Sie sind auf Seite 1von 14

Contemporary

Security Studies
lrri nr' ” 111'M1iiw , fm irw rw fr,i<w tm m w m Bw im ^m riw ^w ifa^«^iiiriw i»Trm T

SECOND EDITION

Edited by Alan Collins

OXFORD
UNIV ERSITY PRESS
OXfORD
U N IV E R S IT Y PR E S S

G re a t C la ren d o n S t r e e t , O x f o r d o x 2 6d p
O x fo r d U niversity P r e s s is a d e p a r tm e n t o f th e U n iv e rsity o f O x fo r d .

It fu rth e rs th e U n iv e r s ity ’s o b je c t i v e o f ex ce lle n c e in re se a rc h , s c h o la rs h ip ,


a n d ed u c a tio n by p u b li s h in g w o r ld w id e in

O x fo r d N ew Y ork

A u cklan d C a p e T o w n D a r e s S a la a m H o n g K o n g K arach i

Kuala L u m p u r M a d r id M e lb o u r n e M e x ic o C ity N a iro b i


N ew D elh i S h a n g h a i T a ip e i T o r o n t o

W ith offices in

A rg en tin a A ustria B r a z il C h il e C z e c h R ep u blic F r a n c e G r e e c e


G u a tem a la H u n g a ry It a ly J a p a n P o la n d P ortu gal S in g a p o r e
S o u th K orea S w itz e r la n d T h a ila n d T u rk ey U k ra in e V ie tn a m

O x fo r d is a reg iste red t r a d e m a r k o f O x fo r d U niversity Press

in th e U K a n d in c e r t a in o t h e r c o u n tr ie s

P u b lish ed in th e U n ite d S t a te s

b y O x fo r d U n iv e rsity P r e s s I n c ., N ew Y ork

© O x fo rd U n iv e rsity P r e s s 2 0 1 0

T h e m o ra l rig h ts o f t h e a u t h o r h a v e b e e n asserted
D a ta b a se rig h t O x f o r d U n iv e r s it y P ress (m a k e r)

F irst p u b lish ed 2 0 0 7

A ll rights reserv ed . N o p a r t o f th is p u b lica tio n m a y b e r e p ro d u c e d ,

sto red in a retriev a l s y s t e m , o r tr a n s m itte d , in an y fo r m o r b y a n y m e a n s ,


w ith o u t th e p r io r p e r m is s io n in w r itin g o f O x fo r d U n iv e rsity P r e ss,

o r as expressly p e r m it te d b y la w , o r u n d e r term s agreed w ith th e a p p r o p r ia te


rep ro g ra p h ics r ig h ts o r g a n iz a t io n . E n q u irie s c o n c e rn in g r e p r o d u c tio n

o u tsid e th e sc o p e o f t h e a b o v e s h o u ld b e sen t to th e R ig h ts D e p a r t m e n t,
O x fo r d U n iv e rsity P r e s s , a t th e a d d re ss a bov e

You m u st n o t c ir c u la te th is b o o k in a n y o th e r b in d in g o r c o v e r
a n d you m u st im p o s e th e s a m e c o n d itio n o n any a c q u ire r

