Roger MacGinty writes: “…hybridity demands that we look backwards and ask questions about origins and antecedence” (MacGinty, 2011, p. 78), and it is with this in mind that it will be useful to trace the origins of the bureau-shaping process in Cambodia between June 21st 1997 to June 6th 2003. […]
The goals of Pan-Africanism are in direct opposition to the global socio-political system, where structural conditions of rule currently facilitate exploitation.
Despite controversy, the use of economic sanctions continues to be a popular option for the UN Security Council due to the introduction of targeted sanctions in the 90’s.
Drones offer little strategic value because they have the capacity to perpetuate the problem they are trying to solve, which is argued through two theoretical approaches.
Security ought to be conceptualized as a strategic practice comprising both (1) the practices used to securitize an issue and (2) the practices used to address it.
Neither Realism nor Liberalism provide a comprehensive explanation of the rise of China; only a synthesis of the two paradigms can be sufficient.
The foreign investor gains land ownership to produce and export food and biofuels while Ethiopia gains foreign capital necessary to boost its fragile economy.
Asking what is the nature of the IR field amounts to questioning what IR is for and leads subsequently to exploring what is at stake in the social practices.
Adopting an international historical approach to the origins of the 2003 Iraq War, as opposed to an IR theory approach, presents both challenges and opportunities.
Booth argues a simple understanding of security and power and the emancipation that he defends contains the possibility of starting the violence it seeks to eliminate.
Globalization and neoliberal economic policy must be considered separately, for there is neither evidence of their correlation nor of a global transition to the latter.
Security Studies is in rude health, and will remain so amidst ever-changing global threats so long as scholars continue to engage with security theories critically.