Contemporary Security Studies
With unrivalled coverage of a wide range of issues - from terrorism, inter-state conflict and nuclear deterrence, to environmental security, health, and transnational crime - Contemporary Security Studies is the definitive introduction to Security Studies. Bringing together contributions from leading scholars, it provides a student-friendly guide to traditional and critical theoretical approaches, as well as the most important contemporary issues that dominate the modern security field.

The sixth edition has been substantially updated, with significantly revised chapters on Securitization and Transnational Crime, and coverage of recent developments - including the initial impact of the COVID-19 pandemic, climate change, and forced migration - incorporated throughout. A brand-new chapter on popular culture and security provides an innovative overview and cutting-edge analysis of the role that popular culture plays in shaping and understanding security-related processes, as well as its place in the study of international relations, with examples ranging from Star Trek and Game of Thrones, to Disney cartoons and K-pop.

Students are encouraged throughout to question their own preconceptions of Security Studies, and to use their own judgement to critically evaluate key approaches and ideas. To help them achieve this, each chapter contains 'key ideas' boxes, 'think point' boxes, and case studies, the latter of which demonstrate the real-world applications, relevance, and implications of each theory.

Digital formats and resources
The sixth edition is available for students and institutions to purchase in a variety of formats.

The e-book offers a mobile experience and convenient access, along with functionality tools, navigation features, and links that offer extra learning support: www.oxfordtextbooks.co.uk/ebooks

In addition to helpful learning features within the book, the text is accompanied by online resources designed to help students to take their learning further.

For students:
- Explore relevant security issues in greater depth with additional online case studies
- Test your understanding of the key ideas and themes in each chapter with self-marking multiple-choice questions
- Expand your knowledge of the subject with web links to additional reliable sources
- Test your knowledge of key terminology using the flashcard glossary

For registered lecturers:
- Use the adaptable PowerPoint slides as the basis for lecture presentations, or as hand-outs in class
1117134381
Contemporary Security Studies
With unrivalled coverage of a wide range of issues - from terrorism, inter-state conflict and nuclear deterrence, to environmental security, health, and transnational crime - Contemporary Security Studies is the definitive introduction to Security Studies. Bringing together contributions from leading scholars, it provides a student-friendly guide to traditional and critical theoretical approaches, as well as the most important contemporary issues that dominate the modern security field.

The sixth edition has been substantially updated, with significantly revised chapters on Securitization and Transnational Crime, and coverage of recent developments - including the initial impact of the COVID-19 pandemic, climate change, and forced migration - incorporated throughout. A brand-new chapter on popular culture and security provides an innovative overview and cutting-edge analysis of the role that popular culture plays in shaping and understanding security-related processes, as well as its place in the study of international relations, with examples ranging from Star Trek and Game of Thrones, to Disney cartoons and K-pop.

Students are encouraged throughout to question their own preconceptions of Security Studies, and to use their own judgement to critically evaluate key approaches and ideas. To help them achieve this, each chapter contains 'key ideas' boxes, 'think point' boxes, and case studies, the latter of which demonstrate the real-world applications, relevance, and implications of each theory.

Digital formats and resources
The sixth edition is available for students and institutions to purchase in a variety of formats.

The e-book offers a mobile experience and convenient access, along with functionality tools, navigation features, and links that offer extra learning support: www.oxfordtextbooks.co.uk/ebooks

In addition to helpful learning features within the book, the text is accompanied by online resources designed to help students to take their learning further.

For students:
- Explore relevant security issues in greater depth with additional online case studies
- Test your understanding of the key ideas and themes in each chapter with self-marking multiple-choice questions
- Expand your knowledge of the subject with web links to additional reliable sources
- Test your knowledge of key terminology using the flashcard glossary

For registered lecturers:
- Use the adaptable PowerPoint slides as the basis for lecture presentations, or as hand-outs in class
75.99 In Stock
Contemporary Security Studies

Contemporary Security Studies

Contemporary Security Studies

Contemporary Security Studies

Paperback(6th ed.)