B ritish L ib ra ry C a ta lo g u in g in P u b lic a tio n D ata

D a ta av ailab le

L ib ra ry o f G o n g re ss C a t a lo g in g in P u b lic a tio n D ata


D a ta av ailab le

T y p eset by M P S L im ite d , A M a c m illa n C o m p an y

P rin ted in Italy b y L . E . G . 0 S .p .A

IS B N 9 7 8 -0 -1 9 -9 5 4 8 8 5 -9

10 9 8 7 6 5 4 3 2
Preface

The genesis o f the first edition was the need to provide a wide coverage o f a discipline that
had, and is still, undergoing significant changes— changes not only in what Security
Studies was concerned with, but also in what it means to be secure and how something
actually becomes a security issue. The dynamic nature of this field o f enquiry has ensured
that since the first edition appeared m ore topics have emerged on the security agenda and
new approaches to studying security have evolved.
T he second edition maintains the structure o f the first edition: the Approaches section
is followed by the Deepening and Broadening of the subject before we finish by looking
at a range o f Traditional and Non-Traditional security issues. The second edition is,
though, significantly larger than the first; in all, seven chapters have been added. The sec­
tion to benefit the most from this enlargement is the first. Rather than explaining the
traditional approach to studying security in one chapter, this has now been divided into
two (‘Realism’ and ‘Liberalism’). The book thus provides a more detailed explanation of
these two traditional approaches, enabling a greater appreciation o f their breadth. In
addition, another two chapters have been added to this section: ‘Social Constructivism’
and ‘Historical Materialism’. All the other approaches from the first edition remain. The
chapters have been updated, with ‘Critical Security Studies’ and ‘Gender and Security’ in
particular receiving significant adjustments. In all, the Approaches section boasts nine
chapters, an increase of three chapters from the first edition.
T he second section embraces the Deepening and Broadening o f what Security Studies
examines and here there are two changes to the first edition. First, the ‘Military Security’
chapter has a new author and thus appears as an entirely new chapter from the first
edition. Secondly, the section has an additional chapter, ‘Globalization, Development,
and Security’. The other chapters have been updated to reflect changes in the world; for
example, the ‘Economic Security’ chapter has a new case study on the current global
recession.
The final section on Traditional and Non-Traditional security has two new chapters:
‘Humanitarian Intervention’ and ‘Energy Security’. It maintains the same coverage as the
first edition on the other security issues, but the chapter on HIV/AIDS has been broad­
ened to encompass other diseases and is retitled ‘Health’, while the chapter on children
and war is more narrowly focused on the issue o f‘Child Soldiers’.
'

Introduction: What is Security


Studies?
A L A N C O L L IN S

^ Chapter Contents

• Introduction

• Definition of security
• Structure

• Conclusion
2 Alan Collins

Introduction
Welcome to Security Studies: the sub-discipline of (Sheehan 2005:1). It is the survival o f agents, which
International Relations. It is the study o f security for much of the discipline has meant sovereign states,
that lies at the heart of International Relations. It was that has become accepted as the dominant explana­
the carnage o f the First World War, and the desire to tory tool for understanding their behaviour. Security
avoid its horrors again, that gave birth to the discipline is a matter of high politics; central to government
of International Relations in 1919 at Aberystwyth, debates and pivotal to the priorities they establish.
United Kingdom. This concern with the origins of Quite simply, ‘no other concept in international rela­
war and its conduct enabled International Relations tions packs the metaphysical punch, nor-commands
to ‘distinguish itself from related disciplines such as the disciplinary power o f “security” ’ (Der Derian
history, economics, geography, and international law’ 1995:24-5).

Definition of security
Welcome, then, to a subject of great importance With the Cold W ar over, Security Studies has
and, since you are about to embark upon the study re-emerged, and core assumptions about what is
o f this subject, no doubt you would like to start with to be secured, and how, have come to occupy our
a definition o f security. Or, what it means to be thoughts. Traditionally the state has been the
secure? You will see in Key Quotes 1.1 that many thing to be secured, what is known as the referent
scholars have done so. The good news is that a con­ object, and it has sought security through m ili­
sensus has emerged on what security studies tary might. In the chapters that follow you will
entails— it is to do with threats to survival— and the find alternative approaches to security; approaches
even better news is that hidden within that simple that offer different referent objects, different
definition lies the complexity that you are about to means of achieving security, and that indicate
delve into. What is most striking about the defini­ that past practice, far from enhancing security,
tions in Key Quotes 1.1 is that, while war and the has been the cause o f insecurity. You are, then,
threat to use force is part of the security equation, it about to study a subject that is undergoing great
is not exclusively so. The absence of threats is suffi­ change as it questions its past assumptions, deep­
ciently far-reaching for Security Studies to encom­ ens its understanding o f what should be secured,
pass dangers that range from pandemics, such as and broadens its rem it to encompass a diverse
HIV/AIDS,and environmental degradation through range o f threats and dangers. O f course, this
to the m ore readily associated security concerns of broadening o f the su bject matter creates a blur­
direct violence, such as terrorism and inter-state ring in the distinction between Security Studies
armed conflict. The latter, which so dominated the and the study o f International Relations m ore
discipline that during the Cold War it became syn­ generally. In this sense the broadening o f Security
onymous with SecurityStudies.isactuallyasub-field Studies mirrors the wider blurring between
of Security Studies and is known as Strategic Studies. International R elations and Political Science. The
Oxford University Press publishes a textbook that is process o f globalization has led to internal issues
concerned with Strategic Studies: it is called Strategy becoming externalized and external issues inter­
in the Contem porary World. nalized. The role o f dom estic agents and policy
Introduction: W hat is Security Studies 3

