Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

The Handbook of Global Security Policy

E-BookEPUB2 - DRM Adobe / EPUBE-Book
560 Seiten
Englisch
John Wiley & Sonserschienen am20.03.20141. Auflage
This Handbook brings together 30 state-of-the-art essays covering the essential aspects of global security research and practice for the 21st century.
Embraces a broad definition of security that extends beyond the threat of foreign military attack to cover new risks for violence
Offers comprehensive coverage framed around key security concepts, risks, policy tools, and global security actors
Discusses pressing contemporary issues including terrorism, disarmament, genocide, sustainability, international peacekeeping, state-building, natural disasters, energy and food security, climate change, and cyber warfare
Includes insightful and accessible contributions from around the world aimed at a broad base of scholars, students, practitioners, and policymakers



Mary Kaldor is Professor of Global Governance and Director of the Civil Society and Human Security Research Unit at the London School of Economics. She is the author of many books, including New & Old Wars: Organized Violence in a Global Era (2013) and The Ultimate Weapon is No Weapon: Human Security and the Changing Rules of War and Peace (2010). She was a founding member of European Nuclear Disarmament and of the Helsinki Citizen's Assembly.
Iavor Rangelov is Global Security Research Fellow at the Civil Society and Human Security Research Unit at the London School of Economics. He is co-chair of the London Transitional Justice Network and author of Nationalism and the Rule of Law: Lessons from the Balkans and Beyond (2014).
mehr
Verfügbare Formate
BuchGebunden
EUR223,50
E-BookEPUB2 - DRM Adobe / EPUBE-Book
EUR146,99
E-BookPDF2 - DRM Adobe / Adobe Ebook ReaderE-Book
EUR146,99

Produkt

KlappentextThis Handbook brings together 30 state-of-the-art essays covering the essential aspects of global security research and practice for the 21st century.
Embraces a broad definition of security that extends beyond the threat of foreign military attack to cover new risks for violence
Offers comprehensive coverage framed around key security concepts, risks, policy tools, and global security actors
Discusses pressing contemporary issues including terrorism, disarmament, genocide, sustainability, international peacekeeping, state-building, natural disasters, energy and food security, climate change, and cyber warfare
Includes insightful and accessible contributions from around the world aimed at a broad base of scholars, students, practitioners, and policymakers



Mary Kaldor is Professor of Global Governance and Director of the Civil Society and Human Security Research Unit at the London School of Economics. She is the author of many books, including New & Old Wars: Organized Violence in a Global Era (2013) and The Ultimate Weapon is No Weapon: Human Security and the Changing Rules of War and Peace (2010). She was a founding member of European Nuclear Disarmament and of the Helsinki Citizen's Assembly.
Iavor Rangelov is Global Security Research Fellow at the Civil Society and Human Security Research Unit at the London School of Economics. He is co-chair of the London Transitional Justice Network and author of Nationalism and the Rule of Law: Lessons from the Balkans and Beyond (2014).
Details
Weitere ISBN/GTIN9781118533796
ProduktartE-Book
EinbandartE-Book
FormatEPUB
Format Hinweis2 - DRM Adobe / EPUB
FormatFormat mit automatischem Seitenumbruch (reflowable)
Erscheinungsjahr2014
Erscheinungsdatum20.03.2014
Auflage1. Auflage
Seiten560 Seiten
SpracheEnglisch
Dateigrösse1955 Kbytes
Artikel-Nr.2986127
Rubriken
Genre9201

