Security Studies

Höfundur Norma Rossi; Malte Riemann

Útgefandi SAGE Publications, Ltd. (UK)

Snið ePub

Print ISBN 9781529774603

Útgáfa 1

Útgáfuár 2024

3.590 kr.

Description

Efnisyfirlit

  • About the editors and authors
  • Preface
  • Acknowledgements
  • Online resources
  • Part I Whose security?: History, theories and institutions
  • 1 Introducing security studies: An applied introduction
  • Chapter overview
  • Introduction
  • Whose security?
  • Theories of (in)security
  • Theory and practice of security: A guide to the textbook
  • Review questions
  • Further reading
  • 2 Security: When? Where? From what? Of what? For whom?
  • Chapter overview
  • Key learning goals
  • Security as a question
  • Pluralized sources of insecurity
  • Pluralized subjects of security
  • So who is now to be secured?
  • Review questions
  • Further readings
  • 3 International security
  • Chapter overview
  • Key learning goals
  • Introduction
  • International as a space where inter-state security dynamics take place
  • International as a security referent
  • The international as a challenge to security for some
  • International as hierarchy amidst anarchy
  • Conclusion
  • Review questions
  • Further reading
  • 4 State security
  • Chapter overview
  • Key learning goals
  • Introduction
  • What is the state?
  • The (auto)biographies of the state
  • The state and state security in sovereignty cartels
  • The state as a security threat
  • Conclusion
  • Review questions
  • Further reading
  • 5 Human security
  • Chapter overview
  • Key learning goals
  • Introduction
  • Broadening, deepening and opening security
  • Human security in practice
  • Three framings of the human as security referent
  • Human security for whom? The case of Agnes
  • Conclusion
  • Review questions
  • Further reading
  • 6 Security beyond the human
  • Chapter overview
  • Key learning goals
  • Knowledge systems, nonhumans and security
  • Nonhuman rights and security
  • More-than-human frameworks of security
  • Nonhuman security threats and post-humanist thought
  • Conclusions
  • Review questions
  • Further reading
  • Part II Security challenges
  • 7 War and militarism
  • Key learning goals
  • Introduction
  • Explore: The Yugoslav wars of the 1990s
  • Understand: The study of war and militarism
  • Respond: Responding to war and militarism
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 8 Genocide and crimes against humanity
  • Key learning goals
  • Introduction
  • Explore: Crimes against humanity and genocide in contemporary global politics
  • Understand: Genocide – key concepts
  • Respond: Brazil
  • Conclusion
  • Problem-mapping exercise
  • Review questions
  • Further reading
  • Security beyond the real
  • 9 Terrorism
  • Key learning goals
  • Introduction
  • Explore: Race and political violence
  • Understand: Terrorism, counterterrorism and supremacism
  • Respond: The social and political functions of ‘terrorism’
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 10 The global arms trade and its control
  • Key learning goals
  • Introduction
  • Explore: Arming the war in Yemen
  • Understand: Challenging dominant approaches
  • Respond: Accountability for arms sales to the Saudi- and UAE-led coalition
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 11 Weapons of mass destruction
  • Key learning goals
  • Introduction
  • Explore: The 2003 US war in Iraq
  • Understand: Interrogating the WMD category
  • Respond: WMD in the 2003 US war in Iraq
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 12 Street gangs and urban violence
  • Key learning goals
  • Introduction
  • Explore: Street gangs in Haiti
  • Understand: What is urban violence? How should we define violent urban actors?
  • Respond: Street gangs in Haiti
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 13 Global development
  • Key learning goals
  • Introduction
  • Explore: The problem of conflict-related sexual violence
  • Understand: CRSV as a threat to security and development. Centering the ‘human’ and the ‘state’?
  • Respond: Mobile courts
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the ‘real’
  • 14 Migration
  • Key learning goals
  • Introduction
  • Explore: The simultaneous deep appreciation and demonisation of migrants
  • Understand: Foregrounding colonialism, rethinking the ‘safety’ of home, and reflecting on the allure of ‘balance’
  • Respond: Striking migrant workers
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 15 Race and security
  • Key learning goals
  • Introduction
  • Explore: The licit life of racism and in/security
  • Understand: “What is going on?”:2 Whiteness as property, war, and climate change
  • Respond: “We are all in this together”?
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 16 Conflict and gendered violence
  • Key learning goals
  • Introduction
  • Explore: Gendered dimensions of Afghan conflict (2001–2021)
  • Understand: Gendered violence and international security
  • Respond: Moving forward in Afghanistan and Ukraine
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the ‘real’
  • 17 Organised crime
  • Key learning goals
  • Introduction
  • Explore: The maxi-trial Rinascita-Scott and the ‘Ndrangheta in Calabria, Italy
  • Understand: Defining organised crime
  • Respond: The maxi-trial Rinascita-Scott and the ‘Ndrangheta in Calabria, Italy
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 18 Cybersecurity
  • Key learning goals
  • Introduction
  • Explore: Cybersecurity
  • Understand: Why is cybersecurity political?
  • Understand: National and international cybersecurity
  • Understand: Cybersecurity beyond the state
  • Understand: Cybersecurity in practice
  • Respond: Colonial Pipeline
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 19 Financial crises and security
  • Key learning goals
  • Introduction
  • Explore: Cascading financial and political crises
  • Understand: Recurring crises, war economy, and populist politics
  • Respond: Global financial crisis and its afterlives
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 20 Climate change
  • Key learning goals
  • Introduction
  • Explore: Climate change, security and the UNSC
  • Understand: The climate change–security nexus
  • Respond: The UNSC – climate change as a threat multiplier and the progressive climatization of security
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further readings
  • Security beyond the real
  • 21 Health security
  • Key learning goals
  • Introduction
  • Explore: The rise of health security
  • Understand: Emergency and neglect
  • Respond: Reclaiming (everyday) health security
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 22 Resource security
  • Key learning goals
  • Introduction
  • Explore: Food insecurity and the Arab Spring
  • Understand: Securing resources
  • Respond: Food insecurity and the Arab Spring
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 23 Maritime security
  • Key learning goals
  • Introduction
  • Explore: The context for maritime security
  • Understand: The history of the maritime security agenda
  • Respond: Governing maritime security through informality
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • 24 Space security
  • Key learning goals
  • Introduction: Why is space rubbish a security issue?
  • Explore: Litter at 15,000 mph
  • Understand: Three key lenses for the examination of space debris
  • Respond: Voluntary standards and guidelines
  • Problem-mapping exercise
  • Conclusion
  • Review questions
  • Further reading
  • Security beyond the real
  • Glossary
  • References
  • Index
Show More

Additional information

Veldu vöru

Leiga á rafbók í 120 daga, Leiga á rafbók í 90 daga, Leiga á rafbók í 180 daga, Rafbók til eignar

Reviews

There are no reviews yet.

Be the first to review “Security Studies”

Netfang þitt verður ekki birt. Nauðsynlegir reitir eru merktir *

Aðrar vörur

0
    0
    Karfan þín
    Karfan þín er tómAftur í búð