![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
This revised and updated second edition features over twenty new chapters and offers a wide-ranging collection of cutting-edge essays from leading scholars in the field of Security Studies. The field of Security Studies has undergone significant change during the past 20 years, and is now one of the most dynamic sub-disciplines within International Relations. This second edition has been significantly updated to address contemporary and emerging security threats with chapters on organised crime, migration and security, cyber-security, energy security, the Syrian conflict and resilience, amongst many others. Comprising articles by both established and up-and-coming scholars, The Routledge Handbook of Security Studies provides a comprehensive overview of the key contemporary topics of research and debate in the field of Security Studies. The volume is divided into four main parts: * Part I: Theoretical Approaches to Security * Part II: Security Challenges * Part III: Regional (In)Security * Part IV: Security Governance This new edition of the Handbook is a benchmark publication with major importance for both current research and the future of the field. It will be essential reading for all scholars and students of Security Studies, War and Conflict Studies, and International Relations.
Since its formation in 1948, and particularly since the assassination of Prime Minister Yitzak Rabin in 1995, Israel has experienced turbulent political change and numerous ongoing security challenges, including major party splits, collapsed peace talks with the Palestinians and Syria, nuclear threats from Iran, and even the specter of civil war as Israel withdrew from Gaza. This essential survey brings together Israeli and American scholars to provide a much-needed balanced introduction to Israel's domestic politics and foreign policy. Experts tackle this difficult subject in three parts: domestic politics, foreign policy challenges, and strategic challenges. Domestic topics include the Israeli Right and Left; religious, Russian, and Arab parties; the Supreme Court; and the economy. Part two discusses Israel's complicated and often fractious relationships with the Palestinians and the Arab world, as well as its improved relations with Turkey and India and continuing close relationship with the United States. The Israel-Hizbollah War of 2006 and existential threats to Israel, including the threat from Iran, are detailed in part three. This compelling and authoritative coverage provides students with the necessary framework to understand Israel's political past and present, as well as the direction Israel is likely to take in the future. Contents 1. Introduction (Robert O. Freedman) Part One: Israeli Domestic Politics Part Two: Israel's Foreign Policy Challenges Part Three: Israel's Strategic Challenges
As a concept, deterrence has launched a thousand books and
articles. It has dominated Western strategic thinking for more than
four decades. In this important and groundbreaking new book,
Lawrence Freedman develops a distinctive approach to the evaluation
of deterrence as both a state of mind and a strategic option. This
approach is applied to post-cold war crisis management, and the
utility and relevance of the concept is addressed in relation to US
strategic practice post-9/11, particularly in the light of the
apparent preference of the Bush Administration for the alternative
concept of pre-emption. The study of deterrence has been hampered by the weight of the intellectual baggage accumulated since the end of the Second World War. Exaggerated notions of what deterrence might achieve were developed, only to be to knocked down by academic critique. In this book, Freedman charts the evolution of the contemporary concept of deterrence, and discusses whether - and how - it still has relevance in today's world. He considers constructivist as well as realist approaches and draws on criminological as well as strategic studies literature to develop a concept of a norms-based, as opposed to an interest-based, deterrence. This book will be essential reading for students of politics and international relations as well as all those interested in contemporary strategic thought.
This new handbook provides a comprehensive overview of the issues facing naval strategy and security in the twenty-first century. Featuring contributions from some of the world's premier researchers and practitioners in the field of naval strategy and security, this handbook covers naval security issues in diverse regions of the world, from the Indian Ocean and the Mediterranean to the Arctic and the piracy-prone waters off East Africa's coast. It outlines major policy challenges arising from competing claims, transnational organized crime and maritime terrorism, and details national and alliance reactions to these problems. While this volume provides detailed analyses on operational, judicial, and legislative consequences that contemporary maritime security threats pose, it also places a specific emphasis on naval strategy. With a public very much focused on the softer constabulary roles naval forces play (such as humanitarian assistance, disaster relief, naval diplomacy, maintenance of good order at sea), the overarching hard-power role of navies has been pushed into the background. In fact, navies and seapower have been notably absent from many recent academic discussions and deliberations of maritime security. This handbook provides a much-desired addition to the literature for researchers and analysts in the social sciences on the relationship between security policy and military means on, under, and from the sea. It comprehensively explains the state of naval security in this maritime century and the role of naval forces in it. This book will be of much interest to students of naval security and naval strategy, security studies and IR, as well as practitioners in the field.
