• Table of Contents

An Introduction to Security Studies

Paul D. Williams and Matt McDonald

Download Introduction PowerPoint

Chapter 1

Realisms

Download Chapter 1 Slides

Abstract

In this chapter, students will learn about the various strands of the realist research tradition and their different approaches to security studies. Although sharing a pessimistic outlook about the continuity of inter-group strife, each realist research programme is rooted in different assumptions and provides different explanations for the causes and consequences of armed conflict. These differences are illustrated with reference to what the contemporary strands of realism anticipate will happen in international politics as China’s power continues to grow.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 2

Liberalisms

Download Chapter 2 Slides

Cornelia Navari

Abstract

In this chapter, students will learn about the debates concerning security within liberal thought. The first section outlines traditional/Kantian liberalism. The second section introduces liberal economic thought regarding peace and war—the ideas of ‘douce commerce’. The third section describes the democratic peace thesis and reviews the major discussions on the idea that liberal states do not fight wars with other liberal states. The fourth section outlines neoliberal institutionalism and its implications for thinking about security. The last section outlines how liberal thought deals with global transitions and the potential end of American hegemony.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter3

Constructivisms

Download Chapter 3 Slides

Matt McDonald

Abstract

In this chapter, students will learn about constructivist approaches to security. Constructivism has become an increasingly prominent theoretical approach to International Relations since its emergence in the 1980s. Focusing on the role of ideational factors and the social construction of world politics, it is perhaps best described as a broader social theory, which then informs the study of security. This chapter draws out key contributions of constructivist thought that have been applied to security studies. It introduces students to the idea that the meanings and practices of security are socially constructed, before examining constructivist concerns with ideational factors such as norms and identity. The chapter then outlines what can be gained through understanding security as the product of processes of negotiation and contestation, and the relationship between agents and structures in the international system as mutually constitutive.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 4

Critical Theory

Download Chapter 4 Slides

Pinar Bilgin

Abstract

In this chapter, students will learn about the critical approach to security studies which draws on the critical theory of Italian political theorist Antonio Gramsci and the Frankfurt School. This approach is also known as the ‘Aberystwyth School’ of security studies. The chapter begins by tracing the origins of critical security studies. It then explores the key concepts of security studies that have been inspired by critical theory, using empirical illustrations from regions such as the Middle East and the Euro-Mediterranean, and issues such as human mobility, nuclear weapons, and ‘state failure’.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 5

Feminisms

Download Chapter 5 Slides

Sandra Whitworth

Abstract

In this chapter, students will learn about feminist perspectives and the kinds of questions they raise about international security. It also examines some of the empirical research conducted by feminists around questions of security, including work that focuses on the impacts of armed conflict on women, the ways in which women are actors during armed conflict, and the gendered associations of war-planning and foreign policymaking. The chapter suggests that whichever feminist perspective one adopts, greater attention to gender—the prevailing ideas and meanings associated with masculinity and femininity rather than biological differences—enriches our understanding and expectations associated with international security.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 6

Poststructuralism

Download Chapter 6 Slides

Linda Åhäll

Abstract

In this chapter, students will learn about some basic principles of poststructuralist critique as it relates to security studies. By asking what? where? and how? the chapter captures sights, sites, and insights of poststructuralist interventions in security studies. The first section focuses on sights: on how security is ‘seen’ when we put poststructuralist ‘lenses’ on. This involves analysing discursive power and understanding security as a logic informing violence and war as practice. The second section focuses on sites for security logics. Here, poststructuralist critique is situated within the broader ‘aesthetic turn’ associated with production of knowledge in academic International Relations. The third section explores poststructuralist insights as a way of illustrating what security does. Two examples of security logics informing war are discussed: militarisation and drone warfare. The chapter demonstrates how poststructuralist security studies not only fundamentally challenges what security itself might mean, but also opens up for questioning where, how and with what effects security is practiced.