concerns appear prominently on global agendas, nature of the social sciences. These disciplines are
whether it is the future political structure o f Iraq sub-disciplines precisely because they overlap
or deforestation in the Amazon. This blurring o f and have ‘something to say’ about the same top­
the dem arcation between International Relations, ics. Instead o f looking for different subject m at­
Political Science, and Security Studies can be seen ters, it is better to think about different approaches.
in the breadth o f topics covered in this book and Despite the contested nature o f security, you
the centrality o f security in theories o f interna­ know that ultimately we are interested in how ref­
tional relations (for more on this see Chapter 27). erent objects are threatened and what they can do
This is to be welcomed. I know it can appear co n ­ to survive. With that thought in mind, examining
fusing and it would be much easier to categorize this diverse range o f topics might seem rather less
topics neatly, but this is to misunderstand the daunting.

KEY Q U O TE S 1.1

Definitions of security 'Security-insecurity is defined in relation to vulnerabili­


ties— both internal and external— that threaten or have
'Security itself is a relative freedom from war, coupled with the potential to bring down or weaken state structures,
a relatively high expectation that defeat will not be a conse­ both territorial and institutional, and governing regimes’
quence o f any war that should occur.’
Ayoob(1995:9; emphasis in original).
B e lla m y ( 1 9 8 1 : 1 0 2 ) .

'Emancipation is the freeing o f people (as individuals and


'A nation is secure to the extent to which it is not in danger of
groups) from the physical and hum an constraints which
having to sacrifice core values if it wishes to avoid war, and is
stop them carrying out w hat they would freely choose to
able, if challenged, to maintain them by victory in such a wad
d o .,. Security and emanci pation are two sides of the same
Walter Lippman, cited in Buzan (1991a: 16). coin. Emancipation, not power or order, produces true
security. Emancipation, theoretically, is security.'
'National security may be defined as the ability to with­
Booth (1991:319),
stand aggression from abroad.'

Luciani (1989:151). 'If people, be they governm ent ministers or private indi­
viduals, perceive an issue to threaten their lives in some
'A threat to national security is an action or sequence of way and respond politically to this, then that issue should
events th a t (1) threatens drastically and over a relatively be deemed to be a security issue.'
brief span o f tim e to degrade the quality o f life for the
Hough (2004:9) (emphasis in original).
inhabitants o f a state, or (2) threatens significantly to nar­
row th e range o f policy choices available to th e govern­
'Security ... implies both coercive means to check an
ment o f a state or to private, nongovernmental entities
aggressor and all .manner o f persuasion, bolstered by the
(persons, groups, corporations) within the state.'
prospect of mutually shared benefits, tofransform hostility
Ullman (1983:133). into cooperation.'

Kolodziej (2005:25).
'Security, in any objective sense, measures th e absence
of threats to acquired values, in a subjective sense, the
absence o f threats to acquired values, in a subjective sense,
the absence o f fear that such values will be attacked.

Wolfers (1962:150).
4 Alan Collins

Structure
The book is not designed to be read from start the differences between American and European
(Chapter 1) to finish (Chapter 27) because that is approaches to theorizing about security, as it traces
not the way to read an academic text. If this seems past, present, and possible future trends in how
a peculiar thing for me to write, then let me explain. security is studied by today’s scholars. For those
You are not reading a novel in which the aim is to new to Security Studies and/or International
keep you in suspense until the final pages where you Relations, it will be a testing read, but stick with it
discover who committed the crim e or whether the because it will be a chapter that you will want to
lovers live happily ever after. You want to know the read m ore than once as you increase your knowl­
questions and the answersas soon as possible, and edge o f this subject; in each read you will discover
then, because, as important as the answers are, they som ething new. Once Chapters 1 and 27 have been
are not the most important thing, you should want read, the book becomes a pick ‘n’ m ix, so if you
to know why these are the answers and how they want to start with weapons o f mass destruction
were reached. Think o f it as a complicated maths (C hapter 19) or terrorism (Chapter 20) then go
question in which the m athematician has scribbled right ahead. That is not to say that the structure has
furiously on the blackboard (or more likely today no m eaning, and I would strongly advise that you
the whiteboard) a series of, to a layperson, unintel­ at least begin with the approaches section and espe­
ligible equations that eventually lead to an answer. It cially Chapters 2 and 3 in order to appreciate the
is the bit in between the question and the answer prim ary role that states and power have had in the
(the bit in between is those impenetrable equations) study o f security. By beginning w ith the approaches
that reveals why the answer was found and found in section you will be able to appreciate just how
that particular way. It is like this with your studies hugely important different approaches are in estab­
too. You should want to know, and your tutor will lishing what constitutes security; a point that will
certainly want to know, why you believe in the be evident once you have read Chapter 27,
answers you have, found: to know your thought T h e book is divided into three sections: differing
processes. Knowing why you think about a subject approaches to the study of security; the deepening
the way that you do, so that these thought processes and broadening o f security; and, finally, a range ot
can be convincingly articulated in oral and written traditional and non-traditional issues that have
form , is what reading for a degree is all about. emerged on the security agenda. T h e authors come
Therefore in this book, when reading the chap­ from a range o f countries, and their examples are
ters, it is perfectly fine to read the introduction and global in scope. Nevertheless, the field o f Security
then the conclusion, but you then have to read the Studies, as with International Relations more
bits in between to know why the answers found in generally, is dominated by W estern thought and
the conclusion were reached. To understand the approaches. One of the refreshing changes in
author’s thought processes will help you develop post-C old War Security Studies is that the security
yours. So, having read w hat this book contains, problem s o f the developing world are no longer
which you will find in th is chapter, then read the either ignored or seen through the prism o f the
conclusion. Chapter 27 w ill present you with the E ast-W est conflict. We are therefore examining
state o f Security Studies, and the theorizing that these security problems and, perhaps, in doing so,
has taken place in the discipline. It provides you we will witness the emergence o f specifically African
with the context o f why we, students and tutors or Asian approaches to the study o f security that
(scholars o f the subject), think about the subject will force us to rethink core assumptions and gain
the way that we do. In particular, the chapter reveals a greater understanding of the Security Studies field.
Introduction: What is Security Studies 5