Did the Trump administration have a cybersecurity strategy, or was it hell-bent on dismantling years of consensus-building on how the nation should respond to an existential threat to its digital life blood? Based on insider accounts and exclusive interviews with experts, Cyber in the Age of Trump offers a first-time chronicle and analysis of the Trump administration's approach to cybersecurity, its curious decisions and strategic choices, places where its work has earned applause, and the places where cyber pros see major signs of danger. The new administration came in with a strong faith in technology, a sense that the U.S. could better deploy its cyber weaponry to deter foes, and a willingness to continue popular Obama-era policies on collaborating with industry. But it didn't seem to have a cyber vision, or one that was applied consistently. And in the absence of such a strategic overview, the threat to the nation would only grow. Cyber in the Age of Trump is the first book to examine the impact of President Trump on the nation's greatest long-term strategic challenge and how a "disruptor presidency" has upended consensus and threatened to derail cyber policy.
This book sets out a new analytic methodology: analysis by contrasting narratives (ACN), which states that defining an enemy and attempting to counter threats can contribute to the manifestation of that threat. Peter de Werd applies ACN to the problem the US faced in understanding and responding to the phenomenon of Al Qaeda in the 1990s. He demonstrates how this approach can fill a gap in intelligence studies by enhancing the understanding of complex intelligence problems and strengthening the practice of intelligence analysis. Adopting a reflexivist theoretical stance, the book underlines the importance of an integrated approach to interpretation and action, and of a continuous dialogue between intelligence and policy.
During the Cold War the concept of international security was understood in military terms as the threat or use of force by states. The end of EastDWest hostilities, however, brought critical perspectives to the fore as scholars sought to explain the emergence of new challenges to international stability, such as environmental degradation, immigration and terrorism. The second edition of this popular and highly respected text offers a wide-ranging and comprehensive analysis of the growing field of critical security studies. All the chapters have been fully revised and updated to map the on-going evolution of debates about international security since 1989, including the more recent shift in emphasis from critiques of the realist practices of states to those of global liberal governance. Topics covered include the relationship between security and change, identity, the production of danger, fear and trauma, human insecurity and emancipation. The book explores the meaning and use of these concepts and their relevance to real-life situations ranging from the War on Terror to the Arab Spring, migration, suffering in war, failed states and state-building, and the changing landscape of the international system, with the emergence of a multipolar world and the escalation of global climate change. Written with verve and clarity and incorporating new seminar activities and questions for class discussion, this book will be an invaluable resource for students of international relations and security studies.
This collection of essays combines historical research with cutting-edge strategic analysis and makes a significant contribution to the study of the early history of strategic thinking. There is a debate as to whether strategy in its modern definition existed before Napoleon and Clausewitz. The case studies featured in this book show that strategic thinking did indeed exist before the last century, and that there was strategy making, even if there was no commonly agreed word for it. The volume uses a variety of approaches. First, it explores the strategy making of three monarchs whose biographers have claimed to have identified strategic reasoning in their warfare: Edward III of England, Philip II of Spain and Louis XIV of France. The book then analyses a number of famous strategic thinkers and practitioners, including Christine de Pizan, Lazarus Schwendi, Matthew Sutcliffe, Raimondo Montecuccoli and Count Guibert, concluding with the ideas that Clausewitz derived from other authors. Several chapters deal with reflections on naval strategy long thought not to have existed before the nineteenth century. Combining in-depth historical documentary research with strategic analysis, the book illustrates that despite social, economic, political, cultural and linguistic differences, our forebears connected warfare and the aims and considerations of statecraft just as we do today. This book will be of great interest to students of strategic history and theory, military history and IR in general.
