[1]
P. Williams, Ed., Security studies: an introduction, Second edition. London: Routledge, 2013 [Online]. Available: https://www.dawsonera.com/guard/protected/dawson.jsp?name=https://idp.gla.ac.uk/shibboleth&dest=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9780203122570
[2]
C. Peoples, N. Vaughan-Williams, and Ebooks Corporation Limited, Critical security studies: an introduction. London: Routledge, 2010 [Online]. Available: http://www.GLA.eblib.com/patron/FullRecord.aspx?p=547344
[3]
A. Collins, Ed., Contemporary security studies, Fourth edition. Oxford, United Kingdom: Oxford University Press, 2016.
[4]
K. Krause and M. C. Williams, Critical security studies: concepts and cases. London: Routledge, 1997 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=315340
[5]
P. Williams, Ed., Security studies: an introduction, Second edition. London: Routledge, 2013 [Online]. Available: https://www.dawsonera.com/guard/protected/dawson.jsp?name=https://idp.gla.ac.uk/shibboleth&dest=http://www.dawsonera.com/depp/reader/protected/external/AbstractView/S9780203122570
[6]
K. Krause and M. C. Williams, Critical security studies: concepts and cases. London: Routledge, 1997 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=315340
[7]
D. A. Baldwin, ‘The Concept of Security’, Review of International Studies, vol. 23, no. 1, pp. 5–26, 1997 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/20097464
[8]
K. Booth, Critical security studies and world politics, vol. Critical security studies. Boulder, Colo: Lynne Rienner Publishers, 2005.
[9]
B. Buzan, People, states and fear: an agenda for international security studies in the post-cold war era, 2nd ed. Harlow: Pearson Education Ltd, 1991.
[10]
C. A. S. E. Collective, ‘Critical Approaches to Security in Europe: A Networked Manifesto’, Security Dialogue, vol. 37, no. 4, pp. 443–487, Dec. 2006, doi: 10.1177/0967010606073085.
[11]
T. Terriff, Security studies today. Cambridge, UK: Polity Press, 1999.
[12]
A. J. Bellamy, Security and the war on terror, vol. Contemporary security studies. London: Routledge, 2008.
[13]
J. Huysmans, ‘Security! What Do You Mean?: From Concept to Thick Signifier’, European Journal of International Relations, vol. 4, no. 2, pp. 226–255, Jun. 1998, doi: 10.1177/1354066198004002004.
[14]
Thucydides, ‘The Melian Dialogue excerpted from The War of the Peloponnesians against the Athenians’. [Online]. Available: https://www.mtholyoke.edu/acad/intrel/melian.htm
[15]
L. M. J. Bagby, ‘The Use and Abuse of Thucydides in International Relations’, International Organization, vol. 48, no. 1, pp. 131–153, 1994 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2706917
[16]
D. A. Welch, ‘Why International Relations Theorists Should Stop Reading Thucydides’, Review of International Studies, vol. 29, no. 3, pp. 301–319, 2003 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/20097856
[17]
J. Mynott and Thucydides, The war of the Peloponnesians and the Athenians, vol. Cambridge texts in the history of political thought. Cambridge: Cambridge University Press, 2013.
[18]
M. Walzer, Just and unjust wars: a moral argument with historical illustrations, Fifth edition. New York: Basic Books, a member of the Perseus Books Group, 2015 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=2083288
[19]
J. Monten, ‘Thucydides and Modern Realism’, International Studies Quarterly, vol. 50, no. 1, pp. 3–25, 2006 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/3693549
[20]
R. N. Lebow, The tragic vision of politics: ethics, interests, and orders. Cambridge: Cambridge University Press, 2003.
[21]
C. von Clausewitz, M. E. Howard, P. Paret, and Dawson Books, On war. Princeton, NJ: Princeton University Press, 1984 [Online]. Available: https://www.vlebooks.com/vleweb/product/openreader?id=GlasgowUni&isbn=9781400837403
[22]
M. van Creveld, ‘The eternal Clausewitz’, Journal of Strategic Studies, vol. 9, no. 2–3, pp. 35–50, Jun. 1986, doi: 10.1080/01402398608437258.
[23]
V. J. Esposito, ‘War as a continuation of politics’, Military Affairs, vol. 18, no. 1 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://search.proquest.com/docview/1296714832?pq-origsite=summon
[24]
P. Paret, Understanding war: essays on Clausewitz and the history of military power. Princeton, N.J.: Princeton University Press, 1992.