$75.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

With unrivalled coverage of a wide range of issues - from terrorism, inter-state conflict and nuclear deterrence, to environmental security, health, and transnational crime - Contemporary Security Studies is the definitive introduction to Security Studies. Bringing together contributions from leading scholars, it provides a student-friendly guide to traditional and critical theoretical approaches, as well as the most important contemporary issues that dominate the modern security field.

The sixth edition has been substantially updated, with significantly revised chapters on Securitization and Transnational Crime, and coverage of recent developments - including the initial impact of the COVID-19 pandemic, climate change, and forced migration - incorporated throughout. A brand-new chapter on popular culture and security provides an innovative overview and cutting-edge analysis of the role that popular culture plays in shaping and understanding security-related processes, as well as its place in the study of international relations, with examples ranging from Star Trek and Game of Thrones, to Disney cartoons and K-pop.

Students are encouraged throughout to question their own preconceptions of Security Studies, and to use their own judgement to critically evaluate key approaches and ideas. To help them achieve this, each chapter contains 'key ideas' boxes, 'think point' boxes, and case studies, the latter of which demonstrate the real-world applications, relevance, and implications of each theory.

Digital formats and resources
The sixth edition is available for students and institutions to purchase in a variety of formats.

The e-book offers a mobile experience and convenient access, along with functionality tools, navigation features, and links that offer extra learning support: www.oxfordtextbooks.co.uk/ebooks

In addition to helpful learning features within the book, the text is accompanied by online resources designed to help students to take their learning further.

For students:
- Explore relevant security issues in greater depth with additional online case studies
- Test your understanding of the key ideas and themes in each chapter with self-marking multiple-choice questions
- Expand your knowledge of the subject with web links to additional reliable sources
- Test your knowledge of key terminology using the flashcard glossary

For registered lecturers:
- Use the adaptable PowerPoint slides as the basis for lecture presentations, or as hand-outs in class

Product Details

ISBN-13: 9780198862192
Publisher: Oxford University Press
Publication date: 05/14/2022
Edition description: 6th ed.
Pages: 584
Product dimensions: 9.74(w) x 7.44(h) x 1.11(d)

