Security Studies

  1. Acharya, Amitav, “Human Security: East versus West”, International Journal, Vol. 56, No. 3 (Summer, 2001), pp. 442-460
  2. Afkhami, Mahnaz & Naidoo, Kumi & Pitanguy, Jacqueline & Rao, Aruna, “Human Security: A Conversation”, Social Research, Vol. 69, No. 3, The Status of Women in the Developing World (Fall, 2002), pp. 657-673
  3. Alkaff, Sued Huzaifah Bin Othman & Quek, Natasha, “Analysis of the Tunisian Foreign Terrorist Fighters Phenomenon”, Counter Terrorist Trends and Analyses, Vol. 11, No. 5 (May, 2019), pp. 1-5
  4. Anderson, David A. & Kalimuddin, Mikail, “Soft Power in China’s Security Strategy”, Strategic Studies Quarterly, Vol. 12, No. 3 (Fall 2018), pp. 114-141 Open Access: https://www.jstor.org/stable/26481912
  5. Atienza, Maria & Eadie, Pauline & Tan-Mullins, May, “Urban poverty in the Wake of Environmental Disaster: Rehabilitation, Resilience and Typhoon Haiyan (Yolanda)”, Routledge, 2018
  6. Barthwal-Dalta, Monika, “Securitising Threats without the State: A Case Study of Misgovernance as a Security Threat in Bangladesh”, Vol. 35, No. 2 (April, 2009), pp. 277-300
  7. Bennett, Andrew & Langold, Joseph, “Reinventing Collective Security after the Cold War and the Gulf Conflict”, Political Science Quarterly, Vol. 108, No. 2 (Summer, 1993), pp. 213-237
  8. Blaxland, John, “Strategic Balancing Act: Australia’s Approach to Managing China, the USA and Regional Security Priorities”, Security  Challenges, Vol. 13, No. 1 (2017), pp. 19-39 Open Access: https://www.jstor.org/stable/26465614
  9. Booth, Ken, “Critical Security Studies and World Politics”, Lynne Rienner Publishers, 2005
  10. Borelli, Marguerite, “ASEAN Counter-terrorism Weaknesses”, Counter Terrorist Trends and Analyses, Vol. 9, No. 9 (September 2017), pp. 14-20 Open Access: https://www.jstor.org/stable/26351552
  11. Borghard, Erica D & Demarest, Heidi B. (eds.), “US National Security Reform: Reassessing the National Security Act of 1947”, Routledge, 2018
  12. Brigety, Reuben E. II, “Ethics, Technology and the American Way of War: Cruise Missiles and US Security Policy”, Routledge, 2019
  13. Burke, Anthony & Nyman, Joanna (eds), “Ethical Security Studies: A New Research Agenda”, Routledge, 2016
  14. Buzan, Barry & Waever, Ole, “Macrosecuritisation and Security Constellations: Reconsidering Scale in Securitisation Theory”, Review of International Studies, Vol. 35, No. 2 (April, 2009), pp. 253-276
  15. Caballero-Anthony, Mely, “SARS in Asia: Crisis, Vulnerabilities, and Regional Responses”, Asian Survey, Vol. 45, No. 3 (May-June 2005), pp. 475-495
  16. Cels, Johan & Ogata, Sadako, “Human Security – Protecting and Empowering the People”, Global Governance, Vol. 9, No. 3 (July-September 2003), pp. 273-282
  17. Davies, Sara E., “Securitizing Infectious Disease”, International Affairs (Royal Institute of International Affaira 1944-), Vol. 84, No. 2 (March 2008), pp. 295-313
  18. Dillon, Michael, “Underwriting Security”, Security Dialogue, Vol. 39, No. 2/3, Special Issue on Security, Technologies of Risk and the Political (April/June 2008), pp. 309-332
  19. Ellingsen, Tanja & Hauge, Wenche, “Beyond Environmental Scarcity: Causal Pathways to Conflict”, Vol. 35, No. 3, Special Issue on Environmental Conflict (May 1998), pp. 299-317
  20. Floyd, Rita, “Towards a Consequentialist Evaluation of Security: Bringing Together the Copenhagen and the Welsh Schools of Security Studies”, Review of International Studies, Vol. 33, No. 2 (April 2007), pp. 327-350
  21. Friedrichs, Jorg, “East Asian Regional Security”, Asian Survey, Vol. 52, No. 4 (July/August 2012), pp. 754-776
  22. Friman, H. Richard & Reich, Simon, “Human Trafficking, Human Security, and the Balkans”, University of Pittsburgh Press, 2007
  23. Gaan, Narottam, “Environmental Scarcity of Fish and Conflict: The Case of India and Sri Lanka over Kachchativu Waters”, International Studies Notes, Vol. 22, No. 3 (Fall 1997), pp. 17-23