In the meantime the field, while global in scope, the search for security because they have under­
remains dominated by Western thought. pinned much of our thinking during the previous
century; they remain hugely influential, and just
because they are traditional does not mean they
have been replaced by more recent thinking. New
Approaches thinking about security has emerged, especially in
In the book’s first substantive chapter, Chapter 2, the post-Cold War period, and such approaches are
Charles Glaser introduces the first o f the two domi­ explained and examined in the other chapters in the
nant explanations o f why and how states have Approaches section. You should think o f these new
sought security: realism. Realism is not one approaches as challenging the dominance of the
approach but rather a set o f approaches, and in this traditional insights offered by realism and liberal­
chapter you will be introduced to the divisions ism. It may be that you find the traditional explana­
within this explanation o f why states behave the way tions o f how security can be conceived of and
they do as they seek security in an anarchic interna­ achieved convincing. This is fine so long as you
tional environment. One such division concerns reach that conclusion with an understanding of the
debates within structural realism, but there is also other approaches— in other words, that you find an
a more fundamental division within realism: struc­ approach to understanding security convincing
tural realism versus motivational realism. Utilizing based not on ignorance of other approaches but
the emergence of China as a great power, this chap­ with a full understanding of them.
ter explains the key concepts realism brings to the The first alternative approach is relatively new;
study o f security as well as the breadth o f approaches first coined in 1989, social constructivism has rap­
that fall within its framework. The second domi­ idly emerged as providing a third explanation for
nant explanation of why and how states have sought state behaviour. As with realism and liberalism, it is
security is the focus for Chapter 3. Here, Patrick not one approach, and in Chapter 4 Christine Agius
Morgan will introduce you to liberalism. Whereas introduces us to two broad camps: conventional
realism seeks an explanation for state behaviour in and critical constructivism. For constructivists
the international system, liberalism looks to the identities matter in explaining the search for secu­
state as the unit o f analysis and places importance rity, and identities are constituted through interac­
on domestic actors’ power and preferences and the tion. Since state identities are malleable and can
nature of their political systems. Since behaviour is change as a consequence of interaction, this means
a product of domestic circumstances for liberalists, we create the world in which we live. Conceiving of
states are not alike, and this means that international relations as a product of how we think o f them— as
relations are determined by the choices people opposed to them being something independent
make; the world can operate in a realist manner, but from us— enables us to think o f threats as socially
for liberalists it does not have to. The recognition constructed. This can, as Chapter 4 reveals, provide
among state leaders that they have common, shared, important insights into topics such as NATO
values means that they can establish agreements on enlargement and the War on Terror.
a range of issues from trade to human rights that T he next alternative approach, and one that
will benefit them all and thus create a secure shares with realism and liberalism a long tradition,
environment. Liberalism, while recognizing that is peace studies, although as a formal field o f study
cooperation can be difficult, is nevertheless an its origins are found in the p o st-1945 period. Here
optimistic approach that posits lasting security as the approach to security is distinctively broad based,
a possibility. both in the nature of threats that the field covers and
We can think o f these opening chapters as also in its approaches to finding solutions. Thus,
covering traditional approaches to understanding although initially concerned with the arrival of
6 Alan Collins