This collection of essays combines historical research with cutting-edge strategic analysis and makes a significant contribution to the study of the early history of strategic thinking. There is a debate as to whether strategy in its modern definition existed before Napoleon and Clausewitz. The case studies featured in this book show that strategic thinking did indeed exist before the last century, and that there was strategy making, even if there was no commonly agreed word for it. The volume uses a variety of approaches. First, it explores the strategy making of three monarchs whose biographers have claimed to have identified strategic reasoning in their warfare: Edward III of England, Philip II of Spain and Louis XIV of France. The book then analyses a number of famous strategic thinkers and practitioners, including Christine de Pizan, Lazarus Schwendi, Matthew Sutcliffe, Raimondo Montecuccoli and Count Guibert, concluding with the ideas that Clausewitz derived from other authors. Several chapters deal with reflections on naval strategy long thought not to have existed before the nineteenth century. Combining in-depth historical documentary research with strategic analysis, the book illustrates that despite social, economic, political, cultural and linguistic differences, our forebears connected warfare and the aims and considerations of statecraft just as we do today. This book will be of great interest to students of strategic history and theory, military history and IR in general.
In a time where US deployments are uncertain, this book shows how US service members can either build the necessary support to sustain their presence or create added animosity towards the military presence. The United States stands at a crossroads in international security. The backbone of its international position for the last 70 years has been the massive network of overseas military deployments. However, the US now faces pressures to limit its overseas presence and spending. In Beyond the Wire, Michael Allen, Michael Flynn, Carla Martinez Machain, and Andrew Stravers argue that the US has entered into a "Domain of Competitive Consent" where the longevity of overseas deployments relies upon the buy-in from host-state populations and what other major powers offer in security guarantees. Drawing from three years of surveys and interviews across fourteen countries, they demonstrate that a key component of building support for the US mission is the service members themselves as they interact with local community members. Highlighting both the positive contact and economic benefits that flow from military deployments and the negative interactions like crime and anti-base protests, this book shows in the most rigorous and concrete way possible how US policy on the ground shapes its ability to advance its foreign policy goals.
Many historians of U.S. foreign relations think of the post-World War II period as a time when the United States, as an anti-colonial power, advocated collective security through the United Nations and denounced territorial aggrandizement. Yet between 1945 and 1947, the United States violated its wartime rhetoric and instead sought an imperial solution to its postwar security problems in East Asia by acquiring unilateral control of the western Pacific Islands and dominating influence throughout the entire Pacific Basin. This detailed study examines American foreign policy from the beginning of the Truman Administration to the implementation of Containment in the summer and fall of 1947. As a case study of the Truman Administration's Early Cold War efforts, it explores pre-Containment policy in light of U.S. security concerns vis-a-vis the Pearl Harbor Syndrome. The American pursuit of a secure Pacific Basin was inconsistent at the time with its foreign policy toward other areas of the world. Thus, the consolidation of power in this region was an exception to the avowed goal of a multilateral response to the policies of the Soviet Union. This example of national or strategic security went much further than simple military control; it included the cultural assimilation of the indigenous population and the unilateral exclusion of all other powers. Analyzing traditional archival records in a new light, Friedman also investigates the persisting American notions of a Westward moving frontier that stretches beyond North American territorial bounds.
Arms purchases are among the most expensive, technologically challenging and politically controversial decisions made by modern-day governments. Superpower spending on weapons systems is widely analysed and discussed. But defence procurement in smaller industrial countries involves different issues which receive less attention. This volume presents a general framework for understanding smaller country defence procurement supported by country, industry and project studies. Part I provides a general framework for analysing smaller country defence procurement, focusing on the formation of national defence capabilities. The framework is then used to analyse issues around the development of procurement demand, the characteristics of defence industry supply, contracts and relationships between buyers and sellers, and government policy for defence procurement and industry development. Part II focuses on defence procurement in seven smaller industrial nations with widely varying historical and political settings (Australia, Canada, Israel, Singapore, Spain, Sweden and The Netherlands). Part III consists of two Australian case studies of the procurement issues raised in, respectively, the naval shipbuilding industry and in a major, complex defence project. The book addresses the needs of public and private sector managers, military planners, procurement specialists, industry policy-makers, and defence procurement and industry educators. It presents general principles in an accessible manner and points to real-world experience to illustrate the principles at work. Therefore it will be of interest to scholars and practitioners in defence economics, strategic procurement, public sector procurement, and defence industry policy.
