دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 2 نویسندگان: Myriam Dunn Cavelty (editor), Thierry Balzacq (editor) سری: Routledge handbooks ISBN (شابک) : 9781138338173, 1138803936 ناشر: Routledge سال نشر: 2017 تعداد صفحات: 854 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 6 مگابایت
کلمات کلیدی مربوط به کتاب راهنمای مطالعات امنیتی روتلج: مطالعات امنیتی، دفاعی، نظامی
در صورت تبدیل فایل کتاب Routledge handbook of security studies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب راهنمای مطالعات امنیتی روتلج نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این ویرایش دوم اصلاح شده و به روز شده بیش از بیست فصل جدید را شامل می شود و مجموعه گسترده ای از مقالات پیشرفته را از محققان برجسته در زمینه مطالعات امنیتی ارائه می دهد. رشته مطالعات امنیتی در طول 20 سال گذشته دستخوش تغییرات قابل توجهی شده است و اکنون یکی از پویاترین زیرشاخه های روابط بین الملل است. این ویرایش دوم به طور قابل توجهی به روز شده است تا تهدیدات امنیتی معاصر و نوظهور را با فصل هایی در مورد جنایات سازمان یافته، مهاجرت و امنیت، امنیت سایبری، امنیت انرژی، درگیری و تاب آوری سوریه و بسیاری موارد دیگر مورد بررسی قرار دهد. کتابچه راهنمای مطالعات امنیتی راتلج که شامل مقالاتی از دانشمندان معتبر و جدید است، یک مرور کلی از موضوعات کلیدی معاصر تحقیق و بحث در زمینه مطالعات امنیتی ارائه می دهد. این جلد به چهار بخش اصلی تقسیم می شود: • بخش اول: رویکردهای نظری به امنیت • بخش دوم: چالش های امنیتی • بخش سوم: امنیت (غیر) منطقه ای • بخش چهارم: حاکمیت امنیتی این نسخه جدید از کتابچه راهنمای انتشار معیار با اهمیت عمده برای تحقیقات فعلی و آینده این زمینه است. خواندن آن برای همه محققان و دانشجویان مطالعات امنیتی، مطالعات جنگ و درگیری، و روابط بینالملل ضروری خواهد بود.
This revised and updated second edition features over twenty new chapters and offers a wide-ranging collection of cutting-edge essays from leading scholars in the field of Security Studies. The field of Security Studies has undergone significant change during the past 20 years, and is now one of the most dynamic sub-disciplines within International Relations. This second edition has been significantly updated to address contemporary and emerging security threats with chapters on organised crime, migration and security, cyber-security, energy security, the Syrian conflict and resilience, amongst many others. Comprising articles by both established and up-and-coming scholars, The Routledge Handbook of Security Studies provides a comprehensive overview of the key contemporary topics of research and debate in the field of Security Studies. The volume is divided into four main parts: • Part I: Theoretical Approaches to Security • Part II: Security Challenges • Part III: Regional (In)Security • Part IV: Security Governance This new edition of the Handbook is a benchmark publication with major importance for both current research and the future of the field. It will be essential reading for all scholars and students of Security Studies, War and Conflict Studies, and International Relations.
Cover Page Routledge Handbook of Security Studies Title Copyright Contents Contributors Acknowledgements Introduction Part I: Theoretical Approaches to Security Part II: Security Challenges Part III: Regional (In)security Part IV: Security Governance Notes References PART I Theoretical Approaches to Security 1 Realism and Security Studies Defining Realism Realism’s Diversity: Theoretical Schools Realist Theories Contemporary Realist Scholarship and Security Studies Conclusion Notes References 2 Liberalism: A Theoretical and Empirical Assessment Classical Liberals: Evolutionary vs. Revolutionary Liberalism Conclusion References 3 International Political Economy and Security Liberal Theories of Markets and Interdependence Two Challenges to Liberalism Economics and War Putting Political Economy Theories to the Test Conclusion Notes References 4 The English School and International Security The English School as an Approach to International Security Studies Existing English School Literature on International Security Conclusions: Opportunities for Developing the Linkage Notes Further Reading References 5 Critical Security Studies Origins Security and Social Construction Security and Post-Marxism Security and Post-structuralism Bridging the Divides? Conclusion Note References 6 Constructivism and Securitization Studies The Theory of Securitization: The Basics What is Securitization? Securitization and the ‘Negative’ Side of Security Successful Securitization and its Consequences What Kind of Theory is Securitization Theory? Conclusion Notes References 7 Poststructuralist Approaches to Security Challenging Security Studies: Discourse, Power, Materiality Security, Sovereign Power, and Exceptionalism Governmentality and the Biopolitics of Security Unmaking Security Conclusion References 8 Debates in Feminist Security Studies Debates in Feminist Security Studies Contributions of Feminist Security Studies Theoretical Commitments of Feminist Security Studies Conclusion Notes References 9 Postcolonialism: Interrogating National Security and Drone Warfare Drone Warfare and ‘Heartbreaking Tragedies’ Rationalizing ‘Targeted’ Killings A Postcolonial Critique Conclusion Notes References 10 Human Security: Lessons Learned from Afghanistan Human Security – A State Agenda in Sheep’s Clothing? A New Framework for Analysis Practising Human Security in a Complex Space: The Case of Afghanistan Conclusion References 11 Risk and Security Risk in Security Studies: A Partial History Risk as Uncertainty: The Ambiguity of Knowing Precaution and Resilience as Risk Practices Conclusion Notes References 12 Security as Practice Understanding the Practice Turn Bourdieu in Security Studies Security Communities of Practice Relational Security Approaches The Security-as-Practice Agenda: Conclusion Notes References PART II Security Challenges 13 Terrorism and