Booth argues a simple understanding of security and power and the emancipation that he defends contains the possibility of starting the violence it seeks to eliminate.
Security Studies is in rude health, and will remain so amidst ever-changing global threats so long as scholars continue to engage with security theories critically.
Whether revolutions result in greater security or insecurity is entirely dependent on whose security is being discussed.
The US invasion of Iraq in 2003 was the culmination of a long series of events and the product of many complex, different, and yet interrelated factors.
Attempts to compare Malaya with other counterinsurgency campaigns such as the Vietnam War or Afghanistan War are limited in value and risk dangerous over-simplifications
The Central Security and Defence Policy attempted to centralise the decision-making process on foreign policy for E.U. members, but a more unified Union is essential.
Throughout its endeavour, NATO has faced many key challenges in its crisis management operation in Afghanistan.
Environmental changes make the rethinking of security unavoidable. An international effort is necessary to develop a framework of adaptation and mitigation practices.
In a ‘state of exception’, where it is vital to maintain national security, liberal governments do not suspend the rule of law but rather legally circumvent it.
Any advantages that a virtual currency like Bitcoin has over fiat money may be short-lived, as states will subject it to regulations that will erode its competitive edge.
Shaw’s risk-transfer theory and Der Derian’s conceptualization of virtuous war allow an in-depth understanding of the deployment of drones in the War on Terror.