Essay / Exam Questions

Websites and Audio Visual Resources

Chapter 7

Securitization

Download Chapter 7 Slides

Jonna Nyman

In this chapter, students will learn about the concept and theory of ‘securitization’ and the major debates it has stimulated. Securitization refers to a process whereby issues are presented as security threats and, if relevant audiences accept these representations, emergency measures are enabled to deal with them. An increasingly prominent approach to the study of security in International Relations, it promises a move away from developing an abstract definition of security, instead suggesting the need to explore the process through which security is given meaning in political practice. The chapter summarizes the evolution of securitization theory after the Cold War, introduces the central contributions of the approach, and examines the key debates within and about securitization.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 8

Postcolonialism

Download Chapter 8 Slides

Nivi Manchanda

Abstract

In this chapter, students will learn about postcolonialism as an increasingly prominent theoretical approach to security in International Relations (IR). Focusing on the legacy of empire and the perpetuation of hierarchies between the Global North and South, postcolonialism is best understood as an orientation rather than one coherent theory, or even a cohesive school of thought. Postcolonial thought is inherently interdisciplinary and while there is no postcolonial school of security studies, it nonetheless provides important insights for students of security. This chapter engages postcolonial thought on security issues by focusing on two key moments in its development and the work of key postcolonial thinkers. It highlights both shared assumptions and important differences between proponents while stressing the myriad ways in which postcolonialism can enrich our understanding of security through its sensitivity to questions of colonial legacies, racism, and inequality.

Essay / Exam Questions

Websites and Audio-Visual Resources

  • The blog: www.thedisorderofthing.com hosts many critical voices writing on IR and security (amongst other things).
  • The Runnymede Trust (https://www.runnymedetrust.org/) in Britain deals with issues of racism and migration and has interesting research projects that are relevant to this chapter’s topic.
  • The BBC Newsnight’s discussion on the partition of India and Pakistan from 2017 is worth watching: https://www.youtube.com/watch?v=1aaYTKuatqM (‘Partition at 70, What’s the Legacy of Empire?’).

Chapter 9

Uncertainty

Download Chapter 9 Slides

Ken Booth and Nicholas J. Wheeler

Abstract

Uncertainty is immanent in all human relations, and nowhere more so—and with such causal significance—as at the international level of world politics. Here, its impacts are particularly evident in relation to the concept of the ‘security dilemma’. This chapter examines the meanings (and misunderstandings) of ‘the security dilemma’, describes its dynamics and practices, and offers illustrations from history, present crises, and future dangers. It is our contention that if Security Studies are to meet the complex and multiple challenges of the 21st century, engagement with the security dilemma analytical toolkit must have a central place.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 10

Great Power Rivalry

Download Chapter 10 Slides

Beverley Loke

Abstract

In this chapter, students will learn about great power rivalry in contemporary world politics. An adversarial relationship characterised by intense competition and mutual threat perceptions, great power rivalry emerges—and indeed is constructed—over material, ideational and positional factors. This chapter outlines the main concepts to contextualise and conceptualise the ‘return’ of great power rivalry in world politics: polarity; balance of power; and power and hegemonic transition. These broader conceptual debates are then applied to contemporary US-China great power rivalry. Four different domains are examined to capture the complex and multidimensional nature of US-China rivalry: strategic competition in the South China Sea; economic and technological competition; grey zone conflict in cyberspace; and institutional rivalry. The chapter concludes by outlining key strategies to stabilise great power rivalry.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 11

Culture

Download Chapter 11 Slides

Michael N. Barnett

Abstract

In this chapter, students will learn about the complex relationships between culture and security. Culture is present in organizations, societies, states, and global affairs. Culture, like the social world in general, is ubiquitous. The chapter therefore begins by summarizing why security scholars began to think that culture might shape processes of global and national security. It then clarifies what we mean by culture and how we think it matters. Contrasting rational and cultural approaches to security, the chapter examines several important issues: (1) the importance of bureaucratic and organizational culture for understanding security issues such as military doctrine and evolution; (2) strategic culture; and, (3) how organizational and global cultural factors influence peace operations.

