Námskeið
- STJ439G Introduction to Security Studies
Lýsing:
With unrivalled coverage of a wide range of issues - from terrorism, inter-state conflict and nuclear deterrence, to environmental security, health, and transnational crime - Contemporary Security Studies is the definitive introduction to Security Studies. Bringing together contributions from leading scholars, it provides a student-friendly guide to traditional and critical theoretical approaches, as well as the most important contemporary issues that dominate the modern security field.
The sixth edition has been substantially updated, with significantly revised chapters on Securitization and Transnational Crime, and coverage of recent developments - including the initial impact of the COVID-19 pandemic, climate change, and forced migration - incorporated throughout. A brand-new chapter on popular culture and security provides an innovative overview and cutting-edge analysis of the role that popular culture plays in shaping and understanding security-related processes, as well as its place in the study of international relations, with examples ranging from Star Trek and Game of Thrones, to Disney cartoons and K-pop.
Students are encouraged throughout to question their own preconceptions of Security Studies, and to use their own judgement to critically evaluate key approaches and ideas. To help them achieve this, each chapter contains 'key ideas' boxes, 'think point' boxes, and case studies, the latter of which demonstrate the real-world applications, relevance, and implications of each theory. Digital formats and resources The sixth edition is available for students and institutions to purchase in a variety of formats.
The e-book offers a mobile experience and convenient access, along with functionality tools, navigation features, and links that offer extra learning support: www. oxfordtextbooks. co. uk/ebooks In addition to helpful learning features within the book, the text is accompanied by online resources designed to help students to take their learning further. For students: - Explore relevant security issues in greater depth with additional online case studies - Test your understanding of the key ideas and themes in each chapter with self-marking multiple-choice questions - Expand your knowledge of the subject with web links to additional reliable sources - Test your knowledge of key terminology using the flashcard glossary For registered lecturers: - Use the adaptable PowerPoint slides as the basis for lecture presentations, or as hand-outs in class.
Annað
- Útgáfa:6
- Útgáfudagur: 2022-01-24
- Hægt að prenta út 2 bls.
- Hægt að afrita 2 bls.
- Format:ePub
- ISBN 13: 9780192607096
- Print ISBN: 9780198862192
- ISBN 10: 019260709X
Efnisyfirlit
- Cover
- Title Page
- Copyright page
- Preface
- Acknowledgements
- New to this edition
- Table of Contents
- Notes on Contributors
- List of Figures
- List of Tables
- List of Boxes
- How to use this book
- Reader’s Guides
- Key Ideas
- Think Points
- Background Boxes
- Case Studies
- Key Quotes
- Key Points
- Glossary Terms
- Questions
- Further Reading
- Important Websites
- Online Resources
- For Students:
- For Registered Lecturers:
- 1 Introduction: What is Security Studies?
- Chapter Contents
- 1.1 Introduction
- 1.2 Definition of security
- 1.3 Structure
- 1.3.1 Approaches
- 1.3.2 Deepening and broadening
- 1.3.3 Traditional and non-traditional
- 1.4 Conclusion
- Part 1 Approaches to Security
- 2 Realism
- Chapter Contents
- 2.1 Introduction
- 2.2 What is realism?