  24. Ganguly, Sumit & Scobell, Andrew & Liow, Joseph Chinyong (eds.), “The Routledge Handbook of Asian Security Studies”, Routledge, 2017
  25. Gleditsch, Nils Petter & Urdal, Henrik, “Ecoviolence? Links Between Population Growth, Environmental Scarcity and Violent Conflict in Thomas Homer-Dixon’s Work”, Journal of International Affairs, Vol. 56, No. 1, Face of the State: Population, Politics and Stability (Fall 2002), pp. 283-302
  26. Goh, Evelyn, “Great Powers and Hierarchical Order in Southeast Asia: Analysing Regional Security Strategies”, International Security, Vol. 32, No. 3 (Winter 2007/2008), pp. 113-157
  27. Greenhill, Kelly M., “Weapons of Mass Migration: Forced Displacement, Coercion, and Foreign Policy”, Cornell University Press, 2010
  28. Hagerty, Devin T., “India’s Regional Security Doctrine”, Asian Survey, Vol. 31, No. 4 (April 1991), pp. 351-363
  29. Hegarty, David & Tryon, Darell, “Politics, Development and Security in Oceania”, ANU Press, 2013 Open Access: https://www.jstor.org/stable/j.ctt2tt18z
  30. Hansen, Lene & Nissenbaum, Helen, “Digital Disaster, Cyber Security, and the Copenhagen School”, International Studies Quarterly, Vol. 53, No. 4 (December, 2009), pp. 1155-1175
  31. Hataley, Todd & Kilroy, Richard J. Jr. & Sumano, Abelardo Rodriguez, “Security Inequalities in North America: Reassessing Regional Security Complex Theory”, Journal of Strategic Security, Vol. 10, No. 4 (2017), pp. 1-28 Open Access: https://www.jstor.org/stable/26466766
  32. Hinz, Anne, “Security and the Costs and Benefits of Manipulating Analytical Boundaries: Constructivist Debates within European Critical Security Studies”, Sicherheit und Frieden (S+F) / Security and Peace, Vol. 25, No. 4, Themenschwerpunkt: »Privatisierung« von Sicherheit (2007), pp. 202-207
  33. Homer-Dixon, Thomas & Percival, Val, “Environmental Scarcity and Violent Conflict: The Case of Rwanda”, The Journal of Environment & Development, Vol. 5, No. 3 (September, 1996), pp. 270-291
  34. Homer-Dixon, Thomas & Percival, Val, “Environmental Scarcity and Violent Conflict: The Case of South Africa”, Journal of Peace Research, Vol. 35, No. 3, Special Issue on Environmental Conflict (May, 1998), pp. 279-298
  35. Hoogensen, Gunhild & Stuvoy, Kirsti, “Gender, Resistance and Human Security”, Security Dialogue, Vol. 37, No. 2 (June 2006), pp. 207-228
  36. Hough, Peter & Moran, Andrew & Pilbeam, Bruce & Stokes, Wendy, “International Security Studies: Theory and Practice”, Routledge, 2015
  37. Hunter, Robert E., “Building Security in the Persian Gulf”, RAND Corporation, 2010 Open Access: https://www.jstor.org/stable/10.7249/mg944
  38. Islam, Md. Didarul, “De-radicalisation of Terrorists: Theoretical Analysis and Case Studies”, Counter Terrorist Trends and Analyses, Vol. 11, No. 5 (May, 2019), pp. 6-12
  39. Kayani, Saima A., “Human Security and Central Asian States”Policy Perspectives, Vol. 15, No. 1 (2008), pp. 95-112
  40. Kelly, Robert E., “Security Theory in the “New Regionalism””, International Studies Review, Vol. 9, No. 2 (Summer 2007), pp. 197-229
  41. King, Garry & Murray, Christopher J. L., “Rethinking Human Security”, Political Science Quarterly, Vol. 116, No. 4 (Winter, 2001-2002), pp. 585-610
  42. Kupchan, Charles A. & Kupchan, Clifford A., “The Promise of Collective Security”, International Security, Vol. 20, No. 1 (Summer, 1995), pp. 52-61
  43. Lewis, Alexandra, “Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security”, Perspectives on Terrorism, Vol. 7, No. 5 (October 2013), pp. 77-92 Open Access: https://www.jstor.org/stable/26297008
  44. Maclean, Sandra J., “Microbes, Mad Cows and Militaries: Exploring the Links Between Health and Security”, Security Dialogue, Vol. 39, No. 5 (October 2008), pp. 475-494
  45. McClelland, Cary, “Political Capital Deficits in Zimbabwean Famine: National and International Responsibility for Prevention Failure”, Journal of International Affairs, Vol. 59, No. 2, The Globalization of Disaster (Spring/Summer, 2006), pp. 315-332
