Description
Efnisyfirlit
- About the editors and authors
- Preface
- Acknowledgements
- Online resources
- Part I Whose security?: History, theories and institutions
- 1 Introducing security studies: An applied introduction
- Chapter overview
- Introduction
- Whose security?
- Theories of (in)security
- Theory and practice of security: A guide to the textbook
- Review questions
- Further reading
- 2 Security: When? Where? From what? Of what? For whom?
- Chapter overview
- Key learning goals
- Security as a question
- Pluralized sources of insecurity
- Pluralized subjects of security
- So who is now to be secured?
- Review questions
- Further readings
- 3 International security
- Chapter overview
- Key learning goals
- Introduction
- International as a space where inter-state security dynamics take place
- International as a security referent
- The international as a challenge to security for some
- International as hierarchy amidst anarchy
- Conclusion
- Review questions
- Further reading
- 4 State security
- Chapter overview
- Key learning goals
- Introduction
- What is the state?
- The (auto)biographies of the state
- The state and state security in sovereignty cartels
- The state as a security threat
- Conclusion
- Review questions
- Further reading
- 5 Human security
- Chapter overview
- Key learning goals
- Introduction
- Broadening, deepening and opening security
- Human security in practice
- Three framings of the human as security referent
- Human security for whom? The case of Agnes
- Conclusion
- Review questions
- Further reading
- 6 Security beyond the human
- Chapter overview
- Key learning goals
- Knowledge systems, nonhumans and security
- Nonhuman rights and security
- More-than-human frameworks of security
- Nonhuman security threats and post-humanist thought
- Conclusions
- Review questions
- Further reading
- Part II Security challenges
- 7 War and militarism
- Key learning goals
- Introduction
- Explore: The Yugoslav wars of the 1990s
- Understand: The study of war and militarism
- Respond: Responding to war and militarism
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 8 Genocide and crimes against humanity
- Key learning goals
- Introduction
- Explore: Crimes against humanity and genocide in contemporary global politics
- Understand: Genocide – key concepts
- Respond: Brazil
- Conclusion
- Problem-mapping exercise
- Review questions
- Further reading
- Security beyond the real
- 9 Terrorism
- Key learning goals
- Introduction
- Explore: Race and political violence
- Understand: Terrorism, counterterrorism and supremacism
- Respond: The social and political functions of ‘terrorism’
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 10 The global arms trade and its control
- Key learning goals
- Introduction
- Explore: Arming the war in Yemen
- Understand: Challenging dominant approaches
- Respond: Accountability for arms sales to the Saudi- and UAE-led coalition
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 11 Weapons of mass destruction
- Key learning goals
- Introduction
- Explore: The 2003 US war in Iraq
- Understand: Interrogating the WMD category
- Respond: WMD in the 2003 US war in Iraq
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 12 Street gangs and urban violence
- Key learning goals
- Introduction
- Explore: Street gangs in Haiti
- Understand: What is urban violence? How should we define violent urban actors?
- Respond: Street gangs in Haiti
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 13 Global development
- Key learning goals
- Introduction
- Explore: The problem of conflict-related sexual violence
- Understand: CRSV as a threat to security and development. Centering the ‘human’ and the ‘state’?
- Respond: Mobile courts
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the ‘real’
- 14 Migration
- Key learning goals
- Introduction
- Explore: The simultaneous deep appreciation and demonisation of migrants
- Understand: Foregrounding colonialism, rethinking the ‘safety’ of home, and reflecting on the allure of ‘balance’
- Respond: Striking migrant workers
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 15 Race and security
- Key learning goals
- Introduction
- Explore: The licit life of racism and in/security
- Understand: “What is going on?”:2 Whiteness as property, war, and climate change
- Respond: “We are all in this together”?
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 16 Conflict and gendered violence
- Key learning goals
- Introduction
- Explore: Gendered dimensions of Afghan conflict (2001–2021)
- Understand: Gendered violence and international security
- Respond: Moving forward in Afghanistan and Ukraine
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the ‘real’
- 17 Organised crime
- Key learning goals
- Introduction
- Explore: The maxi-trial Rinascita-Scott and the ‘Ndrangheta in Calabria, Italy
- Understand: Defining organised crime
- Respond: The maxi-trial Rinascita-Scott and the ‘Ndrangheta in Calabria, Italy
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 18 Cybersecurity
- Key learning goals
- Introduction
- Explore: Cybersecurity
- Understand: Why is cybersecurity political?
- Understand: National and international cybersecurity
- Understand: Cybersecurity beyond the state
- Understand: Cybersecurity in practice
- Respond: Colonial Pipeline
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 19 Financial crises and security
- Key learning goals
- Introduction
- Explore: Cascading financial and political crises
- Understand: Recurring crises, war economy, and populist politics
- Respond: Global financial crisis and its afterlives
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 20 Climate change
- Key learning goals
- Introduction
- Explore: Climate change, security and the UNSC
- Understand: The climate change–security nexus
- Respond: The UNSC – climate change as a threat multiplier and the progressive climatization of security
- Problem-mapping exercise
- Conclusion
- Review questions
- Further readings
- Security beyond the real
- 21 Health security
- Key learning goals
- Introduction
- Explore: The rise of health security
- Understand: Emergency and neglect
- Respond: Reclaiming (everyday) health security
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 22 Resource security
- Key learning goals
- Introduction
- Explore: Food insecurity and the Arab Spring
- Understand: Securing resources
- Respond: Food insecurity and the Arab Spring
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 23 Maritime security
- Key learning goals
- Introduction
- Explore: The context for maritime security
- Understand: The history of the maritime security agenda
- Respond: Governing maritime security through informality
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- 24 Space security
- Key learning goals
- Introduction: Why is space rubbish a security issue?
- Explore: Litter at 15,000 mph
- Understand: Three key lenses for the examination of space debris
- Respond: Voluntary standards and guidelines
- Problem-mapping exercise
- Conclusion
- Review questions
- Further reading
- Security beyond the real
- Glossary
- References
- Index
Reviews
There are no reviews yet.