International Security

by
Format: Paperback
Pub. Date: 2006-03-08
Publisher(s): Cq Pr
  • eCampus.com Device Compatibility Matrix

    Click the device icon to install or view instructions

    Apple iOS | iPad, iPhone, iPod
    Apple iOS | iPad, iPhone, iPod
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Android Devices | Android Tables & Phones OS 2.2 or higher | *Kindle Fire
    Windows 10 / 8 / 7 / Vista / XP
    Windows 10 / 8 / 7 / Vista / XP
    Mac OS X | **iMac / Macbook
    Mac OS X | **iMac / Macbook
    Enjoy offline reading with these devices
    Apple Devices
    Android Devices
    Windows Devices
    Mac Devices
    iPad, iPhone, iPod
    Our reader is compatible
     
     
     
    Android 2.2 +
     
    Our reader is compatible
     
     
    Kindle Fire
     
    Our reader is compatible
     
     
    Windows
    10 / 8 / 7 / Vista / XP
     
     
    Our reader is compatible
     
    Mac
     
     
     
    Our reader is compatible
List Price: $82.11

Buy New

Usually Ships in 8 - 10 Business Days.
$78.20

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:90 Days access
Downloadable:90 Days
$60.00
Online:120 Days access
Downloadable:120 Days
$67.20
Online:180 Days access
Downloadable:180 Days
$75.60
Online:1825 Days access
Downloadable:Lifetime Access
$109.20
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$75.60*

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Conflict--be it war between states, ethnic violence, civil war, or terrorist activity--endures, despite immense efforts to end it. How do states cope with conflict, minimize future threats, and reduce the risk of insecurity? Morgan outlines a spectrum of solutions states use to manage violent conflict, ranging from strategies that individual governments enact largely on their own, such as distribution of power, deterrence, or arms control, to those such as collective security and multilateralism that are more global in nature. The book progresses into tactical and practical actions, from negotiation and mediation to peace imposition. Morgan evaluates each strategy and tactic in terms of how well it addresses three levels of security--systemic, state, and societal--to show how they are interrelated and complementary to each other in important ways. Addressing insecurity at one level often elicits further insecurity at another. Morgan shows students how these various levels interact-either to a state&BAD:rs"s advantage or to its detriment-so they can comprehensively analyze the ways that political actors manage (or incite) conflict.Useful pedagogical features help students master the material:Terms and Concepts boxes go beyond simple definitions and provide students with a concept&BAD:rs"s evolution over time or the controversy surrounding the meaning of a certain term.Cases and Context boxes offer needed background and interesting detail about pivotal cases of conflict, both historical and contemporary in nature.Key terms are bolded throughout and compiled in a glossary.Annotated bibliographic essays at the end of each chapter point students to additional sources for further study.