Essay / Exam Questions

Websites and Audio-Visual Resources

To what extent has popular culture affected international security dynamics

Chapter 12

War

Download Chapter 12 Slides

Paul D. Williams

Abstract

In this chapter, students will learn about the concept of war and how it continues to evolve in line with the human societies that wage it. The chapter starts by examining different approaches to defining war and distinguishing it from several related activities before summarizing how most human societies developed the habit of warfare. The third section discusses how the character of contemporary warfare has changed with reference to debates about Revolutions in Military Affairs and so-called new and old wars. Finally, the chapter discusses how urban spaces, cyber space, and outer space are becoming increasingly important domains for waging war.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 13

Coercion

Download Chapter 13 Slides

Lawrence Freedman and Srinath Raghavan

Abstract

In this chapter, students will learn about coercion as a distinctive type of strategy, in which the intention is to use threats to put pressure on another actor to do something against their wishes (compellence) or not to do something they had planned to do (deterrence). The chapter considers the different forms coercion can take in terms of the ambition of the objective, the methods used (denial versus punishment) and the capacity of the target for counter-coercion. It also analyses how perceptions of an actor’s strategic environment are formed and the extent to which these perceptions are susceptible to targeted threats as part of another’s coercive strategy.

Essay / Exam Questions

Websites and Audio-Visual Resources

  • For good materials see this site of John Hopkins US-Korea Institute
  • Articles include William McKinley, ‘Understanding North Korea’s Nuclear Coercion Strategy’, Foreign Affairs (March 2015).
  • For an article using Iran as an example see Robert Jervis, ‘Getting to Yes With Iran: The Challenges of Coercive Diplomacy’, Foreign Affairs, (January/February 2013).

Chapter 14

Peace and Violence

Download Chapter 14 Slides

Helen Dexter

Abstract

In this chapter, students will learn about two concepts that are central to security studies and yet tend to receive little analysis in their own right: violence and peace. The chapter highlights that both concepts are complex and contested. Rather than try and settle on a definition of either, the chapter is structured around a series of questions that serve to explore the complex nature of violence and peace. Specifically, the chapter asks: What is violence? How do we come to know it? Does violence work as a means of resistance? What does this mean for our understanding of peace? Finally, if there is no fixed definition of violence or peace, what does this mean for security studies?

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 15

Human Security

Download Chapter 15 Slides

Gunhild Hoogensen Gjørv

Abstract

In this chapter, students will learn about human security and the status of this concept in policy and research today. Human security was popularized by the UN Development Programme’s 1994 Human Development Report, which promised a revolutionary move in security studies, reorienting the focus on individuals rather than the states. However, this ambition did not come to fruition, at least not as some had hoped. States and international institutions adopted the concept for their own purposes, losing sight of individual, contextualized experiences of insecurity that were often brought about by these same states and institutions. Critics remain divided over the utility of human security but the concept continues to be relevant to state and nonstate actors alike.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 16

The Responsibility to Protect

Download Chapter 16 Slides

Alex J. Bellamy

Abstract

In this chapter, students will learn about the ‘responsibility to protect’ principle, which seeks to rethink the relationship between security, sovereignty, and human rights. It looks at the origins of the principle, the politics behind its adoption by the United Nations (UN) in 2005, subsequent debates at the UN about its implementation, and its role in shaping international responses to major humanitarian crises. Key questions include whether sovereignty should entail the protection of a state’s population, whether states can be persuaded to take responsibility for protecting populations abroad, and what sorts of policies states should adopt in the face of mass atrocities.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 17

Development

Download Chapter 17 Slides

Danielle Beswick

Abstract

In this chapter, students will learn why processes of development are relevant for security studies. It first outlines the historical roots of development and summarizes the ‘Washington Consensus’, which has dominated international approaches to development since the 1980s. It then explains how development challenges have been viewed as major security threats at three broad and interrelated levels: international, state, and individual (human). The chapter then analyses how development and security have been linked in theory and practice. While few dispute the goal of development, its practical pursuit can create or compound insecurity for some of the poorest people in society, increase the likelihood of violent conflict by marginalizing some groups, and provide an environment in which armed groups can access funds and materials, particularly through shadow economies.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 18

Alliances

Download Chapter 18 Slides

Sara Bjerg Moller

Abstract

In this chapter, students will learn about theories of alliance formation and management. After surveying the literature on alliance formation and war, the chapter lays out the challenges involved in adapting alliances over time to suit different geopolitical environments. It then presents a case study on NATO after the Cold War, a period which saw the transatlantic alliance nearly double its membership size and significantly expand its purview and responsibilities. The conclusion discusses how different theoretical frameworks envisage the future of alliances amidst China’s rise.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 19

Regional Organizations

Download Chapter 19 Slides

Louise Fawcett

Abstract

Abstract
In this chapter, students will learn about the role of regional organizations in the provision of international security; the history and development of regionalism in the security sphere; and the evolving relationship between the United Nations (UN) and regional organizations. This chapter considers the conditions behind the growth and expanding remit of regional security projects, and explanations for their success and failure. As the world has become increasingly multipolar and more states seek an active stake in the multilateral system, regional organizations play important though uneven roles in a complex multilateral security architecture.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 20

The United Nations

Download Chapter 20 Slides

Thomas G. Weiss and Danielle Zach

Abstract

In this chapter, students will learn about the principal organs of the United Nations and their role in maintaining international peace and security, the world body’s primary mandate. It provides an overview of the UN system as well as a short history of its contributions to security studies. It also addresses key threats confronting the globe in the twenty-first century—such as terrorism, mass atrocities, and weapons of mass destruction—and assesses the UN’s capacity to meet these security challenges.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 21

Peace Operations

Download Chapter 21 Slides

Michael Pugh

Abstract

In this chapter, students can learn about the concepts, policies and practices of peace operations. Peace operations range from small observation and monitoring missions to extensive post-war reconstruction. A shift in the concepts and discourse about peace operations has occurred since the mid-1990s, notably in the UN where the peacekeeping concept originated. Prominent debates include whether peace is enforceable, whether operations can effectively protect civilians, and whether international interventions, including peacebuilding, have been effective. Peace operations can be represented as international responses to armed conflicts that disrupt security and threaten human security needs. An idealist, liberal conception that promotes peace between states and enlightened governance within them has attracted critique, in large measure because peace operations reflect power distributions in the international system, and as a form of crisis management sustain rather than transform the global system.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 22

The Nuclear Disarmament and Non-Proliferation Regime

Download Chapter 22 Slides

Waheguru Pal Singh Sidhu

Abstract

In this chapter, students will learn about three contemporary challenges to the international regime for the disarmament and non-proliferation of nuclear weapons as well as efforts to overcome them. The first challenge is posed by states within the existing regime. The second set of challenges comes from states outside the present regime. The third and, perhaps, most formidable challenge comes from nonstate actors. These challenges have generated at least three different approaches: first, efforts to strengthen the traditional multilateral institutional approach anchored in treaty-based regimes; second, to establish non-treaty based multilateral approaches initiated within the UN system; and third, to build a set of ad-hoc, non-institutional, non-conventional approaches outside the UN to address the immediate challenges of proliferation. These approaches have significant consequences for addressing nuclear disarmament and non-proliferation in future.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 23