nuclear weapons, peace studies, long before the reality is that in many ways (rape, prostitution,
post-Cold War era, were noting the security impli­ breeders) women are victims and their plight has
cations of environmental degradation and poverty. remained a silence in the study of security.
With its wide agenda, it is not perhaps surprising to One o f the new ‘buzz words’ in the security litera­
learn that academics working in peace studies come ture is hum an security. It shares much in common
not just from politics and international relations with critical approaches to security, the most nota­
but other disciplines in the social sciences, notably ble being its critique o f the state-centrism o f the tra­
anthropology and sociology, as well as the natural ditional approach. As the name suggests, thè
sciences, such as physics and mathematics; it is referents for security are humans, but, as Pauline
a truly interdisciplinary field. In Chapter 5 a leading Kerr explains in Chapter 8, while this change o f ref­
authority, Paul Rogers, provides a historical account erent object reveals the close connection between
of how peace studies developed, highlighting its development and security, it also brings many chal­
characteristics and revealing its continued relevancy lenges to maintaining analytical rigour. Dividing
to contemporary security studies. human-security proponents into narrow and broad
The following chapter captures the reflections schools makes it possible for you to appreciate the
that took place by some scholars studying security vast arrays o f threats that exist to humans and their
in the immediate post-Cold War period. Labelled livelihoods and thus enables you to make your own
Critical Security Studies (CSS), these reflections judgement about what constitutes security. The
pre-date the end of the Cold War, but they have chapter also compares the state-centrism o f realism
flourished since the removal of the nuclear sword of with human security to reveal both o f their strengths
Damocles that hung over the study o f security. and weaknesses.
David Mutimer provides ah explanation o f the dif­ The penultimate chapter in the Approaches
ferent approaches that have developed since CSS section, Chapter 9, examines a process known as
first arrived on the scene in 1994. For those new to ‘securitization’ that was introduced to the literature
critical thinking it is a demanding read, but thor­ by scholars working at the Conflict and Peace
oughly worthwhile, because, amongst many of the Research Institute (COPRI) in Copenhagen. Known
things on which it will give you pause to ponder, it collectively as the Copenhagen School, these schol­
unashamedly forces you to think through your ars place primary importance on determining how
assumptions, and it reconnects security with its an issue becomes a security issue, by how it is articu­
normative origins. lated. That is, we think of something as a security
A criticism aimed not just at security studies but issue because the elite, such as political leaders, have
at the wider field of international relations is the convinced us that it represents a threat to our very
failure to appreciate the important insights that survival. They are, therefore, interested in th e‘speech
gender provides. Caroline Kennedy-Pipe reveals acts’ that the elite use in order to convince an audi­
two elements that gender can provide in our under­ ence that, in order to counter a threat, they require
standing of security: a practical appreciation of the emergency powers. It is then a subjective approach
role women have been ascribed in the security field to determining what constitutes security. A threat
and a discursive element that reveals the implicit exists because an audience has been convinced it
link between militarism and masculinity. The latter exists by the elite and it has granted the elite the
highlights how the notions o f honour, nobleness, authority to use emergency powers to counter the
and valour are associated with masculinity and war, threat. The threat therefore is not something that
implicitly therefore leaving femininity devoid of simply exists; it has to be articulated as a threat for it
such positive attributes. The former notes how to become a matter o f security. Ralf Emmers explains
women, if they are mentioned at all, are portrayed this process, notes limitations with the concept of
in a secondary, supporting role to men, whereas the securitization, and uses case studies ranging from
Introduction: What is Security Studies 7

