Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book presents an in-depth exploration of the impact of the Arab Uprisings on the relationship between constructions of (in)security, narratives of threat and patterns of socio-political change within the Middle East and North Africa region. It also offers insights into the study of regional security and the operation of threat perceptions.
This book demonstrates that the disciplinary boundaries present within international relations approaches to security studies are redundant when examining social media, and inter- and multi-disciplinary analysis is key. A key result of the analysis undertaken is that when examining the social media sphere security scholars need to ¿expect the unexpected¿. This is because social media enables users to subvert, contest and create security narratives with symbols and idioms of their choice which can take into account ¿traditional¿ security themes, but also unexpected and under explored themes such as narratives from the local context of the users¿ towns and cities, and the symbolism of football clubs. The book also explores the complex topography of social media when considering constructions of security. The highly dynamic topography of social media is neither elite dominated and hierarchical as the Copenhagen School conceptualises security speak. However, neither is it completely flat and egalitarian as suggested by the vernacular security studies¿ non-elite approach. Rather, social mediäs topography is shifting and dynamic, with individuals gaining influence in security debates in unpredictable ways. In examining social media this book engages with the emancipatory burden of critical security studies. This book argues that it remains unfulfilled on social media and rather presents a ¿thin¿ notion of discursive emancipation where social media does provide the ability for previously excluded voices to participate in security debates, even if this does not result in their direct emancipation from power hierarchies and structures offline.
This book offers a novel contribution to the study of post-Cold War European defence. Interdisciplinary in approach, it uses European law to assess the utility of existing theoretical accounts. By exploring the balance of threat theory, it provides new insights into the forces driving and hindering European defence cooperation.
In this book, leading academics and policy practitioners develop approaches for managing critical contemporary and emerging security challenges for South East Europe. They attempt to conceptualize and realize security as a cooperative endeavour for collective good, in contrast to security narratives driven by power and national egotism.
A long-term evaluation and analysis of the UK's involvement in Sierra Leone before and after the conflict which ended in 2002. This book looks at how UK intervention moved from initial involvement through to war fighting and then post-conflict reconstruction, specifically of the security infrastructure.
This book analyzes the effects of economic, social, and political disruptions that have come with integration into the global economy for countries in five different regions and the developing world as a whole.
ASEAN's role as a security provider remains largely a matter of scholarly debate. Through the lens of the concept of regional security partnership, this book uncovers a more nuanced understanding of ASEAN capacity, highlighting both its merits and fragilities in coping with traditional and emerging security problems.
This book explores the intersection of the study of transatlantic relationships and the study of public support for the use of force in foreign policy. It contributes to two important debates: one about the nature of transatlantic partnership, and another about the determinants of support for the use of military force in a comparative perspective.
This edited book provides an insight into the new approaches, challenges and opportunities that characterise open source intelligence (OSINT) at the beginning of the twenty-first century. It does so by considering the impacts of OSINT on three important contemporary security issues: nuclear proliferation, humanitarian crises and terrorism.
This book provides a comprehensive assessment of the perspective and approaches to Afghan security taken by the states bordering and in close proximity to Afghanistan, and the transnational dynamics that interconnect these states with Afghanistan and one another.
This book analyses security cooperation in the domain of inter-regionalism, addressing the emergence of the African Union as a regional actor and its impact on EU-Africa relations. It explores the transformative potential of security cooperation for equality, partnership and local ownership in EU-Africa relations.
In this book, leading academics and policy practitioners develop approaches for managing critical contemporary and emerging security challenges for South East Europe. They attempt to conceptualize and realize security as a cooperative endeavour for collective good, in contrast to security narratives driven by power and national egotism.
This book comprises of a range of case studies of military strategy, based on UN documents, observing and concluding the effectiveness of each individual case. Edstrom and Gyllensporre analyse the UN's military strategy, its consequences and its potential to fulfil political ambitions.