- 2.2.1 Basic shared elements
- 2.2.2 Map of the realist family
- International structure versus states’ motives
- Divides within structural realism: Waltz versus offensive versus defensive realism
- Realism and suboptimality
- 2.3 Waltz’s structural realism
- 2.3.1 Competition
- 2.3.2 Balancing
- 2.4 Offensive realism
- 2.4.1 Power maximization
- 2.4.2 Inefficient balancing and buckpassing
- 2.5 Defensive realism
- 2.5.1 Risks of competition
- 2.5.2 Benefits of cooperation
- 2.5.3 Variation in the security dilemma
- 2.5.4 Threats and balancing
- 2.6 Motivational realism
- 2.7 Realism and war
- 2.8 Conclusion
- Questions
- Further Reading
- 2 Realism
- 3 Liberalism and Liberal Internationalism
- Chapter Contents
- 3.1 Introduction
- 3.2 Characteristic features of liberalism and liberal internationalism
- 3.3 Central elements in liberalism thinking: commercial liberalism
- 3.4 Pursuit of human rights
- 3.5 Liberalism and international organizations
- 3.6 Liberalism and democracy
- 3.7 Tracing liberal internationalism’s rise and fall: the Cold War and after
- 3.7.1 The Cold War
- 3.7.2 The post-Cold War spread of liberal internationalism
- 3.7.3 The decline of liberal internationalism
- 3.8 Liberalism and liberalist internationalism now—under severe strain
- 3.8.1 New arms build-ups
- 3.8.2 Resistance to Western values
- 3.8.3 Domestic disenchantment with Western values
- 3.8.4 Authoritarian resurgence
- 3.8.5 Disillusionment with the promotion of liberal internationalism
- 3.9 Conclusion
- Questions
- Further Reading
- Important Website
- 4 Historical Materialism
- Chapter Contents
- 4.1 An overview of historical materialism
- 4.2 Capitalism and neoliberalism: insecurity for labour, security for capital
- 4.3 Historical materialism, (in)security, and Security Studies
- 4.3.1 Postcolonialism
- 4.3.2 Critical Security Studies
- 4.3.3 Human security
- 4.3.4 Social constructivism
- 4.3.5 Gender
- 4.3.6 Liberalism
- 4.3.7 Realism
- 4.3.8 The sectoral approach and securitization
- 4.3.9 Peace studies
- 4.4 Conclusion
- Questions
- Further Reading
- Important Websites
- 5 Peace Studies
- Chapter Contents
- 5.1 Introduction
- 5.2 The early years
- 5.2.1 The universities get involved
- 5.3 Evolution amidst controversy
- 5.3.1 A new agenda: environment and poverty
- 5.3.2 The ‘maximalist’ agenda and structural violence
- New goals: equality, justice, and dignity
- 5.4 What is peace studies now?
- 5.5 Responding to the new security challenges
- 5.5.1 A choice of responses
- 5.6 Conclusion
- Questions
- Further Reading
- Important Websites
- Chapter Contents
- 6.1 Introduction
- 6.2 Definitions and key concepts
- 6.2.1 Identity
- 6.2.2 Beliefs, collective ideas, and culture
- 6.2.3 Norms
- 6.2.4 Mutual constitution
- 6.3 Wendt’s three cultures of anarchy
- 6.4 Conventional and critical constructivism
- 6.5 Critiques of constructivism
- 6.6 Conclusion
- Questions
- Further Reading
- Important Website
- Chapter Contents
- 7.1 Introduction: ‘Follow the sign of the gourd’
- 7.2 Toronto desire: Critical Security Studies
- 7.3 Copenhagen distinctions
- 7.4 Aberystwyth exclusions
- 7.5 Constructing security
- 7.6 Everyone’s other: poststructuralism and security
- Anna Stavrianakis, ‘Legitimising Liberal Militarism’ (2016)
- Chris Rossdale, Resisting Militarism (2019)
- 7.7 Beyond divisions? CASEing the joint or returning the gift?
- 7.8 Conclusion
- Questions
- Further Reading
- Chapter Contents
- 8.1 Introduction
- 8.2 Secret agents and power bases
- 8.3 The subject of ‘smart’ bombs
- 8.4 Complicated subjects: children
- 8.5 Indigenous peoples and a cautionary tale
- 8.6 Conclusion
- Questions
- Further Reading
- Acknowledgement
- Chapter Contents
- 9.1 Introduction
- 9.2 A view from elsewhere: genealogies of the postcolonial
- 9.2.1 Edward Said and Orientalism
- 9.2.2 Subaltern Studies
- 9.3 Security and the colonizer’s view of the world
- 9.4 Decolonizing security: strategies
- 9.5 Conclusion: should we ‘forget security studies’?
- Questions
- Further Reading
- Important Websites
- Chapter Contents
- 10.1 Introduction
- 10.2 Arguments for human security
- 10.2.1 Commission on Human Security
- 10.2.2 International Commission on Intervention and State Sovereignty (ICISS) and the Responsibility to Protect
- 10.2.3 Millennium Development Goals (MDGs)
- 10.2.4 The International Criminal Court
- 10.3 The genealogy of human security: what’s new?
