In this Book

ISEAS–Yusof Ishak Institute
  • Non-Traditional Security in Asia: Issues, Challenges and Framework for Action
  • Book
  • edited by Mely Caballero-Anthony and Alistair D.B. Cook
  • 2013
  • Published by: ISEAS–Yusof Ishak Institute
buy this book Buy This Book in Print
summary
Non-Traditional Security in Asia examines the critical security challenges faced by states and societies in Asia including health, food, water, natural disasters, internal conflict, forced migration, energy, transnational crime, and cyber security. Through the development of a comprehensive analytical framework that establishes the key ingredients to policy evaluation, the editors draw on a wide variety of experts to collaborate in investigating these crucial issues. This inclusive framework ensures that all voices are heard including those oftentimes under-represented and marginalized in society to ensure that academic and policy debates are well informed about the often complex and nuanced nature of these non-traditional security challenges. The book undertakes an issue-specific chapter study of how Asian states and societies address these non-traditional security concerns from environmental adaptation and mitigation measures to conflict resolution. For each issue area, it identifies and explains the concerns of various policy communities, identifying the motivations behind some of the key decisions made to affect change or stabilize the status quo. Essentially it questions not only what a security issue is but also for whom the issue is important and the interaction this has with policy outcomes. With a focus on regional and global institutions as well as national and local ones, this collection illustrates the variety of stakeholders involved in non-traditional security concerns, and reflects on their relative importance in the decision-making process. Through a systematic evaluation of these non-traditional security issues by employing a comprehensive analytical framework, critical appreciation of the dynamics of the policy-making process surrounding issues of crucial national, regional and international significance in Asia are made. As a result of sharing these insights, the contributors provide the tools as well as a selection of issue-specific stakeholders to illuminate the key but complex characteristics of non-traditional security in Asia.

Table of Contents

restricted access Download Full Book
  1. Cover Page
  2. p. 1
  3. restricted access
    • Download PDF Download
  1. Title Page
  2. pp. 2-5
  3. restricted access
    • Download PDF Download
  1. Contents
  2. pp. v-9
  3. restricted access
    • Download PDF Download
  1. Acknowledgements
  2. pp. ix-x
  3. restricted access
    • Download PDF Download
  1. List of Contributors
  2. pp. xi-17
  3. restricted access
    • Download PDF Download
  1. 1. NTS Framework1
  2. pp. 1-14
  3. restricted access
    • Download PDF Download
  1. 2. Health
  2. pp. 15-39
  3. restricted access
    • Download PDF Download
  1. 3. Food
  2. pp. 40-65
  3. restricted access
    • Download PDF Download
  1. 4. Water
  2. pp. 66-84
  3. restricted access
    • Download PDF Download
  1. 5. Natural Disasters
  2. pp. 85-117
  3. restricted access
    • Download PDF Download
  1. 6. Internal Conflict
  2. pp. 118-157
  3. restricted access
    • Download PDF Download
  1. 7. Forced Migration
  2. pp. 158-204
  3. restricted access
    • Download PDF Download
  1. 8. Energy
  2. pp. 205-233
  3. restricted access
    • Download PDF Download
  1. 9. Transnational Crime
  2. pp. 234-266
  3. restricted access
    • Download PDF Download
  1. 10. Cyber Security
  2. pp. 267-289
  3. restricted access
    • Download PDF Download
  1. 11. Conclusion
  2. pp. 290-294
  3. restricted access
    • Download PDF Download
  1. Appendix
  2. pp. 295-298
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 299-349
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.