Critical Approaches to International SecurityJohn Wiley & Sons, 2015 M03 6 - 320 pages During the Cold War the concept of international security was understood in military terms as the threat or use of force by states. The end of EastÐWest hostilities, however, brought ‘critical’ perspectives to the fore as scholars sought to explain the emergence of new challenges to international stability, such as environmental degradation, immigration and terrorism. The second edition of this popular and highly respected text offers a wide-ranging and comprehensive analysis of the growing field of critical security studies. All the chapters have been fully revised and updated to map the on-going evolution of debates about international security since 1989, including the more recent shift in emphasis from critiques of the realist practices of states to those of global liberal governance. Topics covered include the relationship between security and change, identity, the production of danger, fear and trauma, human insecurity and emancipation. The book explores the meaning and use of these concepts and their relevance to real-life situations ranging from the War on Terror to the Arab Spring, migration, suffering in war, failed states and state-building, and the changing landscape of the international system, with the emergence of a multipolar world and the escalation of global climate change. Written with verve and clarity and incorporating new seminar activities and questions for class discussion, this book will be an invaluable resource for students of international relations and security studies. |
From inside the book
Results 1-5 of 29
Page
... explored in the book, given my primary interest in meaning in use and changes in meaning rather than theory per se. As a result, I have avoided positioning myself in relation to the central questions at the heart of current debates, and ...
... explored in the book, given my primary interest in meaning in use and changes in meaning rather than theory per se. As a result, I have avoided positioning myself in relation to the central questions at the heart of current debates, and ...
Page
... explored here connect. A second comment has been the usefulness of the book for teaching purposes, which is another reason for adding some exercises. I have taught a module on this topic for over a decade, first to upper level honours ...
... explored here connect. A second comment has been the usefulness of the book for teaching purposes, which is another reason for adding some exercises. I have taught a module on this topic for over a decade, first to upper level honours ...
Page
... Burke and Claudia Aradau for inviting me to take part in a workshop in Birmingham and an ISA roundtable, respectively, all of which have engaged with the debates explored in this book. Introduction In the decade before the end of the Cold.
... Burke and Claudia Aradau for inviting me to take part in a workshop in Birmingham and an ISA roundtable, respectively, all of which have engaged with the debates explored in this book. Introduction In the decade before the end of the Cold.
Page
... explored here engage with contemporary problems and issues, and in this respect are not divorced from the empirical world, as earlier critics of CSS often claimed. They further reveal the extent to which all inquiry into security is ...
... explored here engage with contemporary problems and issues, and in this respect are not divorced from the empirical world, as earlier critics of CSS often claimed. They further reveal the extent to which all inquiry into security is ...
Page
... explores this question along with different approaches to the construction and performance of security. The discussion thus pushes beyond the notion that security is a property of objects in the world, to examine security as a social ...
... explores this question along with different approaches to the construction and performance of security. The discussion thus pushes beyond the notion that security is a property of objects in the world, to examine security as a social ...
Contents
Classroom exercise | |
Classroom exercise | |
Classroom exercise | |
Questions | |
Questions | |
Classroom exercise | |
Questions | |
Questions | |
Index | |
Other editions - View all
Common terms and phrases
11 September actors agency approach Aradau argues argument assumptions attacks Bigo biopolitics Buzan chapter clash of civilizations Cold Cold War concept conflict constituted Copenhagen School critical security studies Critical Theory cultural debate defined definition of security democracy discourse analysis dominant Edkins emancipation emergence emotion emphasis environment essentially contested concept ethical European explored fear and trauma feminist Fierke focus focused force framework gender global governance highlights human rights human security identity immanent critique individual insecurity instance institutions International Relations international security International Studies Iraq Journal of International Kosovo language liberal London meaning migration military Muslim narrative narrow definition norms nuclear weapons political politicization populations potential practices problem protection PTSD question realist referent object relationship response role Routledge securitization Security Dialogue shift social construction soldiers speech act strategic structures surveillance Terror terrorist traditional transformed University Press violence War on Terror Western