- 10.3.1 The genealogy of human security
- 10.4 Critiques of human security
- 10.4.1 Too broad to be useful
- 10.4.2 National interest and co-optation
- 10.4.3 Liberal reformist tool of global capitalism
- 10.4.4 Neo-colonial
- 10.5 Conclusion
- Questions
- Further Reading
- Important Websites
- Chapter Contents
- 11.1 Introduction
- 11.2 Representations
- 11.3 Practical context I: war
- 11.4 Practical context II: civilian life
- 11.5 Practical context III: the post-conflict environment
- 11.6 Multiple perceptions, same realities?
- 11.7 Conclusion
- Questions
- Further Reading
- Important Websites
- Chapter Contents
- 12.1 Introduction
- 12.2 From Copenhagen to the world: The evolution of securitization theory from the 1980s to the 2020s
- 12.2.1 A ‘new framework for analysis’: The Copenhagen School
- 12.2.2 Evolutions of securitization theory in the 21st century
- 12.3 Main empirical cases in securitization research
- 12.3.1 Migration
- 12.3.2 Religion
- 12.3.3 The environment and climate change
- 12.3.4 Health
- 12.4 Challenges and critiques facing securitization theory
- 12.5 Conclusion
- Questions
- Further Reading
- Important Websites
- Chapter Contents
- 13.1 Introduction
- 13.2 What do we mean by popular culture?
- 13.3 What makes popular culture so politically relevant?
- 13.4 The expansion of Security Studies and the growing interest in popular culture
- 13.5 The role of popular culture in conflict management
- 13.5.1 Shaping basic beliefs about conflict and its rationale
- 13.5.2 Constructing enemy images
- 13.6 Popular culture and the struggle over ‘soft power’
- 13.6.1 Popular culture as a source of state (soft) power
- 13.6.2 Popular culture and soft power competition between states
- 13.6.3 The limitations of using pop culture to advance state interests
- 13.7 Popular culture and the making of peace
- 13.8 Conclusion
- Questions
- Further Reading
- Important Websites
- 14 Military Security
- Chapter Contents
- 14.1 Introduction
- 14.2 Approaches to military security
- 14.3 Traditional military-security studies
- 14.4 War
- 14.5 Alliances and neutrality
- 14.6 Deterrence
- 14.7 Cooperative security and arms control
- 14.8 The cost of military security
- 14.9 Conclusion
- Questions
- Further Reading
- Important Websites
- 15 Regime Security
- Chapter Contents
- 15.1 Introduction
- 15.2 Public versus regime security
- 15.3 Threats to regime security
- 15.4 The regime insecurity loop
- 15.5 Security strategies of patrimonial regimes
- 15.5.1 Coercion
- 15.5.2 Accommodation
- 15.5.3 Manipulation
- 15.6 Anatomy of a weak state: Assad’s Syria
- 15.7 Prospects for regimes in the developing world
- 15.8 Conclusion: The need for sustainable governance
- Questions
- Further Reading
- Important Websites
- 16 Societal Security
- Chapter Contents
- 16.1 Introduction
- 16.2 A duality of state and societal security
- 16.3 Society and societal identity
- 16.4 Threats to societal identity
- 16.4.1 The five sectors of security
- 16.4.2 Immigration and the rise of right-wing populism
- 16.4.3 Genocide, ‘culturecide’, and the Yugoslav wars
- 16.5 Defending societal identity
- 16.5.1 Non-military means of defence
- 16.6 Conclusion
- 16.6.1 The charge of reification
- 16.6.2 Who speaks for society?
- 16.6.3 The dangers of voicing societal security
- 16.6.4 Two ‘generations’ of societal security and their applications
- Questions
- Further Reading
- Important Websites
- 17 Environmental Security
- Chapter Contents
- 17.1 Introduction
- 17.2 The origins of environmental security
- 17.3 Major interpretations of environmental security
- 17.4 Environmental change and violent conflict
- 17.5 Environmental change and national security
- 17.6 Armed forces, war, and the environment
- 17.7 Environmental change and human security
- 17.8 Environment or security?