Inhalt/Kritik

Inhaltsverzeichnis
1;The Handbook of Global Security Policy;3
2;Contents;7
3;Notes on Contributors;11
4;Introduction: Global Security Policy in the Twenty-First Century;19
4.1;Structure and Organization of the Book;21
4.2;References;26
5;Part I Key Concepts;27
5.1;Chapter 1 Global Security;29
5.1.1;What is a Global Security Issue? Existential and Emancipatory Threats;29
5.1.1.1; Security ;29
5.1.1.2; Global ;30
5.1.1.3; Global Security Threats ;31
5.1.2;Where Are We In History? The Paradoxes of Proximity;33
5.1.3;Where Are We Going? The Evolving Global Securityscape and the Inconvenient Truth of the International;35
5.1.3.1;Global Existential Threats;35
5.1.3.2;Global Emancipatory Threats;38
5.1.4;The Challenge: Can we Escape the Madness of Sanity ?;40
5.1.4.1;Global Consciousness;41
5.1.4.2;Individual Engagement;42
5.1.4.3;Global Identity Formation;43
5.1.4.4;Global Institutional Reform;44
5.1.5;Notes;46
5.1.6;References;46
5.2;Chapter 2 Security and Social Critique;49
5.2.1;Security Studies Meets Social Critique;50
5.2.2;Feminism and the Critique of Violence;51
5.2.2.1;United Nations Security Council Resolution 1325;55
5.2.3;After Frankfurt: Security as Emancipation;56
5.2.3.1;Zuccotti Park as Security Policy ;58
5.2.4;The Radical Promise of Poststructuralism;59
5.2.4.1;The Biometric Border;62
5.2.5;Conclusion;64
5.2.6;Notes;65
5.2.7;References;66
5.3;Chapter 3 Gender and Security;69
5.3.1;State-Centric Security and Gendered Violences;70
5.3.2;The Securitization of Sexual and Gender-Based Violence;72
5.3.3;Humanizing Security, Gendering Security?;75
5.3.4;Gender Narratives and the War on Terror ;79
5.3.5;Conclusion;80
5.3.6;Notes;81
5.3.7;References;81
5.4;Chapter 4 Security Policy and (Global) Risk(s);86
5.4.1;Introduction;86
5.4.2;The Modern Invention Called Risk ;87
5.4.3;Security Policies and the Logic of Risk ;88
5.4.3.1;The Dynamic of the Decoupling of Political Acts from the Grounds of Actuality;90
5.4.3.2;The Dynamic of a Depolitization of (Security) Policymaking;90
5.4.3.3;The Dynamic of an Internalization of (Global) Security Issues and the Process of Responsibilization;92
5.4.3.4;The Dynamic of an Expanding Process of Securitization ;93
5.4.3.5;Summary;94
5.4.4; Global Risks and the Imperative to Rethink Modern (Security) Institutions;95
5.4.4.1; Global Risks ;95
5.4.4.2; Risk Society and Reflexive Modernity ;97
5.4.4.3;Summary;99
5.4.5;Conclusion;100
5.4.6;Note;100
5.4.7;References;100
5.5;Chapter 5 Human Security;103
5.5.1;The Evolution of the Concept of Human Security;104
5.5.1.1;Origins;104
5.5.1.2;The Context;106
5.5.1.3;The Barcelona Version of Human Security;109
5.5.1.4;The Impact of the War on Terror;112
5.5.2;The Critiques of Human Security;114
5.5.2.1;What it is to be Human;114
5.5.2.2;The Meaning of Security;115
5.5.2.3;Biopower;117
5.5.3;Reconstructing Human Security;118
5.5.4;Notes;118
5.5.5;References;119
6;Part II Policy Arenas;121
6.1;Chapter 6 Nuclear Disarmament and Nonproliferation;123
6.1.1;Deconstructing Nonproliferation and Disarmament;123
6.1.2;Nuclear Nonproliferation;125
6.1.2.1;History of the Nuclear Nonproliferation Regime;125
6.1.2.2;The Causes of Nuclear Restraint;126