The relationship between intelligence organizations and the national security policymakers which they support has its ups and downs. Sometimes the relationship is a good one; communication flows and both sides benefit from the interaction, but sometimes difficulties arise and problems develop. For example, when knowledge is required for decision but is not available or is inaccurate the outcome is frequently described as an intelligence failure. A subset of this kind of intelligence failure occurs when knowledge is distorted in order to reinforce or oppose policymaker preferences or expectations. Another less successful outcome occurs when good, accurate knowledge is not used to improve policy, but is instead set aside or ignored by those who have the responsibility and obligation to make decisions. This collection explores the difficulties that can arise in the relationship between intelligence and policy. The chapters consider both politicization of, and lack of receptiveness to, intelligence on the part of policymakers from a variety of different angles. Readers will find that this book challenges conventional wisdom and offers new ways of thinking about this important but understudied area. This book was published as a special issue of Intelligence and National Security.
Located in the center of Asia with one of the largest land frontiers in the world and 14 neighbors whose dispositions could not easily be predicted, China has long been obsessed with security. In this Handbook, an internationally renowned team of contributors provide a comprehensive and systematic analysis of contemporary thinking about Chinese national security. Chapters cover the PRC's historical, ideological and doctrinal heritage related to security, its security arrangements and policies targeting key regions and nations of the world, the security aspects of the PRC's ground, air, sea, space and cyber forces, as well as the changing and expanding definition and scope of China's security theory and practice. The Handbook is divided into three thematic parts: Part I focuses on national security, covering traditional views of security and the impact of China's historical experience on current security dispositions as well as non-traditional security. Part II looks at China's relations with the great powers, regional security and China's involvement with collective security organizations. Part III provides an overview of China's institutionalized security forces; looking at the army, navy, air force and Second Artillery (strategic nuclear forces) and offering analysis of China's recent interest in space as a security concern and cybersecurity. This volume is essential reading for all students of Asian Security, Chinese Politics and International Relations.
This book provides the first systematic comparative analysis of climate security discourses. It analyses the securitisation of climate change in four different countries: USA, Germany, Turkey, and Mexico. The empirical analysis traces how specific climate-security discourses have become dominant, which actors have driven this process, what political consequences this has had and what role the broader context has played in enabling these specific securitisations. In doing so, the book outlines a new and systematic theoretical framework that distinguishes between different referent objects of securitisation (territorial, individual and planetary) and between a security and risk dimension. It thereby clarifies the ever-increasing literature on different forms of securitisation and the relationship between security, risk and politics. Whereas securitisation studies have traditionally focused on either a single country case study or a global overview, consequently failing to reconstruct detailed securitisation dynamics, this is the first book to provide a systematic comparative analysis of climate security discourses in four countries and thus closes an empirical gap in the present literature. In addition, this comparative framework allows the drawing of conclusions about the conditions for and consequences of successful securitisation based on empirical and comparative analysis rather than theoretical debate only. This book will of interest to students of climate change, environmental studies, critical security, global governance, and IR in general.
The history of bourgeois modernity is a history of the Enemy. This book is a radical exploration of an Enemy that has recently emerged from within security documents released by the US security state: the Universal Adversary. The Universal Adversary is now central to emergency planning in general and, more specifically, to security preparations for future attacks. But an attack from who, or what? This book - the first to appear on the topic - shows how the concept of the Universal Adversary draws on several key figures in the history of ideas, said to pose a threat to state power and capital accumulation. Within the Universal Adversary there lies the problem not just of the 'terrorist' but, more generally, of the 'subversive', and what the emergency planning documents refer to as the 'disgruntled worker'. This reference reveals the conjoined power of the contemporary mobilisation of security and the defence of capital. But it also reveals much more. Taking the figure of the disgruntled worker as its starting point, the book introduces some of this worker's close cousins - figures often regarded not simply as a threat to security and capital but as nothing less than the Enemy of all Mankind: the Zombie, the Devil and the Pirate. In situating these figures of enmity within debates about security and capital, the book engages an extraordinary variety of issues that now comprise a contemporary politics of security. From crowd control to contagion, from the witch-hunt to the apocalypse, from pigs to intellectual property, this book provides a compelling analysis of the ways in which security and capital are organized against nothing less than the 'Enemies of all Mankind'.