- 17.9 Conclusion
- Questions
- Further Reading
- Important Websites
- 18 Economic Security
- Chapter Contents
- 18.1 Introduction
- 18.2 Economic science of security
- 18.2.1 Overview of economic theory
- 18.2.2 Five vectors of economic incentives
- Goals
- Resource constraints
- Institutional constraints
- Information
- Time
- 18.3 Economic tools of security policy
- 18.3.1 Sanctions
- 18.3.2 Trade
- 18.3.3 Finance
- 18.3.4 Aid
- 18.4 Conclusion
- Questions
- Further Reading
- Important Websites
- Chapter Contents
- 19.1 Introduction
- 19.2 Globalization as a neoliberal ideology for development
- 19.2.1 Globalization as a concept
- 19.2.2 Neoliberalism and contemporary globalization
- 19.2.3 A neoliberal ideology for development
- 19.2.4 The legacy of structural adjustment programmes
- 19.3 Neoliberalism and the fostering of inequality
- 19.3.1 The rising inequality between and within nations
- 19.3.2 Inequality between nations
- 19.3.3 Inequality within nations
- 19.4 Global inequality as a threat to global security
- 19.5 Conclusion
- Questions
- Further Reading
- Important Websites
- 20 Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts
- Chapter Contents
- 20.1 Introduction
- 20.2 What is coercive diplomacy?
- 20.3 Requirements for success
- 20.4 The challenge of defining success
- 20.5 The importance of the strategic context
- 20.6 Conclusion
- Questions
- Further Reading
- Important Websites
- 21 Weapons of Mass Destruction
- Chapter Contents
- 21.1 Introduction
- 21.2 Nuclear weapons
- 21.2.1 Nuclear-weapons effects
- 21.2.2 Methods of delivery
- 21.2.3 Impact on international politics
- 21.3 Chemical weapons
- 21.3.1 Chemical-weapons effects
- 21.3.2 Methods of delivery
- 21.3.3 Impact on international politics
- 21.4 Biological weapons
- 21.4.1 Biological-weapons effects
- 21.4.2 Methods of delivery
- 21.4.3 Impact on international politics
- 21.5 Conclusion
- Questions
- Further Reading
- Important Websites
- 22 Terrorism
- Chapter Contents
- 22.1 Introduction
- 22.2 Concepts and definitions
- 22.2.1 Definition of terrorism
- 22.2.2 Techniques and targets
- 22.2.3 Prevalence of terrorism
- 22.3 Types and causes of terrorism
- 22.3.1 Categories
- 22.3.2 Causes
- 22.4 Security measures
- 22.4.1 Prevention
- 22.4.2 Responses
- 22.4.3 International measures
- 22.4.4 Civil liberties in peril
- 22.5 Conclusion
- Questions
- Further Reading
- Important Websites
- 23 Humanitarian Intervention
- Chapter Contents
- 23.1 Introduction
- 23.2 The case for humanitarian intervention
- 23.3 The case against humanitarian intervention
- 23.4 The Responsibility to Protect
- 23.5 Conclusion
- Questions
- Further Reading
- Important Websites
- 24 Energy Security
- Chapter Contents
- 24.1 Introduction
- 24.2 The problem of energy security
- 24.2.1 The energy–security ‘nexus’
- 24.3 Energy security and International Relations theory
- 24.3.1 Liberalism and energy security
- 24.3.2 Realism and energy security
- 24.3.3 Historical materialism and energy security
- 24.4 Energy security and human insecurity
- 24.5 Energy security and the United States
- 24.5.1 US hegemony, oil, and intervention in the Middle East
- 24.5.2 US strategy of diversification
- 24.6 Conclusion
- Questions
- Further Reading
- Important Websites
- 25 The Weapons Trade
- Chapter Contents
- 25.1 Introduction
- 25.2 History and shifting dynamics of the defence trade
- 25.3 Contemporary trends in the weapons trade
- 25.4 The illicit arms trade
