection
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Accession number Date last seen Date last checked out Koha item type
        Central Library, Sikkim University Central Library, Sikkim University General Book Section 29/08/2016 355.033 WIL/S P31737 12/06/2024 08/05/2024 General Books
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha