• Search Menu
  • Browse content in Arts and Humanities
  • Browse content in Archaeology
  • Anglo-Saxon and Medieval Archaeology
  • Archaeological Methodology and Techniques
  • Archaeology by Region
  • Archaeology of Religion
  • Archaeology of Trade and Exchange
  • Biblical Archaeology
  • Contemporary and Public Archaeology
  • Environmental Archaeology
  • Historical Archaeology
  • History and Theory of Archaeology
  • Industrial Archaeology
  • Landscape Archaeology
  • Mortuary Archaeology
  • Prehistoric Archaeology
  • Underwater Archaeology
  • Urban Archaeology
  • Zooarchaeology
  • Browse content in Architecture
  • Architectural Structure and Design
  • History of Architecture
  • Residential and Domestic Buildings
  • Theory of Architecture
  • Browse content in Art
  • Art Subjects and Themes
  • History of Art
  • Industrial and Commercial Art
  • Theory of Art
  • Biographical Studies
  • Byzantine Studies
  • Browse content in Classical Studies
  • Classical History
  • Classical Philosophy
  • Classical Mythology
  • Classical Literature
  • Classical Reception
  • Classical Art and Architecture
  • Classical Oratory and Rhetoric
  • Greek and Roman Epigraphy
  • Greek and Roman Law
  • Greek and Roman Papyrology
  • Greek and Roman Archaeology
  • Late Antiquity
  • Religion in the Ancient World
  • Digital Humanities
  • Browse content in History
  • Colonialism and Imperialism
  • Diplomatic History
  • Environmental History
  • Genealogy, Heraldry, Names, and Honours
  • Genocide and Ethnic Cleansing
  • Historical Geography
  • History by Period
  • History of Emotions
  • History of Agriculture
  • History of Education
  • History of Gender and Sexuality
  • Industrial History
  • Intellectual History
  • International History
  • Labour History
  • Legal and Constitutional History
  • Local and Family History
  • Maritime History
  • Military History
  • National Liberation and Post-Colonialism
  • Oral History
  • Political History
  • Public History
  • Regional and National History
  • Revolutions and Rebellions
  • Slavery and Abolition of Slavery
  • Social and Cultural History
  • Theory, Methods, and Historiography
  • Urban History
  • World History
  • Browse content in Language Teaching and Learning
  • Language Learning (Specific Skills)
  • Language Teaching Theory and Methods
  • Browse content in Linguistics
  • Applied Linguistics
  • Cognitive Linguistics
  • Computational Linguistics
  • Forensic Linguistics
  • Grammar, Syntax and Morphology
  • Historical and Diachronic Linguistics
  • History of English
  • Language Acquisition
  • Language Evolution
  • Language Reference
  • Language Variation
  • Language Families
  • Lexicography
  • Linguistic Anthropology
  • Linguistic Theories
  • Linguistic Typology
  • Phonetics and Phonology
  • Psycholinguistics
  • Sociolinguistics
  • Translation and Interpretation
  • Writing Systems
  • Browse content in Literature
  • Bibliography
  • Children's Literature Studies
  • Literary Studies (Asian)
  • Literary Studies (European)
  • Literary Studies (Eco-criticism)
  • Literary Studies (Romanticism)
  • Literary Studies (American)
  • Literary Studies (Modernism)
  • Literary Studies - World
  • Literary Studies (1500 to 1800)
  • Literary Studies (19th Century)
  • Literary Studies (20th Century onwards)
  • Literary Studies (African American Literature)
  • Literary Studies (British and Irish)
  • Literary Studies (Early and Medieval)
  • Literary Studies (Fiction, Novelists, and Prose Writers)
  • Literary Studies (Gender Studies)
  • Literary Studies (Graphic Novels)
  • Literary Studies (History of the Book)
  • Literary Studies (Plays and Playwrights)
  • Literary Studies (Poetry and Poets)
  • Literary Studies (Postcolonial Literature)
  • Literary Studies (Queer Studies)
  • Literary Studies (Science Fiction)
  • Literary Studies (Travel Literature)
  • Literary Studies (War Literature)
  • Literary Studies (Women's Writing)
  • Literary Theory and Cultural Studies
  • Mythology and Folklore
  • Shakespeare Studies and Criticism
  • Browse content in Media Studies
  • Browse content in Music
  • Applied Music
  • Dance and Music
  • Ethics in Music
  • Ethnomusicology
  • Gender and Sexuality in Music
  • Medicine and Music
  • Music Cultures
  • Music and Religion
  • Music and Media
  • Music and Culture
  • Music Education and Pedagogy
  • Music Theory and Analysis
  • Musical Scores, Lyrics, and Libretti
  • Musical Structures, Styles, and Techniques
  • Musicology and Music History
  • Performance Practice and Studies
  • Race and Ethnicity in Music
  • Sound Studies
  • Browse content in Performing Arts
  • Browse content in Philosophy
  • Aesthetics and Philosophy of Art
  • Epistemology
  • Feminist Philosophy
  • History of Western Philosophy
  • Metaphysics
  • Moral Philosophy
  • Non-Western Philosophy
  • Philosophy of Science
  • Philosophy of Language
  • Philosophy of Mind
  • Philosophy of Perception
  • Philosophy of Action
  • Philosophy of Law
  • Philosophy of Religion
  • Philosophy of Mathematics and Logic
  • Practical Ethics
  • Social and Political Philosophy
  • Browse content in Religion
  • Biblical Studies
  • Christianity
  • East Asian Religions
  • History of Religion
  • Judaism and Jewish Studies
  • Qumran Studies
  • Religion and Education
  • Religion and Health
  • Religion and Politics
  • Religion and Science
  • Religion and Law
  • Religion and Art, Literature, and Music
  • Religious Studies
  • Browse content in Society and Culture
  • Cookery, Food, and Drink
  • Cultural Studies
  • Customs and Traditions
  • Ethical Issues and Debates
  • Hobbies, Games, Arts and Crafts
  • Lifestyle, Home, and Garden
  • Natural world, Country Life, and Pets
  • Popular Beliefs and Controversial Knowledge
  • Sports and Outdoor Recreation
  • Technology and Society
  • Travel and Holiday
  • Visual Culture
  • Browse content in Law
  • Arbitration
  • Browse content in Company and Commercial Law
  • Commercial Law
  • Company Law
  • Browse content in Comparative Law
  • Systems of Law
  • Competition Law
  • Browse content in Constitutional and Administrative Law
  • Government Powers
  • Judicial Review
  • Local Government Law
  • Military and Defence Law
  • Parliamentary and Legislative Practice
  • Construction Law
  • Contract Law
  • Browse content in Criminal Law
  • Criminal Procedure
  • Criminal Evidence Law
  • Sentencing and Punishment
  • Employment and Labour Law
  • Environment and Energy Law
  • Browse content in Financial Law
  • Banking Law
  • Insolvency Law
  • History of Law
  • Human Rights and Immigration
  • Intellectual Property Law
  • Browse content in International Law
  • Private International Law and Conflict of Laws
  • Public International Law
  • IT and Communications Law
  • Jurisprudence and Philosophy of Law
  • Law and Politics
  • Law and Society
  • Browse content in Legal System and Practice
  • Courts and Procedure
  • Legal Skills and Practice
  • Primary Sources of Law
  • Regulation of Legal Profession
  • Medical and Healthcare Law
  • Browse content in Policing
  • Criminal Investigation and Detection
  • Police and Security Services
  • Police Procedure and Law
  • Police Regional Planning
  • Browse content in Property Law
  • Personal Property Law
  • Study and Revision
  • Terrorism and National Security Law
  • Browse content in Trusts Law
  • Wills and Probate or Succession
  • Browse content in Medicine and Health
  • Browse content in Allied Health Professions
  • Arts Therapies
  • Clinical Science
  • Dietetics and Nutrition
  • Occupational Therapy
  • Operating Department Practice
  • Physiotherapy
  • Radiography
  • Speech and Language Therapy
  • Browse content in Anaesthetics
  • General Anaesthesia
  • Neuroanaesthesia
  • Browse content in Clinical Medicine
  • Acute Medicine
  • Cardiovascular Medicine
  • Clinical Genetics
  • Clinical Pharmacology and Therapeutics
  • Dermatology
  • Endocrinology and Diabetes
  • Gastroenterology
  • Genito-urinary Medicine
  • Geriatric Medicine
  • Infectious Diseases
  • Medical Toxicology
  • Medical Oncology
  • Pain Medicine
  • Palliative Medicine
  • Rehabilitation Medicine
  • Respiratory Medicine and Pulmonology
  • Rheumatology
  • Sleep Medicine
  • Sports and Exercise Medicine
  • Clinical Neuroscience
  • Community Medical Services
  • Critical Care
  • Emergency Medicine
  • Forensic Medicine
  • Haematology
  • History of Medicine
  • Browse content in Medical Dentistry
  • Oral and Maxillofacial Surgery
  • Paediatric Dentistry
  • Restorative Dentistry and Orthodontics
  • Surgical Dentistry
  • Browse content in Medical Skills
  • Clinical Skills
  • Communication Skills
  • Nursing Skills
  • Surgical Skills
  • Medical Ethics
  • Medical Statistics and Methodology
  • Browse content in Neurology
  • Clinical Neurophysiology
  • Neuropathology
  • Nursing Studies
  • Browse content in Obstetrics and Gynaecology
  • Gynaecology
  • Occupational Medicine
  • Ophthalmology
  • Otolaryngology (ENT)
  • Browse content in Paediatrics
  • Neonatology
  • Browse content in Pathology
  • Chemical Pathology
  • Clinical Cytogenetics and Molecular Genetics
  • Histopathology
  • Medical Microbiology and Virology
  • Patient Education and Information
  • Browse content in Pharmacology
  • Psychopharmacology
  • Browse content in Popular Health
  • Caring for Others
  • Complementary and Alternative Medicine
  • Self-help and Personal Development
  • Browse content in Preclinical Medicine
  • Cell Biology
  • Molecular Biology and Genetics
  • Reproduction, Growth and Development
  • Primary Care
  • Professional Development in Medicine
  • Browse content in Psychiatry
  • Addiction Medicine
  • Child and Adolescent Psychiatry
  • Forensic Psychiatry
  • Learning Disabilities
  • Old Age Psychiatry
  • Psychotherapy
  • Browse content in Public Health and Epidemiology
  • Epidemiology
  • Public Health
  • Browse content in Radiology
  • Clinical Radiology
  • Interventional Radiology
  • Nuclear Medicine
  • Radiation Oncology
  • Reproductive Medicine
  • Browse content in Surgery
  • Cardiothoracic Surgery
  • Gastro-intestinal and Colorectal Surgery
  • General Surgery
  • Neurosurgery
  • Paediatric Surgery
  • Peri-operative Care
  • Plastic and Reconstructive Surgery
  • Surgical Oncology
  • Transplant Surgery
  • Trauma and Orthopaedic Surgery
  • Vascular Surgery
  • Browse content in Science and Mathematics
  • Browse content in Biological Sciences
  • Aquatic Biology
  • Biochemistry
  • Bioinformatics and Computational Biology
  • Developmental Biology
  • Ecology and Conservation
  • Evolutionary Biology
  • Genetics and Genomics
  • Microbiology
  • Molecular and Cell Biology
  • Natural History
  • Plant Sciences and Forestry
  • Research Methods in Life Sciences
  • Structural Biology
  • Systems Biology
  • Zoology and Animal Sciences
  • Browse content in Chemistry
  • Analytical Chemistry
  • Computational Chemistry
  • Crystallography
  • Environmental Chemistry
  • Industrial Chemistry
  • Inorganic Chemistry
  • Materials Chemistry
  • Medicinal Chemistry
  • Mineralogy and Gems
  • Organic Chemistry
  • Physical Chemistry
  • Polymer Chemistry
  • Study and Communication Skills in Chemistry
  • Theoretical Chemistry
  • Browse content in Computer Science
  • Artificial Intelligence
  • Computer Architecture and Logic Design
  • Game Studies
  • Human-Computer Interaction
  • Mathematical Theory of Computation
  • Programming Languages
  • Software Engineering
  • Systems Analysis and Design
  • Virtual Reality
  • Browse content in Computing
  • Business Applications
  • Computer Security
  • Computer Games
  • Computer Networking and Communications
  • Digital Lifestyle
  • Graphical and Digital Media Applications
  • Operating Systems
  • Browse content in Earth Sciences and Geography
  • Atmospheric Sciences
  • Environmental Geography
  • Geology and the Lithosphere
  • Maps and Map-making
  • Meteorology and Climatology
  • Oceanography and Hydrology
  • Palaeontology
  • Physical Geography and Topography
  • Regional Geography
  • Soil Science
  • Urban Geography
  • Browse content in Engineering and Technology
  • Agriculture and Farming
  • Biological Engineering
  • Civil Engineering, Surveying, and Building
  • Electronics and Communications Engineering
  • Energy Technology
  • Engineering (General)
  • Environmental Science, Engineering, and Technology
  • History of Engineering and Technology
  • Mechanical Engineering and Materials
  • Technology of Industrial Chemistry
  • Transport Technology and Trades
  • Browse content in Environmental Science
  • Applied Ecology (Environmental Science)
  • Conservation of the Environment (Environmental Science)
  • Environmental Sustainability
  • Environmentalist Thought and Ideology (Environmental Science)
  • Management of Land and Natural Resources (Environmental Science)
  • Natural Disasters (Environmental Science)
  • Nuclear Issues (Environmental Science)
  • Pollution and Threats to the Environment (Environmental Science)
  • Social Impact of Environmental Issues (Environmental Science)
  • History of Science and Technology
  • Browse content in Materials Science
  • Ceramics and Glasses
  • Composite Materials
  • Metals, Alloying, and Corrosion
  • Nanotechnology
  • Browse content in Mathematics
  • Applied Mathematics
  • Biomathematics and Statistics
  • History of Mathematics
  • Mathematical Education
  • Mathematical Finance
  • Mathematical Analysis
  • Numerical and Computational Mathematics
  • Probability and Statistics
  • Pure Mathematics
  • Browse content in Neuroscience
  • Cognition and Behavioural Neuroscience
  • Development of the Nervous System
  • Disorders of the Nervous System
  • History of Neuroscience
  • Invertebrate Neurobiology
  • Molecular and Cellular Systems
  • Neuroendocrinology and Autonomic Nervous System
  • Neuroscientific Techniques
  • Sensory and Motor Systems
  • Browse content in Physics
  • Astronomy and Astrophysics
  • Atomic, Molecular, and Optical Physics
  • Biological and Medical Physics
  • Classical Mechanics
  • Computational Physics
  • Condensed Matter Physics
  • Electromagnetism, Optics, and Acoustics
  • History of Physics
  • Mathematical and Statistical Physics
  • Measurement Science
  • Nuclear Physics
  • Particles and Fields
  • Plasma Physics
  • Quantum Physics
  • Relativity and Gravitation
  • Semiconductor and Mesoscopic Physics
  • Browse content in Psychology
  • Affective Sciences
  • Clinical Psychology
  • Cognitive Psychology
  • Cognitive Neuroscience
  • Criminal and Forensic Psychology
  • Developmental Psychology
  • Educational Psychology
  • Evolutionary Psychology
  • Health Psychology
  • History and Systems in Psychology
  • Music Psychology
  • Neuropsychology
  • Organizational Psychology
  • Psychological Assessment and Testing
  • Psychology of Human-Technology Interaction
  • Psychology Professional Development and Training
  • Research Methods in Psychology
  • Social Psychology
  • Browse content in Social Sciences
  • Browse content in Anthropology
  • Anthropology of Religion
  • Human Evolution
  • Medical Anthropology
  • Physical Anthropology
  • Regional Anthropology
  • Social and Cultural Anthropology
  • Theory and Practice of Anthropology
  • Browse content in Business and Management
  • Business Strategy
  • Business Ethics
  • Business History
  • Business and Government
  • Business and Technology
  • Business and the Environment
  • Comparative Management
  • Corporate Governance
  • Corporate Social Responsibility
  • Entrepreneurship
  • Health Management
  • Human Resource Management
  • Industrial and Employment Relations
  • Industry Studies
  • Information and Communication Technologies
  • International Business
  • Knowledge Management
  • Management and Management Techniques
  • Operations Management
  • Organizational Theory and Behaviour
  • Pensions and Pension Management
  • Public and Nonprofit Management
  • Strategic Management
  • Supply Chain Management
  • Browse content in Criminology and Criminal Justice
  • Criminal Justice
  • Criminology
  • Forms of Crime
  • International and Comparative Criminology
  • Youth Violence and Juvenile Justice
  • Development Studies
  • Browse content in Economics
  • Agricultural, Environmental, and Natural Resource Economics
  • Asian Economics
  • Behavioural Finance
  • Behavioural Economics and Neuroeconomics
  • Econometrics and Mathematical Economics
  • Economic Systems
  • Economic History
  • Economic Methodology
  • Economic Development and Growth
  • Financial Markets
  • Financial Institutions and Services
  • General Economics and Teaching
  • Health, Education, and Welfare
  • History of Economic Thought
  • International Economics
  • Labour and Demographic Economics
  • Law and Economics
  • Macroeconomics and Monetary Economics
  • Microeconomics
  • Public Economics
  • Urban, Rural, and Regional Economics
  • Welfare Economics
  • Browse content in Education
  • Adult Education and Continuous Learning
  • Care and Counselling of Students
  • Early Childhood and Elementary Education
  • Educational Equipment and Technology
  • Educational Strategies and Policy
  • Higher and Further Education
  • Organization and Management of Education
  • Philosophy and Theory of Education
  • Schools Studies
  • Secondary Education
  • Teaching of a Specific Subject
  • Teaching of Specific Groups and Special Educational Needs
  • Teaching Skills and Techniques
  • Browse content in Environment
  • Applied Ecology (Social Science)
  • Climate Change
  • Conservation of the Environment (Social Science)
  • Environmentalist Thought and Ideology (Social Science)
  • Natural Disasters (Environment)
  • Social Impact of Environmental Issues (Social Science)
  • Browse content in Human Geography
  • Cultural Geography
  • Economic Geography
  • Political Geography
  • Browse content in Interdisciplinary Studies
  • Communication Studies
  • Museums, Libraries, and Information Sciences
  • Browse content in Politics
  • African Politics
  • Asian Politics
  • Chinese Politics
  • Comparative Politics
  • Conflict Politics
  • Elections and Electoral Studies
  • Environmental Politics
  • European Union
  • Foreign Policy
  • Gender and Politics
  • Human Rights and Politics
  • Indian Politics
  • International Relations
  • International Organization (Politics)
  • International Political Economy
  • Irish Politics
  • Latin American Politics
  • Middle Eastern Politics
  • Political Methodology
  • Political Communication
  • Political Philosophy
  • Political Sociology
  • Political Behaviour
  • Political Economy
  • Political Institutions
  • Political Theory
  • Politics and Law
  • Public Administration
  • Public Policy
  • Quantitative Political Methodology
  • Regional Political Studies
  • Russian Politics
  • Security Studies
  • State and Local Government
  • UK Politics
  • US Politics
  • Browse content in Regional and Area Studies
  • African Studies
  • Asian Studies
  • East Asian Studies
  • Japanese Studies
  • Latin American Studies
  • Middle Eastern Studies
  • Native American Studies
  • Scottish Studies
  • Browse content in Research and Information
  • Research Methods
  • Browse content in Social Work
  • Addictions and Substance Misuse
  • Adoption and Fostering
  • Care of the Elderly
  • Child and Adolescent Social Work
  • Couple and Family Social Work
  • Developmental and Physical Disabilities Social Work
  • Direct Practice and Clinical Social Work
  • Emergency Services
  • Human Behaviour and the Social Environment
  • International and Global Issues in Social Work
  • Mental and Behavioural Health
  • Social Justice and Human Rights
  • Social Policy and Advocacy
  • Social Work and Crime and Justice
  • Social Work Macro Practice
  • Social Work Practice Settings
  • Social Work Research and Evidence-based Practice
  • Welfare and Benefit Systems
  • Browse content in Sociology
  • Childhood Studies
  • Community Development
  • Comparative and Historical Sociology
  • Economic Sociology
  • Gender and Sexuality
  • Gerontology and Ageing
  • Health, Illness, and Medicine
  • Marriage and the Family
  • Migration Studies
  • Occupations, Professions, and Work
  • Organizations
  • Population and Demography
  • Race and Ethnicity
  • Social Theory
  • Social Movements and Social Change
  • Social Research and Statistics
  • Social Stratification, Inequality, and Mobility
  • Sociology of Religion
  • Sociology of Education
  • Sport and Leisure
  • Urban and Rural Studies
  • Browse content in Warfare and Defence
  • Defence Strategy, Planning, and Research
  • Land Forces and Warfare
  • Military Administration
  • Military Life and Institutions
  • Naval Forces and Warfare
  • Other Warfare and Defence Issues
  • Peace Studies and Conflict Resolution
  • Weapons and Equipment

The Oxford Handbook of International Security

The Oxford Handbook of International Security

The Oxford Handbook of International Security

Alexandra Gheciu is professor at the Graduate School of Public and International Affairs and associate director of the Centre for International Policy Studies at the University of Ottawa.