6.1.2.3;Restraint, Hedging, or Ambiguity?;129
6.1.3;Nuclear Disarmament;130
6.1.3.1;History of Negotiations for Nuclear Disarmament;130
6.1.3.2;Is Disarmament Desirable?;133
6.1.3.3;Is Disarmament Achievable?;134
6.1.4;New Frontiers in Policy and Research;135
6.1.4.1;Questioning Deterrence;135
6.1.4.2;Norm Entrepreneurs: Promoting Both Disarmament and Proliferation?;136
6.1.4.3;The Individual: Future Plains of Research;136
6.1.5;Comparative Conclusions: Beyond Nuclear Politics;137
6.1.6;Notes;139
6.1.7;References;139
6.2;Chapter 7 Terrorism and Antiterrorism;144
6.2.1;Progress in Defining Terrorism;144
6.2.2;The Rise of Terrorism in the Early Twenty-First Century;145
6.2.3;Transnationalization of Terrorism;148
6.2.4; Global Terrorism After 9/11: Transformation and/or Decline?;149
6.2.5;Causes and Explanations of Terrorism;151
6.2.5.1;Structural Causes;152
6.2.5.2;Ideological and Organizational Asymmetry;153
6.2.5.3;Facilitating Factors;154
6.2.6;Specifics of Antiterrorism;155
6.2.6.1;Confronting Manifestations of Terrorism;156
6.2.6.2;Undermining Terrorists Ideologies and Structures;159
6.2.7;Conclusion;160
6.2.8;References;161
6.3;Chapter 8 Genocide and Large-Scale Human Rights Violations;163
6.3.1;Conceptual and Legal Parameters;164
6.3.2;The History of Genocide in Academic Perspectives;166
6.3.3;Historical Parameters of Global-Era Genocide;167
6.3.4;Reasons Not To Be Cheerful;170
6.3.5;Policies and Politics of Genocide Prevention;172
6.3.6;Limitations of Global Genocide Policy;174
6.3.7;References;176
6.4;Chapter 9 Transnational Crime;178
6.4.1;Transnational Groups and Enterprises;179
6.4.2;Networks of Gangs and Cartels;180
6.4.3;A Global TCO Sampler: AfPak, Mexico, Central America, and West Africa;183
6.4.3.1;Afghanistan/Pakistan (AfPak);183
6.4.3.2;Mexico and Central America;184
6.4.3.3;West Africa;186
6.4.4;Violent Non-State Actors, Statemaking, and State Reconfiguration;188
6.4.5;Conclusion: Illicit Networks of Crime and Disorder;188
6.4.6;References;189
6.4.7;Further Reading;192
6.5;Chapter 10 Natural Resources and Insecurity;193
6.5.1;Introduction;193
6.5.2;Cross-Country Empirical Studies: Are Resources and Civil War Related?;194
6.5.3;Theoretical Models and Mechanisms: the How of this Relationship;199
6.5.4;More Empirics: Which Mechanism(s) do the Data Support?;202
6.5.5;Conclusion and Policy Implications;204
6.5.6;Note;206
6.5.7;References;206
6.6;Chapter 11 The Web of Water Security;208
6.6.1;Not Water Secure;208
6.6.2;Why Narrow and Deterministic is not Good Enough;210
6.6.2.1;Water Resources Security, Water Links, Water Nexus;210
6.6.2.2;Overconfidence in the Physical, and Ignoring the Social;212
6.6.2.3;Narrow and Determinist Views;213
6.6.3;The Web of Water Security;214
6.6.4;Interdependency and Sustainable Water Security;216
6.6.5;Analytical and Policy Implications of the Web of Water Security;218
6.6.6;Conclusions;219
6.6.7;Acknowledgements;220
6.6.8;Notes;220
6.6.9;References;221
6.6.10;Further Reading;226
7;Part III Policy Tools;227
7.1;Chapter 12 Civilian Protection;229
7.1.1;Introduction;229
7.1.1.1;Normative Principles: Origins and Tensions;230
7.1.1.2;Three Genres of Civilian Protection;231