Military capability is delivered operationally at a team and collective level, be it a unit as small as a squad or section, or as large as a maritime task group. Modern military forces are required to deal with a potentially wide range of missions frequently involving multiple alliance partners, within a geopolitical environment which can seem to change rapidly. Individual performance, while being important, is not the primary determinant of mission success - force integration, interoperability, adaptability and teamwork are key factors. Team and collective training which fully addresses these factors is fundamental to the development and delivery of military capability. As a consequence, the requirement to determine training requirements and specify effective systems for the delivery of team and collective training is critical to operational success. Training Needs Analysis (also known as Front End Analysis), is a well-established methodology for analysing training requirements and specifying training solutions used extensively by the UK and its NATO partners. However, the analytical techniques employed are optimised for individual training, with little guidance being offered on its application in the team and collective context. Team and Collective Training Needs Analysis (TCTNA) has been developed to close this methodological gap. It addresses the issues of the relationship of individual and team tasks, teamwork, command and control, task and training environments, scenario definition, instructional strategy, team training approaches, instructional functions, and wide-ranging organisational and procurement considerations. Part One of the book develops an integrated set of models which underpin the analytical approach presented in Part Two. Worked examples and case studies illustrate the application of the approach. Between 2005 and 2015 the authors worked on numerous training-related research projects at Cranfield University and Coventry University for the Human Factors Integration Defence Technology Centre and the Defence Human Capability Science and Technology Centre on behalf of the Defence Science and Technology Laboratory, UK Ministry of Defence.
A Choice Outstanding Academic Title for 2016 Perhaps the most basic national security question that U.S. leaders and the body politic continuously face is where and under what circumstances to consider and in some cases resort to the use of armed force to ensure the country's safety and well-being. The question is perpetual-but the answer is not. This insightful text helps students make sense of the ever-changing environment and factors that influence disagreement over national security risks and policy in the United States. The book takes shape through a focus on three considerations: strategy, policy, and issues. Snow explains the range of plans of action that are possible and resources available for achieving national security goals, as well as the courses of action for achieving those goals in the context of a broad range of security problems that must be dealt with. However, there is little agreement among policymakers on exactly what is the nature of the threats that the country faces. Snow helps readers frame the debate by suggesting some of the prior influences on risk-assessment, some of the current influences on national security debates, and suggestions for how future strategy and policy may be shaped.
This book offers a multifaceted, analytical account of counterterrorism argumentative speech. Traditionally, existing scholarship in this field of research has taken a selective focus on issues and actors, concentrating mainly on US state discourse after 9/11. However, this approach ignores the fact that there was counterterrorism speech before 9/11, and that there are other countries and other actors who also actively engage in the counterterrorism discursive field, both within and outside of the Western world. Addressing several thematic, chronological and methodological gaps in the current literature, Arguing Counterterrorism offers a dynamic perspective on counterterrorism argumentative speech. Over the course of the volume, the authors tackle the following key issues: first, historical and cultural continuity and change. Second, the phenomenology of counterterrorism speech: its nature, instrumentalisation, implications and interactions between the various actors involved. The third theme is the anatomy of counterterrorism speech; namely its political, cultural and linguistic constitutive elements. Employing a multi-disciplinary framework, the authors explore these issues through a geographically and historically diverse range of case studies, resulting in a book that broadens the perspective of counterterrorism argumentation analysis. This book will be of much interest to students of critical terrorism studies, counterterrorism, discourse analysis, security studies and IR.