Australian reaction to undocumented migration to and so on; but, while these can be explained by tra­
the invasion of Iraq in 2003. ditional approaches, this chapter reveals that the
The final chapter in the Approaches section dis­ alternative approaches have something to say about
cusses historical materialism; written by Eric these issues as well, and, in so doing, shed new light
Herring, it provides both an explanation of what on the subjects. Military security used to be the sine
historical materialism is (it is a version of Marxism) qua non o f security studies, and, while it no longer
and how it relates to the other approaches in this dominates the discipline as it once did, it remains
book’s first section. The exploitative nature o f capi­ very much part o f the security-agenda and remains
talism and the insecurities this generates form the an indispensable component. What has changed is
focal point for.this approach to understanding what what constitutes military security, and this chapter
constitutes security, and this is explained with refer­ reveals the breadth and depth of the subject in
ence to the arms trade industry. a concise and accessible fashion.
Turning our attention to the security concerns
within states enables us to appreciate that life in the
Deepening and broadening developed world is far from indicative o f that lived
The middle section o f the book examines the by most o f the planet’s inhabitants. The majority o f
deepening and broadening that has taken place in people living in the developing world face a vast
Security Studies. As will have become evident from range o f insecurities, from half a million people
the Approaches section, the theoretical approach dying each year from the use o f light weapons to
you take towards examining security will determine 40,000 dying each day from hunger. There is, as
the type o f subject matter that you consider Richard Jackson writes in Chapter 12 on regime
constitutes security. This part o f the book contains security, ‘a profound disjuncture between the kinds
six sectors of security; these are the recognizable of security enjoyed by a small group o f developed
sectors that you will find in the Security Studies lit­ nations and the kind o f security environment
erature. The exception is regime security, which inhabited by the majority of the world’s population’.
I have included instead o f political security, first In this chapter you will have the opportunity to
because political security has a tendency to become understand the underlying causes o f the developing
a miscellaneous section in which security issues that world’s inherent insecurity and why it is that, far
cannot fit in the other sectors end up, and secondly from being the providers of security, governing
because, while political security is concerned with regimes becom e the main source o f their peoples’
external threats (concern with recognition), its insecurity. It is a bleak picture that is portrayed, but
greater utility lies in internal threats (concern with after reading the chapter you will appreciate the
legitimacy) to the regime. Labelling the chapter complexities that make bringing security to these
‘regime’ therefore clarifies what the referent object m illions o f people both urgent and yet extremely
is and also highlights the internal dimension of this difficult. T he notion o f an insecurity dilemma cap­
security sector. Whether these sectors do constitute tures not only the spiralling nature o f the violence
security is contentious, so, as with all your reading, but also how problematic finding a solution is.
adopt a critical, enquiring m ind, and see if you are The broadening o f security so that it means more
persuaded. than a preoccupation with the state and m ilitary
We begin with military security because it is the defence should have been appreciated by now. In
hom e o f our traditional understanding o f what Chapter 13 on societal security, an alternative to the
constitutes security; the use or threat to use force. In state, and indeed the individual, is posited. In this
Chapter 11 Michael Sheehan provides a clear expo­ instance you will be introduced to the notion o f
sition of the issues that are the staple diet o f military a collective o f people becoming the thing to be
security: war, deterrence, alliances, arms control, secured. In recent times the term ‘ethnic’ has becom e
8 Alan Collins

a popular label for describing conflict between to eight types, or typologies, o f economic security,
groups within states. In this chapter Paul Roe intro­ including accessing markets and finance; transborder
duces you to a means o f examining the dynamics economic cooperation; and the ideologies that
behind those ethnic conflicts where identity lies at underpin economic activity. You will also be able to
the conflict’s core. Importantly he does so by focus­ note the role institutions such as the International
ing on non-military issues that can give rise to inse­ Monetary Fund and the World Trade Organization
curity and thereby shows how ambiguity in such play, as well as appreciate the economic-security
seemingly non-threatening issues, such as educa­ issues raised by such crises as the East Asian financial
tion,can indeed become matters of great concern. If crisis of 1997-8.
you have an interest in the nexus between security The final chapter o f the deepening and broaden­
and identity, this is a must-read chapter. ing part of the book, Chapter 16, continues the
Although it pre-dates the end of the Cold War it economy theme, but here the focus is on individuals
was in the 1990s, and especially because of concern in the developing world and specifically on the
over ozone depletion and global warming, that range o f insecurities presented by the globalized
environmental change began to be thought o f as world. With the focus on individuals, it will not be
a ‘new’ security threat. In Chapter 14, while you will a surprise to discover that human security is the
be exposed to the vast array of environmental deg­ approach adopted as Nana Poku reveals the devel­
radation that is occurring in today’s world, the ques­ opment problems o f Africa and the threats that
tion of interest is what makes environmental change blight people’s lives on that continent.
a matter of security. Jon Barnett provides an expla­
nation of why the environment emerged on the
security agenda before providing six interpretations Traditional and
of environmental security. You will, therefore, have
the opportunity to consider whether the environ­
non-traditional
ment really is a security issue and whether labelling The final section o f the book highlights a series o f
it as a matter o f security helps or hinders attempts to traditional and non-traditional security issues that
reverse environmental degradation. For those with have emerged on the Security Studies agenda. The
a normative interest in studying international secu­ section begins with traditional security concerns
rity, this is an important chapter to read. and then moves to the non-traditional issues that
The final two chapters in this section are concerned •have emerged as the subject area has expanded. We
with economics; in the first the referent object is the begin by addressing the traditional security concern
state and in the second it is the individual. In Chapter o f the threat and use o f force. This is examined by
15 a state’s economy and its access to resources are looking at how Western strategy has evolved
presented as essential components in determining its post-Cold War away from deterrence to compel-
ability to protect itself in an anarchical self-help envi­ lence and in particular to the use o f coercive diplo­
ronment. This, though, is only part of the equation macy. This captures the logic behind Western, and
and actually tells us little o f what economic security in particular US, strategic thinking.
is. In this chapter Christopher Dent uses the term The Bush administration’s willingness to talk o f
economics-security nexus to describe the above. ‘pre-emptive’ use o f force, and indeed to implement
The chapter will use a specific definition o f economic it, has revealed a significant change in strategic
security to highlight that what is being secured is not thinking in the West. It is no longer simply enough
just the economy but also its ability to provide pros­ to deter opponents from taking action; it is now
perity in the future. In this sense economic security necessary to persuade, coerce, and, on occasion,
concerns promoting activities that enhance a state’s, force them to change their behaviour. This, as Peter
or region’s, economic growth. You will be introduced Viggo (akobsen writes, has led to the post-Cold War
Introduction: W hat Is Security Studies 9