7.1.2;Civilian Protection as Acts of Omission: Avoiding Civilian Harm in Armed Conflict;231
7.1.2.1;Concept;232
7.1.2.2;Implementation;233
7.1.3;Peacekeeping and the Protection of Civilians;235
7.1.3.1;Concept;235
7.1.3.2;Implementation;237
7.1.4;Strategies of Civilian Protection and R2P;240
7.1.4.1;Concept of R2P;240
7.1.5;Conclusion;245
7.1.6;Acknowledgements;246
7.1.7;Notes;246
7.1.8;References;248
7.1.9;Further Reading;249
7.2;Chapter 13 Humanitarian Assistance;250
7.2.1;Introduction;250
7.2.2;Humanitarianism, Security, and Politics;251
7.2.2.1;Classical Humanitarian Assistance;252
7.2.2.2;Military Humanitarian Intervention;254
7.2.2.3;The Responsibility to Protect;256
7.2.3;Securing Humanitarian Space;257
7.2.3.1;Types of Humanitarian Space;257
7.2.3.2;Humanitarians in Peril;258
7.2.3.3;Humanitarians in Power;259
7.2.4;Conclusion: Humanitarian (In)coherence, or Humanitarian Purity?;261
7.2.5;References;261
7.3;Chapter 14 The Evolution of International Peacekeeping;265
7.3.1;Introduction;265
7.3.2;The Evolution of International Peacekeeping;265
7.3.2.1; Traditional Peacekeeping;266
7.3.2.2;Multidimensional and Multi-Actor Peacekeeping;267
7.3.2.3;New and Old Peacekeeping Models;269
7.3.3;Current Implementation Challenges;271
7.3.3.1;Consent;271
7.3.3.2;Protection of Civilians;272
7.3.3.3;Peacekeepers as Peacebuilders;273
7.3.3.4;Capabilities;274
7.3.3.5;Partnerships;275
7.3.4;Rethinking International Peacekeeping?;276
7.3.4.1;Smaller, Shorter, Sharper;277
7.3.4.2;Demonstrating Impact;278
7.3.4.3;Authority and Leadership;279
7.3.5;Notes;280
7.3.6;References;280
7.4;Chapter 15 State-Building, Nation-Building, and Reconstruction;283
7.4.1;Introduction;283
7.4.2;Definitions;284
7.4.3;(Post-)Liberal and Critical Framings;285
7.4.4;Dilemmas and Contradictions;288
7.4.4.1;Sovereignty;288
7.4.4.2;Legitimacy;289
7.4.4.3;Accountability;290
7.4.4.4;Ownership;292
7.4.5;New Emerging Alternatives: Hybrid and Post-Liberal Peace, the Local , the Everyday , and Beyond;293
7.4.6;Conclusion;295
7.4.7;References;296
7.5;Chapter 16 Strengthening Democratic Governance in the Security Sector: The Unfulfilled Promise of Security Sector Reform;300
7.5.1;What is Security Sector Reform?;300
7.5.2;The Evolution of the Security Sector Reform Concept;301
7.5.3;The Challenges of Implementing the SSR Agenda;305
7.5.3.1;International Political and Security Climate;306
7.5.3.2;Ownership;307
7.5.3.3;Politics of Security Sector Reform;310
7.5.3.4;Effectiveness of Donor Approaches to Security Sector Reform;312
7.5.4;Becoming More Effective: Giving More Attention to Process;313
7.5.5;References;315
7.6;Chapter 17 Diplomacy and Mediation;318
7.6.1;The Post-Cold War Issues;320
7.6.1.1;The Tension between Accountability and Peace;320
7.6.1.2;Dealing with the Past;321
7.6.1.3;Managing Diversity in an Age of State Fragmentation;322
7.6.1.4;Making Peace Sustainable after Intrastate Conflict;323
7.6.1.5;Managing Complex, Multilayered Transitions;324
7.6.1.6;Dealing with Groups Labeled as Terrorists;325
7.6.1.7;The Proliferation of Would-Be Mediators;325
7.6.2;The Post-Cold War Actors;326
7.6.2.1;The United Nations Secretary-General;327
7.6.2.2;Regional Organizations;329
7.6.2.3;States;331