Private Military and Security Companies

Download Chapter 23 Slides

Deborah Avant

Abstract

In this chapter, students will learn about the growth of private security—security allocated through the market. The chapter explains why this development is important for the control of force and outlines a debate over its costs and benefits. It also describes the current market, compares it to other markets for violence in the past, and explains its origins. The chapter encourages students to think about how the market for force poses tradeoffs to the state and nonstate actors that seek to control it and how a market for force challenges some of the central assumptions in security studies.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 24

Genocide and Crimes against Humanity

Download Chapter 24 Slides

Adam Jones

Abstract

In this chapter, students will learn about the concepts of ‘genocide’—the destruction of human groups—and the range of atrocities classified as ‘crimes against humanity’. Key modern instances of genocide are described, along with some central debates in the field of genocide studies, and proposals for intervention and prevention. The legal evolution of the related but much broader concept of crimes against humanity is also considered.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 25

Ethnic Conflict

Download Chapter 25 Slides

Stuart J. Kaufman

Abstract

In this chapter, students will learn about the social construction of ethnic groups across lines of language, race and/or religious affiliation and its role in armed conflict. Most countries are multiethnic, and most ethnic relationships are peaceful. However, some ethnic conflicts become violent, often enough that ethnic wars represent a sizeable fraction of all wars that have occurred in the last century. Ethnic conflicts are most likely to result in serious violence when government is weak; narratives of group identity lead the groups to see each other as hostile; prejudice is widespread; group members fear for the survival of their group; and the competing sides demand political dominance over some disputed territory. Violent ethnic conflicts have important international dimensions: they are often encouraged by hardline émigré groups or foreign powers, they can cause very large flows of refugees across international borders, and they inspire international intervention ranging from diplomatic efforts to military force. While power-sharing and compromise are the internationally preferred formula for resolving ethnic conflicts, in practice most of them end only when one side wins militarily.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 26

Terrorism

Download Chapter 26 Slides

Paul Rogers

Abstract

In this chapter, students will learn about the definitional debates surrounding the concept of terrorism and different types of terrorism, notably the difference between state terrorism and sub-state terrorism or terrorism from below. The chapter then analyses trends in state terrorism and sub-state terrorism in the context of other more substantive threats to security. It then examines the main responses to sub-state terrorism and assesses the response to the 9/11 attacks on the United States, the state of the ‘global war on terror’ after more than twenty years, and the likelihood of a reconsideration of the nature of the response.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 27

Counterterrorism

Download Chapter 27 Slides

Paul R. Pillar

Abstract

In this chapter, students will learn about the different means of combating terrorism by nonstate actors, including dissuading individuals from joining terrorist groups, deterring groups from using terrorism, reducing the capability of terrorist groups, erecting defences against terrorist attacks, and mitigating the effects of attacks. Reducing terrorist capabilities in turn requires the use of several instruments—each with its own strengths and limitations—including diplomacy, intelligence, financial controls, criminal justice systems, and military force. Counterterrorism unavoidably raises difficult and often controversial policy issues, including conflicts with other values such as personal liberty and privacy.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 28

Counterinsurgency

Download Chapter 28 Slides

Joanna Spear

Abstract

In this chapter students will learn about the theory and practice of counterinsurgency. In contrast to other areas of security studies, counterinsurgency is an issue area where there are many scholar/practitioners, which gives their writings particular immediacy and applicability. In the West, counterinsurgency has gone in and out of fashion since being developed during the colonial era. In the US, counterinsurgency is now out of fashion as politicians seek to avoid long-term military interventions and the US military prioritises planning for major war against high-technology enemies, a mission they always preferred to counterinsurgency. History suggests that while the West may think it is done with counterinsurgency, insurgency is not necessarily done with the West. Moreover, counterinsurgency is currently being violently practiced in parts of Africa, the Middle East, Asia, and also in Ukraine.