This book seeks to elucidate the decisions of states that have chosen to acquire nuclear arms or inherited nuclear arsenals, and have either disarmed or elected to retain their warheads.
"Over the past dozen years special operations forces (SOF) have been one of the few areas of growth and expansion in a number of militaries. This growth and expansion, however, has not been mirrored by a comparable one in academic inquiries into the subject. Special Operations from a Small State Perspective - Future Security Challenges, which contains a wide range of perspectives from both practitioners and academics, makes a unique contribution to the literature and offers fascinating insights into the opportunities provided by and challenges confronting small states such as Swedenin their evolutionary development and use of SOF."Dr James Kiras, Associate Professor, School of Advanced Air and Space Studies, The Air University,Alabama, USA.
NATO has many European and global partner countries. The political and military utility of all these partnerships is clear; they 'provide' more security than they 'consume'. But the utility for NATO of partners also changes over time. This book scrutinizes these partnerships, both from a NATO perspective and from that of its partners.
Cybercrime affects over 1 million people worldwide a day, and cyber attacks on public institutions and businesses are increasing. This book interrogates the European Union's evolving cybersecurity policies and strategy and argues that while progress is being made, much remains to be done to ensure a secure and resilient cyberspace in the future.
Climate Terror engages with a highly differentiated geographical politics of global warming. It explores how fear-inducing climate change discourses could result in new forms of dependencies, domination and militarised 'climate security'.
This book argues that the war on terror is a paradigmatic foreign policy that has had profound effects on domestic social order. Cameron develops an original framework which inverts the traditional analysis of foreign policy in order to interpret its impact upon subject formation through everyday practises of security and social regulation.
This book provides a multi-level analysis of international security in the South Caucasus. Using an expanded and adapted version of Regional Security Complex Theory, it studies both material conditions and discourses of insecurity in its assessment of the region's possible transition towards a more peaceable future.
The case study chapters draw on recent Chinese and English sources - on military doctrine, capabilities, and defense strategy - to build a clear understanding the main sources of U.S.-China misperceptions, and highlight the problems these assessments can create for the conduct of statecraft across strategically competitive geopolitical dyads.
This book constructs a multidisciplinary approach to human security questions related to digitalisation in the European High North i.e. It challenges the mainstream conceptualisation of cybersecurity and reconstructs it with the human being as the referent object of security.
Themes and issues include the EU's capacities and actorness, support from the United States, challenges from Russia, and a range of case studies including Ukraine, other post-Soviet conflicts, the Kurdish question, Central Asia, and terrorism and counter-terrorism.
Hamed El-Said investigates Counter-de-Rad programmes in Muslim majority and Muslim minority states. This multifaceted book provides a new approach to evaluate Counter-de-Rad Programmes and develops a holistic framework which will allow policy-makers and practitioners to design and effectively implement and assess such programmes in the future.
The case study chapters draw on recent Chinese and English sources - on military doctrine, capabilities, and defense strategy - to build a clear understanding the main sources of U.S.-China misperceptions, and highlight the problems these assessments can create for the conduct of statecraft across strategically competitive geopolitical dyads.
This book uniquely employs risk and vulnerability approaches to advocate international policy options for enhancing maritime security cooperation in the Indian Ocean region.
This book examines US recourse to military force in the post-9/11 era. In particular, it evaluates the extent to which the Bush and Obama administrations viewed legitimizing the greater use-of-force as a necessary solution to thwart the security threat presented by global terrorist networks and WMD proliferation.
Security in Translation proposes an innovative way to capture the evolution, spread and local transformation of threat images in world affairs. Reworking traditional securitization theory, this book develops a coherent new framework for analysis that makes securitization theory applicable to empirical studies.
A freshly provocative look at the nexus linking EU security, trans-Turkey energy supply routes to Europe and Turkey's EU membership negotiations, this book argues that Europe's collective energy security prospects have become increasingly tied to Turkey's progress towards joining the EU.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.