Security

Universal Security/Emancipation: A Critique of Ken Booth

Universal Security/Emancipation: A Critique of Ken Booth

Booth argues a simple understanding of security and power and the emancipation that he defends contains the possibility of starting the violence it seeks to eliminate.

The Field of Security Studies: In Rude Health or a Chronic State of Disrepair?

The Field of Security Studies: In Rude Health or a Chronic State of Disrepair?

Security Studies is in rude health, and will remain so amidst ever-changing global threats so long as scholars continue to engage with security theories critically.

Do Revolutions Lead to Greater Security or Insecurity?

Do Revolutions Lead to Greater Security or Insecurity?

Whether revolutions result in greater security or insecurity is entirely dependent on whose security is being discussed.

One War, Many Reasons: The US Invasion of Iraq

One War, Many Reasons: The US Invasion of Iraq

The US invasion of Iraq in 2003 was the culmination of a long series of events and the product of many complex, different, and yet interrelated factors.

Assessing the British Counter-Insurgency Effort in Malaya

Assessing the British Counter-Insurgency Effort in Malaya

Attempts to compare Malaya with other counterinsurgency campaigns such as the Vietnam War or Afghanistan War are limited in value and risk dangerous over-simplifications

Has the EU become an Effective Crisis Manager?

Has the EU become an Effective Crisis Manager?

The Central Security and Defence Policy attempted to centralise the decision-making process on foreign policy for E.U. members, but a more unified Union is essential.

Analysing NATO’s Role in Afghanistan

Analysing NATO’s Role in Afghanistan

Throughout its endeavour, NATO has faced many key challenges in its crisis management operation in Afghanistan.

Image by Klem@s

Adaptation, Mitigation and the Securitization of Climate Change

Environmental changes make the rethinking of security unavoidable. An international effort is necessary to develop a framework of adaptation and mitigation practices.

The State of Deception & The Time Bomb: Evaluating Torture as Counter-Terrorism

The State of Deception & The Time Bomb: Evaluating Torture as Counter-Terrorism

In a ‘state of exception’, where it is vital to maintain national security, liberal governments do not suspend the rule of law but rather legally circumvent it.

Should Fiat Money be Replaced with Virtual Currencies?

Should Fiat Money be Replaced with Virtual Currencies?

Any advantages that a virtual currency like Bitcoin has over fiat money may be short-lived, as states will subject it to regulations that will erode its competitive edge.

Aiming from a Distance: The Implications of the Use of Drones for Security

Aiming from a Distance: The Implications of the Use of Drones for Security

Shaw’s risk-transfer theory and Der Derian’s conceptualization of virtuous war allow an in-depth understanding of the deployment of drones in the War on Terror.