Essay / Exam Questions

Chapter 29

Intelligence

Download Chapter 29 Slides

Richard J. Aldrich

Abstract

In this chapter, students will learn about intelligence, a concept which since 9/11 has frequently been in the media spotlight. Little of this coverage has been flattering and a word association game might quickly link intelligence with terms like ‘snooping’, ‘failure’, ‘torture’—even ‘poison’. This chapter introduces students to the competing concepts of intelligence, the arguments over whether its performance can be substantially improved and whether intelligence services stabilize or disrupt the international system. The field is still dominated by an out-dated concept of intelligence as a strategic process designed to avoid surprise and produce refined information for policymakers. This traditional approach fails to capture intelligence activity elsewhere in the wider world, which is more about covert action and regime security. It is also fundamentally unsuited for the 21st century wherein the very idea of intelligence is merging with open-source information, ‘Big Data’, and cybersecurity.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 30

Economic Threats

Download Chapter 30 Slides

Rollie Lal

Abstract

In this chapter, students will learn about the ways in which economic issues are integral to international security and the different ways in which states and other actors can use economic coercion. Economic forces are constantly changing the world in ways that can threaten human, national, and even global security. After using the war in Ukraine to summarize some of the main ways in which economics and security are connected, the chapter analyzes four key economic issues that now routinely effect national and international security dynamics. They are economic sanctions, globalization, the computerization and mechanization of work, and foreign investment and sovereign wealth funds.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 31

Transnational Organized Crime

Download Chapter 31 Slides

Phil Williams

Abstract

In this chapter, students will learn about how transnational organized crime emerged as a threat to national and international security. The chapter defines transnational organized crime then examines its rise, suggesting that its emergence is inextricably linked to globalization and the weakness of states in many parts of the world. The major transnational criminal organizations (TCOs) are subsequently examined, including their diversity, organizational structures, and portfolios of activities, as well as illicit markets. The chapter then examines U.S. and international efforts to combat transnational organized crime, concluding that these measures have fallen far short of what is needed. Finally, it summarizes the impact of COVID-19, suggesting that after initially disrupting smuggling and trafficking the pandemic provided new opportunities for criminal organizations to exploit. Combined with other global trends, transnational organized crime will continue to expand.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 32

Global Arms Trade

Download Chapter 32 Slides

Andrew T. H. Tan

Abstract

In this chapter, students will learn about the dynamics of the international arms trade. It examines the key trends in defence spending and the main characteristics of the global arms build-up, such as the increased emphasis on technologically sophisticated weapons systems, greater focus on maritime power, and the proliferation of Small Arms and Light Weapons (SALWs). The chapter also analyses the causes of the arms build-up, such as the rapid development of technology, economic growth, the desire for prestige, corruption and the continued persistence of interstate tensions particularly as a result of the rise of China and the revival of Russia. The chapter ends by assessing international arms control and its major problems and prospects.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 33

Migration and Refugees

Download Chapter 33 Slides

Sita Bali

Abstract

In this chapter, students will learn why and how migration has come to be seen as a security issue. It outlines different types of population movements and how states normally deal with them before examining the direct impact migration can have on the security of the state from war, violence, and terrorism. Next, it considers the effect of population movement on security, broadly defined. This will include an assessment of the impact of migration and ethnic minority communities on host state foreign policy, particularly related to the countries of origin of its migrant communities. It then considers the impact of migration on the internal social stability and cohesion of host states.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 34

Energy Security

Download Chapter 34 Slides

Michael T. Klare

Abstract

In this chapter, students will learn about the meaning of ‘energy security’ and how this concept has evolved over time. During the 1970s and 1980s, the pursuit of ‘energy security’ largely entailed efforts by the Western oil-importing states to ensure their access to Middle Eastern oil and to develop alternative sources of supply. Over time, however, the term has come to encompass other challenges to energy security, such as the vulnerabilities produced by excessive reliance on a single major supplier of energy, as demonstrated by Europe’s excessive reliance on Russian oil and natural gas. Climate change has also altered perceptions of energy security, both by adding new threats to the delivery of vital fuels and by generating contests over access to the specialized minerals, such as cobalt and lithium, needed for green energy production.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 35