About the Author

Alan Collins, Swansea University

Alan Collins is a Professor in International Relations at Swansea University

Table of Contents

Notes on Contributors xix

List of Figures xxiii

List of Tables xxiv

List of Boxes xxv

How to use this book xxix

Online Resources xxxii

1 Introduction: What is Security Studies? Alan Collins 1

1.1 Introduction 1

1.2 Definition of security 1

1.3 Structure 2

1.4 Conclusion 10

Part I Approaches to Security 11

2 Realism Charles L. Glaser 13

2.1 Introduction 14

2.2 What is realism? 14

2.3 Waltz's structural realism 18

2.4 Offensive realism 19

2.5 Defensive realism 21

2.6 Motivational realism 25

2.7 Realism and war 26

2.8 Conclusion 27

3 Liberalism and Liberal Internationalism Patrick Morgan Alan Collins 30

3.1 Introduction 31

3.2 Characteristic features of liberalism and liberal internationalism 31

3.3 Central elements in liberalism thinking: commercial liberalism 32

3.4 Pursuit of human rights 33

3.5 Liberalism and international organizations 34

3.6 Liberalism and democracy 36

3.7 Tracing liberal internationalism's rise and fall: the Cold War and after 37

3.8 Liberalism and liberalist internationalism now-under severe strain 39

3.9 Conclusion 43

4 Historical Materialism Eric Herring 47

4.1 An overview of historical materialism 48

4.2 Capitalism and neoliberalism: insecurity for labour, security for capital 49

4.3 Historical materialism, (in)security, and Security Studies 53

4.4 Conclusion 58

5 Peace Studies Paul Rogers 60

5.1 Introduction 60

5.2 The early years 61

5.3 Evolution amidst controversy 62

5.4 What is peace studies now? 65

5.5 Responding to the new security challenges 67

5.6 Conclusion 70

6 Social Constructivism Christine Agius 73

6.1 Introduction 74

6.2 Definitions and key concepts 76

6.3 Wendt's three cultures of anarchy 82

6.4 Conventional and critical constructivism 83

6.5 Critiques of constructivism 85

6.6 Conclusion 87

7 Critical Security Studies: A Schismatic History David Mutimer Derek Verbakel 90

7.1 Introduction: 'Follow the sign of the gourd' 91

7.2 Toronto desire: Critical Security Studies 92

7.3 Copenhagen distinctions 95

7.4 Aberystwyth exclusions 96

7.5 Constructing security 100

7.6 Everyone's other: poststructuralism and security 101

7.7 Beyond divisions? CASEing the joint or returning the gift? 105

7.8 Conclusion 108

8 Critical Security studies II-Narratives of Security: Other Stories, Other Actors J. Marshall Beier 111

8.1 Introduction 112

8.2 Secret agents and power bases 114

8.3 The subject of 'smart' bombs 116

8.4 Complicated subjects: children 118

8.5 Indigenous peoples and a cautionary tale 121

8.6 Conclusion 123

9 Postcolonialism Mark Laffey Suthaharan Nadarajah 126

9.1 Introduction 127

9.2 A view from elsewhere: genealogies of the postcolonial 128

9.3 Security and the colonizer's view of the world 132

9.4 Decolonizing security: strategies 135

9.5 Conclusion: should we 'forget security studies'? 141

10 Human Security Randolph B. Persaud 144

10.1 Introduction 145

10.2 Arguments for human security 146

10.3 The genealogy of human security: what's new? 151

10.4 Critiques of human security 154

10.5 Conclusion 156

11 Gender and Security Caroline Kennedy-Pipe Sophia Dingli 159

11.1 Introduction 160

11.2 Representations 160

11.3 Practical context I: war 165

11.4 Practical context II: civilian life 167

11.5 Practical context 111: the post-conflict environment 169

11.6 Multiple perceptions, same realities? 170

11.7 Conclusion 171

12 Securitization Theory Stephane Baele Catarina Thomson 173

12.1 Introduction 174

12.2 From Copenhagen to the world: The evolution of securitization theory from the 1980s to the 2020s 175

12.3 Main empirical cases in securitization research 179

12.4 Challenges and critiques facing securitization theory 182

12.5 Conclusion 184

13 Popular Culture and Security Galia Press-Bamathan 186

13.1 Introduction 187

13.2 What do we mean by popular culture? 187

13.3 What makes popular culture so politically relevant? 188

13.4 The expansion of Security Studies and the growing interest in popular culture 189

13.5 The role of popular culture in conflict management 190

13.6 Popular culture and the struggle over 'soft power' 192

13.7 Popular culture and the making of peace 196

13.8 Conclusion 198

Part 2 Deepening and Broadening Security 201

14 Military Security Michael Sheehan 203

14.1 Introduction 204

14.2 Approaches to military security 204