Counterterrorism The Definitional Debate The ‘New’ Terrorism Debate The ‘Root’ Causes Debate The Radicalization Debate Counterterrorism Approaches to Counterterrorism: Two Models Concluding Remarks: Glass Half Full or Half Empty? References 14 Organized Crime The Actor-orientation (1): Conspirators The Actor-orientation (2): Illegal Entrepreneurs The Actor-orientation (3): Poly-criminals The Organization of Serious Crimes: Commissioning Processes Conclusion Notes References 15 Migration and Security Strategic and Humanitarian Approaches to the Migration/Security Nexus Critical Analyses of the Migration/Security Nexus Moving Beyond the Migration/Security Nexus Conclusion Note References 16 Cyber-security The Securitization of Cyberspace Cyber Insecurities Governance Conclusion References 17 War The Origins of War The Mechanism of War The Ontogeny of War The Functions of War Conclusion References 18 Ethnic and Religious Violence The Changing Boundaries of Ethnic and Religious Narratives Contextual and Systemic Factors Consequences on Violence Patterns Dealing with Ethnic and Religious Violence Conclusion References 19 Energy Security Differing Definitions and Strategies Historical Background Key Trends and Themes in Energy Security Today Impact of Energy on International Security Challenges for the Future References 20 Resources, the Environment, and Conflict Schools of Thought The State of Research A ‘Coming Anarchy’? Notes References 21 Pandemics and Global Health Pandemics, Global Health, and ‘Health Security’: Security for Whom and From What? Common Responses to Pandemic Threats Balancing Health Security with Other Values Conclusions References PART III Regional (In)security 22 China’s Rise: Counterproductive Fearmongering Power Transition: General Aspects What Arms Race? China’s Global Economic Impact Conclusion: Power Transitions and Post-hoc Arguments Notes References 23 Indian Security Policy Post-independence Concerns The Aftermath of 1962 The Nuclear Conundrum Crossing the Nuclear Rubicon A Seismic Policy Shift The Kargil War and After Coping with Internal Conflicts Current and Future Directions Conclusion Notes References 24 Afghanistan: A State in Limbo Background Elite Fragmentation US and NATO Strategy Counter-systemic Actors The 2014 Presidential Election Conclusion and Outlook References 25 Iran Iran’s Political History The Iranian Economy Iran and International Security Conclusion Notes References 26 Intervention in Iraq: From Regime Change to de Facto Partition Detoriating Security (2005–2014) Drivers for (In)security in Three Layers Developing Security Concerns Conclusion: The Past as Prologue Notes References 27 The Syrian Crisis and International Security Context and Roots of the Conflict ‘New Wars’, Counter-insurgency, Failed States and Terrorism Securitization, Human Security Crisis and Humanitarian Intervention Conflict Resolution and Diplomacy Conclusion References 28 Israel-Palestine: An Archipelago of (In)security Historical Background Israeli (In)security Mechanisms Conclusion References 29 Analysing Drug Violence in Mexico Understanding Mexico’s Recent Violence Drug violence in Mexico: Data and Findings Analysis and Conclusion Notes References 30 Conflict in the Democratic Republic of Congo Violent Actors and their Activities Proximate Causes of Conflict Fundamental Causes of Conflict Conclusion Notes References 31 Russia’s Revival Decline: The 1990s Revival: The 2000s The 2010s: Russia in a Multipolar World Between West and East The Challenge for the West: Conclusion and Outlook References PART IV Security Governance 32 Alliances The Origins of Alliances Alliance Management – How do Alliances Work? The Military Aspect: Alliances in Practice Why do Alliances End, Why do they Survive, and How? Conclusion and Outlook Notes References 33 International Sanctions What are International Sanctions? The Debate about Sanctions’ Effectiveness Do Sanctions have to ‘Work’? What’s Next for the Study of International Sanctions Conclusion References 34 Deterrence The Golden Age of Deterrence Theory Deterrence Strategy Critiques Contemporary Deterrence and Compellence Conclusion and Promising Areas of Research References 35 Nuclear Non-proliferation Preventing Proliferation in Theory Preventing Proliferation in Practice The Evolution of Proliferation Conclusion: The Future of Non-proliferation Notes References 36 Public Diplomacy in a National Security Context Public Diplomacy Research The Origins of Public Diplomacy 9/11 as Tipping Point Conclusion Notes References 37 Statebuilding State Failure and its Reflection in Policy Discourses Statebuilding: Shortcut to the Weberian State? Reminders from History: State Formation as a Coercive and Violent Process The Local Turn, Resilience, and Hybridity as Alternative Perspectives Conclusion Note References 38 Humanitarian Intervention What is ‘Humanitarian Intervention’? When is Intervention Warranted? Who Sanctions Interventions? Duty or Discretionary Entitlement? Conclusion Note References 39 Global Security Governance Five Core Elements of Global Governance Governance Arrangements in Global Security Affairs Different Bases of Global Governance The Complexity of Contemporary Global Security Governance Conclusion Note References 40 Resilience The Resilient Subject Post-intervention ‘Organic’ versus ‘Political’ Understandings of Intervention Examples of policy shifts Conclusion Notes References 41 The Study of Crisis Management Studying Crisis: Schools of Thought The Emergence of Crises Crisis Management: Crucial Challenges for Leadership Conclusion: Crisis and Security Reconsidered Notes References 42 ‘Killer Robots’ and Preventive Arms Control The Technology The Literature in Security Studies Regulating Killer Robots: Issues of Arms Control Conclusion Notes References Index