William C. Wohlforth is the Daniel Webster Professor in the Department of Government at Dartmouth College.

  • Cite Icon Cite
  • Permissions Icon Permissions

Future-oriented questions are woven through the study and practice of international security. The 48 essays collected in this Handbook use such questions to provide a tour of the most innovative and exciting new areas of research as well as major developments in established lines of inquiry. The results of their efforts are: the definitive statement of the state of international security and the academic field of security studies, a comprehensive portrait of expert assessments of expected developments in international security at the onset of the twenty-first century’s second decade, and a crucial staging ground for future research agendas.

Signed in as

Institutional accounts.

  • Google Scholar Indexing
  • GoogleCrawler [DO NOT DELETE]

Personal account

  • Sign in with email/username & password
  • Get email alerts
  • Save searches
  • Purchase content
  • Activate your purchase/trial code
  • Add your ORCID iD

Institutional access

Sign in with a library card.

  • Sign in with username/password
  • Recommend to your librarian
  • Institutional account management
  • Get help with access

Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:

IP based access

Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.

Sign in through your institution

Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.

  • Click Sign in through your institution.
  • Select your institution from the list provided, which will take you to your institution's website to sign in.
  • When on the institution site, please use the credentials provided by your institution. Do not use an Oxford Academic personal account.
  • Following successful sign in, you will be returned to Oxford Academic.

If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.

Enter your library card number to sign in. If you cannot sign in, please contact your librarian.

Society Members

Society member access to a journal is achieved in one of the following ways:

Sign in through society site

Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:

  • Click Sign in through society site.
  • When on the society site, please use the credentials provided by that society. Do not use an Oxford Academic personal account.

If you do not have a society account or have forgotten your username or password, please contact your society.

Sign in using a personal account

Some societies use Oxford Academic personal accounts to provide access to their members. See below.

A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.

Some societies use Oxford Academic personal accounts to provide access to their members.

Viewing your signed in accounts

Click the account icon in the top right to:

  • View your signed in personal account and access account management features.
  • View the institutional accounts that are providing access.

Signed in but can't access content

Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.

For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.

Our books are available by subscription or purchase to libraries and institutions.

  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Rights and permissions
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright © 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Programs submenu

Regions submenu, topics submenu, cyber leaders series: the future of cyber on the african continent; a conversation with kenya's ps tanui, outcomes and implications of the 2024 solomon islands election, the next generation of national security leaders: a conversation with major general arnold punaro.

  • Abshire-Inamori Leadership Academy
  • Aerospace Security Project
  • Africa Program
  • Americas Program

Arleigh A. Burke Chair in Strategy

  • Asia Maritime Transparency Initiative
  • Asia Program
  • Australia Chair

Brzezinski Chair in Global Security and Geostrategy

  • Brzezinski Institute on Geostrategy
  • Chair in U.S.-India Policy Studies
  • China Power Project
  • Chinese Business and Economics
  • Defending Democratic Institutions
  • Defense-Industrial Initiatives Group
  • Defense 360
  • Defense Budget Analysis
  • Diversity and Leadership in International Affairs Project
  • Economics Program
  • Emeritus Chair in Strategy
  • Energy Security and Climate Change Program
  • Europe, Russia, and Eurasia Program
  • Freeman Chair in China Studies
  • Futures Lab
  • Geoeconomic Council of Advisers
  • Global Food and Water Security Program
  • Global Health Policy Center
  • Hess Center for New Frontiers
  • Human Rights Initiative
  • Humanitarian Agenda
  • Intelligence, National Security, and Technology Program

International Security Program

  • Japan Chair
  • Kissinger Chair
  • Korea Chair
  • Langone Chair in American Leadership
  • Middle East Program
  • Missile Defense Project
  • Project on Critical Minerals Security
  • Project on Fragility and Mobility
  • Project on Nuclear Issues
  • Project on Prosperity and Development
  • Project on Trade and Technology
  • Renewing American Innovation Project
  • Scholl Chair in International Business
  • Smart Women, Smart Power
  • Southeast Asia Program
  • Stephenson Ocean Security Project
  • Strategic Technologies Program
  • Transnational Threats Project
  • Wadhwani Center for AI and Advanced Technologies
  • All Regions
  • Australia, New Zealand & Pacific
  • Middle East
  • Russia and Eurasia
  • American Innovation
  • Civic Education
  • Climate Change
  • Cybersecurity
  • Defense Budget and Acquisition
  • Defense and Security
  • Energy and Sustainability
  • Food Security
  • Gender and International Security
  • Geopolitics
  • Global Health
  • Human Rights
  • Humanitarian Assistance
  • Intelligence
  • International Development
  • Maritime Issues and Oceans
  • Missile Defense
  • Nuclear Issues
  • Transnational Threats
  • Water Security

Geopolitics and International Security

The International Security Program , the Arleigh A. Burke Chair in Strategy , the Zbigniew Brzezinski Chair in Global Security and Geostrategy , and regional programs analyze the threats and opportunities shaping global security.

Photo: Sean Gallup/Getty Images

Photo: Sean Gallup/Getty Images

NATO and Economic Security: A Political Oxymoron or Inevitability?

A new commentary from the Project on Trade and Technology explores the prospect of NATO expanding its focus from traditional defense to the economic security realm.

Commentary by Emily Benson and Pau Alvarez-Aragones — May 15, 2024

Photo: MANDEL NGAN/AFP via Getty Images

Victory in Ukraine Starts with Addressing Five Strategic Problems

Report by Benjamin Jensen and Elizabeth Hoffman — May 15, 2024

Photo: SIMON MAINA/AFP/Getty Images

Keeping the Embers Alive: Biden Reignites U.S.-Africa Relations with Kenyan State Visit

Commentary by Mvemba Phezo Dizolele, Cameron Hudson, Khasai Makhulo, and Catherine Nzuki — May 10, 2024

Photo: Hannelore Foerster/Getty Images

Europe’s Fiscal Crossroads

Report by Max Bergmann and Federico Steinberg — May 8, 2024

Latest Podcasts

China Power Podcast Banner

Taiwan's Upcoming Presidential Inauguration: A Conversation with Dr. Lauren Dickey

Podcast Episode by Bonny Lin and Lauren Dickey — May 17, 2024

Photo: CSIS

Singapore's New Leader with Chong Ja Ian

Podcast Episode by Gregory B. Poling, Japhet Quitzon, and Lauren Mai — May 16, 2024

Russian Roulette Banner

"Collisions: The Origins of the War in Ukraine and the New Global Instability," the latest book by Michael Kimmage

Podcast Episode by Maria Snegovaya and Michael Kimmage — May 16, 2024

Pekingology Podcast Banner

Beyond China's Black Box

Podcast Episode by Jude Blanchette — May 16, 2024

Past Events

Photo: MARCOS PIN/AFP/Getty Images

Cooperative Approaches to Counter-Narcotics: Perspectives from the Director of National Drug Control Policy

Photo: Omar Havana/Getty Images

Strengthening NATO's European Pillar

Photo: GERARD CERLES/AFP/Getty Images

Super Election Year: Maintaining Transatlantic Unity

Photo: Win McNamee/Getty Images

The New Era of U.S.-Japan Strategic Cooperation: A Dialogue with Japanese Lawmakers

Photo: Andrew Harrer/Bloomberg via Getty Images

North American Economic Security in an Era of Geopolitical Uncertainty

Photo: DIMITAR DILKOFF/AFP via Getty Images

Collisions: The Origins of the War in Ukraine and the New Global Instability with Michael Kimmage and Mary Elise Sarotte

Photo: Drew Angerer/Getty Images

'Across the Aisle' on Hostage Diplomacy

Photo: George Rose/Getty Images

The Future of the Indo-Pacific with the Coast Guard Commandant

Related programs.

Photo: Alex Wong/Getty Images

Hidden Reach

Jon B. Alterman

Jon B. Alterman

Eliot A. Cohen

Eliot A. Cohen

Seth G. Jones

Seth G. Jones

Emily Harding

Emily Harding

Clayton Swope

Clayton Swope

Max Bergmann

Max Bergmann

Christopher B. Johnstone

Christopher B. Johnstone

Victor Cha

All Geopolitics and International Security Content

Type open filter submenu.

  • Article (1423)
  • Event (777)
  • Expert/Staff (77)
  • Podcast Episode (974)
  • Podcast Series (2)
  • Report (852)

Article Type open filter submenu

Report type open filter submenu, region open filter submenu.

  • Afghanistan (182)
  • Africa (231)
  • Americas (414)
  • Arctic (53)
  • Asia (1109)
  • Australia, New Zealand & Pacific (124)
  • Caribbean Security (37)
  • Central Asia (54)
  • China (626)
  • Eastern Europe (239)
  • Egypt and the Levant (192)
  • Europe (650)
  • European Union (269)
  • Japan (193)
  • Korea (380)
  • Middle East (802)
  • North Africa (94)
  • North Africa (64)
  • North America (390)
  • Pakistan (50)
  • Russia (431)
  • Russia and Eurasia (429)
  • South America (82)
  • Southeast Asia (237)
  • Sub-Saharan Africa (104)
  • The Gulf (244)
  • The South Caucasus (33)
  • Turkey (79)

Please join Senior Fellow Kathryn Paik for a virtual discussion focused on the recent election in the Solomon Islands examining its geopolitical implications for the nation itself, the region, and the relationship between the United States and the Solomon Islands.

Event — May 20, 2024

Photo:  Hagen Hopkins/Getty Images

In this episode of the China Power Podcast, Dr. Lauren Dickey joins us to discuss Taiwan’s upcoming inauguration of president-elect William Lai. 

CSIS ChinaPower

In this episode of Pekingology, Freeman Chair in China Studies Jude Blanchette is joined by Jacob Stokes, Senior Fellow with the Indo-Pacific Security Program at the Center for a New American Security. They discuss China’s foreign policy decision making and his new report.

CSIS Pekingology

On May 2, 2024, Maria sat down with Michael Kimmage and Mary Elise Sarotte to discuss Michael's newest book, "Collisions the Origins of the War in Ukraine, and the New Global Instability."

Russian Roulette podcast logo

Face Off: US-China

Former New York Times Beijing bureau chief Jane Perlez joins the show to discuss her new Harvard podcast and the latest tensions in the U.S.-China relationship.  

Podcast Episode by H. Andrew Schwartz — May 16, 2024

CSIS the truth of the matter

Greg and Elina chat with Chong Ja Ian about Singapore under Lawrence Wong’s premiership. Japhet and Lauren cover the latest from the region.

CSIS Southeast Asia Radio

The Murky World of Deepfakes

In her aptly named scientific study, “ As Good as A Coin Toss ,” Horizon Fellow Di Cooke joins Dr. Kathleen McInnis to walk through the murky world of deepfakes and the countermeasures that should be prioritized to mitigate the dangers posed by weaponized synthetic media.

Podcast Episode by Kathleen McInnis and Di Cooke — May 15, 2024

CSIS Smart Women, Smart Power

Bonus Episode: Protests in Georgia and European Implications with Tinatin Japaridze and Eto Buziashvili

Max discusses the ongoing protests taking place in Georgia with Tinatin Japaridze and Eto Buziashvili. 

Podcast Episode by Max Bergmann — May 15, 2024

CSIS

The new assistance package passed by Congress requires the administration to produce a U.S. strategy for supporting Ukraine. This piece outlines five key issues this strategy should address.

Photo: MANDEL NGAN/AFP via Getty Images

An audio version of “NATO and Economic Security: A Political Oxymoron or Inevitability?,” a new commentary by CSIS’s Emily Benson and Pau Alvarez-Aragones. This audio was generated with text-to-speech by Eleven Labs. 

Podcast Episode by Emily Benson and Pau Alvarez-Aragones — May 15, 2024

Audio Briefs

Harvard Kennedy School Library & Research Services

  • Harvard Library
  • Research Guides
  • HKS Library & Research Services

National & International Security

Articles & reports, arms & expenditures, armed conflict & terrorism, think tanks, hot topic: ukraine.

  • Books on the Ukraine-Russia Crisis
  • Articles and Reports on Ukraine

Harvard Kennedy School Research Guides

Other research guides.

Profile Photo

  • Book an in-person meeting at https://ken.sc/meet-a-librarian-in-person
  • Book a virtual meeting at https://ken.sc/meet-a-librarian-virtual
  • Lawfare A blog dedicated to national security issues, published by the Lawfare Institute in cooperation with the Brookings Institution.
  • Politico Pro (Harvard Login) In depth news and analysis on current issues before Congress with extra subscriber-only content. Includes defense and cybersecurity news pages.
  • Just Security National security blog with numerous contributors.
  • Foreign Policy (Harvard Login) Leading magazine for in-depth analysis of U.S. foreign policy, and relations with Russia, North Korea, the Middle East and Europe.Direct link to site's security channel.
  • Oxford Handbook on International Security (Harvard Login) The 48 essays collected in this Handbook use such questions to provide a tour of the most innovative and exciting new areas of research as well as major developments in established lines of inquiry in international security studies.
  • Oxford Handbook on US National Security (Harvard Login) Contributors include senior practitioners in US national security institutions and top academics in the field. Essays are geared toward both scholars within academia as well as graduate students in practitioner-oriented programs.
  • Research Handbook on the EU’s Common Foreign and Security Policy (Harvard Login) Examines the law, policy and practice of the EU’s Common Foreign and Security Policy, including the Common Security and Defence, and gauges its interactions with the other external policies of the Union (including trade, development, energy), as well as the evolving political and economic challenges that face the European Union.
  • Routledge Handbook of Deradicalisation and Disengagement (Harvard Login)
  • DTIC Online A searchable database for the full-text of U.S Department of Defense research publications. Includes technical reports, dissertations and Congressional testimony.
  • Military & Government Collection (Harvard Login) Provides full text access to more than 300 journals on military and government topics.
  • ProQuest Military Database (Harvard Login) Includes scholarly and trade publications covering a wide range of topics, from military technology and armaments to defense policy, national and international security, counterterrorism, etc.
  • Oxford Bibliographies (Harvard Login) Recent articles written by academic experts, with commentary and annotations on a variety of international and national security topics.
  • US Department of State,Country Reports on Terrorism Annual report on trends and events in international terrorism that occur in individual countries.
  • National Academies Press Published reports by the National Academies of Sciences, Engineering and Medicine. Includes large selection of security topics.
  • East View Russia Military and Security Periodicals Russian defense and security journals from official and independent sources. Eastview also includes the leading English language Russian defense journal, Moscow Defense Brief
  • U.S Declassified Documents (Harvard Login) The majority of these documents are presidential records and all of them were formerly classified. They provide a unique, behind-the-scenes view of the highest level of American policymaking on the most sensitive issues of national security and foreign policy.
  • Digital National Security Archive (Harvard Login) Over 43,000 of the most important declassified documents that led to key policy decisions in the post-World War II era.
  • Homeland Security Digital Library (Harvard Login) Access to U.S. policy documents, presidential directives, and national strategy documents.
  • US Department of Defense Archives Includes speeches, press releases, stories, contracts and other publications dating back to the mid 1990s.

Statistics & Data

  • DoD Budget Request Materials The Under Secretary of Defense (Comptroller's) budget materials site provides detailed documentation for the current and past DoD budget requests, including the National Defense Budget Estimates from 1998 to present (the "Green Book").
  • Global Firepower rankings Commercial site that ranks countries by each nation's war-making capabilities.
  • Military Balance (Harvard Login) Published by the IISS, the Military Balance is the annual assessment of the military capabilities and defense economics of 170 countries world-wide, produced annually by the IISS since 1961.
  • SIPRI Military Expenditure Database Military expenditure data based on open sources only, including a SIPRI questionnaire which is sent out annually to all participating countries.
  • SIPRI Yearbook: World Armaments and Disarmament (Print Only) This annual yearbook is a compendium of data and analysis in the areas of: security and conflicts, military spending and armaments and non-proliferation, arms control and disarmament.
  • Small Arms Survey Includes the following data on global violent deaths,global firearms holdings, peace operations data set, small arms trade transparency barometer and unplanned explosions at munitions sites
  • United Nations Report on Military Expenditures Searchable database of military expenditures by country.
  • World Military Expenditures and Arms Transfers (WMEAT) Annual publication from the U.S. Department of State's Bureau of Arms Control, Verification and Compliance that provides statistical information and in-depth analysis on military expenditures, arms transfers, armed forces, and related economic data for each country of the world. Reports issued under previous administrations can be found in the "archived reports" section; most recently: 2017-2021 , 2009-2017 .
  • Correlates of War Project Includes datasets on international relations topics, including international conflict, militarized international disputes, bilateral trade, and diplomatic exchanges.
  • CPOST Suicide Attack Database Comprises the most complete and comprehensive list of suicide attacks since 1980. Hosted by University of Chicago's Project on Security & Terrorism.
  • Global Terrorism Database Hosted by University of Maryland, an open-source database that includes information on terrorist events around the world. Includes data on domestic, transnational and international terrorist incidents.
  • Terrorism & Preparedness Data Resource Center ICPSR-hosted archive containing data about terrorism, homeland security and government preparedness issues. Includes Terrorism and Preparedness Survey Archive with data from relevant surveys conducted around the world.
  • World Handbook of Political Indicators A set of country-level measures of contentious political events. Covers 231 countries and territories using 40 event forms to identify 263,912 events. Political events are identified by searching Reuters news wire stories.

Organizations

  • Center for Security Studies, ETH Zurich An online library that specifically focuses on international relations and security studies. The library now includes approximately 75,000 open source books, chapters, articles, reports, transcripts, etc. Hosted by Center for Security Studies (CSS) at ETH Zurich
  • Center for Strategic and Budgetary Assessments Think tank with detailed reports on national security strategy, defense planning and military investment options for the 21st century.
  • Center for Strategic and International Studies (CSIS) One of top US think tanks on national security and international relations.
  • Federation of American Scientists Contains CRS reports, issue briefs and other publications on national and international security issues connected to applied science and technology.
  • HKS Library Think Tank Search A Google Custom Search of nearly 700 think tanks and research center websites.
  • International Institute for Strategic Studies (IISS) British research institute with a focus on international security and international relations.
  • James Martin Center for Nonproliferation Studies (CNS) Largest non-governmental organization in the United States devoted exclusively to research and training on nonproliferation issues.
  • National Consortium for the Study of Terrorism and Responses to Terrorism A university-based research center committed to the scientific study of the causes and human consequences of terrorism in the United States and across the globe.
  • Rand Corporation A non-profit research think tank that publishes over 17,000 reports dating from 1948. Topics include criminal justice, national security, terrorism and international affairs.

For context on the current crisis in Ukraine, here are a few resources: 

Ukraine: What Everyone Needs to Know (Harvard Login)

Articles and Reports

  • HKS Insights and Analysis on the Russia-Ukraine War Read what Harvard Kennedy School faculty members and other experts are saying about the Russia-Ukraine war. From geopolitics to sanctions to the role of misinformation and cyberattacks, HKS scholars analyze the Russian invasion of Ukraine and what it means for the world.
  • Harvard Ukrainian Research Institute The website of HURI features extensive information on Ukraine, both historical and contemporary, including MAPA: Digital Atlas of Ukraine and a dedicated page with background and updates on Russia's War on Ukraine .
  • Congressional Research Service: Reports on Ukraine This links to a search for constantly updated research and analysis on Ukraine by CRS researchers.
  • EastView Universal Databases (Harvard Login) This collection of databases covers news, scholarly periodicals, and a wealth of primary sources on Russia, Ukraine, and other former Soviet republics, including the Ukrainian National Bibliography .
  • EMIS (Harvard Login) This database contains market research, company research, as well as economic information on emerging markets, including up-to-date information on Ukraine, Russia, and other parts of Eastern Europe.
  • American Bibliography of Slavic and East European Studies (ABSEES) (Harvard Login) This database indexes English-language humanities and social science scholarship on Eastern Europe and the former Soviet Union, starting in 1989.
  • Historical Abstracts (Harvard Login) This database surveys scholarship on world history from 1450 to the present and has excellent coverage of the history of Eastern Europe in a variety of languages.

Other Guides

  • Country Information Sources
  • International Relations
  • Harvard Library, United States Declassified Documents
  • Penn State University Libraries, Military Studies
  • Last Updated: Jul 26, 2023 11:49 AM
  • URL: https://guides.library.harvard.edu/hks/security

Harvard University Digital Accessibility Policy

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.

institution icon

International Security

In this issue.

issue cover image

  • Volume 33, Number 2, Fall 2008

restricted access

International Security publishes lucid, well-documented essays on all aspects of the control and use of force. Its articles cover contemporary policy issues, and probe historical and theoretical questions behind them. Essays in International Security have defined the debate on American national security policy and have set the agenda for scholarship on international security affairs.

The MIT Press

published by

Viewing issue, table of contents.

  • Assessing the Dangers of Illicit Networks: Why al-Qaida May Be Less Threatening Than Many Think
  • Mette Eilstrup-Sangiovanni, Calvert Jones

View HTML

  • Nuclear Stability in South Asia
  • Sumit Ganguly
  • Ten Years of Instability in a Nuclear South Asia
  • S. Paul Kapur
  • Security and Displacement in Iraq: Responding to the Forced Migration Crisis
  • Sarah Kenyon Lischer
  • Making the World Safe for Partial Democracy?: Questioning the Premises of Democracy Promotion
  • Arthur A. Goldsmith
  • pp. 120-147
  • Wishful Thinking or Buying Time?: The Logic of British Appeasement in the 1930s
  • Norrin M. Ripsman, Jack S. Levy
  • pp. 148-181
  • Correspondence: ASEAN, Regional Integration, and State Sovereignty
  • Hiro Katsumata, David Martin Jones, Michael L.R. Smith
  • pp. 182-188

Previous Issue

Volume 33, Number 1, Summer 2008

Volume 33, Number 3, Winter 2008/09

Additional Information

Copyright © 2008 The President and Fellows of Harvard College and the Massachusetts Institute of Technology.

Additional Issue Materials

external link

Project MUSE Mission

Project MUSE promotes the creation and dissemination of essential humanities and social science resources through collaboration with libraries, publishers, and scholars worldwide. Forged from a partnership between a university press and a library, Project MUSE is a trusted part of the academic and scholarly community it serves.

MUSE logo

2715 North Charles Street Baltimore, Maryland, USA 21218

+1 (410) 516-6989 [email protected]

©2024 Project MUSE. Produced by Johns Hopkins University Press in collaboration with The Sheridan Libraries.

Now and Always, The Trusted Content Your Research Requires

Project MUSE logo

Built on the Johns Hopkins University Campus

  • Recent news
  • Media centre
  • News archive
  • Nobel Peace Prize shortlist
  • Upcoming events
  • Recorded events
  • Annual Peace Address
  • Event archive
  • Project archive
  • Research groups
  • Recent publications
  • Publication archive
  • Current staff
  • Alphabetical list
  • Global Fellows
  • Practitioners in Residence
  • Replication data
  • Annual reports
  • How to find

Globalization and the Study of International Security

Journal article

Cha, Victor D. (2000) Globalization and the Study of International Security, Journal of Peace Research 37 (3): 391–403.

In spite of the plethora of literature on security and globalization, there is relatively little work written by security specialists that interconnects the two. In the case of security studies, this has been in no small part because the field remains entrenched in the 'foodfight' of competing realist, liberal, and constructionist research programs. In the case of the globalization literature, it has stemmed from a relatively stronger focus on the social and economic processes of globalization. This essay explores how the processes of globalization have fundamentally changed the way we think about security. It argues that non-physical security, diversification of threats, and the salience of identity are key effects of globalization in the security realm. These security effects translate into certain behavioral tendencies in a state's foreign policy that have thus far not been studied in the literature. First, globalization creates an interpenetration of foreign and domestic ('intermestic') issues such that national governments increasingly operate in spaces defined by the intersection of internal and external security. Second, globalization puts unprecedented bureaucratic innovation pressures on governments in their search for security, and creates multilateralist pressures to cooperate with substate and transnational partners rather than traditional allies. Third, globalization makes the calculation of relative capabilities extremely complex and non-linear. Finally, globalization compels contemplation of new modes of fighting as well as renders commonly accepted modes of strategic thinking and rational deterrence increasingly irrelevant. The 'new' security environment in the 21st century will operate increasingly in the space defined by the interpenetration between two spheres: globalization and national identity.

Victor D. Cha

PRIO logo

UN logo

Search the United Nations

  • Member States

Main Bodies

Secretary-general.

  • Secretariat
  • Emblem and Flag
  • ICJ Statute
  • Nobel Peace Prize

Peace and Security

  • Human Rights
  • Humanitarian Aid
  • Sustainable Development and Climate
  • International Law
  • Global Issues
  • Official Languages
  • Observances
  • Events and News
  • Get Involved
  • Israel-Gaza

Two female Swedish Marines walk down a street in Mali in 2018 with children in the background.

" To save succeeding generations from the scourge of war " are among the first very words of the UN Charter (in its Preamble), and those words were the main motivation for creating the United Nations, whose founders had lived through the devastation of two world wars by 1945. Since the UN's creation on 24 October 1945 (the date its Charter came into force), the United Nations has often been called upon to prevent disputes from escalating into war, or to help restore peace following the outbreak of armed conflict, and to promote lasting peace in societies emerging from wars.

  • Security Council

Over the decades, the UN has helped to end numerous conflicts, often through actions of the  Security Council & — the organ with primary responsibility, under the  United Nations Charter,  for the maintenance of international peace and security. When it receives a complaint about a threat to peace, the Council first recommends that the parties seek an agreement by peaceful means. In some cases, the Council itself investigates and mediates. It may appoint special representatives or request the Secretary-General to do so, or to use his good offices. It may set forth principles for a peaceful settlement.

When a dispute leads to fighting, the Council's first concern is to end it as soon as possible. On many occasions, the Council has issued ceasefire directives, which have helped to prevent major hostilities. It also deploys UN peacekeeping operations to reduce tensions in troubled areas, keep opposing forces apart, and create conditions for sustainable peace after settlements have been reached. The Council may decide on  enforcement measures ,  economic sanctions  (such as trade embargoes) or collective military action.

The Security Council has  15 Members  -5 permanent (United States, France, Russia, United Kingdom, and China), and 10 non-permanent members-. Each Member has one  vote . According to the Charter, all Member States are obligated to comply with Council decisions .

Reform of the Security Council

One of the issues of major concern at the international level is the stalemate in the Council's decision-making. This deadlock, largely due to the veto power of the five permanent members, is not new and has been synonymous with paralysis for the UN on many occasions.

During its sixty-second session, the General Assembly decided to begin informal plenary intergovernmental negotiations. The discussions started in the sixty-third session and were based on proposals made by the Member States. The dialogues focused on the question of equitable representation in the Security Council, an increase in its membership, and other matters related to the Council. The goal is to find a solution that will gain the widest possible political acceptance by Member States.

  • General Assembly

According to the Charter, the General Assembly can make recommendations on the general principles of cooperation for maintaining international peace and security, including disarmament, and for the peaceful settlement of any situation that might impair friendly relations among nations. The General Assembly may also discuss any question relating to international peace and security and make recommendations if the Security Council is not currently discussing the issue. 

Pursuant to its  “Uniting for Peace” resolution of November 1950 (resolution 377 (V)), the General Assembly may also take action if the Security Council fails to act, owing to the negative vote of a Permanent Member, in a case where there appears to be a threat to, or breach of peace, or an act of aggression. The Assembly can consider the matter  immediately in order to make recommendations to Members for collective measures to maintain, or restore, international peace and security.

The Assembly meets in regular sessions from September to December each year, and thereafter as required. It discusses specific issues through dedicated agenda items or sub-items, which lead to the adoption of resolutions.

The Charter empowers the Secretary-General to " bring to the attention of the Security Council any matter which in his opinion may threaten the maintenance of international peace and security ." One of the most vital roles played by the Secretary-General is the use of his " good offices " – steps taken publicly and in private that draw upon his independence, impartiality and integrity to prevent international disputes from arising, escalating or spreading.

Conflict Prevention

The main strategies to prevent disputes from escalating into conflict, and to prevent the recurrence of conflict, are preventive diplomacy and preventive disarmament. Preventive diplomacy refers to action taken to prevent disputes from arising or escalating into conflicts, and to limit the spread of conflicts as they arise. It may take the form of mediation, conciliation or negotiation.

Preventive diplomacy

Early warning is an essential component of prevention, and the United Nations carefully monitors developments around the world to detect threats to international peace and security, thereby enabling the Security Council and the Secretary-General to carry out preventive action. Envoys and special representatives of the Secretary-General are engaged in  mediation and preventive diplomacy throughout the world. In some trouble spots, the mere presence of a skilled envoy can prevent the escalation of tension. These envoys often cooperate with regional organizations.

Preventive disarmament

Complementing preventive diplomacy is preventive disarmament , which seeks to reduce the number of small arms in conflict-prone regions. In El Salvador, Liberia, Sierra Leone, Timor-Leste and elsewhere, this has entailed demobilizing combat forces, as well as collecting and destroying their weapons as part of an overall peace agreement. Destroying yesterday’s weapons prevents their use in tomorrow’s wars.

Preventing Genocide and Responsibility to Protect

Prevention requires apportioning responsibility and promoting collaboration between the concerned States and the international community. The duty to prevent and halt genocide and mass atrocities lies first and foremost with the State, but the international community has a role that cannot be blocked by the invocation of sovereignty. Sovereignty no longer exclusively protects States from foreign interference; it is a charge of responsibility where States are accountable for the welfare of their people. This principle is enshrined in article 1 of the  Genocide Convention  and embodied in the principle of “sovereignty as responsibility” and in the concept of the Responsibility to Protect.

The Special Adviser on the Prevention of Genocide  acts as a catalyst to raise awareness of the causes and dynamics of genocide, to alert relevant actors where there is a risk of genocide, and to advocate and mobilize for appropriate action. The Special Adviser on the Responsibility to Protect leads the conceptual, political, institutional and operational development of the Responsibility to Protect. The efforts of their Office include alerting relevant actors to the risk of genocide, war crimes, ethnic cleansing and crimes against humanity, enhancing the capacity of the United Nations to prevent these crimes, including their incitement.

Peacekeeping

United Nations peacekeeping operations are a vital instrument employed by the international community to advance peace and security.

The first UN peacekeeping mission was established in 1948 when the Security Council authorized the deployment of the  United Nations Truce Supervision Organization (UNTSO) to the Middle East to monitor the Armistice Agreement between Israel and its Arab neighbours. Since then, there have been more than 70 UN peacekeeping operations around the world.

Over 72 years, UN peacekeeping has evolved to meet the demands of different conflicts and a changing political landscape. Born at the time when Cold War rivalries frequently paralyzed the Security Council, UN peacekeeping goals were primarily limited to maintaining ceasefires and stabilizing situations on the ground, so that efforts could be made at the political level to resolve the conflict by peaceful means. 

UN peacekeeping expanded in the 1990s, as the end of the Cold War created new opportunities to end civil wars through negotiated peace settlements. Many conflicts ended, either through direct UN mediation, or through the efforts of others acting with UN support. Countries assisted included El Salvador , Guatemala , Namibia , Cambodia , Mozambique , Tajikistan , and  Burundi . In the late nineties, continuing crises led to new operations in the  Democratic Republic of the Congo , the  Central African Republic , Timor Leste , Sierra Leone and Kosovo .

In the new millennium, peacekeepers have been deployed to  Liberia ,  Côte d'Ivoire ,  Sudan ,  South Sudan ,  Haiti , and  Mali .

Today's conflicts are less numerous but deeply rooted. For example, the Democratic Republic of the Congo, Darfur, and South Sudan today, are in a second or third wave of conflict. And many are complicated by regional dimensions that are key to their solution. In fact, some two-thirds of peacekeeping personnel today are deployed amid ongoing conflict, where peace agreements are shaky or absent. Conflicts today are also increasingly intensive, involving determined armed groups with access to sophisticated armaments and techniques.

The nature of conflict has also changed over the years. UN peacekeeping, originally developed as a means of resolving inter-State conflict, has been increasingly applied over time to intra-State conflicts and civil wars. Although the military remains the backbone of most peacekeeping operations, today’s peacekeepers perform a variety of complex tasks, from helping to build sustainable institutions of governance, through human rights monitoring and security sector reform, to the disarmament, demobilization and reintegration of former combatants, and demining.

Peacebuilding

Within the United Nations, peacebuilding refers to efforts to assist countries and regions in their transitions from war to peace and to reduce a country's risk of lapsing or relapsing into conflict by strengthening national capacities for conflict management, and laying the foundations for sustainable peace and development.

Building lasting peace in war-torn societies is a daunting challenge for global peace and security. Peacebuilding requires sustained international support for national efforts across the broadest range of activities. For instance, peacebuilders monitor ceasefires, demobilize and reintegrate combatants, assist the return of refugees and displaced persons, help to organize and monitor elections of a new government, support justice and security sector reforms, enhance human rights protections, and foster reconciliation after past atrocities.

Peacebuilding involves action by a wide array of organizations of the UN system, including the World Bank , regional economic commissions, NGOs and local citizens’ groups. Peacebuilding has played a prominent role in  UN operations  in Bosnia and Herzegovina, Cambodia, El Salvador, Guatemala, Kosovo, Liberia and Mozambique, as well as more recently in Afghanistan, Burundi, Iraq, Sierra Leone and Timor-Leste. An example of inter-state peacebuilding has been the UN Mission in Ethiopia and Eritrea.

Recognizing that the UN needs to better anticipate and respond to the challenges of peacebuilding, the  2005 World Summit approved the creation of a new Peacebuilding Commission. In the resolutions establishing the  Peacebuilding Commission , resolution 60/180 and resolution 1645 , the UN General Assembly and the Security Council mandated it to bring together all relevant actors to advise on the proposed integrated strategies for post-conflict peacebuilding and recovery; to marshal resources and help ensure predictable financing for these activities; and to develop best practices in collaboration with political, security, humanitarian and development actors.

The resolutions also identify the need for the Commission to extend the period of international attention on post-conflict countries, and where necessary, highlight any gaps which threaten to undermine peacebuilding.

The General Assembly and Security Council resolutions establishing the Peacebuilding Commission also provided for the establishment of a  Peacebuilding Fund & and a Peacebuilding Support Office .

The Rule of Law

Promoting the  rule of law at the national and international levels is at the heart of the United Nations’ mission. Establishing respect for the rule of law is fundamental to achieving a durable peace in the aftermath of conflict, to the effective protection of human rights, and to sustained economic progress and development. The principle that everyone – from the individual to the State itself – is accountable to laws that are publicly promulgated, equally enforced and independently adjudicated, is a fundamental concept which drives much of the United Nations work. The main United Nations organs, including the General Assembly and the Security Council, play essential roles in supporting Member States to strengthen the rule of law, as do many United Nations entities.

Responsibility for the overall coordination of rule of law work by the United Nations system rests with the  Rule of Law Coordination and Resource Group , chaired by the Deputy Secretary-General and supported by the Rule of Law Unit. Members of the Group are the principals of 20 United Nations entities engaged in supporting Member States to strengthen the rule of law. Providing support from headquarters to rule of law activities at the national level, the Secretary-General designated the Department of Peacekeeping Operations (DPKO) and the United Nations Development Programme (UNDP) as the joint global focal point for the police, justice and corrections areas in the rule of law in post-conflict and other crisis situations. 

Women and Children in Conflict

In contemporary conflicts, up to 90 per cent of casualties are civilians, mostly women and children. Women in war-torn societies can face specific and devastating forms of sexual violence, which are sometimes deployed systematically to achieve military or political objectives. Moreover, women continue to be poorly represented in formal peace processes, although they contribute in many informal ways to conflict resolution.

However, the UN Security Council in its  resolution 1325 on women, peace and security has recognized that including women and gender perspectives in decision-making can strengthen prospects for sustainable peace. The landmark resolution addresses the situation of women in armed conflict and calls for their participation at all levels of decision-making on conflict resolution and peacebuilding.

Since the agenda was set with the core principles of resolution 1325, the Security Council has adopted seven supporting resolutions —  1820 ,  1888 , 1889 , 1960 ,  2106 ,  2331  and  2467 -. All the resolutions focus on two key goals: strengthening women’s participation in decision-making and ending sexual violence and impunity.

Since 1999, the systematic engagement of the UN Security Council has firmly placed the situation of children affected by armed conflict as an issue affecting peace and security. The Security Council has created a strong framework and provided the Secretary-General with tools to respond to violations against children.  The Special Representative of the Secretary-General for Children and Armed Conflict serves as the leading UN advocate for the protection and well-being of children affected by armed conflict.

Peaceful uses of outer space

The UN works to ensure that outer space is used for peaceful purposes and that the benefits from space activities are shared by all nations. This concern for the peaceful uses of outer space began soon after the launch of Sputnik — the first artificial satellite — by the Soviet Union in 1957 and has kept pace with advances in space technology. The UN has played an important role by developing international space law and by promoting international cooperation in space science and technology.

The Vienna-based  United Nations Office for Outer Space serves as the secretariat for the  Committee on the Peaceful Uses of Outer Space and its subcommittees, and assists developing countries in using space technology for development.

  • UN Peacekeeping
  • International Day of UN Peacekeepers (29 May)
  • Child and Youth Safety Online
  • Disarmament

Related Stories from the UN System

Two UN Mine Action Service staff demine a road.

Read more about peace and security.

  • Economic and Social Council
  • Trusteeship Council
  • International Court of Justice

Departments / Offices

  • UN System Directory
  • UN System Chart
  • Global Leadership
  • UN Information Centres

Resources / Services

  • Emergency information
  • Reporting Wrongdoing
  • Guidelines for gender-inclusive language
  • UN iLibrary
  • UN Chronicle
  • UN Yearbook
  • Publications for sale
  • Media Accreditation
  • NGO accreditation at ECOSOC
  • NGO accreditation at DGC
  • Visitors’ services
  • Procurement
  • Internships
  • Academic Impact
  • UN Archives
  • UN Audiovisual Library
  • How to donate to the UN system
  • Information on COVID-19 (Coronavirus)
  • Africa Renewal
  • Ten ways the UN makes a difference
  • High-level summits 2023

Key Documents

  • Universal Declaration of Human Rights
  • Convention on the Rights of the Child
  • Statute of the International Court of Justice
  • Annual Report of the Secretary-General on the Work of the Organization

News and Media

  • Press Releases
  • Spokesperson
  • Social Media
  • The Essential UN
  • Awake at Night podcast

Issues / Campaigns

  • Sustainable Development Goals
  • Our Common Agenda
  • Summit of the Future
  • Climate Action
  • UN and Sustainability
  • Action for Peacekeeping (A4P)
  • Global Ceasefire
  • Global Crisis Response Group
  • Call to Action for Human Rights
  • Disability Inclusion Strategy
  • Fight Racism
  • Hate Speech
  • LGBTIQ+ People
  • Safety of Journalists
  • Rule of Law
  • Action to Counter Terrorism
  • Victims of Terrorism
  • Children and Armed Conflict
  • Violence Against Children (SRSG)
  • Sexual Violence in Conflict
  • Refugees and Migrants
  • Action Agenda on Internal Displacement
  • Spotlight Initiative
  • Preventing Sexual Exploitation and Abuse
  • Prevention of Genocide and the Responsibility to Protect
  • The Rwanda Genocide
  • The Holocaust
  • The Question of Palestine
  • The Transatlantic Slave Trade
  • Decolonization
  • Messengers of Peace
  • Roadmap for Digital Cooperation
  • Digital Financing Task Force
  • Data Strategy
  • Countering Disinformation
  • UN75: 2020 and Beyond
  • Women Rise for All
  • Stop the Red Sea Catastrophe
  • Black Sea Grain Initiative Joint Coordination Centre
  • Türkiye-Syria Earthquake Response (Donate)
  • Israel-Gaza Crisis
  • Tools and Resources
  • Customer Services
  • Conflict Studies
  • Development
  • Environment
  • Foreign Policy
  • Human Rights
  • International Law
  • Organization
  • International Relations Theory
  • Political Communication
  • Political Economy
  • Political Geography
  • Political Sociology
  • Politics and Sexuality and Gender
  • Qualitative Political Methodology
  • Quantitative Political Methodology
  • Security Studies
  • Share This Facebook LinkedIn Twitter

Article contents

Critical theory, security, and emancipation.

  • K.M. Fierke K.M. Fierke School of International Relations, University of St Andrews
  • https://doi.org/10.1093/acrefore/9780190846626.013.138
  • Published in print: 01 March 2010
  • Published online: 30 November 2017

Critical theory in International Relations originated from the Marxist tradition which, during the mid- to late Cold War, formed the basis of dependency and world systems theory. In the years before and after the Cold War, critical theory became part of a larger post-positivist challenge to the discipline and to the development of critical security studies. At the heart of contestation within the broader arena of critical security is the concept of emancipation, developed by members of the Frankfurt School such as Theodor W. Adorno and Max Horkheimer. Several key debates have been at the center of critical security studies relating to the construction of threats, identity and difference, human security, and emancipation. In particular, critical security analysts have addressed the question of how, given the range of threats or risks that exist in the world, some threats come to have priority over others and become the focus of discourses of security. Also, some scholars have disputed the idea that identity is dependent on difference. The concept of human security shifts attention away from states to individuals, emphasizing human rights, safety from violence, and sustainable development. In the case of emancipation, critical theorists have expressed concern that the concept is too closely linked with modernity, meta-narratives, especially Marxism and liberalism, and the Enlightenment belief that humanity is progressing toward a more perfect future. What is needed is not to avoid emancipation per se, but to pay close attention to its underlying assumptions.

  • critical theory
  • Frankfurt School
  • critical security studies
  • emancipation
  • human security

Introduction

Critical theory in International Relations can mean several things. Critical theory refers to a body of thought growing out of the Marxist tradition, which, during the mid- to late Cold War informed dependency and world systems theory. In the decade prior to and following the end of the Cold War, critical theory, informed by Gramsci and the Frankfurt School, both of which have a Marxist lineage, became part of a larger post-positivist challenge to the discipline and to the development of critical security studies. In this context, the word critical was also used in relation to a much broader array of approaches, including postmodern, feminist, and postcolonial accounts. At the heart of this widespread critique was a concern for those outside established structures of power, who had been excluded from accounts of international relations, or, more specifically, discussions of security. In this respect, the attempt to dismantle the dominant state and Eurocentric assumptions of international relations and security studies was part of an attempt to allow a space for the voices of the marginalized and the suffering to be heard within a discipline and a subfield that had prioritized questions relating to the threat and use of force by states. For critical theory, and critical security studies as its offshoot, theory and practice are closely intertwined. The theorist does not observe the world objectively, but rather is always situated in a historical context and responding to a set of historically specific circumstances. In this respect, the critical developments within international relations have to be understood against the backdrop of critical social movements in the world. Emancipation is a specific concept, developed by members of the Frankfurt School, such as Adorno and Horkheimer, which has been at the heart of contestation within the broader arena of critical security studies.

Classical and Older Literatures

The discussion of classical literatures of critical theory has to be distinguished from the discussion of classical literatures of security in so far as the two did not merge until the 1990s, with the development of critical security studies. Up to this point in time, development, a central concern of critical theory, and security, largely informed by realist thought, were separate areas of study and practice. Marxist and neo-Marxist international relations theories, which emerged during the Cold War, focused their critique primarily on dominant realist and liberal views of the international system. Like the Marxist tradition from which they derived, critical theories emphasized questions of hierarchy. Development studies addressed questions of inequality and poverty, while security studies focused on conflict and war. The latter was, during the first two decades of the Cold War, more often referred to as strategic or national security studies.

The critical Marxist literature presented a critique of the more liberal model of development, which assumed that societies in the South could replicate social and economic changes experienced by the North since the eighteenth century . The liberal model located the lack of development within individual states, ignoring the embeddedness of these states in historical, more global relationships. By contrast, the critical Marxist literature was premised on the idea that globalization is not a new phenomenon. The underdevelopment of the South went hand in hand with the development of the North in a capitalist world economy. Critics of European imperialism in the early part of the twentieth century , and not least Lenin ( 1939 / 1988 ), argued that capitalism was fueled by the need to expand in search of profit. Imperialism was a manifestation of this global expansion in pursuit of wealth. In the period following decolonization, these arguments were adapted to explain less formal structures of control. Immanuel Wallerstein’s ( 1974 ) world systems theory provided a framework for understanding the relationship between the development of the industrial core, the underdevelopment of a periphery, which provided raw materials, and a semi-periphery, which produced luxury goods and provided a buffer against revolutionary transformation. Dependency theorists further examined how links between elites in North and South reproduced a relationship of Southern dependence and underdevelopment (Cardoso and Faletto 1979 ).

From the 1950s to the 1970s, a critical discourse of development became popular in areas of the periphery that had been historically exploited. This critical framework, like critical theory, placed the backwardness of the economies of the former colonies in a larger global context, in which the formal imperial relationship had, since decolonization, been replaced by less formal processes of exploitation. For instance, Northern companies purchased raw materials and labor power in the South below their true cost. Cheap labor and cheap Southern raw materials were transformed into manufactured goods in the North. In this critical discourse, the exploitative relationship was simply a new expression of the hierarchy that had constituted the capitalist world economy for centuries. It wasn’t that the South was undeveloped, but rather that it had been deliberately underdeveloped within a global relationship. Poverty was a direct consequence of how wealth was produced. This provided a global structural argument about the cause of poverty and legitimized practices on the part of Southern governments to intervene in the economy in order to lead the development process. At the time, many third world states joined together in calling for a New International Economic Order, or a reorganization of the global economy so that they would no longer be disadvantaged.

Critical Theory and Security

The 1980s saw the emergence of a neoliberal free market agenda, which pushed the critical arguments about underdevelopment into the background. At the same time, other offshoots of critical theory began to assume a place within International Relations, a development which was not unrelated to events in the world of Cold War security relations. US President Reagan’s rhetoric about limited nuclear war and demonstration shots over Europe revived fears of nuclear war, which spawned a political debate over the meaning of security, particularly in Europe. While NATO argued that nuclear weapons had blessed Europe with an unprecedented period of peace, peace and disarmament movements mobilized around arguments that the increasing likelihood of nuclear war made these weapons a source of insecurity rather than security. Reagan’s early policy, in the name of nuclear deterrence and mutually assured destruction, was one inspiration for this fear. However, against the background of these debates, in 1983 , he introduced the Strategic Defense Initiative (SDI), or “Star Wars,” followed, in subsequent years, by arguments that SDI would replace deterrence and make the “world sleep more secure.” After Soviet Premier Gorbachev came to power in 1985 , he also entered into the debate, arguing the need for New Thinking, to conceive of security in political terms, and to emphasize the importance of common security. Against this background, the two superpowers began to engage in a peace competition that led to face-to-face talks in Reykjavik and discussions, for the first time during the Cold War, of disarmament and not merely arms control. In 1989 , “velvet” revolutions shook Eastern Europe, and the Soviet Union watched as the communist regimes were dissolved, not by force but by popular demand.

The Cold War was declared over with the dismantling of the Berlin Wall, well before the dissolution of the Soviet Union in 1991 . Almost no one, and least of all the practitioners of security studies, saw the end of the Cold War coming. They were shocked both by the rapid course of events and by the fact that these changes did not fit with the realist assumptions of security studies. Not disarmament, nor velvet revolutions, nor a state relinquishing its sovereignty could be explained within a framework that defined security in terms of the threat and use of force by states. The sudden lack of a security problem, in addition to the apparent declining utility of military force, stimulated reflection and critical evaluation within the academy on the meaning of security.

These dramatic changes in the political world added momentum to the critique of international relations theory more generally, and security studies more specifically, which had been under way in the academy. In the post–World War II period, security studies, as well as conflict analysis, had been preoccupied with the attempt to develop the scientific status of the field, with a focus on deductive formal modeling, particularly of nuclear strategy (see, for instance, Schelling 1966 ), or the creation of empirical databases, such as the Correlates of War project, respectively. This emphasis on science in the academy, or, in the political world, on force structure, planning, and other technical problems related to nuclear and conventional weapons (Crawford 1991 :289), went hand in hand with a distancing from the more political aspects of security. This demise of the political was also evident in the prominence of neo-realism by the 1980s. Neo-realists, such as Waltz ( 1979 ), criticized earlier realisms for being reductionist, that is, for reducing the problem of insecurity to the level of the individual or the state instead of the system of anarchy. In the search for elegance and parsimony, neo-realism removed any traces of the human, the political, or the cultural from international relations and provided instead a general theory of international relations, and a set of categories for formulating causal hypotheses that could then be tested against the world.

While the preoccupation with force structures, neo-realism, and social science created distance from the politics of security, this was also the point at which it began to be reintroduced. The period leading up to the end of the Cold War gave rise to a more fundamental attack on the scientific pretensions of the field, which was related to a larger Third Debate between positivists and post-positivists in international relations theory. One early expression of this emerging debate was Robert Cox’s ( 1981 ) distinction between problem solving and critical theory, which questioned the politics of power that underpins dominant theories. Cox argued that problem solving theory takes the world as it is, and attempts to find solutions to problems within it; critical theory, by contrast, raises questions about the historical location of both the theorist and his or her theory. As he famously stated, “Theory is always for some one and for some purpose” ( 1981 :128). Around the same time, Barry Buzan ( 1983/1991 ) introduced the idea that security is an “essentially contested concept.” Somewhat later, post-structuralists, such as Richard Ashley ( 1984 ) and R.B.J. Walker ( 1987 ) exposed the absence of the political in international theory, the scientific pretensions of neorealism and the disciplining effect of the discourse of sovereignty. Constructivists, such as Nicholas Onuf ( 1989 ) and Alexander Wendt ( 1992 ) questioned the static view of anarchy, arguing that the world of international politics is not given but always in the process of being made. Analysts of gender, such as Cynthia Enloe ( 1989 ), Ann Tickner ( 1993 ), and Spike Peterson ( 1992 ), began to uncover the gendered assumptions embedded in the theories, concepts, and practices of international security. The application of security to a range of new and different threats, and the analysis of how threats are constructed, gave rise to a burgeoning literature on critical security studies.

Critical analysts of security were often accused of lacking either empirical pretensions or ability. Yet security studies had been plagued by this problem from the beginning. As Nye and Lynne-Jones ( 1988 :13) pointed out: “In the fortunate absence of empirical data on nuclear exchanges, the field [of security studies] encourages non-empirical analyses.” Given the dramatic changes in international politics, the questions raised by critical security studies, and the attempts to develop new approaches and answers, arguably were more in tune with a changing world than their counterparts in the mainstream. As Krause and Williams ( 1997 ) document, critical security studies gave rise to a large number of studies within a fairly short period of time. The main problem was that these scholars did not define “empirical” in a way that fits with the research program of the mainstream. The difference regards a question of how scholars might know the world they are analyzing.

While rationalists treat the identities of actors – as self-interest maximizers – as given, critical analysts argued that identities, threats, and interests are constructed in historically specific circumstances. The shift to an understanding of security as a social and political construction expands the potential for formulating questions relating specifically to processes of change, including how enemies transform their relationship into one of friendship, how threats are defined and how the use of force is constructed. These questions were more empirically relevant to the changing contexts of the post–Cold War world than general theory that assumes the sameness of security across time.

Changing Debates

Critical security studies is distinguished from a longer tradition of security studies by the adoption of a critical approach. However, the meaning of critical has itself been at the heart of the evolving debate. Since Cox formulated the distinction between critical and problem solving theory in 1981 , critical theorists, such as Ken Booth ( 1991 ; 2005 ) and Richard Wyn Jones ( 1999 ) have identified critical security studies (CSS) with Marxist traditions of critical theory, such as the Frankfurt School or Gramsci. Keith Krause and Michael Williams ( 1997 ) have argued that CSS is a useful way to categorize a range of approaches that have challenged the narrow metatheoretical assumptions of traditional security studies. Reinforcing the multiplicity of critical approaches, Fierke ( 2007 ) analyzed a range of concepts and debates that have defined critical security studies, and their relevance to real world problems. While the Copenhagen School does not claim to be critical, its important work on the securitization of threats (Buzan et al. 1998 ) or discourse analysis (Hansen 2006 ), has an important place in this literature. Critical security studies has grown in leaps and bounds over the last decade, and the arguments are often complex, drawing on a range of philosophical traditions, including, in addition to the Frankfurt School and Gramsci, Wittgenstein, Schmitt, Bourdieu, Foucault, and Derrida. The following explores a few key debates that have been at the center of critical security studies relating to the construction of threats, identity and difference, human security, and emancipation.

The Construction of Threats

Traditional security studies asked a question about how to respond to objective threats. Critical security analysts have begun with a different question about how, given the range of threats or risks that exist in the world, from the destruction of the environment to nuclear weapons to terrorism or human rights, some threats come to have priority over others and become the focus of discourses of security. The question can be asked more broadly in terms of how specific objects or phenomena come to be constituted as one type or another, that is, as “threats” (Wæver 1995 ), “crises” (Weldes 1996 ), “problems” (Dalby 2002 ) or “risks” (Beck 2003 ). These ascriptions of meaning are not always self-evident and any one has consequences for how actions or policy responses are constituted. Critics often confuse the issue by assuming that social construction of any of these is equivalent to fabrication, that is, if threats are constructed they don’t really exist. However, to call a threat a social construction is not, for instance, to deny that nuclear weapons exist or that they can maim or kill millions. The question, as posed by Weldes et al. ( 1999 :12) is rather one of “how one gets from here to such widely shared propositions as these: that the U.S. is threatened by Russian, but not British nuclear weapons; that Third World states are more likely to use nuclear weapons than Western countries; that Iraq’s nuclear potential is more threatening than the U.S. nuclear arsenal; and the U.S. is safer with nuclear weapons than without them.” The focus is the process by which objects embedded in one set of relationships are given meaning as threatening, while in another they are understood to be benign.

Conventional approaches to security start with an objective threat, which is assumed to exist independent of the routines, procedures, discourses and knowledge brought to bear by security agencies (Huysmans et al. 2006 :44). More critical approaches emphasize that threats are a product of a politics of representation. Far from being a purely external phenomenon, to which security agencies merely react, a potential threat is transformed into a security question through the active intervention of security agencies. Measurements of the scope and seriousness of threats are shaped by social, cultural, and political processes that produce some phenomena as “security” threats while largely ignoring others. In the process of reification, a human-made object or situation comes to be understood as a factual given that exists externally and independently of the agencies that produced it. It is not that weapons or threats of one kind or another have been made up but rather that the meaning attached to them, and the subsequent practice, has been molded in discourses. In this way, the actors and insecurities taken for granted in conventional security studies are called into question, thereby denaturalizing the state and its insecurities, demonstrating how both are culturally produced (Weldes et al. 1999 :10).

Critical scholars of security (Campbell 1998 ; Weldes et al. 1999 ; Huysmans et al. 2006 ) focus on the background assumptions and discourses belonging to a culture from which threats are defined. Their intent is to denaturalize what has come to be assumed in order to open a space for alternatives. The Copenhagen School has distinguished itself from the broader category of critical security studies, which it identifies with critical theorists and post-structuralists. While the latter through a process of denaturalization attempt to show that change is possible, the Copenhagen School emphasizes that social constructions often become sedimented and relatively stable practices. Thus the task is not only to criticize this sedimentation but also to understand how the dynamics of security work and thus to change them (Buzan et al. 1998 :35). The Copenhagen School brings greater nuance to the constructivist argument that security is not an objective condition but an outcome of a specific kind of social process, an argument which tends to grow out of a critique of the realist focus on state security. Ole Wæver ( 1995 ) embraces the latter but for a different reason. Security, he argues, is a concept with a history and connotations that can’t be escaped. The core of this concept is defense of the state. The alternative to denaturalizing related discourses of security, as is characteristic of critical security studies, is to take the realist concept seriously and to examine its dynamics. Broadening the concept of security raises an unanswerable question of where to stop, that is, security potentially relates to everything that is potentially threatened. The alternative is to examine how security is used , that is, to examine it as a field of practices and how it typically works.

Security is typically about survival and about an existential threat to a particular object, which legitimizes the use of extraordinary measures. It opens the way for the state to justify the taking of special powers to handle the threat. The problem of security arises from an emergency condition, which establishes the right to use whatever means are necessary to block a threatening development. In and of itself, there is nothing in this depiction of security that is contrary to the realist picture, which focuses on the state; rather, it represents how security typically works for states. The concept of securitization highlights the dynamics by which some threats as opposed to others come to be understood under the rubric of security and the significance of this naming as an act of construction.

The Copenhagen School argues that security is a speech act. The speech act, which was elaborated by John Austin ( 1962/1975 ), begins with the idea that saying something is doing something. Saying “I do” in the context of a wedding is not mere language or description. It is an act that brings a marriage into being. Promising or threatening are not labels that refer to objects in the world, but rather acts that involve an exchange in relation to others which, to be meaningful, must rest on certain shared understandings and some degree of credibility. The credibility of a threat will cease in the absence of a consistent pattern of following through on threats. Because the shared understanding attached to security is one of existential threat, uttering the word security is an act that constitutes a threat as existential. Threats that are securitized have been identified as existential threats that require an emergency response and the suspension of normal politics.

For instance, before September 11, 2001 , terrorism was a category of criminal activity, and remains so for many international actors. However, after September 11, terrorism became an existential threat to the United States. The threat was existential insofar as the survival of America and American identity was seen to be at stake, and thus the threat had absolute priority. Use of the word security and the language of war constituted an emergency condition, where elites claimed the right to use whatever means are necessary to block the threat, including a policy of preemption against states that harbor terrorists. In so doing, they broke free of the rules that would normally constrain their actions. Since September 11, increasing surveillance and powers of arrest have been justified in the name of security. In the argument of the Copenhagen School, securitization is different from “normal” politics. The politicization of an issue brings it into the open and makes it a matter of public choice and something to be decided upon, that is, a part of the normal politics of public deliberation in a democracy. The securitization of an issue, by contrast, removes it from the political haggling of normal politics and justifies its prioritization over other issues, as well as decisive action by leaders. This may work to silence opposition, as leaders exploit threats for domestic purposes and act without democratic control or constraint. In this respect, security becomes a negative term that points to the removal of an issue from the realm of politics.

The Copenhagen School distinguishes itself from more critical security studies by its acceptance of certain realist themes, including attention to the processes by which state security practices are sedimented. Other critical analysts go beyond the Copenhagen School’s claim that securitization represents the suspension of normal politics to explore the role of securitization as a continual technique of governance, its role in the suspension of the political, such that the “state of exception becomes the norm” (Muller 2004 ; Shapiro 2004 ; Bigo 2006 ; Dillon 2007 ).

Michel Foucault ( 1976 ) argued that in modernity the legal authority of the state, accompanied by a view of individuals as citizens, represents a form of biopolitics. Biopolitics is the transformation of state power from the power of death to the management of populations and power over life. This reduces the citizen to what Giorgio Agamben ( 1998 ) refers to as “bare life.” The citizen of “normal politics,” derived, for instance, from Aristotle’s conception, engages in political debate and decision making. In Foucault’s argument, sovereign power revolves around the governance of populations and biological life rather than political life. The subject of politics is no longer the potential agency of the citizen, but the management of life itself. In this respect, the founding political image of the West has shifted from “Athens to Auschwitz” (Agamben 2004 :169).

