Term 1, Week 2

advertisement
PLEASE NOTE this is a 2013 reading list—the precise content may change in future years.
Term 1, Week 2
WHAT’S NEW ABOUT NEW SECURITY CHALLENGES?
Study Questions:

What is security?

What explains the development of calls to broaden and deepen the security agenda at the
end of 20th century?

How ‘new’ are New Security Challenges?
Essential Reading

Booth, K. (1991) ’Security and Emancipation’, Review of International Studies 17(4) pp.313327.

Smith, S., ‘The contested concept of security’ in Booth (ed.), Critical Security Studies (Lynne
Rienner, 2005).

Wæver, O. (1995) ‘Securitization and desecuritization’, in R.D. Lipschutz (ed.), On Security
(Columbia UP), pp. 46-86. (E-Book)

Campbell, D. (1998) Writing Security. United States Foreign Policy and the Politics of
Identity (University of Minnesota Press), Introduction and chapter 3. (Because of copyright
only one chapter can be scanned - please go to the library for chapter 3)
General Overviews

Baldwin, D. ‘Review Article: Security Studies and the End of the Cold War’, World Politics, 48
(1995), 117-41.

Baylis, J., ‘International and Global Security in the Post-Cold War Era’, in Baylis, J. & Smith, S.
(eds), The Globalization of World Politics (OUP, 3rd ed, 2004).

Brincat, S., Lima, L. and Nunes, J. (eds) Critical Theory in International Relations and Security
Studies: Interviews and Reflections (Routledge, 2012).

Buzan, B., People, States and Fear, 2nd ed. (Lynne Rienner, 1991).

Buzan, B. and L. Hansen (2009) The Evolution of International Security Studies (Cambridge:
Cambridge University Press) chs.6-7.

Collins, A. (ed.) (2010) Contemporary Security Studies (Oxford: Oxford University Press)
Second Edition. Chs 1-10.

Fierke, K. Critical Approaches to International Security (Polity, 2007) chs.3,4,5,7,9.

Haftendorn, H., ‘The Security Puzzle’, International Studies Quarterly, 35 (1991), 3-17.

Kolodziej, E., Security and International Relations (Cambridge UP, 2005). Chapter 1.

Liotta, P. H., ‘Through the Looking Glass: Creeping Vulnerabilities and the Reordering of
Security’, Security Dialogue 36:1 (2005), pp.49-70.

Matthews, J. T. (1989) ‘Redefining Security’, Foreign Affairs, 68(2) pp.162-77.

McSweeney, B., Security, Identity and Interests (Cambridge UP, 1999), esp. introduction,
chapter 1.

Peoples, C. and N Vaughan-Williams (2010) Critical Security Studies: An
Introduction (London: Routledge) chs 1-5

Rothschild, E., ‘What is security?’ Daedalus, 124:3 (1995), 53-99.

Sheehan, M. (2005) International Security: An Analytical Survey (Lynne Rienner) chs.1-4.

Smith, M. (2010) International Security: Politics, Policy, Prospects (Palgrave Macmillan) chs13.

Smith, S., ‘The Increasing Insecurity of Security Studies’, Contemporary Security Policy, 20:3
(1999), 72-101.

Snyder, C. (ed.) Contemporary Security and Strategy (Palgrave Macmillan, 2008) chs. 1-4.

Tickner, J.A., ‘Re-visioning security’ in K. Booth & S. Smith (eds), International Relations
Theory Today (Polity Press, 1995), pp. 175-97.

Ullman, R. H., ‘Redefining Security’, International Security, 8:1 (1983), 129-53.

Williams, Paul (ed.) Security Studies: An Introduction (Routledge, 2008) chs 1-9.
Human Security

Axworthy, L. ‘Human Security and Global Governance: Putting People First’, Global
Governance, 7:1 (2001), 19-23.

Bellamy, A.J. & M. McDonald, ‘ “The Utility of Human Security”: Which Humans? What
Security?’, Security Dialogue, 33:3 (2002). And response by Tow & Thomas.

Bilgin, P. ‘Individual and Societal Dimensions of Security’, International Studies Review, Vol. 5
(2003), 202-22.

Chandler, D. (2008) ‘Human Security: The dog that didn’t bark’, Security Dialogue 39(4),
pp.427-38. Plus the following articles by Ambrosetti, Owen and Wibben.

Christie, R. (2010) ‘Critical Voices and Human Security’, Security Dialogue 41(2), pp.169-90.

Final Report of The Commission on Human Security (New York,
2003). http://www.humansecurity-chs.org/

King, G. & C.J.L. Murray (2001-02) ‘Rethinking Human Security’, Political Science Quarterly,
116(4), pp.585-610.

McDonald, M. ‘Human Security and the Construction of Security’, Global Society, 16:3 (2002),
277-95.

Newman, E. (2010) ‘Critical human security studies’, Review of International Studies 36(1),
pp.77-94.

Owen, T. (ed.), Special Section on Human Security, Security Dialogue, 35:3 (2004), 345-87.

Paris, R. (2001) ‘Human Security: Paradigm shift or hot air?’, International Security, 26(2), 87102.

Security Dialogue (2004) Special Symposium on Human Security?’, 35(3), 345-87.

Thomas, N. & W.T. Tow, ‘The Utility of Human Security: Sovereignty and Humanitarian
Intervention’, Security Dialogue, 33:2 (2002), 177-92.

UNDP, Human Development Report, 1994 (Oxford UP, 1994).
Constructivist Security

Booth, K., ‘Cold Wars of the Mind’ in Booth, K. (ed.), Statecraft and Security (CUP, 1998),
pp.29-55.