Table of Contents

Preface xiii
Part I Outlining the Problem
An Introduction to Security in International Relations
1(16)
The Realist Perspective
2(3)
Terms and Concepts: Some Basics
3(2)
Problems in Cooperation
5(1)
Levels of Security
6(7)
Systemic Security
6(1)
State Security
7(1)
Societal Security
8(1)
Tensions among the Three Levels
8(3)
Cases and Context: The Wars of Iraq
11(2)
Security Dilemmas and the Dilemmas of Pursuing Security
13(1)
Conclusion
14(1)
Sources and Other Useful Readings
15(2)
The Problem of War in International Politics
17(18)
Causes of War
18(2)
Perception of War at the Three Levels
20(6)
Cases and Context: Nineteenth-Century Prussian Wars
23(3)
The Impact on State and Societal Security
26(2)
The Impact on Systemic Security
28(3)
Conclusion
31(2)
Sources and Other Useful Readings
33(2)
Part II Strategic and Structural Solutions
The Appropriate Distribution of Power
35(26)
Strategies for Peace and Security
36(1)
The Strategy of Arranging an Appropriate Distribution of Power
37(8)
Terms and Concepts: Is This a Strategy?
39(1)
Peace by Preponderance
40(3)
Peace by Balance
43(2)
Creating an Appropriate Power Distribution inside States
45(3)
Preponderance
45(1)
Balance
46(2)
Does the Distribution of Power Strategy Work?
48(6)
Conclusion
54(4)
Systemic Security
54(1)
State Security
55(1)
Societal Security
56(1)
Final Assessment
57(1)
Sources and Other Useful Readings
58(3)
Seeking Cheap Victories
61(16)
Elements of a Cheap Victory Strategy
62(2)
Great Military Superiority under Any Circumstances
63(1)
Strategic Surprise
63(1)
Rapid Mobilization and Use of Force
63(1)
Isolate the Opponent
64(1)
Establish a Solid Defense
64(1)
Cheap Victory Strategies in the Twentieth Century
64(7)
World War I
64(3)
World War II
67(2)
The Cold War and Post-Cold War Eras
69(2)
The Appeal of a Cheap Victory Strategy
71(2)
Conclusion
73(2)
Sources and Other Useful Readings
75(2)
Deterrence and Arms Control
77(32)
The Main Elements of Deterrence
78(3)
Terms and Concepts: Deterrence and Arms Control
80(1)
The Credibility Problem
81(3)
The Stability Problem
84(3)
Does Deterrence Work?
87(7)
The Appeal of a Deterrence Strategy
88(2)
Nuclear Deterrence in Practice
90(4)
Terms and Concepts: Weapons of Mass Destruction
94(1)
Arms Control and Disarmament
94(5)
Arms Control
94(3)
Disarmament
97(2)
Conclusion
99(8)
Nuclear Deterrence
99(3)
Arms Control
102(3)
Disarmament
105(1)
Final Assessment
106(1)
Sources and Other Useful Readings
107(2)
The Great-Power Concert
109(24)
The Main Elements of a Concert
110(4)
The Strategy in Practice
114(12)
The Concert of Europe
114(2)
The Interwar Years
116(1)
Post-World War II and Cold War Attempts at Concerts
117(4)
The UN Security Council and Other Post-Cold War Attempts
121(4)
Terms and Concepts: Terrorism
125(1)
Conclusion
126(6)
Sources and Other Useful Readings
132(1)
Wilsonian Collective Security
133(20)
The Main Elements
133(5)
Credibility and Stability
138(3)
Wilsonian Collective Security in Practice
141(7)
The League of Nations
141(2)
NATO
143(5)
Conclusion
148(4)
Security at the Three Levels
148(3)
Final Assessment
151(1)
Sources and Other Useful Readings
152(1)
Complex Multilateralism and Integration
153(24)
Complex Multilateralism
154(4)
Complex Multilateralism in Practice
158(5)
NATO
158(1)
The Warsaw Pact
159(1)
ASEAN
160(2)
Eastern Europe Today
162(1)
Integration
163(2)
The European Union
165(4)
Conclusion
169(6)
Complex Multilateralism
169(4)
Integration
173(1)
Final Assessment
174(1)
Sources and Other Useful Readings
175(2)
Part III Tactical and Practical Solutions
Negotiation and Mediation
177(32)
Negotiation
178(14)
Negotiation as a Process
179(3)
Negotiation as Politics
182(6)
Negotiation and Culture
188(1)
Cases and Context: Cultural Aspects of Negotiations
189(3)
Mediation
192(4)
Mediation Activities
192(1)
Mediation Performers
193(3)
General Features and Principles
196(3)
Cases and Context: The China-Taiwan Conflict
197(2)
Conclusion
199(8)
The Track Record
200(3)
The Three Levels of Security
203(4)
Sources and Other Useful Readings
207(2)
Peacekeeping
209(20)
Who Does Peacekeeping?
211(2)
Classic Principles of Peacekeeping
213(2)
Experience with Peacekeeping Grows
215(4)
General Rules for Today
219(4)
Terms and Concepts: Human Rights
220(3)
Conclusion
223(5)
Assessment
223(2)
The Three Levels
225(3)
Sources and Other Useful Readings
228(1)
Peace Enforcement and Peace Imposition
229(28)
Main Elements of Peace Enforcement and Peace Imposition
230(7)
Who, Where, and Why?
231(2)
Legitimacy
233(4)
Peace Enforcement and Imposition in Practice
237(3)
Explaining the Use of Peace Enforcement and Peace Imposition
240(5)
Protracted Insecurity and Partitions
245(5)
Conclusion
250(4)
Systemic Security
250(2)
State Security
252(1)
Societal Security
253(1)
Sources and Other Useful Readings
254(3)
Peacebuilding
257(34)
The Main Elements of Peacebuilding
257(5)
Who Does What?
262(12)
The Political Dimension
263(5)
The Security Dimension
268(6)
Cases and Context: The Violence in the Congo
274(3)
The Economic Sphere
275(2)
Peacebuilding in Practice
277(6)
Cases and Context: Sudan and Its Darfur Region
278(1)
Cambodia
279(1)
El Salvador
280(1)
Bosnia
280(1)
Iraq
281(2)
Conclusion
283(4)
Systemic Security
283(2)
State Security
285(1)
Societal Security
286(1)
Sources and Other Useful Readings
287(4)
Part IV Conclusion
Conclusion
291(4)
Glossary 295(14)
Bibliography 309(12)
Index 321

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.