Auschwitz is a symbol of depoliticization, where survival is elevated over questions about the nature and continuation of a specific form of political life. The suspension of normal politics, as discussed by the Copenhagen School, becomes, in this view, a permanent “state of exception” (Agamben 2005 ). In the state of exception the sovereign becomes both the law and outside the law, insofar as it has the power to suspend the law, imposing extrajudicial exceptional powers or a permanent state of emergency, which becomes an important technology of government control. The state of emergency need not always be openly declared in a technical sense, yet statutory amendments and changes in the background speak directly to the permanence of the state of exception. The suspension of conventional legislative and judicial powers and the concentration of power in the hands of the core executive constitute the state of exception.

While the initial questions about the meaning of security were often situated within arguments about the need to expand the concept to cover new areas, such as the environment or poverty, the Copenhagen School argued that we cannot so easily escape a history of meaning and use in which security is associated with states and military power (Wæver 1995 ). What is important, in this argument, is the analysis of how a concept of security is put to use in the construction of threats. Post-structuralists go a step further to examine a more structural process by which insecurity is reproduced. The dilemma, according to Anthony Burke ( 2002 :20) is that “security is bound into a dependent relation with ‘insecurity,’ it can never escape it: it must continue to produce images of ‘insecurity’ in order to retain its meaning.” While both rely on some notion of the “exceptional,” the Copenhagen School presents the exception as a deviation from “normal” deliberative and democratic politics, which are suspended in the face of a threat; by contrast, post-structuralists implicate liberal governance in the production of a long-term or permanent “state of exception.” All of these approaches depart from the assumption of traditional security studies that threats exist as objective phenomena separate from processes of making meaning.

Identity and Difference

The critical literature on threats goes beyond the assumption of traditional security studies that threats exist as objective phenomena in the world to examine how threats are constructed. Threats thus do not exist in a static field and their construction presumes a corresponding definition of the subject and object of threats. Thus, not only threats but identity are problematized by critical security analysts. In neo-realist accounts, states are assumed to be unitary and rational actors and thus identity is not an issue. The concept of identity, by contrast, opens up the possibility of multiple identities, and change between them. According to Goff and Dunn ( 2004 ), identity has four dimensions: alterity, fluidity, constructedness, and multiplicity. Discussions of identity within the literature on critical security studies have revolved around several aspects of identity. The first point, upon which critical analysts generally agree, is that identity exists in a relationship, an idea that is often captured in the concept of alterity. Identity is a social category that expresses not only the meaning any one actor attributes to the self; rather self-definitions are related to definitions that the self gives to others and others to the self. Categories are thus intersubjective and defining of a particular community of identity and practice; they are not purely in the minds of individuals.

The discussion of identity as a relationship suggests that it is to some degree constituted in difference. As William Connolly ( 1991 :64) argues, identity, whether of an individual, a state, or some other social group, is always “established in relation to a series of differences that have become socially recognized. These differences are essential to its being. If they did not coexist as difference, it would not exist in its distinctness and solidity.” Critical scholars inspired by Foucault and Derrida, among others, have highlighted several dimensions of the identity–difference relationship. The first is the role of identity and difference in constituting “insides” and “outsides” of states (Walker 1993 ; Campbell 1998 ). Notions of order, progress, democracy, and ethics have been presumed to be only possible “inside” the state, while the “outside” is a realm characterized by anarchy, war, and the primacy of power. David Campbell ( 1998 ) takes this logic a step further to demonstrate how US identity has been dependent on the production of danger from evil others outside. Another theme is the role of difference in constructing hierarchy and the legitimacy of intervention. Roxanne Lynn Doty ( 1996 ) explored practices of representation by Northern elites that constituted the “imperial encounter.” She analyzes the role of binary oppositions, characterized by reason/rationality, passion/emotion, parent/child, and good/evil, and the construction of regions such as the “South” or the “third world,” or more narrowly Kenya or the Philippines, in relation to the “North,” the United States or Britain. Doty argues that hierarchical representations legitimized intervention in these regions. Gender is also a site where identity is constructed in hierarchical difference. Gender discourse provides a system of meanings and a way of thinking that shapes how men and women experience, understand, and represent themselves, which also shapes many other aspects of human life and culture (Cohn, in Cooke and Woollacott 1993 :228–9). This discourse rests on dichotomies that construct mutually exclusive oppositions, including mind to body, culture to nature, thought to feeling, logic to intuition, objectivity to subjectivity, etc.

Whether deconstructing the “othering” of enemies or subordinates, all of these scholars emphasize the power inherent in constructions of knowledge based on difference. Most of them build on the Foucauldian idea that discourse not only contains linguistic expressions, to be judged in terms of the accuracy of representation, but also generates modes of power and exclusion. As Michael Shapiro (Der Derian and Shapiro 1989 :75) comments: “In deploying identities for actors and producing the overall meaning frame within which they operate, [discourses] constitute and reproduce prevailing systems of power and authority in general and direct the actions flowing from these systems to the particular.” The purpose of critical analysis, in this school of thought is to deconstruct the binary oppositions upon which power and exclusionary processes rest.

Some scholars have disputed the idea that identity is dependent on difference. Ole Wæver ( 1996 :122) points to contemporary Europe as an example that raises questions about this claim. Rather than constructing clear and dangerous others, post–Cold War Europe has, he argues, been “a pole of attraction with graduated membership so that Europe fades out but is not constituted against an external enemy.” Critical theorists in the tradition of Habermas, such as Linklater ( 1998 ), have argued that dialogue can be a path to some kind of universal consent against the background of particular differences. Linklater ( 1996 :85–7) claims that discourse ethics seeks to critique all forms of systematic inequality that prevent active participation in dialogue. Nonetheless, critical scholars who emphasize identity and difference have problematized the goal of universal consent. First, the goal of expanding the values of the polis to the international sphere is in conflict with the search for consent within sovereign states, insofar as democratic consent within sets the stage for practices of exclusion of others outside. While these critical scholars also seek dialogue that crosses lines of difference, they resist totalization in any form, including a totalized universal agreement. It is difference itself that is to be celebrated. Freedom is about speaking, listening, and being heard, and not being excluded from communication and conversation (Ashley and Walker 1990 :395). An ethical relationship between self and other requires contestation and negotiation. All ethics arises from a relationship to otherness, which entails a permanent critique of totalization and a struggle on behalf of difference rather than attempts to eliminate it.

In practice, processes of dialogue have been defined less by the search for universal agreement than the attempt to move beyond the stark identity–difference relationship, which is the foundation of conflict, toward some kind of common identity and language that would make talk – as distinct from fighting – possible. Before the end of the Cold War, the European dialogue between disarmament campaigns in the West and human rights initiatives in the Eastern Bloc constituted “citizens of a Europe whole and free,” in contrast to bifurcated Cold War identities of a divided Europe (Fierke 1998 ). Divided societies moving out of conflict have also often sought some kind of common identity. In South Africa, the notion that all citizens are South Africans provided a foundation of common identity for the truth and reconciliation process. In Northern Ireland, a common identity of this kind is by definition more problematic, given the conflict has been defined by allegiance to either the United Kingdom or Ireland. As a result, distinctions within the peace process between “men of violence” and those who had renounced violence played a larger role.

The shift within critical security studies to a focus on identity went hand in hand with a methodological shift away from the attempt, common within the social sciences, to fix the meaning of terms in order to test them against the world, to forms of discourse analysis. Given the fluidity of identity from one context to another or its changeability, it is imperative that the analyst examine how identities are formed in context and in relationship to other identities. The extent to which discourse analysis should be viewed as a “method” has been a subject of debate. As Jennifer Milliken (in Fierke and Jorgensen 2001 :136) points out, some discourse analysts within international relations avoid questions of rigor and systematic method given their association with positivism and an objective world “out there.” Others, such as Hansen ( 2006 ), have argued that it is imperative for discourse analysts to be clear in stating their assumptions and presenting their methods. The fact that discourse analysis rests on a more constitutive model of analysis, as distinct from a causal one, does not make it less rigorous by definition (Hansen 2006 :28).

The debate over identity and difference also flows over into debates over discourse analysis. While most who identify themselves with post-structuralism would focus analysis on the deconstruction of hierarchical oppositions, others conceive of discourse analysis as useful for a range of tasks. First, it may be useful for analyzing the multiple discourses for giving meaning to identities in a context undergoing change. For instance, in the aftermath of the Cold War, against the backdrop of conflict in the former Yugoslavia, and particularly Bosnia, Western observers placed the identities of the antagonists in several different frameworks of meaning, drawing on analogies to World War I, World War II, Vietnam, etc., each of which shaped a different understanding of the conflict and conclusions about the type of action to be taken (Fierke 1996 ; Hansen 2006 ). A second approach focuses on the distinct contours of different worlds across time. The subjects, objects, and practices that constituted the world of sixteenth century witch-hunts or eighteenth century slave-trading or twenty-first century terrorism are historically and culturally specific. Discourse analysis may be used to map the transition between worlds. Neta Crawford ( 2002 ) adopts a form of argument analysis to map the transition from a world in which slavery was legitimate to one in which it became an illegitimate practice. A third angle explores how meanings, shaped in one historical encounter, may carry over into future interactions, to be transformed within a new discourse. For instance, the concept of a safe haven, situated during the 1990s in a discourse of protecting refugees and civilians in war, has been transported, in the context of the War on Terrorism, into a discourse of terrorism (Fierke 2007 ). Despite changes in the discourse over time, the core of the safe haven, since it was defined in the 1949 Geneva Convention, has been the protection of vulnerable people. By contrast, in the National Military Strategic Plan for the War on Terrorism , published by the Chairman of the Joint Chiefs of Staff ( 2006 ), the safe haven is “one of the most important resources of extremists” ( 2006 :15). While this is not the first time that the term has been used in relation to nefarious activities, such as money laundering and fraud, there is an overlap between the use of safe haven in this context and the protection discourses of the 1990s. Both are embedded in a world of “failed states”; what changes is the identity of the subject, from that of “victim” to be protected to “terrorist” who is a source of fear.

Human Security

Global inequality was a theme of the early Marxist literature of international relations. This theme reemerged in the 1990s, in a somewhat different form, as “failed states,” many of which were a product of decolonization and bloody intrastate war, began to proliferate. The old concept of security, focusing on conflict between states, was of minimal use for understanding this phenomenon. Two developments in the mid-1990s provided an alternative point of departure. The first was a concept of human security, articulated in the 1994 UN Human Development Program report. Human security shifts attention away from states to individuals, emphasizing human rights, safety from violence, and sustainable development. The second was a rethinking of the relationship between security and development, previously two separate areas of analysis. This rethinking gave rise to a conclusion that underdevelopment is dangerous insofar as it correlates and coexists with violent conflict (Duffield 2001 ; Hampson et al. 2001 ). Achieving human security, in this argument, would require the transformation of entire societies into liberal democracies. These developments reinforced the idea that the international community, and the United States more specifically, had a responsibility to spread democracy to other areas of the world.

Human security was first popularized by the UN Development Program and was a response to an observation after the end of the Cold War that in today’s conflicts civilians are often the victims and even the primary targets of violence. Human security builds on the idea that people’s rights are at least as important as those of states. It had relevance in a context where, since the end of the Cold War, the majority of casualties in war had been civilian, where more than 30 million people had been displaced from their homes, where large numbers of child soldiers had been recruited or forced into violent conflict, and where rape had become a standard practice of warfare. The concept emerged from the fusion of several other concepts (Hampson et al. 2001 :152). The first, which was introduced by the Brundtland Commission in 1987 , was sustainable development. The Commission’s report argued that environmental protection was a necessary condition for the long-term survival of humanity and, subsequently, of any long-term development strategy (World Commission on the Environment and Development 1987 ). The second, introduced by the first development report of the UN Development Program in 1990 , was human development. The report stated that “people must be at the center of all development [and] […] that while growth in national production (GDP) is absolutely necessary to meet all essential human objectives, what is important is to study how this growth translates – or fails to translate – into human development” (UNDP 1990 :iii). In the fifth Human Development Report in 1994 human development was merged with a significantly broadened security agenda to produce human security (Hampson et al. 2001 :153).

The core concern underpinning the human security concept is the inextricable interrelationship between freedom from want and freedom from fear (Thomas 2004 :353). This rests on a holistic understanding in which the vulnerability of individuals poses a threat to – and thus the safety of individuals is key to – global security (Hampson 2004 :350). One major focus of the human security agenda was a treaty that banned landmines, which are often left scattered around a landscape after war, and can be a source of harm to people going about their daily business. Other issues on the agenda include protecting civilians in armed conflict; reforming sanction regimes to mitigate some of the more negative effects on civilians; the rights of women; humanitarian intervention to protect against future Rwandas or Srebrenicas; and the demobilization and rehabilitation of combatants, and particularly child soldiers. The International Criminal Court has also been an important item on the human security agenda, as has the “responsibility to protect,” a proposal of the International Commission on Intervention and State Sovereignty (ICISS) which incorporates a concept of human security over more narrow definitions of national security. The ICISS proposal represents a rethinking of the conflictual relationship between sovereignty and non-interference, on the one hand, and human rights on the other. Sovereignty comes with an obligation of the state to provide protection to its population. When the latter is not forthcoming or the state becomes a source of harm, the responsibility to protect transfers to the international community.

Human security is a critical concept in so far as it raises questions about the focus and assumptions of realist security studies. Scholars have, however, complained about the existence of over thirty definitions of human security (Alkire 2004 :359). The lack of clear boundaries has been useful for political actors who seek to organize as broad a coalition as possible behind the concept, and for anthropologists who seek to uncover how it is used in different contexts. Scholars of human security have, on the one hand, sought a more precise category in order to improve its analytic strength, and, on the other hand, have been troubled by the difficulty of fixing the definition of human security. Kyle Grayson ( 2004 ) raises a concern about the politics of conceptualizing human security. He asks who, what, and where is marginalized when “experts” provide a precise/scientific definition that is of practical use, and argues that the focus of attention should be the power–knowledge nexus that the concept constitutes.

The methodological issue points to questions about the concept’s critical potential in practice. On the one hand, despite its distance from liberal notions of possessive individualism, as noted by Thomas ( 2000 :xi), human security does have links to a liberal model of development. In this respect, many of its assumptions are in conflict with more critical theories of development. On the other hand, the concept has been used to present a critical challenge to current practice. Human security has been a key concept of NGOs and others who are interested in actually transforming global economic structures. As Thomas ( 2000 :9) notes, “the shift to human security […] highlights the importance of scrutinizing global processes that may impact on, even jeopardize security and the global governance structures which drive these processes.” Whether human security is understood to be part of a new regime of power or a challenge to existing regimes, the concept rests on a recognition that the traditional means of providing safety and security to civilians, that is, the nation-state, is no longer – if it ever was – effective in many parts of the world.

Liberal discourses of development and democracy have focused on individual states, ignoring the embeddedness of these states in historical relations that are global. This focus has been maintained in the merging of development and security discourses. Mark Duffield ( 2001 ) provides a critical analysis of the relationship between security and development, which, he argues, has increasingly been addressed within a liberal governance model. Since the mid-1990s there has been a change of policy based on the conclusion that underdevelopment is dangerous and is a source of conflict. In this respect, “want” perpetuates “fear.” This conclusion, which is an extension of the liberal model, does not locate underdevelopment or “failed states” in an unjust global system, which emerged along with a capitalist world economy and a history of imperialism, but instead internalizes the causes of conflict and political instability. Conflict is a result of underdeveloped and dysfunctional war-torn societies. The solution to underdevelopment is to be found in the transformation of individual societies rather than the global system in this liberal logic. The policy of international organizations has thus shifted from humanitarian assistance and aid, per se, to the process of reconstructing post-conflict societies along liberal lines (Duffield 2001 :11). As a result, an increasingly complex array of UN agencies, donor governments, NGOs, and military establishments work together to bring about a change in societies so that problems of the past don’t reemerge. Their practice rests on an argument that development is impossible without stability and that security isn’t sustainable without development (Duffield 2001 :16).

Duffield examines human security as part of a Foucauldian strategy of biopolitics, whereby a strategic complex of global actors and governing agencies, through a newly formed public–private relationship, shapes and controls civil populations. He argues that the nature of power and authority has changed radically. This new power, expressed in the globalized structures of liberal peace, differs from old imperial structures. Rather than the brute imposition of power, or the direct control of territory, we see partnership and participation, which implies a mutual acceptance of shared normative understandings. Inclusion in global structures means buying into the norms that underpin these structures. This development is a response to the demise of political alternatives in the South, since the end of the Cold War and the demise of the socialist project. On the part of the West, it is an attempt to stem refugee flows and to transform entire societies, replacing indigenous values and modes of organization with liberal ones.

The marriage of development and security discourses reinforced a liberal agenda of transforming entire societies into liberal democracies. This agenda is problematic for two reasons. First, as already discussed, it represents a new regime of power, albeit “softer” than the old imperialist regime. Marxists view human security as a repackaging of liberal humanitarianism, with its routine failure to address underlying social causes (Thomas 2004 :353). Second, the discourse failed to problematize the role of historical global relations in the production of “failed states” and, subsequently, in the production of fear and want. The discourse localizes agency in the “international community” and some Western states, which have taken on the role of “fixing” the problem of human insecurity. The resulting practices have the potential to reproduce historical relationships of power.

On the one hand, human security embodies a number of liberal assumptions and has reinforced a liberal agenda. On the other hand, it contains a potential for questioning and rethinking these assumptions. Liberal approaches ask how security is to be provided to the individual, given the failure of states. More critical analyses look to the global historical context, and the assumptions underpinning it, to the processes by which “failed” states, and subsequently human insecurity are produced and reproduced.

Critical Theory and Emancipation

The Frankfurt School originated in 1930s Germany with Theodor Adorno and Max Horkheimer , who articulated a technique of immanent critique and the concept of emancipation. Immanent critique begins with the idea that the critical theorist stands within time and within a historical context, rather than outside time as an objective observer, as assumed by problem solving theories. The critical theorist creates a critical distance from his or her historical context in order to explore its origins, development, institutions, and potential for change (Booth 2005 :11). Critical theory presents a more three-dimensional world containing not only the powerful but others as well. Immanent critique relies on a clear link between theory and practice and, as Richard Wyn Jones ( 1999 :6, 56) argued, “critical theory stands or falls by its ability to illuminate the possibilities for emancipatory transformation.” If problem solving theory reinforces the position of the powers that be, critical theory and immanent critique make suffering humanity the prism through which problems are viewed. This means focusing on the men, women, and communities for whom the present order is a cause of insecurity. If all theory is theory for someone, then critical theory, or critical security studies, is for the voiceless, the unrepresented, the powerless, and its purpose is their emancipation (Wyn Jones 1999 :159). Edward Said ( 1994 :84) further suggests that critical intellectuals “are always tied to and ought to remain an organic part of an ongoing experience in society: of the poor, the disadvantaged, the voiceless, the unrepresented, the powerless.” Consistent with a Gramscian argument, intellectuals are the agents of critique, who engage specialist information and expertise to the end of challenging prevailing hegemonic discourses (Wyn Jones 1999 :160).

In everyday language, emancipation is associated with struggles for freedom from domination, such as the emancipation of American slaves or the emancipation of women. The word is derived from the Latin emancipare , meaning the action of setting free from slavery or tutelage ( Wyn Jones , in Booth 2005 :216). The theoretical roots of the concept are found in Marxist theory. In his “Theses on Feuerbach,” Marx claimed that the point is to change the world, not merely to interpret it. While originally equating emancipation with the need to be freed from the vicissitudes of nature, Adorno and Horkheimer later rethought the problem as they struggled to make sense of the barbarism of the Holocaust, arguing that it represented the deification of instrumental reasoning, which had been essential to nature’s domination. They instead envisioned emancipation as a “reconciliation” with nature, suggesting a more non-instrumental relationship with it. Several decades later, Habermas ( 1984 ; 1987 ) discussed emancipation in relation to interaction and community, and identified emancipation with the potential to be freed from those institutions and practices that stand in the way of unconstrained communication.

Within international relations, Andrew Linklater ( 1998 ) adapted the discourse ethics of Habermas to an argument about the potential for global dialogue as a path to more universal agreement and thus a more universal culture and identity. Ken Booth ( 1991 ) further identified two elements of the relationship between security and emancipation, defining security as the absence of threats, and presenting emancipation as freeing people from the physical and human constraints that stop them from carrying out what they freely choose to do. War and the threat of war are constraints, as are poverty, poor education, and oppression. He later ( 1999 :41–2) defined what emancipation is not. In his argument, it is not a universal, timeless concept, nor can it be gained at the expense of others. Emancipation is not synonymous with westernization. These arguments point to a larger concern, expressed by other critical theorists, that the concept of emancipation is too closely linked with modernity, meta-narratives, especially Marxism and liberalism, and the Enlightenment belief that humanity is progressing toward a more perfect future.

