Contesting Security
Title | Contesting Security PDF eBook |
Author | Thierry Balzacq |
Publisher | Routledge |
Pages | 381 |
Release | 2014-11-20 |
Genre | Political Science |
ISBN | 1136162720 |
Contesting Security investigates to what extent the ‘logic of security’, which underpins securitization, can be contained, rolled back or dismantled. Featuring legitimacy as a cement of security practices, this volume presents a detailed account of the "logic" which sustains security in order to develop a novel approach to the relation between security and the policies in which it is engraved. Understanding security as a normative practice, the contributors suggest a nuanced, and richer take on the conditions under which it is possible, advisable or fair to accept or roll back its policies. The book comprises four sections, each investigating one specific modality of contesting security practices: resistance, desecuritization, emancipation, and resilience. These strategies are examined, compared and assessed in different political and cultural habitats. This book will be of much interest to students of critical security studies, securitisation theory, social theory, and IR in general.
Access Contested
Title | Access Contested PDF eBook |
Author | Ronald Deibert |
Publisher | MIT Press |
Pages | 391 |
Release | 2011-09-30 |
Genre | Computers |
ISBN | 026229804X |
Experts examine censorship, surveillance, and resistance across Asia, from China and India to Malaysia and the Philippines. A daily battle for rights and freedoms in cyberspace is being waged in Asia. At the epicenter of this contest is China—home to the world's largest Internet population and what is perhaps the world's most advanced Internet censorship and surveillance regime in cyberspace. Resistance to China's Internet controls comes from both grassroots activists and corporate giants such as Google. Meanwhile, similar struggles play out across the rest of the region, from India and Singapore to Thailand and Burma, although each national dynamic is unique. Access Contested, the third volume from the OpenNet Initiative (a collaborative partnership of the Citizen Lab at the University of Toronto's Munk School of Global Affairs, the Berkman Center for Internet and Society at Harvard University, and the SecDev Group in Ottawa), examines the interplay of national security, social and ethnic identity, and resistance in Asian cyberspace, offering in-depth accounts of national struggles against Internet controls as well as updated country reports by ONI researchers. The contributors examine such topics as Internet censorship in Thailand, the Malaysian blogosphere, surveillance and censorship around gender and sexuality in Malaysia, Internet governance in China, corporate social responsibility and freedom of expression in South Korea and India, cyber attacks on independent Burmese media, and distributed-denial-of-service attacks and other digital control measures across Asia.
Contemporary European Security
Title | Contemporary European Security PDF eBook |
Author | David J. Galbreath |
Publisher | Routledge |
Pages | 380 |
Release | 2019-03-20 |
Genre | Political Science |
ISBN | 1351235605 |
Contemporary European Security explores the complex European security architecture and introduces students to the empirical, theoretical and conceptual approaches to studying the subject. Written by experts in each subfield, it addresses key topics within the wider strategic context of international security. Presenting traditional and critical debates to illuminate this ever-changing field it addresses specifically: European security since 2000 and the end of the Cold War. The evolution of International Relations theories in understanding security in Europe. The role of NATO in the post-war period and its strategy, impact and enlargement. The institutionalisation of the CSCE and the political tensions within the OSCE. The EU’s Common Security and Defence Policy and recent policy initiatives in defence. Feminist conceptions of European security. European military innovation. Security challenges in the post-Soviet space and the growing instability in the Middle East and North Africa. The emergence of human security. Internal and societal security. This essential textbook will be of key interests to students and scholars of European Security, Security and Military studies, Strategic Studies, European Politics and International Relations.
Secession and Security
Title | Secession and Security PDF eBook |
Author | Ahsan I. Butt |
Publisher | Cornell University Press |
Pages | 505 |
Release | 2017-11-15 |
Genre | Political Science |
ISBN | 1501713965 |
In Secession and Security, Ahsan I. Butt argues that states rather than separatists determine whether a secessionist struggle will be peaceful, violent, or genocidal. He investigates the strategies, ranging from negotiated concessions to large-scale repression, adopted by states in response to separatist movements. Variations in the external security environment, Butt argues, influenced the leaders of the Ottoman Empire to use peaceful concessions against Armenians in 1908 but escalated to genocide against the same community in 1915; caused Israel to reject a Palestinian state in the 1990s; and shaped peaceful splits in Czechoslovakia in 1993 and the Norway-Sweden union in 1905. Butt focuses on two main cases—Pakistani reactions to Bengali and Baloch demands for independence in the 1970s and India's responses to secessionist movements in Kashmir, Punjab, and Assam in the 1980s and 1990s. Butt's deep historical approach to his subject will appeal to policymakers and observers interested in the last five decades of geopolitics in South Asia, the contemporary Israeli-Palestinian conflict, and ethno-national conflict, separatism, and nationalism more generally.
The Routledge Handbook of Security Studies
Title | The Routledge Handbook of Security Studies PDF eBook |
Author | Myriam Dunn Cavelty |
Publisher | Routledge |
Pages | 499 |
Release | 2009-12-16 |
Genre | Political Science |
ISBN | 113523907X |
Pt. 1. Theoretical approaches to security and different 'securities' -- pt. 2. Contemporary security challenges -- pt. 3. Regional security challenges -- pt. 4. Confronting security challenges.
Security Expertise
Title | Security Expertise PDF eBook |
Author | Trine Villumsen Berling |
Publisher | Routledge |
Pages | 267 |
Release | 2015-04-10 |
Genre | Political Science |
ISBN | 1317593197 |
This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks, the collaboration between science, anthropology and the military, transnational terrorism, and the ethical consequences of security expertise. Together they challenge our understanding of how expertise works and what consequences it has for security politics and international relations. This book will be of particular interest to students of critical security studies, sociology, science and technology studies, and IR/security studies in general.
Contesting Crime Science
Title | Contesting Crime Science PDF eBook |
Author | Ronald Kramer |
Publisher | Univ of California Press |
Pages | 270 |
Release | 2022-01-04 |
Genre | Social Science |
ISBN | 0520299582 |
"In this eye-opening critique, Ronald Kramer and James C. Oleson interrogate the promises of crime science and target our misplaced faith in technology as the solution to criminality. This book deconstructs crime science's most prominent manifestations--biological, actuarial, security, and environmental sciences. Rather than holding the technological keys to crime's resolution, crime sciences inscribe criminality on particular bodies and constitute a primary resource for the conceptualizations of crime that many societies take for granted. Crime science may strive to reduce crime, but in doing so, it reproduces power asymmetries, creates profit motives, undermines important legal concepts, instantiates questionable practices, and forces open new vistas of deviant activity"--