This book explores the development of the military as an organization and looks at the patterns of civil-military relations that have emerged in modern Nepal, especially after the rise of King Prithvi Narayan Shah, who founded the unified state of Nepal. It combines astute analyses with up-to-date data to present a comprehensive account of the relations between monarchy, military and civil government and their impact on the democratization process in the country. The author underlines the pressing need for establishing civilian supremacy over the military, through developing and strengthening civilian supervisory mechanisms. The book will be an important resource to researchers, scholars, students of politics, military studies, peace and conflict studies, and history, particularly those concerned with Nepal. It will also interest policy-makers, security experts and military personnel.
Countless attempts at analyzing Russia's actions focus on Putin to understand Russia's military imbroglio in Ukraine, hostility towards America, and disdain of 'Gayropa'. This book invites its readers to look beyond the man and delve into the online lives of millions of Russians. It asks not the question of what the threats are to Russia's security, but what they are perceived to be by digital Russia. The author examines how enemy images are manufactured, threats magnified, stereotypes revived, memories implanted and fears harnessed. It looks at the legacy of the Soviet Union in shaping discussions ranging from the Ukraine crisis to the Pussy Riots trial, and explores the complex inter-relation between enemy images at the governmental level and their articulation by the general public. By drawing on the fields of international relations, memory studies, visual studies, and big data, this book addresses the question of why securitization succeeds - and why it fails. "Security theory meets the visual turn and goes to Russia, where old tsarist and Soviet tropes are flooding the internet in support of Putin's neo-tsarism. A magical mystery tour that comes recommended. Iver B. Neumann, author of "Russia and the Idea of Europe" "The novelty of her approach is in going beyond the traditional top down perspective and capturing the receptivity and contribution of various social groups to securitized discourses." Andrei P.Tsygankov, author of "Russia's Foreign Policy: Change and Continuity in National Identity". "When do scary proclamations of security threats attract an audience? When does securitization work? 'Security Threats and Public Perception' combines in-depth analysis of the Ukraine Crisis in the Russian digital media with discourse theory to make an innovative argument about how and when people believe that they are insecure. A must read!" Laura Sjoberg, Assistant Professor of Political Science, University of Florida, USA
The Organization of European Security Governance investigates what impact the changing nature of security challenges has had on the organization of security governance in Europe. As the most pervasive security challenges today are difficult to classify as either internal or external, the traditional divide between domestic and international security has become blurred. In response, European leaders have emphasized the need to develop comprehensive and horizontal approaches to security in the European Union. But has the European Union been able to deliver a coherent response to this new security environment? In a detailed comparative study of two crucial policy fields - EU counter-terrorism and post-conflict crisis management the book outlines the scope of the ongoing transformation of Europe's security order, examines its challenges and explains its defects. This important volume will be of interest to students and scholars of Security Studies and European Politics.
Commanding Military Power offers a new explanation of why some armed forces are stronger than others. Ryan Grauer advances a 'command structure theory' which combines insights from organization theory, international relations, and security studies literatures to provide a unique perspective on military power. Specifically, armed forces organized to facilitate swift and accurate perception of and response to battlefield developments will cope better with war's inherent uncertainty, use resources effectively, and, quite often, win. Case studies of battles from the Russo-Japanese War, Chinese Civil War and Korean War, based on new archival research, underscore the argument, showing that even smaller and materially weaker militaries can fight effectively against and defeat larger and better endowed adversaries when they are organizationally prepared to manage uncertainty. That organization often matters more than numbers and specific tools of war has crucial implications for both contemporary and future thinking about and efforts to improve martial strength. |
You may like...
Rethinking American Grand Strategy
Elizabeth Borgwardt, Christopher McKnight Nichols, …
Hardcover
R2,460
Discovery Miles 24 600
Cuito Cuanavale - 12 Months Of War That…
Fred Bridgland
Paperback
(4)
Sustainable Security - Rethinking…
Jeremi Suri, Benjamin Valentino
Hardcover
R3,762
Discovery Miles 37 620
|