Protagonists in this debate fear that the codification of positive alternatives, based on the search for universal consensus, as suggested by Habermas or Linklater, will only buttress new regimes of power, as was the case with Marxist communism in the former Eastern Bloc. They point to Western discourses of universalism that are implicated in the production of a particular conception of politics and society. In this conception, negative representations of non-European peoples contribute to the construction of Western identity as the highest civilization, and legitimize its project of global domination (Linklater 1998 :47). From this perspective, the critique of universalist concepts, including emancipation, is fundamental to eradicating hegemonic representations of the non-Western world that have been part of the construction of Western power. One related argument is that the agents of emancipation are invariably from the West, whether in the form of Western-dominated international institutions, a Western-led global civil society, or the “ethical foreign policies” of leading Western powers (Barkawi and Laffey 2006 : 350). Even when the concrete agents of emancipation are not themselves Westerners, they are conceived as the bearers of Western ideas. This does not mean that emancipation needs to be avoided per se, only that, like any other phenomenon in international relations, critical attention to its underlying assumptions is required.

Emancipation begins with critique and is primarily about the act of freeing, whether from the assumptions that blind us to alternatives or from the structures of power that constrain human potential. Wyn Jones (in Booth 2005 :216) argues that some concept of emancipation is a necessary element of any form of analysis that attempts to problematize and criticize the status quo. Hayward Alker (also in Booth 2005 :200) discusses the need to include multiple Western and non-Western perspectives on freedom without “giving up the distinctive and attractive appeal to human improvement and emancipatory development that is so central to the ethical/global concerns of the critical security studies project.” Even Jacques Derrida ( 1996 :82) has expressed a commitment to the “great classical discourse of emancipation,” while avoiding inscription of the discourse into “a teleology, a metaphysics, an eschatology.” He goes so far as to state that there “is no ethico-political decision or gesture without […] a ‘yes’ to emancipation.” Emancipation is a process rather than an end point, a direction rather than a destination. Immanent critique is one step in this process and the point of departure for identifying the emancipatory potential of a context. Emancipation can more generally be understood in relation to the critical imperative of freeing security studies from those assumptions that blind scholars to concerns outside its narrow definition, which focuses on statecraft and force, thereby opening a space to consider alternatives. Emancipation further refers to freeing those outside established structures of power from the constraints that hold them back from realizing their potential.

  • Agamben, G. (1998) Homer Sacer: Sovereign Power and Bare Life . Stanford: Stanford University Press.
  • Agamben, G. (2004) Bodies without Words: Against the Biopolitical Tatoo. German Law Journal 5 (2), 168–9.
  • Agamben, G. (2005) State of Exception . Chicago: University of Chicago Press.
  • Alkire, S. (2004) What Is Human Security? Security Dialogue 35 (3), 359–60.
  • Ashley, R. (1984) The Poverty of Neorealism. International Organization 38 (2), 225–49.
  • Ashley, R. , and Walker, R.B.J. (1990) Reading Dissidence/Writing the Discipline: Crisis and the Question of Sovereignty in International Relations. International Studies Quarterly 34 (3), 367–416.
  • Austin, J.L . (1975) How to Do Things with Words , 2nd edn. Oxford: Oxford University Press. Originally published 1962.
  • Barkawi, T. , and Laffey, M. (eds.) (2006) The Post-Colonial Moment in Security Studies. Review of International Studies 32 (2), 329–52.
  • Beck, U. (2003) The Silence of Words: On Terror and War. Security Dialogue 34 (3), 255–67.
  • Bigo, D. (2006) Security, Exception, Ban and Surveillance. In D. Lyon (ed.) Theorizing Surveilliance: The Panopticon and Beyond . Cullompton: Willan, pp. 46–68.
  • Booth, K. (1991) Security and Emancipation. Review of International Studies 17 (14), 313–26.
  • Booth, K. (ed.) (1999) Three Tyrannies. In T. Dunne and N.J. Wheeler (eds.) Human Rights in Global Politics . Cambridge: Cambridge University Press, pp. 31–70.
  • Booth, K. (ed.) (2005) Critical Security Studies and World Politics . Boulder: Lynne Rienner.
  • Burke, A. (2002) Aporias of Security. Alternatives 27, 1–27.
  • Buzan, B . (1991) People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era . London: Harvester Wheatsheaf. Originally published 1983.
  • Buzan, B. , Wæver, O. , and Wilde, J. de (1998) Security: A New Framework of Analysis . Boulder: Lynne Rienner.
  • Campbell, D. (1998) Writing Security: United States Foreign Policy and the Politics of Identity , 2nd edn. Minneapolis: University of Minnesota Press.
  • Cardoso, F.H. , and Faletto, E. (1979) Dependency and Development in Latin America . Berkeley: University of California Press.
  • Chairman of the Joint Chiefs of Staff (2006) National Military Strategic Plan for the War on Terrorism (Feb. 1). At www.jcs.mil , accessed Jun. 15, 2009.
  • Connolly, W. (1991) Identity/Difference: Democratic Negotiations of Political Paradox . Ithaca: Cornell University Press.
  • Cooke, M. , and Woollacott, A. (eds.) (1993) Gendering War Talk . Princeton: Princeton University Press.
  • Cox, R.W. (1981) Social Forces, States and World Orders: Beyond International Relations Theory. Millennium 10 (1), 126–55.
  • Crawford, N. (1991) Once and Future Security Studies. Security Studies 1 (2), 283–316.
  • Crawford, N. (2002) Argument and Change in World Politics: Ethics, Decolonization and Humanitarian Intervention . Cambridge: Cambridge University Press.
  • Dalby, S. (2002) Environmental Security . Minneapolis: University of Minnesota Press.
  • Der Derian, J. , and Shapiro, M. (eds.) (1989) International/Intertextual Relations: Post-Modern Readings in International Relations . Lexington: Lexington Books.
  • Derrida, J. (1996) Remarks on Deconstruction and Pragmatism, trans. S. Critchley. In C. Mouffe (ed.) Deconstruction and Pragmatism . London: Routledge, pp. 77–88.
  • Dillon, M. (2007) Governing Terror: The State of Emergency of Biopolitical Governance. International Political Sociology 1, 7–28.
  • Doty, R.L. (1996) Imperial Encounters: The Politics of Representation in North/South Relations . Minneapolis: University of Minnesota Press.
  • Duffield, M. (2001) Global Governance and the New Wars: The Merging of Development and Security . London: Zed Books.
  • Enloe, C. (1989) Bananas, Beaches and Bases: Making Feminist Sense of International Politics . Berkeley: University of California Press.
  • Fierke, K.M. (1996) Multiple Identities, Interfacing Games: The Social Construction of Western Action in Bosnia. European Journal of International Relations 2 (4), 467–98.
  • Fierke, K.M. (1998) Changing Games, Changing Strategies: Critical Investigations in Security . Manchester: University of Manchester Press.
  • Fierke, K.M. (2007) Critical Approaches to International Security . Cambridge: Polity.
  • Fierke, K.M. , and Jorgensen, K.E. (2001) Constructing International Relations: The Next Generation . Armonk: M.E. Sharpe.
  • Foucault, M. (1976) The Will to Knowledge: The History of Sexuality . London: Penguin.
  • Goff, P.M. , and Dunn, K.C. (2004) Identity and Global Politics: Theoretical and Empirical Elaborations . Basingstoke: Palgrave.
  • Grayson, K. (2004) What Is Human Security? A Challenge to the Power over Knowledge of Traditional Security Studies. Security Dialogue 35 (3), 356–7.
  • Habermas, J. (1984) Theory of Communicative Action . Vol. 1: Reason and the Rationalization of Society , trans. T. McCarthy . London: Heinemann.
  • Habermas, J. (1987) Theory of Communicative Action . Vol. 2: Lifeworld and System: A Critique of Functionalist Reason , trans. T. McCarthy . London: Heinemann.
  • Hampson, F.O. , Daudelin, J. , Hay, J. , Reid, H. , and Martin, T. (2001) Madness in the Multitude: Human Security and World Disorder . Oxford: Oxford University Press.
  • Hampson, F.O. (2004) What Is Human Security? A Concept in Need of a Global Policy Response. Security Dialogue 35 (3), 349–50.
  • Hansen, L. (2006) Security as Practice: Discourse Analysis and the Bosnian War . London: Routledge.
  • Huysmans, J. , Dobson, A. , and Prokhovnik, R. (eds.) (2006) The Politics of Protection: Sites of Insecurity and Political Agency . London: Routledge.
  • Krause, K. , and Williams, M. (eds.) (1997) Critical Security Studies . Minneapolis: University of Minnesota Press.
  • Lenin, V.I . (1988) Imperialism: The Highest Stage of Capitalism . New York: International. Originally published 1939.
  • Linklater, A. (1996) Citizenship and Sovereignty in the Post-Westphalian State. European Journal of International Relations 2 (1), 77–103.
  • Linklater, A. (1998) The Transformation of Political Community: Ethical Foundations of the Post-Westphalian Era . Cambridge: Polity.
  • Muller, B. (2004) (Dis)qualified Bodies: Securitization, Citizenship and Identity Management. Citizenship Studies 8, 279–94.
  • Nye, J. , and Lynn-Jones, S. (1988) International Security Studies: A Report of a Conference on the State of the Field. International Security 12 (4), 5–27.
  • Onuf, N. (1989) World of Our Making: Rules and Rule in Social Theory and International Relations . Columbia: University of South Carolina Press.
  • Peterson, V.S. (ed.) (1992) Gendered States: Feminist (Re)Visions of International Relations Theory . Boulder: Lynne Rienner.
  • Said, S. (1994) Culture and Imperialism . New York: Vintage.
  • Schelling, T. (1966) Arms and Influence . New Haven: Yale University Press.
  • Shapiro, M.J. (2004) Methods and Nations: Cultural Governance and the Indigenous Subject . London: Routledge.
  • Thomas, C. (2000) Global Governance, Development and Human Security . London: Pluto.
  • Thomas, C. (2004) What Is Human Security? A Bridge between the Interconnected Challenges Confronting the World. Security Dialogue 35 (3), 353–4.
  • Tickner, J.A. (1993) Gender and International Relations: Feminist Perspectives on Achieving International Security . New York: Columbia University Press.
  • United Nations Development Program (UNDP) (1990) Human Development Report, 1990 . New York: UNDP.
  • Wæver, O. (1995) Securitization and Desecuritization. In R.D. Lipschutz (ed.) On Security . New York: Columbia University Press, pp. 46–86.
  • Wæver, O. (1996) European Security Identities. Journal of Common Market Studies 34 (1), 103–32.
  • Walker, R.B.J. (1987) Realism, Change and International Political Theory. International Studies Quarterly 31 (1), 65–86.
  • Walker, R.B.J. (1993) Inside/Outside: International Relations as Political Theory . Cambridge: Cambridge University Press.
  • Wallerstein, I. (1974) The Rise and Future Demise of the World Capitalist System: Concepts of Comparative Analysis. Comparative Studies in Society and History , 16 (4), 390–2, 399–406.
  • Waltz, K. (1979) Theory of International Politics . Reading: Addison Wesley.
  • Weldes, J. (1996) Constructing the National Interest. European Journal of International Relations 2 (3), 275–318.
  • Weldes, J. , Laffey, L. , Gusterson, H. , and Duvall, R. (eds.) (1999) Cultures of Insecurity . Minneapolis: University of Minnesota Press.
  • Wendt, A. (1992) Anarchy Is What States Make of It: The Social Construction of Power Politics. International Organization 46 (2), 391–425.
  • World Commission on the Environment and Development (1987) Our Common Future, Brundtland Commission. At www.are.admin.ch/are/en/nachaltig/international_uno/unterseite023301 , accessed 24 June 2006.
  • Wyn Jones, R. (1999) Security, Strategy and Critical Theory . Boulder: Lynne Rienner.

Links to Digital Materials

The Responsibility to Protect, Report of the International Commission on International and State Sovereignty, 2001. At www.dfait-maeci.gc.ca/iciss-ciise/report-en.asp , accessed Jul. 2009.

Acknowledgments

This essay is heavily indebted to my book Critical Approaches to International Security ( 2007 ). Readers wishing a more detailed treatment of this topic are encouraged to consult this source.

Printed from Oxford Research Encyclopedias, International Studies. Under the terms of the licence agreement, an individual user may print out a single article for personal use (for details see Privacy Policy and Legal Notice).

date: 17 May 2024

  • Cookie Policy
  • Privacy Policy
  • Legal Notice
  • Accessibility
  • [66.249.64.20|185.148.24.167]
  • 185.148.24.167

Character limit 500 /500

Advertisement

  • Previous Article
  • Next Article

Understanding the Islamic State—A Review Essay

  • Cite Icon Cite
  • Permissions
  • Article contents
  • Figures & tables
  • Supplementary Data
  • Peer Review
  • Search Site

Daniel Byman; Understanding the Islamic State—A Review Essay. International Security 2016; 40 (4): 127–165. doi: https://doi.org/10.1162/ISEC_r_00235

Download citation file:

  • Ris (Zotero)
  • Reference Manager

This article reviews several recent books on the Islamic State in order to understand its goals, motivations, strategy, and vulnerabilities. It argues that the Islamic State's ideology is powerful but also highly instrumental, offering the group legitimacy and recruiting appeal. Raison d'etat often dominates its decisionmaking. The Islamic State's strength is largely a consequence of the policies and weaknesses of its state adversaries. In addition, the group has many weaknesses of its own, notably its brutality, reliance on foreign fighters, and investment in a state as well as its tendency to seek out new enemies. The threat the Islamic State poses is most severe at the local and regional levels. The danger of terrorism to the West is real but mitigated by the Islamic State's continued prioritization of the Muslim world and the heightened focus of Western security forces on the terrorist threat. A high-quality military force could easily defeat Islamic State fighters, but there is no desire to deploy large numbers of Western ground troops, and local forces have repeatedly shown many weaknesses. In the end, containing the Islamic State and making modest rollback efforts may be the best local outcomes.

Client Account

Sign in via your institution, email alerts, affiliations.

  • Online ISSN 1531-4804
  • Print ISSN 0162-2889

A product of The MIT Press

Mit press direct.

  • About MIT Press Direct

Information

  • Accessibility
  • For Authors
  • For Customers
  • For Librarians
  • Direct to Open
  • Open Access
  • Media Inquiries
  • Rights and Permissions
  • For Advertisers
  • About the MIT Press
  • The MIT Press Reader
  • MIT Press Blog
  • Seasonal Catalogs
  • MIT Press Home
  • Give to the MIT Press
  • Direct Service Desk
  • Terms of Use
  • Privacy Statement
  • Crossref Member
  • COUNTER Member  
  • The MIT Press colophon is registered in the U.S. Patent and Trademark Office

This Feature Is Available To Subscribers Only

Sign In or Create an Account

Mario Einaudi Center for International Studies

Fulbrighter with women in India

Reppy Institute for Peace and Conflict Studies

Prize for Best Essay in Technology and International Security Policy

Essay Prize for best essay on technology and international security

The prize for Best Essay in Technology and International Security Policy is a newly established competition starting in AY 2023-2024. The prize is made possible by a generous donor. Awarded up to once annually, this prize offers recognition for the best essay that considers the impact of technology on prospects for peace or war, and/or the ways in which conflict may shape technology.

The essay should be 2500 – 5000 words in length, before references, and may be a term paper or other writing assignment. The deadline for submissions to the 2023-24 competition is May 20, 2024. 

Eligibility

All currently enrolled Cornell students—including undergraduate, doctoral, masters, Cornell Tech, law, and medical students—are eligible. However, undergraduate students are particularly encouraged to apply.

How to Apply

  • Apply online . 
  • The essays will be reviewed by a committee of PACS faculty members.

Additional Information

Funding type.

How Successful Has the UN Been in Maintaining International Peace and Security?

Miguel A Padrinan/Pixabay

This year, the United Nations (UN) is celebrating its 75 th  year. Born out of war, the UN has sought to curtail plagues of a past characterized by two world wars. Based on the idea of liberal institutionalism where multilateral institutions are to facilitate inter-state cooperation, the UN intended to bring the major military powers together with the main task of maintaining international peace and security (Weiss 2018: 174, Hanhimaki 2015: 18). This has, however, been fraught with difficulties that this essay will address along with the challenges and opportunities with different peace and security initiatives, in an attempt to evaluate the UN’s success in its main task. It will specifically focus on peace operations, nuclear disarmament and humanitarian intervention, some of the main areas through which the UN is maintaining international peace and security (UN 2020a). As one main actor in global governance, I conclude that the real success of the UN has been in its role as a normative power, guiding the global understanding of acceptable behavior.

UN’s Role in Maintaining Peace and Security – A Tense Security Council and Ambiguous Peace Operations

The UN Security Council (UNSC) is the organ with the primary responsibility for maintaining international peace and security. Outlining its structure and function is an essential first step for determining its success. It consists of 15 members, 5 of which are permanent and have veto power (the P5), namely the United States, the United Kingdom, Russia, China and France. These were considered the main military powers when the UN was founded and their veto right would prevent them from going to war against each other, while creating a necessary balance when taking decisions on security issues that would be collectively enforced (Goodrich 1965: 430). This illustrates how the constellation itself was based on peace and security considerations, and there has in fact never been a direct physical war between the P5 since the UN’s beginning. Despite a period of inaction during the Cold War, many UNSC resolutions have also been passed to support peace processes, solve disputes, respond to illegitimate uses of force and enforce sanctions in situations where peace and security has been threatened. This involvement ranges from Bosnia in 1993 to Afghanistan in 2001 to its Anti-Piracy resolution in 2008 (Mingst and Karns 2011: 108). UNSC resolutions have been central for tackling conflict situations and have also demonstrated that extensive joint action can be taken to respond to crisis, such as in the case of Iraq’s occupation of Kuwait in 1990 where it condemned its action and authorized states to “use all necessary means” to stop the occupation (Mingst and Karns 2011: 105). Such examples would challenge the realist assumption that there is an inherent collective action problem in international relations and the system of anarchy. Nevertheless, the UNSC has attracted vast criticism for upholding procedures that impede robust action in important situations where international law has been violated but the P5 disagree, such as in Syria (Nadin 2017), as well as for keeping an outdated permanent membership and for being undemocratic (Weiss & Kuele 2014). In the mentioned example of Iraq 1990, the agreed resolution authorized a US-led military operation, but UN oversight was weak and the autonomy of US action as well as the lack of inclusion of supportive states outside of the Council in the decision-making process is one example that points to the undemocratic structure of the Council as well as the continued importance of powerful states during interventions, rather than the UN itself (Ebegbulem 2011: 25). Furthermore, Security Council vetoes have not always managed to stop nations from proceeding with their endeavors, which was the case with the US’ invasion of Iraq, 2003 (Morris & Wheeler 2007: 221). This shows that the individual interests of some states make them deviate from institutional constraints, pointing to flaws in the theory of liberal institutionalism that laid the basis for the UN. Such examples spark doubt about the credibility of the UN and UNSC and disrupt the balance that the composition of UNSC is to uphold, which is one important obstacle to its success in maintaining peace and security. 

Beyond internal tensions, the UN has an active presence in the world through peace operations, which has become central for the UNSC and its approach to maintaining peace. The mandates range from protecting civilians to supporting state-building efforts, a list that has become more extensive in its attempt to improve the strategy towards sustainable peace. There is no mention of peace operations in the UN Charter, and the concept of peacekeeping has adapted in line with shifting nature of war and understanding of security, leading up to today’s multidimensional peace operations (Williams & Bellamy 2013: 415). Traditionally, the presence of UN forces was to be approved by all parties in the host country, they were to be impartial, lightly armed, with the main goal to maintain a truce. The peace has indeed been kept between states such as Israel-Syria or Iraq-Kuwait, indicating the success of UN deployment for preventing interstate conflict (Mingst and Karns 2011: 130). With the increase of intrastate wars in the 1990s however, conflicts had become more complex, requiring a more complex response. Peacekeepers were deployed in situations where there was no peace to keep, and they encountered atrocities that put both them and civilians in danger, demanding greater military response (Bellamy & Hunt 2015: 1277, Doyle & Sambanis 2008: 2). Their mandate therefore expanded and started bordering on enforcement, as was the case of Bosnia in the 1990s. One problem was the discrepancy between the expectations of the operations and the actual capabilities in form of manpower or resources, showing a political unwillingness to transform the operations to more robust ones (Thakur 2006: 62, Autesserre 2019). Bosnia was a clear example of the failure that can ensue when undertaking  ad hoc  responses to a situation that does not match the original mandate, as it might lead to the inability to perform the envisioned tasks entrusted upon peacekeepers as they are prevented by nation state reluctance (Crossette 1999). This shows the importance of broad member state support of missions in today’s complex conflict situations and the need for nations to be willing to adapt to challenges that might arise.