Women, Peace, and Security

Download Chapter 35 Slides

Aisling Swaine

Abstract

In this chapter, students will learn about the women, peace, and security agenda (WPS).
Initially adopted by the UN Security Council in 2000, the WPS agenda now consists of ten resolutions that establish provisions to address gaps in gender-responsive approaches to peace and security, and that seek to advance women’s rights across all aspects of conflict prevention, management, and response. Since its adoption, scholars, policymakers and activists have expanded the reach and impact of the agenda. It is also subject to wide-ranging critique, particularly regarding its implementation by UN member states and the UN system. This chapter provides an overview of the adoption of the WPS agenda and its broad aims and sets out some of the key areas of debate and critique thus far.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 36

Environmental Change

Download Chapter 36 Slides

Matt McDonald and Simon Dalby

Abstract

In this chapter, students will learn about the Anthropocene and how humanity has become a force shaping the planetary system with major consequences for the theory and practice of security. It discusses the evolution of debates about the relationship between the environment and security before exploring the idea of the Anthropocene and debates about planetary boundaries. The chapter then focuses specifically on the issue of climate change, noting different discourses of climate security, examining the potential role of climate change in contributing to armed conflict and noting current responses to climate insecurity. We conclude by reflecting on the profound implications that the climate crisis has for the way we think about security, and suggesting the need to shift from protecting what we have to changing who we are.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 37

Health

Download Chapter 37 Slides

Jessica Kirk

Abstract

In this chapter, students will learn why and how health has been understood as a security issue. It discusses the history and meaning of ‘Global Health Security’ as a concept and analyzes the major issues appearing on this agenda, notably emerging and re-emerging infectious diseases and biological weapons/bioterrorism. The chapter then examines what is involved in approaching the health-security nexus from a human security perspective. Finally, it discusses some critical questions: Whose health security matters most? What health threats are prioritized? And, whether it is a good idea to conceptualize health as a security issue?

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 38

Emerging Technologies

Download Chapter 38 Slides

Paul D. Williams

Abstract

In this chapter, students will learn about the ways in which emerging technologies can influence global security as well as how world politics shapes the type and pace of technological innovation. After summarizing this reciprocal relationship, the chapter examines five important areas where scientific innovation is having major security implications. These clusters of emerging technologies relate to the revolution in digital information and communications technology, Artificial Intelligence, biotechnology, quantum computing, and missile technologies.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 39

Cybersecurity

Download Chapter 39 Slides

Rhea Siers

Abstract

In this chapter, students will learn how cybersecurity has become a key issue in global security. Once the primary domain of military and intelligence activities, cyber attacks and intrusions have had a broad impact, from the attacks against Georgia and Estonia to Stuxnet to the recent disruptions to operational and information technology. Cyber capabilities are no longer solely the province of states. Nonstate actors, such as criminals, terrorists, and ‘hacktivists’ have adapted cyber power for their own purposes. Private businesses find themselves on the frontline of cyber conflict every day. Rapidly evolving computer technology is a considerable challenge to standard strategies of conflict and deterrence as well as to the creation of norms.

Essay / Exam Questions

Websites and Audio-Visual Resources

Chapter 40

Outer Space

Download Chapter 40 Slides

Cassandra Steer

Abstract

In this chapter, students will learn about the importance of outer space as a strategic domain, for national and international security. Space has become a security domain of equal importance alongside land, sea, air, and cyberspace, because space-based technologies support military activities on Earth and have become so critical to military operations that it has become a contested strategic domain. But outer space is also a domain which forms part of our environmental, economic, and human security. This chapter examines the ways in which we are dependent on space, why a potential conflict extending into space would seriously impact us all, efforts to prevent a conflict and restrain the weaponization of space, as well as the disruptive importance of commercial actors which have now become integral to space security.

Essay / Exam Questions

Websites and Audio-Visual Resources