Buzan, B. et al., Security: A New Framework for Analysis (Lynne Rienner, 1998) chs 1, 2, 8 & 9.

Ciuta, Felix, ‘Narratives of Security: Strategy and Identity in the European Context’, in
Richard Mole (ed.) Discursive Constructions of Identity in European Politics (Palgrave
Macmillan, 2007) ch.10.

Ciuta, F. (2009) ‘Security and the problem of context: a hermeneutical critique of
securitisation theory’, Review of International Studies 35, pp.301-26.

Desch, M.C., ‘Culture Clash: Assessing the Importance of Ideas in Security
Studies’, International Security, 23:1 (1998), 141-70.

Farrell, T., ‘Constructivist Security Studies’, International Studies Review, 4:1 (2002), pp. 4972.

Hopf, T., ‘The Promise of Constructivism in International Relations Theory’, International
Security, 23:1 (1998), pp.171-200.

Katzenstein, P. (ed.), The Culture of National Security (Columbia UP, 1996).

McDonald, M. (2008) ‘Securitization and the Construction of Security’, European Journal of
International Relations14(4), pp.563-87.

McSweeney, B., Security, Identity and Interests: A Sociology of International Relations (CUP,
1999), chs 1 & 5-9.

Reus-Smit, C. ‘Constructivism’ in Scott Burchill et al., Theories of International
Relations (Palgrave, 2nd edn, 2001), pp.209-230.

Wendt, A., ‘Anarchy is What States Make of It: The social construction of power
politics’, International Organization, 46:2 (1992), pp.391-425.
Critical Security Studies

Bilgin, P. ‘Critical Theory’, in Paul Williams (ed.) Security Studies: An Introduction (Routledge,
2008)

Booth, K., (ed.) Critical Security Studies and World Politics (Lynne Rienner, 2005).

Booth, K. (2007) Theory of World Security (Cambridge: CUP).

Krause, K., ‘Critical Theory and Security Studies’, Cooperation and Conflict, 33:3 (1998),
pp.298-333.

Krause, K. & M.C. Williams (eds), Critical Security Studies: Concepts and Cases (UCL Press,
1997), esp. preface & chs 2, 4 & 6.

Nunes, J.,'Reclaiming the Political: Emancipation and Critique in Security Studies', Security
Dialogue, 43:4 (2012), pp. 345-361.

Steans, J., Gender and International Relations (Cambridge UP, 1998), ch. on security.

Wyn Jones, R., Security, Strategy and Critical Theory (Lynne Rienner, 1999).

Wyn Jones, R., “Message in a Bottle’? Theory and Praxis in Critical Security
Studies’, Contemporary Security Policy, 16:3 (1995), pp.299-319.
Post-structural approaches to security:

Bigo, D. ‘International Political Sociology’, in P. Williams (Ed.), Security Studies: An
Introduction, (Routledge, 2008), pp. 116-128.

Bigo, D., S. Carrera, E. Guild, R.B.J. Walker, ‘The Changing Landscape of European Liberty and
Security: Mid-Term Report on the Results of the CHALLENGE Project’, available
at http://www.libertysecurity.org

Campbell, D., Writing Security: United States Foreign Policy and the Politics of
Identity (Manchester University Press, 1998) Ch.3, 4.

Campbell, D., National Deconstruction: Violence, Identity and Justice in Bosnia (Uni
Minnesota Press, 1998).

Der Derian, J., ‘The Value of Security: Hobbes, Marx, Nietzsche and Baudrillard’, in Campbell,
D. & Dillon, M. (eds),The Political Subject of Violence (MUP, 1993), pp.94-113.

Der Derian, J., Virtuous War: Mapping the Military-Industrial-Media-Entertainment
Network (Westview, 2001), see especially pp.xi-xxii.

Dillon, M., The Politics of Security: Towards a Political Philosophy of Continental
Thought, (1996).

Edkins, J., 'Security, Cosmology, Copenhagen', Contemporary Politics, September 2003 (vol 9,
no 4): 361-370.

Edkins, J., ‘After the Subject of International Security’, in A. Finlayson and J. Valentine
(Eds.), Politics and Poststructuralism (Edinburgh: Edinburgh University Press, 2002), pp.68-80.

Hansen, L., ‘A Case for Seduction? Evaluating the Poststructuralist Conceptualization of
Security’, Cooperation and Conflict, 32:4 (1997), 369-98.

Klein, B. Strategic Studies and World Order (Cambridge UP, 1994).

Peterson V. S., ‘Security and Sovereign States’ in V. S. Peterson (Ed) Gendered States:
Feminist (Re)Visions of International Relations Theory, (Boulder: Lynne Rienner, 1992)

Peoples., C. and N.Vaughan-Williams Critical Security Studies: An Introduction (Routledge,
2010) (Chapter 4)

Shapiro, Michael J. Violent Cartographies, (1997), especially chapters 2, 3, 4.

Walker, R. B. J. ‘The Subject of Security’, in K. Krause and M. C. Williams (Eds) Critical Security
Studies: Concepts and Cases (London and New York: Routledge, 1997), pp. 61-82.

Walker, R. B. J. et al Special Issue of Security Dialogue, 37(1), (March 2006).

See also essays available on the web-pages of the EU funded CHALLENGE
project: http://www.libertysecurity.org

Williams, M. C. ‘Identity and the Politics of Security’, European Journal of International
Relations 4(2) (1998), pp. 204-225.
Download