Underlying UN peace operations is the ideal of a liberal democratic peace, which has been a further hindrance to success in some contexts. Afghanistan is a telling example, where democratization, rule of law and economic restructuring was promoted (Saikal 2012: 219), showing a disregard for every state’s right to “choose its political, economic, social and cultural system” (UN Declaration 1965). The state-building efforts saw the quick establishment of governance structures based on Western ideals. It was a rushed affair that eventually failed as the government was neither representative nor accountable (Saikal 2012: 226). Postcolonialism offers a valid critique of the ideational dominance of Western values and understandings, and its failure to recognize imperialist tendencies in the vision that liberal peace is universally applicable and desirable (Nair 2017). Imposing structures in a top-down fashion can have important consequences in fragile situations where society is multidimensional. The conception of peace should not be equated with liberalism but rather promoted in a balanced effort through combined considerations for basic democratic principles with local understandings of governance. This is called hybrid peacebuilding by authors such as Richmond (2009: 578). Only then will the UN enable long-term success as it would empower the local community through an inclusive bottom-up approach. 

Beyond Peacekeeping – Recognizing the Normative Power of the UN

The active presence of the UN in the world through its different missions has resolved disputes, inhibited escalation of conflict and spurred peace in some situations, but the inherent problems that were highlighted continue to attract criticism. The failure of the UN to foster long-term peace in settings with complex conflict-dynamics shows an important limitation to the claim to success (Sambanis 2008: 29). An alternative area in which its role as a peace and security defender has been more successful, and in my view most successful, is through the spread important norms that have ranged from expanding the security agenda to upholding a nuclear taboo. A telling example is the role of the Nuclear Non-Proliferation Treaty (NPT). As authors such as Scott Sagan argue, norms embedded in the NPT shape “states’ identities and expectations and even powerful actors [become] constrained by the norms they [have] created” (Sagan 1997: 76). The NPT regime helped establish shared understandings of what was considered prestigious, legitimate or delegitimate and states thereby chose to disarm rather than be classified as rogue nations by the international community (Sagan 1997: 80). It has also constrained both Russia and the US in their attempts to modernize their arsenals. Even in cases where the norm has been contested, such as when US recognized India as a nuclear weapons state, it never seriously challenged the core assumptions of the nuclear non-proliferation norm (Carranza 2019: 14). Critics would disagree and argue that the accomplishments in the area of nuclear disarmament has been weak, as with collective security (MacKenzie 2015: 489), but the UN’s efforts have evidently hindered armament and possible escalation, pointing to a major success for maintaining peace and security in the world.

Beyond nuclear disarmament, there is also the shared understanding of illegitimate and legitimate uses of force. The UNSC holds strong authority in this realm, which again points to the normative power of the UN in its role for maintaining international peace and security (Mingst and Karns 2011: 100). Even though tensions can run high between states in the Security Council, this shared understanding has enhanced the risks that an aggressor might face when “breaking” these norms, as the response from the international community can take the form of international condemnation, coordinated sanctions or even humanitarian intervention. This last point particularly derives from the enhanced focus on human rights and human security within the UN, as well as the shifting nature of war after the Cold War (Bellamy 2013: 488). The principles of sovereignty and non-interference came into question with the atrocities committed during intrastate conflicts such as in Rwanda and Bosnia. The “responsibility to protect” principle (R2P) was thereby born during the 2005 World Summit, which came to mean that all states have a responsibility to protect civilians from genocide, ethnic cleansing, war crimes or crimes against humanity (UN 2020b). In cases where a state couldn’t or wouldn’t fulfil this function, humanitarian intervention by the international community would be legitimate. This is in line with the human security agenda that was promoted by the UN in the 1990s, as the security of individuals was to be prioritized over the protection of the state (Hampson 2013: 279). While it contradicts the thesis of realism with its focus on self-interested states, there have been debates on this new role for the UN and how successful it has actually been to use force to support human security objectives (Hampson 2013: 286). One main criticism is about the questions of interpretation. Who dictates when this responsibility is to be invoked? There have also been instances where unlawful intervention has been done in the name of R2P, such as in the case of Russia’s intervention in Georgia where they claimed to protect Russian citizens (Allison 2009: 178). However, the jointly accepted humanitarian intervention in Libya 2011 based on the R2P norm is an important example that illustrates how normative shifts driven by the UN can bring nations together to protect peace and security in the world. Both China and Russia agreed to humanitarian intervention, despite their traditional opposition to it, which stopped Qaddafi from proceeding with possible crimes against humanity (Bellamy 2013: 500). Beyond operational successes, the fact that the international community has agreed to legitimize action to protect human beings as such rather than states, and that there is a general understanding that states should not stand idly by while atrocities are committed, remain two key achievement for the UN in the realm of peace and security. 

Conclusion – A Tale of Success?

The naiveté that liberal institutionalism has been charged with is confirmed by the difficulty to cooperate in areas that are so clearly still part of the realm of national interests (Weiss 2018: 178). Despite this, history has shown that UN nations, and the P5, are agreeing on important resolutions and overcoming their differences. States have also acted in line with the normative frameworks that the UN has promoted. The UN can be and should be criticized for its inability to act where needed or for its inability to stop action deemed damaging to peace and security, but it has an ability to adapt and reinvent itself in line with emerging global challenges that shouldn’t be undermined (MacKenzie 2015: 490). Such adaptability gives constructivism right in its understanding that process affects interests, which thereby transforms structure (Wendt 1992: 393). This understanding explains how the UNCS has been able to legitimize certain norms and practices, even when they intrude into the realm of national sovereignty (Williams & Bellamy 2013: 416). The UN is indeed the sum of its parts, composed of member states with their individual interests, but state interaction in this institutional context continue to shape states’ evolving interest, enabling policy change that corresponds with its task of maintaining peace and security. 

References:

Allison, R., 2009. The Russian case for military intervention in Georgia: international law, norms and political calculation,  European Security , 18(2), 173-200.

Autesserre, S., 2019.  The Crisis of Peacekeeping: Why the UN Can’t End Wars  [online]. Foreign Affairs. Available at:  https://www.foreignaffairs.com/articles/2018-12-11/crisis-peacekeeping  [Accessed 19 August 2020].

Bellamy, A., 2013. The Responsibility to Protect. In: ed. Williams, P.  Security Studies, An Introduction . Routledge: New York, 2013, 486-503.

Bellamy, A., and Hunt, C., 2015. Twenty-first century UN peace operations: protection, force and the changing security environment.  International Affairs  91(6), 1277–1298.

Carranza, M., 2019. The stability of the nuclear nonproliferation norm: a critique of norm-contestation theory  The Nonproliferation Review , 26(1-2), 7-22.

Crossette, B., 1999.  U.N. Details Its Failure to Stop ’95 Bosnia Massacre  [online]. The New York Times. Available at: https://www.nytimes.com/1999/11/16/world/un-details-its-failure-to-stop-95-bosnia-massacre.html  [Accessed 19 August 2020].

Doyle, M., and Sambanis, N., 2008.  Peacekeeping Operations . In: Daws, S., and Weiss, T. The Oxford Handbook on the United Nations. Oxford University Press: Oxford.

Ebegbulem, J., 2011. The Failure of Collective Security in the Post World Wars I and II International System.  Transcience , 2(2), 23-29.

Goodrich, L., 1965. The Maintenance of International Peace and Security.  International Organization,   19 (3), 429-443. 

Hampson, F., 2013. Human Security. In: ed. Williams, P.  Security Studies, An Introduction . Routledge: New York, 2013, 279-294.

Hanhimaki, J., 2015.  The United Nations: a very short introduction. Oxford University Press: New York.

MacKenzie, D., 2015. Forever adaptable: The United Nations system at 70.  International Journal,   70 (3), 489-498. 

Mingst, K., and Karns, M., 2013. The United Nations in the 21 st  Century. Westview Press: Boulder.

Morris, J., and Sheeler, N., 2007. The Security Council’s Crisis of Legitimacy and the Use of Force.  International Politics , 44, 214–231.

Nadin, P., 2017.  How the UN Security Council failed Syria  [online]. The Interpreter.   Available at:  https://www.lowyinstitute.org/the-interpreter/how-un-security-council-failed-syria  [Accessed 19 August 2020].

Nair, S., 2017.  Introduction Postcolonialism in International Relations Theory  [online]. E-International Relations. Available at:  https://www.e-ir.info/2017/12/08/postcolonialism-in-international-relations-theory/  [Accessed 19 August 2020].

Pugh, M., 2013. Peace Operations. In: ed. Williams, P.  Security Studies, An Introduction . Routledge: New York, 2013, 393-408.

Richmond, O. P., 2009. A post–liberal peace: eirenism and the everyday.  Review of International Studies , 35 (3), 557–580.

Sagan, S., 1997. Why Do States Build Nuclear Weapons?: Three Models in Search of a Bomb.  International Security,  21(3), 54-86. 

Saikal, A., 2012. The UN and Afghanistan: Contentions in Democratization and Statebuilding.  International Peacekeeping , 19(2), 217-234.

Sambanis, N., 2008. Short- and Long-Term Effects of United Nations Peace Operations.  The World Bank Economic Review , 22(1), 9-32.

Thakur, R., 2006.  The United Nations, Peace and Security . Cambridge: Cambridge University Press.

Weiss, T., 2018.  International Organizations and Global Governance . Routledge: London.

Weiss, T., and Kuele, G., 2014.  The Veto: Problems and Prospects  [online]. E-International Relations. Available at:  https://www.e-ir.info/2014/03/27/the-veto-problems-and-prospects/  [Accessed 19 August 2020].

Weiss, T., and Thakur, R., 2010.  Global Governance and the UN: An Unfinished Journey . Indiana University Press: Bloomington.

Wendt, A. (1992). Anarchy is what States Make of it: The Social Construction of Power Politics.  International Organization,   46 (2), 391-425.

Williams, P., and Bellamy, A., 2013.  UN Security Council and Peace Operations . In: eds. Weiss, T., and Wilkinson, R., 2013, 1 st  ed. International Organizations and Global Governance. Routledge: London.

UN, 2020a.  Maintain International Peace and Security   [online]. UN. Available at:  https://www.un.org/en/sections/what-we-do/maintain-international-peace-and-security/index.html  [Accessed 19 August 2020].

UN, 2020b.  R2P and the UN  [online]. UN. Available at:  https://www.un.org/en/chronicle/article/r2p-and-un  [Accessed 19 August 2020]. 

UN Declaration, 1965.  Declaration on the Inadmissibility of Intervention in the Domestic Affairs of States and the Protection of Their Independence and Sovereignty. Res. 2131  [online]. Available at:  https://undocs.org/pdf?symbol=en/A/RES/2131(XX)  [Accessed 19 August 2020].

UN Peacekeeping, 2020.  Historical timeline of UN Peacekeeping  [online]. UN. Available at:  https://peacekeeping.un.org/en/historical-timeline-of-un-peacekeeping  [Accessed 19 August 2020].

Written at: Nottingham Trent University Written for: Sagarika Dutt Date written: 08/2020

Further Reading on E-International Relations

  • A New Era of UN Peacekeeping? The Women, Peace and Security Agenda in Africa
  • How Has the Study of International Security Changed since the Cold War’s End?
  • To What Extent Has China’s Security Policy Evolved in Sub-saharan Africa?
  • How Important is Neutrality in Providing Humanitarian Assistance?
  • A Pareto Optimal Peace: How the Dayton Peace Agreement Struck a Unique Balance
  • The Implications of Stabilisation Logic in UN Peacekeeping: The Context of MINUSMA

Please Consider Donating

Before you download your free e-book, please consider donating to support open access publishing.

E-IR is an independent non-profit publisher run by an all volunteer team. Your donations allow us to invest in new open access titles and pay our bandwidth bills to ensure we keep our existing titles free to view. Any amount, in any currency, is appreciated. Many thanks!

Donations are voluntary and not required to download the e-book - your link to download is below.

international security essay

International Terrorism: The Challenge to Global Security Essay

Introduction, international terrorism as a global challenge, discussion and conclusion.

The damaging effect of terrorism on modern society was brought to the world’s attention following the terrorist attacks in New York and Washington in September 2001. This acts by the Al-Qaeda terror network demonstrated that international terrorism has the power to disrupt social life even in the world’s super power.

Since then, a wide-ranging debate has developed about the level of threat that international terrorism poses to the global community. While some people regard international terrorism as a marginal threat, others see it as an existential threat to society.

This paper will argue that international terrorism is the main challenge facing the world in the context of international security and therefore, measures should be taken to address this issue and safeguard global security.

International terrorism has become the greatest danger to world security, overtaking the threats of military confrontations from rival great powers. Stewart (2006) observes that the international security threat posed by military confrontations between rival great powers has reduced dramatically since the Second World War.

Most Western nations have formed alliances such as NATO, which makes it almost impossible for them to engage in aggressive military confrontation against each other. The possession of nuclear weapons by the major powers such as Russia and China acts as a deterrence from any major confrontation (Lutz & Brenda 2004).

Nations are therefore more likely to resort to diplomacy instead of risk military confrontation with each other. However, international terrorists attack nations without fear of retaliation since they do not have a well established base or economic resources that they hope to protect.

The activities of international terrorist organization have made the world unsafe. Terror activities have not been limited to US targets and the rest of the world has suffered from the actions of terrorists. The international terror organization, Al Qaeda did not limit its attacks to US targets and on March 11, 2004, it carried out the Madrid train bombings.

London also experienced terrorist attacks in July 2005 when the London Underground was bombed by Islamist extremists (UK Defence and Security Report 2010). Indonesia experienced terrorist attacks in 2002 that killed 202 people while a hotel in Jakarta was bombed in 2003 killing 12 people.

Thieux (2004) asserts that these attacks prove that international terrorism is a serious and potential threat not only for the United States but also for EU member states and the rest of the world.

International terrorism presents the most significant risk to global nuclear non-proliferation efforts. Presently, all functioning Weapons of Mass Destruction (WMD) including nuclear weapons are in the hands of legitimate governments.

However, intelligence reports indicate that terrorist organizations such as Al Qaeda have made efforts to obtain WMDs especially from weak states such as Pakistan. Bowen and Cottee (2012) state that if international terrorists obtain WMDs, they will be able to inflict major damages to targets all over the world.

International terrorism has increased the vulnerability of nations to attacks from their own citizens. Thieux (2004) documents that in addition to the Islamic radicals who joined the Al Qaeda network in the past, this terror organization now attracts members who are well integrated in the society.

International terrorist organizations are able to radicalize citizens of a country leading to the development of home-grown terrorists. For example, individuals can access jihadi websites and obtain information on suicide bombing (The UK Defence & Security Report 2010). Tackling this threat has proved to be a major challenge for most nations.

Thieux (2004) notes that international terrorism has led to a blurring between foreign and domestic affairs as nations have to deal with issues such as home-grown terrorists and sleeper cells. The difficulty of identifying terrorists increases the risk that these elements pose to the global community.

International terrorists are spread all over the world and it is difficult for law enforcement agencies to correctly identify all potential suspects. Stewart (2006) notes that unlike in a conventional war where the enemy combatants are easy to identify, the diverse pool of individuals involved in international terrorism makes the threat hard to identify.

International terrorism presents a major challenge since these actors do not follow any international laws of combat. There are well-established rules that can be used by nations when dealing with traditional security threats. These laws include rules of engagement that forbid soldiers from attacking unarmed civilians.

Diplomacy can also be used to resolve the differences between nations without resorting to armed confrontation. With international terrorism, there are no rules of engagement and terror organizations target civilians in order to spread fear (Engene 2004). The traditional tools of military deterrence and diplomacy are not effective in dealing with the threat of international terrorism.

International terrorism has led to the development of poor relationships between Western countries and the Arab world. Since most international terrorist organizations are operated by radical Islamists, the policies adopted by countries such as the US to counter them focus on these radical elements. The fight against terrorism has therefore focused on tackling the issue of Islamic extremism (Victoroff 2005).

This has proved to be problematic since terrorism organizations are not disparate and therefore cannot be handled using a uniform policy response. Hammond (2008) asserts that the overemphasis on Islamic extremism has led to the strengthening of the misperception especially in the Middle East that “the anti-terror campaign is actually a war on Islam” (p.220).

This situation has threatened to divide the world on religious basis. Hammond (2008) suggests that the division based on religious differences fostered by international terrorism is proving to be the greatest threat to international unity since the cold war.

International terrorism has contributed to the unpopularity of the US in many countries all over the world and the subsequent inclination of terrorists to attack US targets. Meyer (2009) states that terrorism threatens global security by disrupting the “peace of mind” of citizens and prompting aggressive retaliation by individual states.

Hammond (2008) reveals that following the 9/11 attacks, the Bush administration engaged in controversial security policies and effectively declared that America was at war with international terrorists. Due to the Bush policies, the US carried out military activities against terrorists and their affiliates and used economic means to influence the behaviours or interests of nations that harbour terrorists.

Terrorism threatens to disrupt international relations among traditional allies. Due to globalization, the movement of people from country to country has increased. Many international companies have established themselves in foreign countries and global trade is at a high level. International terrorists target Western citizens in foreign countries leading to immense political and psychological impact.

Tan (2007) documents that in 2002, the Al Qaeda affiliated network in South East Asia, Jemmah Islamiah, planned to carry out a terror attack against American targets in Singapore. If this attack had succeeded, it would have deteriorated the good relationship between the US and Singapore and greatly contributed to the growth of insecurity in the region.

The relationship between Pakistan and the UK has suffered due to international terrorism. The UK has accused Pakistan of not doing enough to prevent terrorism. In 2009, the UK arrested 12 Pakistani students in UK on suspicion of involvement in terrorism (UK Defence and Security Report 2010).

International terrorism undermines the good relationships between nations, and without this amicable relationship, global peace and security cannot be achieved.

The global community considers terrorism to be a significant threat to international peace. Following the events of 9/11, most nations, led by the US, have made a public declaration of war against international terrorism. The potential damages that international terrorists can cause, especially if they acquire WMD has led to arguments that terrorism is an “existential threat” for modern society (Meyer 2009).

With this realization, Western nations have tried to come up with a common and coordinated way of dealing with the threat of international terrorism. However, Thieux (2004) notes that the efforts have not been adequate and terrorism is still a major international threat.

This paper set out to demonstrate that international terrorism is the greatest threat to international security that the global community faces today. It begun by nothing that the global security threat posed by conventional military confrontations between nations is very low. However, the threat presented by international terrorism to global security is on the rise.

This threat has led to the deterioration of relationships especially between the West and Arab countries. The influence of terrorists has spread into many countries all over the world and various attacks have been carried out. For this reason, many countries view international terrorism as a threat to their security. Fighting global terrorism should therefore be a key priority for all nations.

Bowen, W & Cottee, M 2012, ‘Multilateral cooperation and the prevention of nuclear terrorism: pragmatism over idealism’, International Affairs , vol. 88, no. 2, pp. 349–368.

Engene, O 2004, Terrorism in Western Europe: Explaining The Trends Since 1950, Edward Elgar Publishing, NY.

Hammond, A 2008, ‘Two countries divided by a common threat? International perceptions of US and UK counter-terrorism and homeland security responses to the post-September 2001 threat environment’, Place Branding and Public Diplomacy , vol. 4, no. 3, pp. 218–239.

Lutz, J & Brenda, J 2004, Global Terrorism , Routledge, NY. Print.

Meyer, C 2009, ‘International terrorism as a force of homogenization? A constructivist approach to understanding cross-national threat perceptions and responses’, Cambridge Review of International Affairs , vol. 22, no. 4, pp. 647-666.