7.6.2.4;Nongovernmental Organizations;333
7.6.2.5;Eminent Individuals;334
7.6.3;Post-Cold War Trends;335
7.6.4;Notes;337
7.6.5;References;337
7.7;Chapter 18 Global Security and International Law;338
7.7.1;A Conceptual Introduction;338
7.7.2;Global Security, Use of Force, and International Law;341
7.7.2.1;Nuclear Weapons;343
7.7.2.2;Recourse to Threats and Uses of Force;344
7.7.3;Climate Change and Other Global Challenges;348
7.7.4;Concluding Comment;349
7.7.5;Notes;351
7.7.6;References;353
7.8;Chapter 19 Transitional Justice;356
7.8.1;Introduction;356
7.8.2;The Evolution of Transitional Justice;358
7.8.3;The Justice Dilemma and its Critics;360
7.8.4;Beyond the State: Challenges for Scholars and Policymakers;363
7.8.5;Conclusion;367
7.8.6;References;367
8;Part IV Global Security Actors;371
8.1;Chapter 20 Reframing the Use of Force: The European Union as a Security Actor;373
8.1.1;Introduction;373
8.1.2;Integrated Security;375
8.1.3;Norms and Values;379
8.1.4;European Security Capabilities;383
8.1.5;Conclusion;385
8.1.6;Notes;386
8.1.7;References;386
8.2;Chapter 21 China;389
8.2.1;Introduction;389
8.2.2;Part I;390
8.2.2.1;Defining Security;390
8.2.2.2;Challenges - Security Threats that China is Facing;390
8.2.2.3;Capabilities: China as a Security Actor;393
8.2.3;Part II: China s Role in Global Security;394
8.2.3.1;Chinese Perspective and Debates;395
8.2.3.2;Non-Chinese Perspectives;398
8.2.4;Conclusion;400
8.2.5;References;400
8.3;Chapter 22 India as a Global Security Actor;406
8.3.1;Introduction;406
8.3.2;India s Worldview;409
8.3.2.1;Early Foundations of Independent India s Foreign Policy;409
8.3.2.2;Non-alignment 2.0: Framing India s Grand Strategy;410
8.3.3;India as a Global Security Actor;411
8.3.3.1;India in Afghanistan;411
8.3.3.2;The Indian Ocean Region: Maritime Reorientations;413
8.3.4;Challenges and Opportunities;415
8.3.4.1;India in a Multi-polar World;415
8.3.4.2;India - A Revisionist Power? Nuclearization and the Non-Proliferation Treaty;417
8.3.4.3;Human Security at Home: India s Achilles Heel?;419
8.3.5;Conclusion: India s Emerging Global Profile;421
8.3.6;Notes;422
8.3.7;References;423
8.4;Chapter 23 Security Agenda in Russia: Academic Concepts, Political Discourses, and Institutional Practices;426
8.4.1;Introduction;426
8.4.2;Methodological Remarks;427
8.4.3;Security for Domestic Audience: a Genealogy of Russian Fears;430
8.4.4;Russia s Visions of International Security: the Challenges of Legitimation;432
8.4.5;Russia s Security Roles;434
8.4.5.1;Russia as a Security Architect - Yet What Kind of Security?;434
8.4.5.2;Russia as a Unilateral Peace Enforcer;436
8.4.5.3;Russia as a Peace Mediator;437
8.4.5.4;Russia as the Key Element of European Energy Security;438
8.4.5.5;Russia as a Bulwark Against Terrorism;439
8.4.6;Conclusion;440
8.4.7;Notes;441
8.4.8;References;441
8.5;Chapter 24 Contextualizing Global Security: The Case of Turkey;444
8.5.1;Introduction;444
8.5.2;Becoming a Global Security Actor;445
8.5.3;Continuity and Change in Turkey s Security-Policies;448
8.5.4;Lingering Questions;456
8.5.5;Notes;458
8.5.6;References;459
8.6;Chapter 25 The United States;464
8.6.1;Introduction;464
8.6.2;The Context for Policy: Managing Decline or Reasserting Hegemony?;465