era witnessing the pursuit o f coercive diplomacy. weapons, how easy are they to use, and what has
Coercive diplomacy is the threat, and if necessary been their impact on international relations? These
the limited use o f force, designed to make an oppo­ are the questions that James Wirtz addresses in
nent comply with the coercer’s wishes. It is action Chapter 19.
short of brutal force and thus an attempt to achieve Terrorism, perhaps even more than WMD, has
a political objective as cheaply as possible. It has come to occupy a top spot on the security agendas
been used to respond to acts o f aggression, halt o f states. In Chapter 20 Brenda and Jim Lutz pro­
WMD programmes, and stop terrorism. Chapter 17 vide a definition o f terrorism and explain the vari­
provides you with the criteria for what constitutes ous types (religious, ethnic, ideological) and causes
coercive diplomacy and the obstacles to its success, o f terrorism. Using a typology that sees terrorism as
and concludes that Western efforts have largely either a form of war, or crime, or disease, they are
failed. If you want to understand the strategy that -able to explain why certain countermeasures are
underpins Western, and specifically US, policy on adopted by states and their implications for civil lib­
the use of force since the end of the Cold War, this is erties. The chapter will provide you with details of
a chapter for you. terrorists ranging from the Ku Klux Klan to al-Qaeda
The role o f intelligence in determining security and reveal the incidence o f terrorism that has
concerns and outcomes has never been more prom ­ occurred throughout the world in recent times.
inent than in today’s security environment. Chapter After the end of the Cold War but prior to 9/11
18 explains the different types of intelligence agen­ the subject that came to prominence in the field of
cies that exist and how they collect information. international security concerned the use of (prima­
Stan Taylor explains the intelligence cycle so that rily Western) military force to intervene in cases of
you can appreciate what a lengthy process it is, and severe human suffering; it has not gone away, and in
more importantly how errors can occur. Covert Chapter 21 Alex Bellamy charts the arguments for
action is examined, and, with reference to the 2003 and against humanitarian intervention. The atroci­
invasion of Iraq, intelligence failure, or what might ties committed in Bosnia and the genocide of
more properly be called policy failure, is examined. Rwanda heralded the arrival o f the responsibility to
This chapter ties in closely with coercive diplomacy, protect (R2P). What R2P means, what it means for
since the threat to use force in order successfully to coercive state intervention, and what future R2P has
compel an opponent requires knowledge about his in a world where mass atrocities continue— as wit­
goals. In a world o f pre-emption, good intelligence nessed in Darfur— are the subjects the chapter
is a necessary condition for success. examines.
Since the tragic events o f 9/11, the acronym We then turn our attentions to the increasing
WMD has been catapulted into everyday Usage. demands for energy coupled to the declining pool of
Weapons o f mass destruction, and the fear that available resources; in the light o f this, it is not sur­
rogue states or terrorists will target the USA or prising that energy security has become a critical
Europe with such weapons, has become a central issue for states (and people). Chapter 22 on energy
concern for Western states. The belief that Iraq had security provides both a detailed coverage o f the
an undisclosed arsenal o f WMD provided the justi­ topic, specifically related to oil demand, and a link to
fication for the USA’s decision to remove Saddam previous chapters in the approaches and the deepen­
Hussein’s regime, and it was the nuclear programmes ing/broadening sections. You will, for example, have
of both North Korea and Iran (the former a declared an opportunity to look at what historical material­
weapons programme; the latter a potential and ism argues about the state o f energy security, and at
feared possibility) that earned them membership o f the connections that energy security has to economic
Bush’s ‘Axis of Evil’. What, though, are WMD, why and regime security, as well as thinking about energy
are they considered so different from conventional security as an issue not just for states but for human
10 Alan Collins

