In this Book

University of Minnesota Press
summary
Critical Security Studies was first published in 1997. Many of the most interesting issues in post-Cold War international relations can be usefully examined through a prism labeled “security studies.” These issues include challenges to the state from “below” by ethnic and regional fragmentations, and from “above” by global economic, cultural, and environmental dynamics. This new volume brings together a diverse group of analysts seeking to explore these issues and contribute to the development of a self-consciously critical perspective within security studies. The contributors to this volume offer a range of essays that share the goal of establishing the grounds for a broad and reflective dialogue about the nature of security and the practice of security. Chapters address such topics as security-building in postapartheid South Africa, the discourse of security in post-Cold War Europe, the construction of the problem of weapons proliferation, and the role of multilateral institutions in peace and security operations.Operating on both conceptual and practical levels, Critical Security Studies directly engages substantive issues and questions of contemporary security studies in order to contribute to a theoretical reevaluation and practical reorientation of the field.

Contributors: Amitav Acharya, York U, Toronto; Mohammed Ayoob, Michigan State U; Ken Booth, U of Wales, Aberystwyth, UK; Beverly Crawford, U of California, Berkeley; Simon Dalby, Carleton U, Ottawa; Karin M. Fierke, Nuffield College, Oxford U, UK; Bradley S. Klein, Clark U; Ronnie D. Lipschutz, U of California, Santa Cruz; David Mutimer, Keele U, UK; Thomas Risse-Kappen, U of Konstanz, Germany; Peter Vale, U of the Western Cape, South Africa; R. B. J. Walker, U of Victoria, British Columbia. Keith Krause is associate professor of political science at York University in Toronto. Michael C. Williams is a professor of international politics at Aberystwyth University, Wales.Copublished with the University College London Press

Table of Contents

  1. Cover
  2. restricted access Download |
  1. Title Page, About the Series, Copyright
  2. restricted access Download |
  1. Contents
  2. pp. v-vi
  3. restricted access Download |
  1. Preface: Toward Critical Security Studies
  2. MICHAEL C. WILLIAMS, KEITH KRAUSE
  3. pp. vii-xxii
  4. restricted access Download |
  1. Acknowledgments
  2. pp. xxiii-xxiii
  3. restricted access Download |
  1. PART I: Conceptual Debates and Approaches
  2. pp. 1-2
  1. 1. Contesting an Essential Concept: Reading the Dilemmas in Contemporary Security Discourse
  2. SIMON DALBY
  3. pp. 3-32
  4. restricted access Download |
  1. 2. From Strategy to Security: Foundations of Critical Security Studies
  2. KEITH KRAUSE, MICHAEL C. WILLIAMS
  3. pp. 33-60
  4. restricted access Download |
  1. 3. The Subject of Security
  2. R. B. J. WALKER
  3. pp. 61-82
  4. restricted access Download |
  1. 4. Security and Self: Reflections of a Fallen Realist
  2. KEN BOOTH
  3. pp. 83-120
  4. restricted access Download |
  1. 5. Defining Security: A Subaltern Realist Perspective
  2. MOHAMMED AYOOB
  3. pp. 121-146
  4. restricted access Download |
  1. PART II: The Discourses of Security
  2. pp. 147-148
  1. 6. Discourses of War: Security and the Case of Yugoslavia
  2. BEVERLY CRAWFORD, RONNIE D. LIPSCHUT
  3. pp. 149-186
  4. restricted access Download |
  1. 7. Reimagining Security: The Metaphors of Proliferation
  2. DAVID MUTIMER
  3. pp. 187-222
  4. restricted access Download |
  1. 8. Changing Worlds of Security
  2. KARIN M. FIERKE
  3. pp. 223-252
  4. restricted access Download |
  1. PART III: World Order and Regional Imperatives
  2. pp. 253-254
  1. 9. Between a New World Order and None: Explaining the Reemergence of the United Nations in World Politics
  2. THOMAS RISSE-KAPPEN
  3. pp. 255-298
  4. restricted access Download |
  1. 10. The Periphery as the Core: The Third World and Security Studies
  2. AMITAV ACHARYA
  3. pp. 299-328
  4. restricted access Download |
  1. 11. Critical Security Studies and Regional Insecurity: The Case of Southern Africa
  2. KEN BOOTH AND PETER VALE
  3. pp. 329-358
  4. restricted access Download |
  1. 12. Conclusion: Every Month Is "Security Awareness Month"
  2. BRADLEY S. KLEIN
  3. pp. 359-368
  4. restricted access Download |
  1. Contributors
  2. pp. 369-372
  3. restricted access Download |
  1. Index
  2. pp. 373-379
  3. restricted access Download |
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.