In this Book

The Asia-Pacific Security Lexicon (Upated 2nd Edition)
buy this book Buy This Book in Print
summary
The ending of the Cold War opened a new debate across the Pacific about the meaning of security and the new regional multilateral institutions that were beginning to emerge. The first edition of the The Asia-Pacific Security Lexicon, published in 2002, identified and defined the key concepts and ideas central to security discourse in the region. This second edition updates all of the entries and examines the origins and meanings of some of the new terms in common usage in a different historical setting, among them “terrorism”, “pre-emption”, “preventive war”, “a la carte multilateralism”, “coalition of the willing”, and China’s “peaceful rise”. And it looks at how concepts such as “human security” and “non-traditional security” have evolved and found new adherents. Both a diplomatic handbook and theoretical exploration, the Lexicon is based on the analysis of more than 3,000 books, articles, conference reports, and speeches. It does not aim to resolve the disagreements about how words are used. Rather, it makes their evolution clearer for academics and practitioners seeking consensual knowledge.

Table of Contents

  1. Cover
  2. restricted access Download |
  1. Title Page, Copyright
  2. pp. iii-iv
  3. restricted access Download |
  1. Table of Contents
  2. pp. v-vi
  3. restricted access Download |
  1. List of Abbreviations
  2. pp. vii-x
  3. restricted access Download |
  1. Introduction to the Second Edition
  2. pp. xi-xv
  3. restricted access Download |
  1. AD HOC MULTILATERALISM
  2. pp. 1-3
  3. restricted access Download |
  1. A LA CARTE MULTILATERALISM
  2. pp. 5-7
  3. restricted access Download |
  1. THE “ASEAN WAY”
  2. pp. 9-20
  3. restricted access Download |
  1. BALANCE OF POWER
  2. pp. 21-31
  3. restricted access Download |
  1. BILATERALISM
  2. pp. 33-36
  3. restricted access Download |
  1. COALITION OF THE WILLING
  2. pp. 37-42
  3. restricted access Download |
  1. COERCIVE DIPLOMACY
  2. pp. 43-45
  3. restricted access Download |
  1. COLLECTIVE DEFENCE
  2. pp. 47-51
  3. restricted access Download |
  1. COLLECTIVE SECURITY
  2. pp. 53-57
  3. restricted access Download |
  1. COMMON SECURITY
  2. pp. 59-63
  3. restricted access Download |
  1. COMPREHENSIVE SECURITY
  2. pp. 65-75
  3. restricted access Download |
  1. CONCERT OF POWERS
  2. pp. 77-81
  3. restricted access Download |
  1. CONCERTED UNILATERALISM
  2. pp. 83-86
  3. restricted access Download |
  1. CONFIDENCE-BUILDING MEASURES
  2. pp. 87-91
  3. restricted access Download |
  1. CONFIDENCE- AND SECURITYBUILDINGMEASURES
  2. pp. 93-95
  3. restricted access Download |
  1. CONSTRUCTIVE INTERVENTION
  2. pp. 97-103
  3. restricted access Download |
  1. COOPERATIVE SECURITY
  2. pp. 105-113
  3. restricted access Download |
  1. ENGAGEMENT
  2. pp. 115-129
  3. restricted access Download |
  1. FLEXIBLE CONSENSUS
  2. pp. 131-133
  3. restricted access Download |
  1. HUMAN SECURITY
  2. pp. 135-144
  3. restricted access Download |
  1. HUMANITARIAN INTERVENTION
  2. pp. 145-154
  3. restricted access Download |
  1. MIDDLE POWER
  2. pp. 155-158
  3. restricted access Download |
  1. MULTILATERALISM
  2. pp. 159-163
  3. restricted access Download |
  1. MUTUAL SECURITY
  2. pp. 165-168
  3. restricted access Download |
  1. NEW SECURITY APPROACH
  2. pp. 169-172
  3. restricted access Download |
  1. NON-TRADITIONAL SECURITY
  2. pp. 173-178
  3. restricted access Download |
  1. OPEN REGIONALISM
  2. pp. 179-185
  3. restricted access Download |
  1. PEACEFUL RISE
  2. pp. 187-189
  3. restricted access Download |
  1. PRE-EMPTION ANDPREVENTIVE WAR
  2. pp. 191-197
  3. restricted access Download |
  1. PREVENTIVE DIPLOMACY
  2. pp. 199-210
  3. restricted access Download |
  1. SECURITY COMMUNITY
  2. pp. 211-220
  3. restricted access Download |
  1. TERRORISM
  2. pp. 221-227
  3. restricted access Download |
  1. TRACK ONE
  2. pp. 229-230
  3. restricted access Download |
  1. TRACK ONE-AND-A-HALF
  2. pp. 231-232
  3. restricted access Download |
  1. TRACK TWO
  2. pp. 233-236
  3. restricted access Download |
  1. TRACK THREE
  2. pp. 237-240
  3. restricted access Download |
  1. TRANSPARENCY
  2. pp. 241-243
  3. restricted access Download |
  1. TRUST-BUILDING MEASURES
  2. pp. 245-247
  3. restricted access Download |
  1. ABOUT THE AUTHORS
  2. p. 248
  3. restricted access Download |
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.