- 25.5 Controlling the weapons trade
- 25.6 Conclusion
- Questions
- Further Reading
- Important Websites
- 26 Health and Security
- Chapter Contents
- 26.1 Introduction
- 26.2 Health and human security
- 26.3 Health and national security
- 26.3.1 SARS
- 26.3.2 Ebola
- 26.3.3 COVID-19 Pandemic
- 26.4 Health and bio-security
- 26.5 Conclusion
- Questions
- Further Reading
- Important Websites
- 27 Transnational Crime
- Chapter Contents
- 27.1 Introduction
- 27.2 Definitions and key concepts
- 27.2.1 Useful concepts: networks and markets
- 27.2.2 Markets and globalization
- 27.3 ‘Crime–terror nexus’
- 27.4 Organized crime and the state
- 27.5 Case study: organized crime in Mexico
- 27.6 State responses to transnational crime
- 27.7 Conclusion
- Questions
- Further Reading
- Important Websites
- 28 Cyber-Security
- Chapter Contents
- 28.1 Introduction
- 28.2 Security and cyberspace
- 28.2.1 The inherent insecurity of computer networks
- 28.2.2 Computer vulnerabilities and threat agents
- 28.2.3 Hacking into a system
- 28.2.4 Cyber-incidents
- 28.3 Types of cyber-threats
- 28.3.1 Hacktivism
- 28.3.2 Cyber-crime
- 28.3.3 Cyber-espionage and cyber-exploitation
- 28.3.4 Cyber-terrorism
- 28.3.5 Cyber-influence operations
- 28.3.6 Cyber-related violations of human rights/repression
- 28.3.7 Cyber-war
- 28.4 The reality of cyber-conflict
- 28.5 Reducing cyber-in-security
- 28.6 Conclusion
- Questions
- Further Reading
- Important Websites
- 29 After the Return to Theory: The Past, Present, and Future of Security Studies
- Chapter Contents
- 29.1 Introduction
- 29.2 The origins and institutional structure of security studies
- 29.3 The Golden Age of security studies
- 29.4 Institutionalization and stagnation
- 29.5 Disciplinary questioning and theoretical relaunch
- 29.6 Conclusion: the powers of theory and the challenges of the future
- Questions
- Further Reading
- Important Websites
UM RAFBÆKUR Á HEIMKAUP.IS
Bókahillan þín er þitt svæði og þar eru bækurnar þínar geymdar. Þú kemst í bókahilluna þína hvar og hvenær sem er í tölvu eða snjalltæki. Einfalt og þægilegt!Rafbók til eignar
Rafbók til eignar þarf að hlaða niður á þau tæki sem þú vilt nota innan eins árs frá því bókin er keypt.
Þú kemst í bækurnar hvar sem er
Þú getur nálgast allar raf(skóla)bækurnar þínar á einu augabragði, hvar og hvenær sem er í bókahillunni þinni. Engin taska, enginn kyndill og ekkert vesen (hvað þá yfirvigt).
Auðvelt að fletta og leita
Þú getur flakkað milli síðna og kafla eins og þér hentar best og farið beint í ákveðna kafla úr efnisyfirlitinu. Í leitinni finnur þú orð, kafla eða síður í einum smelli.
Glósur og yfirstrikanir
Þú getur auðkennt textabrot með mismunandi litum og skrifað glósur að vild í rafbókina. Þú getur jafnvel séð glósur og yfirstrikanir hjá bekkjarsystkinum og kennara ef þeir leyfa það. Allt á einum stað.
Hvað viltu sjá? / Þú ræður hvernig síðan lítur út
Þú lagar síðuna að þínum þörfum. Stækkaðu eða minnkaðu myndir og texta með multi-level zoom til að sjá síðuna eins og þér hentar best í þínu námi.
Fleiri góðir kostir
- Þú getur prentað síður úr bókinni (innan þeirra marka sem útgefandinn setur)
- Möguleiki á tengingu við annað stafrænt og gagnvirkt efni, svo sem myndbönd eða spurningar úr efninu
- Auðvelt að afrita og líma efni/texta fyrir t.d. heimaverkefni eða ritgerðir
- Styður tækni sem hjálpar nemendum með sjón- eða heyrnarskerðingu
- Gerð : 208
- Höfundur : 8627
- Útgáfuár : 2019
- Leyfi : 380