Stewart, P 2006, ‘Weak States and Global Threats: Fact or Fiction?’, Washington Quarterly, vol. 29, no. 2, pp. 27-53.

Tan, A 2007, ‘Singapore’s Cooperation with the Trilateral Security Dialogue Partners in the War Against Global Terrorism’, Defence Studies , vol. 7, no. 2, pp. 193-207.

Thieux, L 2004, ‘European Security and Global Terrorism: the Strategic Aftermath of the Madrid Bombing’, Central European Review of International Affairs , vol. 22, no. 1, pp. 59-74.

UK Defence and Security Report 2010, Domestic Security Overview , Business Monitor International Ltd, London.

Victoroff, J 2005, ‘The Mind of the Terrorist: A Review and Critique of Psychological Approaches’, The Journal of Conflict Resolution vol. 49, no.1, pp. 3-42.

  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2019, June 3). International Terrorism: The Challenge to Global Security. https://ivypanda.com/essays/international-terrorism-the-challenge-to-global-security/

"International Terrorism: The Challenge to Global Security." IvyPanda , 3 June 2019, ivypanda.com/essays/international-terrorism-the-challenge-to-global-security/.

IvyPanda . (2019) 'International Terrorism: The Challenge to Global Security'. 3 June.

IvyPanda . 2019. "International Terrorism: The Challenge to Global Security." June 3, 2019. https://ivypanda.com/essays/international-terrorism-the-challenge-to-global-security/.

1. IvyPanda . "International Terrorism: The Challenge to Global Security." June 3, 2019. https://ivypanda.com/essays/international-terrorism-the-challenge-to-global-security/.

Bibliography

IvyPanda . "International Terrorism: The Challenge to Global Security." June 3, 2019. https://ivypanda.com/essays/international-terrorism-the-challenge-to-global-security/.

  • The Weapons of Mass Destruction Commission
  • Role of Engineer in Global Challenges
  • Definitions of Diplomacy Analysis
  • Background and Root Causes: the 1987 Palestinian Intifada
  • United States – China Relations During World War II
  • Mine Ban Treaty: The Campaign to Ban Landmines
  • Landmines: An Inhumane Weapon
  • Has The Image Of The United States Become Negative?

Beyond Intractability

Knowledge Base Masthead

The Hyper-Polarization Challenge to the Conflict Resolution Field: A Joint BI/CRQ Discussion BI and the Conflict Resolution Quarterly invite you to participate in an online exploration of what those with conflict and peacebuilding expertise can do to help defend liberal democracies and encourage them live up to their ideals.

Follow BI and the Hyper-Polarization Discussion on BI's New Substack Newsletter .

Hyper-Polarization, COVID, Racism, and the Constructive Conflict Initiative Read about (and contribute to) the  Constructive Conflict Initiative  and its associated Blog —our effort to assemble what we collectively know about how to move beyond our hyperpolarized politics and start solving society's problems. 

By Omario Kanji

October 2003  

In the context of conflict resolution, the definition of "security" depends on one's perspective. At the simplest level, security may be defined as "the quality or state of being secure," "freedom from danger," or "freedom from fear or anxiety." Of the many other levels on which one can analyze security, the most relevant here are individual, group, regional, national, and global. Our task is then relatively simple; we consider how security is defined at these different levels. What emerges is a framework upon which security agreements are constructed and implemented.

Individual Security

On the individual level, security is most often understood as safety. This safety includes freedom from harm, whether physical or psychological. Threats to an individual's security can produce the fear or anxiety mentioned above. The United Nations Universal Declaration of Human Rights states that all people are entitled to "security of person." This declaration reinforces the concept of freedom from physical and psychological harm. Yet, what measures will be taken to protect an individual from harm? The most common forms of protection are legal structures that protect individuals from threats to their security. These include, but are not limited to, laws against murder, sex crimes, bodily harm, theft, and psychological harm such as coercion. The state assumes responsibility for constructing and implementing these legal regulations. In addition, security can be related to one's ability to attain the fundamental physical needs of a home, food, and socio-economic needs such as a job. The concept of individual security can therefore be linked to an individual's perception of her or his standard of living. The individual may thus equate security with a high standard of living.

Group Security

Discussing regional security requires us to first define the extent of the "region." Since we have placed the regional beneath the national level in this hierarchy, we are speaking of a physical area within a nation, which could be a collection of provinces, cities, or states. If there were certain religious, national, or ethnic groups that dominated a region, we would still speak of their security at the group level. What is regional security, then?

The simplest concept of security at the regional level could be economic, implying protection of regional interests. Perhaps a regional association with, or ownership of, a valued resource could provoke desires for security, and the responsibility for protecting that security would rest on the region. For example, labor or trade unions perform this function. Other notions of security at this level could be to maintain a certain standard of living. In this realm, members of a regional group might want to protect themselves from mass immigration, which could occur due to the region's coveted resources. The region might seek to ensure its security by campaigning against this immigration. Threats to security are often cited here, usually connected to issues of lowered living standards. On a more subtle level, religious, national, or ethnic groups may shrewdly promote their interests under the guise of regional security, and may elevate their group security to a regional priority level.

National Security

The definition of security at the group level shares many similarities with the definition of individual security; as the individual expects to have security of person, so does the group. But at the group level, an important aspect of security is freedom from discrimination . While an individual certainly can be mistreated for her or his affiliation with a religious, national, or ethnic group, this mistreatment is more obvious and perhaps more successfully prevented when an entire group is subject to the same mistreatment. We can define the group, i.e., why that group IS a group. Is it due to the similar nationality of its members? Are they a group because they share similar religious beliefs? Whatever the reason, group security may be interpreted as safety from threats to the group's identity . As with ensuring individual security, laws help ensure group security, although laws can also be discriminatory, which is actually one source of intractable conflict.

Regional Security

The national level of security is probably the most often examined and contentious definition of security. The nation-state often assumes the role of guarantor for individual security, group security, and perhaps regional security; for example, agricultural subsidies or steel tariffs are one way in which a nation-state protects a region within its boundaries from a foreign threat.

After ensuring individual, group, and regional security, how does the state define its own security? Lasso and Gonzalez state that "the entirety of conditions -- political, economic, military, social, and cultural -- necessary to guarantee the sovereignty, independence, and promotion of national interest..."[1] defines security. We can then ask what threatens those five conditions. Security from the military viewpoint is highly visible, and a nation will act when it is threatened militarily. Economic threats can also be simply defined, although domestic protectionism can often clash with international trade agreements signed by the same nation. A nation's claim that its protectionism helps ensure national economic security can cause international uproar. (For example, see the essay on Development and Conflict .)

Tension is introduced when a nation defines what in particular guarantees its political, socio-economic, and cultural security. For example, actions undertaken to protect cultures can easily be interpreted as discriminatory or racist. Cultural security is especially difficult to define and protect in heterogeneous, democratic societies such as the United States.

Socio-economic security can also assume controversial definitions and interpretations. Surely a rapidly aging population can threaten socio-economic security. A further question is what measures the state will undertake to solve the problem. Tension can again be introduced if the state or the society chooses to blame a specific group for the threat to socio-economic security. Here, security definitions are at odds since the state is protecting its own security by threatening a group's security.

Perhaps the most ambiguous aspect of security is that of political security, which may be very broadly defined. Often, a nation will react to threats to its political philosophies, as well as threats to its culture, society, or economy. The term "national security" has recently been used to justify "security" procedures within the United States as well as military action outside its borders. This widens the parameters for national security definitions, and implies a wide range of actions available to a nation.

Global Security

Global security is a relatively new concept, and conjures up images of organizations such as the United Nations. Global security, however, may be undermined by national security concerns; if one nation feels threatened by another, then global security cannot exist since members of the world are in disagreement. Global security is also undermined by negative judgment by one nation of another's philosophy of government. If nation A decides that nation B's governing methods are wrong, nation A will not submit to a global authority that allows nation B's methods to continue. Global security is thus a weak concept, since it assumes a supranational entity to whose judgment nations would yield in matters of disagreement. This is obviously a far-fetched goal, which is unlikely to be realized in the near future. As resources such as land, water, and oil are increasingly coveted by nations, global security has little chance to emerge as a durable concept in international relations.[2]

The Security Dilemma

At the national and global level, providing security creates a dilemma. It is generally thought that security is provided with a strong military that can deter attack. Yet, the development of military strength can be seen as a threat by the other side, which then increases its own military investment. This, then, actually decreases both sides' security, rather than increasing it. Security is actually a positive-feedback system. The more security I feel, the more secure my opponent(s) will feel, because I won't have to arm myself against them. But the less secure I feel, the more I will arm, and the less secure my opponent will feel as well. This security dilemma is what fueled the Cold War, the nuclear arms race, and indeed, it is much of what is fueling the conflict between Israel and the Palestinians, Indians and Pakistanis and North and South Korea. (There are other factors in all of those conflicts as well, but security is a big issue.)[3]

The concept of security, on all levels, is related to basic concepts of human psychology. If threatened, people will react and take necessary defensive measures. At the individual level, one can sometimes ward off threats by exercising caution in his or her daily life. He or she may arrange additional security measures, such as alarm systems, weapons, or perhaps changing residences. This same type of reaction may occur on the group or regional level. On the national and global levels, more formal structures of defense and security agreements exist. Nations might activate defense systems to react to overt threats, but this can threaten the other side, thereby reducing security, rather than increasing it. Furthermore, they might cooperate to create security agreements such as NATO, which foster cooperation and collaborative defense and security measures in the face of a perceived threat.

[1] L.H. Lasso, G. Gonzalez, in B.M. Bagley, S.A. Quezada, Eds. Mexico in Search of Security, (University of Miami Press, 1993), 4. < http://www.amazon.com/Mexico-Security-Bruce-M-Bagley/dp/1560006862 >; see also Brian J. Bow,  and Arturo Santa Cruz, The State and Security in Mexico: Transformation and Crisis in Regional Perspective (Routledge, 2012). < http://books.google.com/books?id=Am9r_7ftVdoC >.

[2]. For further discussion of global security, including applications to the War in Iraq, Hurricane Katrina, and Weapons of Mass Destruction (WMDs), see: Peter Hough, Understanding Global Security , (Routledge, 2008). < http://books.google.com/books?id=c_B-qty22m8C >.

[3] This paragraph was added by Heidi Burgess. It was not part of the author's original essay, but as editor, I took the liberty of adding it.

Use the following to cite this article: Kanji, Omario. "Security." Beyond Intractability . Eds. Guy Burgess and Heidi Burgess. Conflict Information Consortium, University of Colorado, Boulder. Posted: October 2003 < http://www.beyondintractability.org/essay/security >.

Additional Resources

The intractable conflict challenge.

international security essay

Our inability to constructively handle intractable conflict is the most serious, and the most neglected, problem facing humanity. Solving today's tough problems depends upon finding better ways of dealing with these conflicts.   More...

Selected Recent BI Posts Including Hyper-Polarization Posts

Hyper-Polarization Graphic

  • Crisis, Contradiction, Certainty, and Contempt -- Columbia Professor Peter Coleman, an expert on intractable conflict, reflects on the intractable conflict occurring on his own campus, suggesting "ways out" that would be better for everyone.
  • Massively Parallel Peace and Democracy Building Links for the Week of April 28, 2024 -- New suggested readings from colleagues and the Burgesses.
  • Attack the Problem, Not the People -- "Separate the people from the problem" might be the most often violated fundamental conflict resolution principle, even by people who know better. And it is hurting us.

Get the Newsletter Check Out Our Quick Start Guide

Educators Consider a low-cost BI-based custom text .

Constructive Conflict Initiative

Constructive Conflict Initiative Masthead

Join Us in calling for a dramatic expansion of efforts to limit the destructiveness of intractable conflict.

Things You Can Do to Help Ideas

Practical things we can all do to limit the destructive conflicts threatening our future.

Conflict Frontiers

A free, open, online seminar exploring new approaches for addressing difficult and intractable conflicts. Major topic areas include:

Scale, Complexity, & Intractability

Massively Parallel Peacebuilding

Authoritarian Populism

Constructive Confrontation

Conflict Fundamentals

An look at to the fundamental building blocks of the peace and conflict field covering both “tractable” and intractable conflict.

Beyond Intractability / CRInfo Knowledge Base

international security essay

Home / Browse | Essays | Search | About

BI in Context

Links to thought-provoking articles exploring the larger, societal dimension of intractability.

Colleague Activities

Information about interesting conflict and peacebuilding efforts.

Disclaimer: All opinions expressed are those of the authors and do not necessarily reflect those of Beyond Intractability or the Conflict Information Consortium.

Beyond Intractability 

Unless otherwise noted on individual pages, all content is... Copyright © 2003-2022 The Beyond Intractability Project c/o the Conflict Information Consortium All rights reserved. Content may not be reproduced without prior written permission.

Guidelines for Using Beyond Intractability resources.

Citing Beyond Intractability resources.

Photo Credits for Homepage, Sidebars, and Landing Pages

Contact Beyond Intractability    Privacy Policy The Beyond Intractability Knowledge Base Project  Guy Burgess and Heidi Burgess , Co-Directors and Editors  c/o  Conflict Information Consortium Mailing Address: Beyond Intractability, #1188, 1601 29th St. Suite 1292, Boulder CO 80301, USA Contact Form

Powered by  Drupal

production_1

IMAGES

  1. The Arms Industry and International Security

    international security essay

  2. "Snowden": Prominent Issues in International Security

    international security essay

  3. SECURITY AND SAFETY Free Essay Example

    international security essay

  4. International Security Essay Example

    international security essay

  5. Is terrorism a serious threat to national and international security

    international security essay

  6. International Security Essay

    international security essay

VIDEO

  1. Essay : Emerging Threats to India's Internal Security

  2. Congratulations to our 2023 ISSA International Award Finalists

  3. Essay : Internal Security Issues and Challenges

  4. International Security|BS English literature|International Relations|Key assumptions|Components

  5. Automatic Report Card in Excel

  6. Episode:15 || Security: Terrorism || Free Mains Answer writing 2021 || UPSC Mains

COMMENTS

  1. International Security

    International Security, the #2 journal in International Relations based on 2021 impact factor, publishes lucid, well-documented essays on the full range of contemporary security issues.Its articles address traditional topics of war and peace, as well as more recent dimensions of security, including environmental, demographic, and humanitarian issues, transnational networks, and emerging ...

  2. International Security, Its Components and Importance Essay

    The measures that are taken to ensure safety and security are: military actions and also the signing of treaties after an agreement. The aim of international security is to carry out an extensive search into a situation, identify the problem, carry an analysis to the cause of the problem and eventually, provide a solution that works right for the problem (Miller 1).

  3. International Security

    International Security publishes lucid, well-documented essays on all aspects of the control and use of force, from all political viewpoints. Its articles cover contemporary policy issues, and probe historical and theoretical questions behind them. Essays in International Security have defined the debate on American national security policy and have set the agenda for scholarship on ...

  4. The Oxford Handbook of International Security

    Abstract. Future-oriented questions are woven through the study and practice of international security. The 48 essays collected in this Handbook use such questions to provide a tour of the most ...

  5. The Oxford Handbook of International Security

    Abstract. Future-oriented questions are woven through the study and practice of international security. The 48 essays collected in this Handbook use such questions to provide a tour of the most innovative and exciting new areas of research as well as major developments in established lines of inquiry. The results of their efforts are: the ...

  6. Analysis

    The CSIS International Security Program leads a rigorous analytic agenda covering the most pressing challenges facing the U.S. globally. Our research projects range from multi-year reports to short commentaries and opinion pieces on breaking news. Explore our various research projects here.

  7. Geopolitics and International Security

    Since the end of the Cold War, the definition of international security has evolved immensely. CSIS is constantly working to engage with diverse actors and issues that present security threats in the twenty-first century. This research is led by the International Security Program, the Arleigh A. Burke Chair in Strategy, and the Zbigniew Brzezinski Chair in Global Security and Geostrategy and ...

  8. Maintain International Peace and Security

    The United Nations was created in 1945, following the devastation of the Second World War, with one central mission: the maintenance of international peace and security. The UN accomplishes this ...

  9. Project MUSE

    Volume 48, Number 1, Summer 2023. International Security publishes lucid, well-documented essays on all aspects of the control and use of force. Its articles cover contemporary policy issues, and probe historical and theoretical questions behind them. Essays in International Security have defined the debate on American national security policy ...

  10. Project MUSE

    International Security publishes lucid, well-documented essays on all aspects of the control and use of force. Its articles cover contemporary policy issues, and probe historical and theoretical questions behind them. Essays in International Security have defined the debate on American national security policy and have set the agenda for scholarship on international security affairs.

  11. Home

    The 48 essays collected in this Handbook use such questions to provide a tour of the most innovative and exciting new areas of research as well as major developments in established lines of inquiry in international security studies. ... issue briefs and other publications on national and international security issues connected to applied ...

  12. International Security-Volume 33, Number 2, Fall 2008

    International Security publishes lucid, well-documented essays on all aspects of the control and use of force. Its articles cover contemporary policy issues, and probe historical and theoretical questions behind them. Essays in International Security have defined the debate on American national security policy and have set the agenda for scholarship on international security affairs.

  13. Globalization and the Study of International Security

    Cha, Victor D. (2000) Globalization and the Study of International Security, Journal of Peace Research 37 (3): 391-403. ... This essay explores how the processes of globalization have fundamentally changed the way we think about security. It argues that non-physical security, diversification of threats, and the salience of identity are key ...

  14. Peace and Security

    United Nations peacekeeping operations are a vital instrument employed by the international community to advance peace and security.. The first UN peacekeeping mission was established in 1948 when ...

  15. Conflict, Peace and Security: An International Relations Perspective

    Conflict, peace and security are some of the enduring concerns of the Peace Research Movement of the 1950s and 1960s. They have become integrated in the dominant disciplines of international relations (IR) and political science and now are also part of most of the social science disciplines, such as economics, sociology, public policy, gender studies, international law and so on.

  16. Critical Theory, Security, and Emancipation

    Critical theory in International Relations can mean several things. Critical theory refers to a body of thought growing out of the Marxist tradition, which, during the mid- to late Cold War informed dependency and world systems theory. In the decade prior to and following the end of the Cold War, critical theory, informed by Gramsci and the ...

  17. International Security Has Changed After Cold War Politics Essay

    Researchers of international relations the 1990's embarked on the search of new concepts of security, which was due to changing conditions in the world politics after the Cold War and the collapse of the socialist bloc. Thus, three new security concept have been formulated. The concept of cooperative security.

  18. Understanding the Islamic State—A Review Essay

    Abstract. This article reviews several recent books on the Islamic State in order to understand its goals, motivations, strategy, and vulnerabilities. It argues that the Islamic State's ideology is powerful but also highly instrumental, offering the group legitimacy and recruiting appeal. Raison d'etat often dominates its decisionmaking. The Islamic State's strength is largely a consequence of ...

  19. Prize for Best Essay in Technology and International Security Policy

    The prize for Best Essay in Technology and International Security Policy is a newly established competition starting in AY 2023-2024. The prize is made possible by a generous donor. Awarded up to once annually, this prize offers recognition for the best essay that considers the impact of technology on prospects for peace or war, and/or the ways in which conflict may shape technology.

  20. How Successful Has the UN Been in Maintaining International Peace and

    The UN Security Council (UNSC) is the organ with the primary responsibility for maintaining international peace and security. Outlining its structure and function is an essential first step for determining its success. It consists of 15 members, 5 of which are permanent and have veto power (the P5), namely the United States, the United Kingdom ...

  21. International Terrorism: The Challenge to Global Security Essay

    International Terrorism as a Global Challenge. International terrorism has become the greatest danger to world security, overtaking the threats of military confrontations from rival great powers. Stewart (2006) observes that the international security threat posed by military confrontations between rival great powers has reduced dramatically ...

  22. Security

    A nation's claim that its protectionism helps ensure national economic security can cause international uproar. (For example, see the essay on Development and Conflict.) Tension is introduced when a nation defines what in particular guarantees its political, socio-economic, and cultural security. For example, actions undertaken to protect ...

  23. Essay

    The former president admires Putin and sees the Ukraine war as a burden on the U.S. But if re-elected, he would have powerful reasons to prevent a Russian victory.