14.3 Traditional military-security studies 207

14.4 War 208

14.5 Alliances and neutrality 210

14.6 Deterrence 211

14.7 Cooperative security and arms control 213

14.8 The cost of military security 215

14.9 Conclusion 216

15 Regime Security Andreas Krieg 218

15.1 Introduction 219

15.2 Public versus regime security 219

15.3 Threats to regime security 220

15.4 The regime insecurity loop 221

15.5 Security strategies of patrimonial regimes 222

15.6 Anatomy of a weak state: Assad's Syria 225

15.7 Prospects for regimes in the developing world 228

15.8 Conclusion: The need for sustainable governance 229

16 Societal Security Paul Roe 233

16.1 Introduction 234

16.2 A duality of state and societal security 234

16.3 Society and societal identity 235

16.4 Threats to societal identity 237

16.5 Defending societal identity 241

16.6 Conclusion 243

17 Environmnetal Security Geoff Dabelko 247

17.1 Introduction 248

17.2 The origins of environmental security 248

17.3 Major interpretations of environmental security 251

17.4 Environmental change and violent conflict 253

17.5 Environmental change and national security 254

17.6 Armed forces, war, and the environment 256

17.7 Environmental change and human security 257

17.8 Environment or security? 259

17.9 Conclusion 260

18 Economic Security Gary M. Shiffman 263

18.1 Introduction 263

18.2 Economic science of security 264

18.3 Economic tools of security policy 269

18.4 Conclusion 276

19 Globalization, Development, and Security Nana K. Poku Jacqueline Therkelsen 278

19.1 Introduction 279

19.2 Globalization as a neoliberal ideology for development 279

19.3 Neoliberalism and the fostering of inequality 283

19.4 Global inequality as a threat to global security 286

19.5 Conclusion 290

Part 3 Traditional and Non-Traditional Security 295

20 Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts Peter Viggo Jakobsen 297

20.1 Introduction 298

20.2 What is coercive diplomacy? 299

20.3 Requirements for success 302

20.4 The challenge of defining success 303

20.5 The importance of the strategic context 306

20.6 Conclusion 307

21 Weapons of Mass Destruction James J. Wirtz 312

21.1 Introduction 312

21.2 Nuclear weapons 314

21.3 Chemical weapons 319

21.4 Biological weapons 323

21.5 Conclusion 327

22 Terrorism Brenda Lutz James Lutz 329

22.1 Introduction 329

22.2 Concepts and definitions 331

22.3 Types and causes of terrorism 335

22.4 Security measures 338

22.5 Conclusion 342

23 Humanitarian Intervention Alex J. Bellamy Stephen McLoughlin 346

23.1 Introduction 347

23.2 The case for humanitarian intervention 350

23.3 The case against humanitarian intervention 352

23.4 The Responsibility to Protect 355

23.5 Conclusion 360

24 Energy Security Sam Raphael Doug Stokes 362

24.1 Introduction 362

24.2 The problem of energy security 364

24.3 Energy security and International Relations theory 365

24.4 Energy security and human insecurity 367

24.5 Energy security and the United States 370

24.6 Conclusion 373

25 The Weapons Trade Suzette R. Grillot 376

25.1 Introduction 376

25.2 History and shifting dynamics of the defence trade 377

25.3 Contemporary trends in the weapons trade 378

25.4 The illicit arms trade 381

25.5 Controlling the weapons trade 384

25.6 Conclusion 387

26 Health and Security Stefan Elbe Eva Hilberg 390

26.1 Introduction 391

26.2 Health and human security 391

26.3 Health and national security 393

26.4 Health and bio-security 399

26.5 Conclusion 401

27 Transnational Crime Nathan P. Jones 404

27.1 Introduction 405

27.2 Definitions and key concepts 406

27.3 'Crime-terror nexus' 412

27.4 Organized crime and the state 413

27.5 Case study: organized crime in Mexico 415

27.6 State responses to transnational crime 418

27.7 Conclusion 419

28 Cyber-Security Myriam Dunn Cavelty 422

28.1 Introduction 423

28.2 Security and cyberspace 423

28.3 Types of cyber-threats 425

28.4 The reality of cyber-conflict 431

28.5 Reducing cyber-in-security 432

28.6 Conclusion 434

29 After the Return to Theory: The Past, Present, and Future of Security Studies Ole Wæver Barry Buzan 437

29.1 Introduction 438

29.2 The origins and institutional structure of security studies 439

29.3 The Golden Age of security studies 441

29.4 Institutionalization and stagnation 443

29.5 Disciplinary questioning and theoretical relaunch 446

29.6 Conclusion: the powers of theory and the challenges of the future 452

Glossary 459

References 479

Index 527

From the B&N Reads Blog

Customer Reviews