8.6.3;Policy Priorities for the United States;467
8.6.3.1;Economic Recovery;467
8.6.4;Reconfiguring Counterterrorism;469
8.6.4.1;Nation-Building, Counterinsurgency and the Military s Strategic Priorities;470
8.6.4.2;Rogue Actors and Weapons of Mass Destruction;472
8.6.4.3;Rival Great Powers and Regional Stability;473
8.6.4.4;The Creeping Importance of Cyber Warfare;474
8.6.4.5;Democracy Promotion versus Strategic Stability;475
8.6.5;Conclusion;476
8.6.6;References;476
8.7;Chapter 26 Civil Society in Fragile Contexts;481
8.7.1;Introduction;481
8.7.2;Strengthening Civil Society, What Is It All About?;483
8.7.3;Hybrid Providers of Development in Fragile States ;485
8.7.4;Agents of Peace and Democratization?;487
8.7.5;Legitimacy and Civilness ;488
8.7.6;Global Connections and Difficulties of Outside Support;489
8.7.7;Case Study - Strengthening Agents of Change in Ituri;490
8.7.7.1;Civil Society in Ituri;491
8.7.8;Identifying Peace-Minded Partners;492
8.7.9;Conclusion;494
8.7.10;Notes;495
8.7.11;References;495
8.8;Chapter 27 Protest and Politics: How Peace Movements Shape History;500
8.8.1;A Global Context;501
8.8.2;Opposing War in Indochina;502
8.8.2.1;Challenging the War-Making President;503
8.8.3;Blocking Escalation;504
8.8.4;Seeds of Watergate;505
8.8.5;Defunding the War;506
8.8.5.1;Resistance in the Ranks;507
8.8.5.2;The Invisible Participant;508
8.8.6;Campaigning for Disarmament;508
8.8.6.1;Freezing the Arms Race;508
8.8.6.2;Saying No to New Missiles;510
8.8.6.3;Who Won the Cold War?;511
8.8.6.4;What is Success?;513
8.8.7;Resisting the Iraq War;514
8.8.7.1;A Diverse Movement;515
8.8.7.2;The Turn Toward Conventional Politics;516
8.8.7.3;Helping to Elect a President;517
8.8.8;Understanding Change;518
8.8.9;Notes;519
8.8.10;References;520
8.9;Chapter 28 Corporate Actors;523
8.9.1;Introduction;523
8.9.2;Outlining the Rise of the PSI;524
8.9.3;Security Privatization: Historical Roots;525
8.9.4;The Post-Cold War Spurt;526
8.9.5;Categorization of PMSCs;529
8.9.6;Major Activities and involvement;530
8.9.6.1;Military Service Industry;530
8.9.6.2;Vital Inputs to Military and Counterinsurgency Operations;531
8.9.6.3;Essential Element of Security Sector Reform Process;532
8.9.7;Protecting the Neoliberal Agenda;533
8.9.8;Problems Related to Monitoring and Regulation;533
8.9.9;Quest for Legitimacy;535
8.9.10;Conclusion;536
8.9.11;Notes;537
8.9.12;References;537
9;Index;543
mehr

Autor

Mary Kaldor is Professor of Global Governance and
Director of the Civil Society and Human Security Research Unit at
the London School of Economics. She is the author of many books,
including New & Old Wars: Organized Violence in a Global
Era (2013) and The Ultimate Weapon is No Weapon: Human
Security and the Changing Rules of War and Peace (2010). She
was a founding member of European Nuclear Disarmament and of the
Helsinki Citizen's Assembly.

Iavor Rangelov is Global Security Research Fellow at the
Civil Society and Human Security Research Unit at the London School
of Economics. He is co-chair of the London Transitional Justice
Network and author of Nationalism and the Rule of Law: Lessons
from the Balkans and Beyond (2014).