security as well. The United States figures promi­ Drug trafficking, along with, among others, human
nently, and reading this chapter will enable you to trafficking and money laundering across national
appreciate that energy security involves a complex frontiers, are all forms o f transnational crime, and,
nexus of geopolitical, economic, and strategic con­ as the Thai experience reveals, this non-traditional
cerns, which link together distant regions o f the security issue has risen rapidly up the national-
globe, and disparate security concerns. security agendas o f states in the post-Cold War era.
Chapter 23 examines the last of the traditional In Chapter 25 Jeanne Giraldo and Harold Trinkunas
security issues in this book: the arms trade, or what reveal the multiple ways in which transnational
Joanna Spear and Neil Cooper call the defence trade. crime impacts directly, and indirectly, on human
In this chapter they examine the reasons why states and national security. They explain why it has
procure weapon systems, ranging from the actio n - become more prevalent since the 1990srthe links
reaction model to technological determinism, between organized crim e and terrorism, and the
before providing details o f trends in defence expend­ various responses that states have taken to curb its
iture, the state o f the market, and the different operation. If you want to appreciate a ‘dark side’
types of goods and services that constitute today’s o f globalization and how transnational criminal
defence trade. activity has impacted on international security, this
In Chapter 24 we turn to our first non-traditional is a must-read chapter.
security issue, health, and here Stefan Elbe examines The examination o f what non-traditional
how diseases such as AIDS and SARS are a threat to issues constitute Security Studies today concludes
both human and national security. AIDS is a pan­ by examining the concept o f child soldiers. This is
demic; it is estimated that in 2007 thirty-three mil­ a topic that has recently gained prominence, but
lion people were living with HIV and on average it is not new; children have been agents in conflict
almost three times as many people die from for centuries. They are an undertheorized and
AIDS-related illnesses every day as died during the underutilized political agent, and in Chapter 26
terrorist attacks on 9/11. This chapter shows how Helen Brocklehurst brings to the fore their
diseases can be thought of as a security issue, ranging recruitment and role and the implications these
from peacekeeping operations spreading AIDS/HIV have for our thinking about war and security. The
to terrorists deliberately using a biological agent to legal dimension is exam ined and the difficulties
spread terror. While ill health is an exacerbating fac­ o f demobilization and reintegration are high­
tor for national security, it is in itself a direct threat lighted. Throughout the chapter provides a criti­
when individuals are the referent object. cal analysis, challenging preconceptions and
In 1999 Thailand identified the narcotics trade as revealing the com plexities the topic of child
the country’s number one threat to national security. soldiers encapsulates.

Conclusion
You are, as I am sure you appreciate having read time to be a scholar o f the discipline— and by
the above, about to embark upon a whirlwind tour scholar I mean students and tutors— because there
of a fascinating subject— a subject that has under­ is so much new and innovative thinking taking
gone, and continues to undergo, a thorough intro­ place that it is impossible for it not to open your
spection o f its core assumptions. It is a wonderful mind. Listen to the ideas contained in the chapters
Introduction: W hat is Security Studies 11
that follow and if, by the end o f it, you are more
and complex the subject is and how challenging it
confused than you are now, then it has been
is therefore to be a scholar o f security studies. The
a worthwhile enterprise. A caveat should, though,
chapter began with the question: what is Security
be added: that your confusion is not a reflection o f
Studies? It is all the above and more. Happy
ignorance but an appreciation o f how complicated reading.

V isit th e Online Resource Centre th a t accomnanipx r h ic <- i .

www.oxfordtertbooks.co.uk/orc/collins2e/ ^ ° f 'mereSting addi,i° na' ma,eria,:

Das könnte Ihnen auch gefallen