Security has become the pre-eminent organising principle of modern life, inextricably bound up with capital accumulation and Empire. This is the first sociological treatise on the security-industrial ...complex, offering a general theory of security based on a critical engagement with the works of Marx and Foucault.
This book provides a holistic picture of Chinese global security discourses, with a focus on macrosecuritizations. The work examines how the People’s Republic of China (PRC) has aligned itself within ...global security discourses. This is approached through the theory of securitization, specifically by using the notion of macrosecuritization as the lens for its analysis. The book offers the first full account of Chinese macrosecuritization discourses and alignments, and it aims to discern what security speech with referent objects such as humanity, civilization, or nature has done in the domestic and international politics of China. Specifically, the work focuses on the discourses of the Cold War, anti-nuclear weapons, climate change, and the Global War on Terror, which have all been postulated in the literature as macrosecuritizations. In addition, it examines discourses with global referent objects that have been put forth by the PRC so that we can see whether its proposals for global security governance take the form of, or are legitimated through, macrosecuritization. The overall argument in the book is that the way contemporary China uses macrosecuritization discourses provides for ontological security as its position in relation to other major powers is undergoing transformation, by allowing it to maintain a consistent narrative of its international self that abides by its own set of moral values and sense of worth. This book will be of interest to students of critical security studies, Chinese politics and International Relations.
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security. ...Acknowledging that the very notion of peace and security has become more complex, the volume seeks to determine which questions of cybersecurity are indeed of relevance for international peace and security and which, while requiring international attention, are simply issues of contemporary governance or development. The Handbook offers a variety of thematic, regional and disciplinary perspectives on the question of international cybersecurity, and the chapters contextualize cybersecurity in the broader contestation over the world order, international law, conflict, human rights, governance and development. The volume is split into four thematic sections:Concepts and frameworks;Challenges to secure and peaceful cyberspace;National and regional perspectives on cybersecurity;Global approaches to cybersecurity.
This book will be of much interest to students of cybersecurity, computer science, sociology, international law, defence studies and International Relations in general.
The threats the world currently faces extend beyond traditional problems such as major power competition, interstate conflict, and nuclear proliferation. Non-traditional security challenges such as ...climate change, migration, and natural disasters surpass states' capacity to address them. These limitations have led to the proliferation of other actors-regional and international organizations, transnational networks, local and international nongovernmental organizations-that fill the gaps when states' responses are lacking and provide security in places where there is none.In this book, Mely Caballero-Anthony examines how non-traditional security challenges have changed state behavior and security practices in Southeast Asia and the wider East Asia region. Referencing the wide range of transborder security threats confronting Asia today, she analyzes how non-state actors are taking on the roles of "security governors," engaging with states, regional organizations, and institutional frameworks to address multifaceted problems. From controlling the spread of pandemics and transboundary pollution, to managing irregular migration and providing relief and assistance during humanitarian crises, Caballero-Anthony explains how and why non-state actors have become crucial across multiple levels-local, national, and regional-and how they are challenging regional norms and reshaping security governance. Combining theoretical discussions on securitization and governance with a detailed and policy-oriented analysis of important recent developments,Negotiating Governance on Non-Traditional Security in Southeast Asiaand Beyond points us toward "state-plus" governance, where a multiplicity of actors form the building blocks for multilateral cooperative security processes to meet future global challenges.
The humanitarian crises caused by civil conflicts and wars in Africa are too great in scope for an adequate and effective continental response. The founding of the African Union and the drafting of ...the Responsibility to Protect doctrine, the basis for collective action against genocide, ethnic cleansing and crimes against humanity makes this a critical time to reflect on how best to address regional conflicts.
This book responds to new regional conflicts over health, water, land and food security in the world's poorest, most socially fragmented continent. The work assesses African regional security arrangements and provides new policy recommendations for the future.
This article presents the research results, which set out to explain the mechanisms leading to the achievement of dominance by the Russian Federation in the international security environment. In the ...research process, the systemic approach was applied. Analysis and criticism of the literature, non-participatory observation and case study elements were used to solve the research problems. As a result, it was determined that the theoretical basis for the Russian Federation's achievement of international dominance is the concept of new generation war. The model of the strategic influence of the Russian Federation is directed at the shaping of the security environment and includes the synchronisation of kinetic and non-kinetic measures, indirect and direct effects, the blurring of the boundaries between war and peace and the application of pressure and aggression. The Russian Federation achieves strategic dominance through asymmetry, chaos, reflexive control, and strategic deterrence. Armed forces provide a key role in asserting dominance, focused on conducting offensive activities and inflicting losses with conventional and nuclear weapons.
It is generally assumed that regional integration leads to stability and peace. This book is a systematic study of the impact of European integration on the transformation of border conflicts. It ...provides a theoretical framework centred on four 'pathways' of impact and applies them to five cases of border conflicts: Cyprus, Ireland, Greece/Turkey, Israel/Palestine and various conflicts on Russia's border with the EU. The contributors suggest that integration and association provide the EU with potentially powerful means to influence border conflicts, but that the EU must constantly re-adjust its policies depending on the dynamics of each conflict. Their findings reveal the conditions upon which the impact of integration rests and challenge the widespread notion that integration is necessarily good for peace. This book will appeal to scholars and students of international relations, European politics, and security studies studying European integration and conflict analysis.
Understanding deterrence and dissuasion in cyberspace is often difficult because our minds are captured by Cold War images of massive retaliation to a nuclear attack by nuclear means. The analogy to ...nuclear deterrence is misleading, however, because many aspects of cyber behavior are more like other behaviors, such as crime, that states try (imperfectly) to deter. Preventing harm in cyberspace involves four complex mechanisms: threats of punishment, denial, entanglement, and norms. Even when punishment is used, deterrent threats need not be limited to cyber responses, and they may address general behavior as well as specific acts. Cyber threats are plentiful, often ambiguous, and difficult to attribute. Problems of attribution are said to limit deterrence and dissuasion in the cyber domain, but three of the major means—denial by defense, entanglement, and normative taboos—are not strongly hindered by the attribution problem. The effectiveness of different mechanisms depends on context, and the question of whether deterrence works in cyberspace depends on “who and what.” Not all cyberattacks are of equal importance; not all can be deterred; and not all rise to the level of significant national security threats. The lesson for policymakers is to focus on the most important attacks and to understand the context in which such attacks may occur and the full range of mechanisms available to prevent them.