  46. McKeon, Nora, “Food Security GovernanceL Empowering Communities, Regulating Corporations”, Routledge, 2015
  47. Meng, Fansong & Wu, Yejun, “Categorizing Security for Security Management and Information Resource Management”, Journal of Strategic Security, Vol. 11, No. 4 (2018), pp. 72-84
  48. Mironova, Vera & Whitt, Sam, “Social Norms after Conflict Exposure and Victimization by Violence: Experimental Evidence from Kosovo”, British Journal of Political Science, Vol. 48, No. 3 (July 2018), pp. 749-765
  49. Narine, Shaun, “ASEAN  and the Management of Regional Security”, Pacific Affairs, Vol. 71, No. 2 (Summer 1998), pp. 195-214
  50. Newman, Edward, “Critical Human Security Studies”, Review of International Studies, Vol. 36, No. 1 (January, 2010), pp. 77-94
  51. Njlstad, Olav & Steen, Bard Nikolas Vik (eds.), “Nuclear Disarmament: A Critical Assessment”, Routledge, 2019
  52. Nurijev, Elkhan, “Russia, the EU and the South Caucasus: Forging an Efficient Over-Arching Cooperative Regional Security Scheme”, Connections, Vol. 14, No. 2 (Spring 2015), pp. 51-64 Open Access: https://www.jstor.org/stable/26326397
  53. Oberleitner, Gerd, “Human Security: A Challenge to International Law?”, Global Governance, Vol. 11, No. 2 (April-June, 2005), pp. 185-203
  54. Offerdal, Kristine & Tamnes, Rolf (eds.), “Geopolitics and Security in the Arctic: Regional Dynamics in a Global World”, Routledge, 2014
  55. Rawat, Naman, “Naxalite Insurgency in India and Need for Holistic Counter Responses”, Counter Terrorist Trends and Analyses, Vol. 11, No. 5 (May, 2019), pp. 13-19
  56. Reid, Hannah, “Climate Change and Biodiversity in Europe”, Conservation and Society, Vol. 4, No. 1 (January-March, 2006), pp. 84-101
  57. Sauer, Tom & Volders, Brecht (eds.), “Nuclear Terrorism: Coutering the Threat”, Routledge, 2017
  58. Shameer, M., “Power Maximisation and State Security”, World Affairs: The Journal of International Issues, Vol. 21, No. 2 (June-April 2017), pp. 10-21
  59. Sheen, Seongho, “Northeast Asia’s Aging Population and Regional Security: “Demographic Peace”?”, Asian Survey, Vol. 53, No. 2 (March/April 2013), pp. 292-318
  60. Shepherd, Benjamin, “Thinking Critically about Food Security”, Security Dialogue, Vol. 43, No. 3 (June 2012), pp. 195-212
  61. Singh, Bilveer, “Terrorist Networks in Southeast Asia and Implications for Regional Security”, Counter Terrorist Trends and Analyses, Vol. 10, No. 5 (May 2018), pp. 8-10 Open Access: https://www.jstor.org/stable/26435153
  62. Smith, Hazel, “Nutrition and Health in North Korea: What’s New, What’s Changed and Why It Matters”, North Korea Review, Vol. 12, No. 1 (Spring 2016), pp. 7-34
  63. Stalley, Phillip, Environmental Scarcity and International Conflict”, Conflict Management and Peace Science, Vol. 20, No. 2 (Fall 2003), pp. 33-58
  64. Stripple, Johannes, “The Subject of Security in a Warming World”, The Brown Journal of World Affairs, Vol. 18, No. 2 (Spring/Summer 2012), pp. 181-194
  65. Taylor, Brendan & Tow, William, “What Is Asian Security Architecture?”, Review of International Studies, Vol. 36, No. 1 (January 2010), pp. 95-116
  66. Trinkunas, Harold, “Reordering Regional Security in Latin America”, Journal of International Affairs, Vol. 66, No. 2, The Rise of Latin America (Spring/Summer 2013), pp. 83-99
  67. Tsai, Yu-tai, “The Emergence of Human Security: A Constructivist View”, International Journal of Peace Studies, Vol. 14, No. 2 (Autumn/Winter 2009), pp. 19-33
  68. Walker, William, “A Perpetual Menace”, Routledge, 2011
  69. Williams, Michael C., “Modernity, Identity, and Security: A Comment on the Copenhagen Controversy“, Review of International Studies, Vol. 24, No. 3 (July 1998), pp. 435-439
  70. Zambelli, Mirko, “Putting People at the Centre of the International Agenda: The Human Security Approach”, Die Friedens-Warte, Vol. 77, No. 1/2 (2002), Schwerpunktthema: Migration (2002), pp. 173-186