[25]
M. E. Howard, Clausewitz: a very short introduction, vol. Very short introductions. Oxford: Oxford University Press, 2002 [Online]. Available: http://lib.myilibrary.com/browse/open.asp?id=176975&entityid=https://idp.gla.ac.uk/shibboleth
[26]
R. N. Lebow, The tragic vision of politics: ethics, interests, and orders. Cambridge: Cambridge University Press, 2003.
[27]
P. M. Baldwin, ‘Clausewitz in Nazi Germany’, Journal of Contemporary History, vol. 16, no. 1, pp. 5–26 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://search.proquest.com/docview/1297330175?pq-origsite=summon
[28]
J. Baylis, J. J. Wirtz, and C. S. Gray, Eds., Strategy in the contemporary world: an introduction to strategic studies, Fifth edition. Oxford: Oxford University Press, 2016.
[29]
K. N. Waltz, ‘Structural Realism after the Cold War’, International Security, vol. 25, no. 1, pp. 5–41, 2000 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2626772
[30]
J. J. Mearsheimer, The tragedy of great power politics, Updated edition., vol. The Norton series in world politics. New York: W.W. Norton & Company, 2014.
[31]
M. TRACHTENBERG, ‘The Question of Realism’:, Security Studies, vol. 13, no. 1, pp. 156–194, Oct. 2003, doi: 10.1080/09636410490493877.
[32]
A. Collins, Ed., Contemporary security studies, Fourth edition. Oxford, United Kingdom: Oxford University Press, 2016.
[33]
H. J. Morgenthau, ‘The Evil of Politics and the Ethics of Evil’, Ethics, vol. 56, no. 1, pp. 1–18, 1945 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2988705
[34]
D. R. Mapel and T. Nardin, Traditions of international ethics, vol. Cambridge studies in international relations. Cambridge: Cambridge University Press, 1992.
[35]
D. R. Mapel and T. Nardin, Traditions of international ethics, vol. Cambridge studies in international relations. Cambridge: Cambridge University Press, 1992.
[36]
J. W. Legro and A. Moravcsik, ‘Is Anybody Still a Realist?’, International Security, vol. 24, no. 2, pp. 5–55, Oct. 1999, doi: 10.1162/016228899560130.
[37]
M. J. Smith, Realist thought from Weber to Kissinger, Paperback ed., vol. Political traditions in foreign policy series. Baton Rouge: Louisiana State University Press, 1990.
[38]
M. C. Williams, The Realist Tradition and the Limits of International Relations, vol. Cambridge Studies in International Relations. Cambridge: Cambridge University Press, 2005 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://dx.doi.org/10.1017/CBO9780511491771
[39]
K. N. Waltz, Man, the state and war: a theoretical analysis, vol. Topical studies in international relations. New York: Columbia University Press, 1959.
[40]
J. H. Herz, ‘Idealist Internationalism and the Security Dilemma’, World Politics, vol. 2, no. 02, pp. 157–180, Jan. 1950, doi: 10.2307/2009187. [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2009187
[41]
E. B. Montgomery, ‘Breaking Out of the Security Dilemma: Realism, Reassurance, and the Problem of Uncertainty’, International Security, vol. 31, no. 2, pp. 151–185, Oct. 2006, doi: 10.1162/isec.2006.31.2.151.
[42]
S. D. Sagan and K. N. Waltz, The spread of nuclear weapons: an enduring debate, Third edition. New York: W.W. Norton & Co, 2013.
[43]
K. Booth and N. J. Wheeler, The security dilemma: fear, cooperation and trust in world politics. Basingstoke: Palgrave Macmillan, 2008.
[44]
G. H. Snyder, ‘The Security Dilemma in Alliance Politics’, World Politics, vol. 36, no. 04, pp. 461–495, Jul. 1984, doi: 10.2307/2010183. [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2010183
[45]
S. Tang, ‘The Security Dilemma: A Conceptual Analysis’, Security Studies, vol. 18, no. 3, pp. 587–623, Sep. 2009, doi: 10.1080/09636410903133050.
[46]
R. Jervis, ‘Cooperation Under the Security Dilemma’, World Politics, vol. 30, no. 2, pp. 167–214, 1978 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2009958
[47]
C. Craig and Ebooks Corporation Limited, Glimmer of a new Leviathan: total war in the realism of Niebuhr, Morgenthau, and Waltz. New York, NY: Columbia University Press, 2003 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=909145
[48]
L. Freedman and Ebooks Corporation Limited, The evolution of nuclear strategy, 3rd ed. Basingstoke, Hampshire: Palgrave Macmillan, 2003 [Online]. Available: http://www.GLA.eblib.com/patron/FullRecord.aspx?p=1040395
[49]
L. Freedman, Deterrence. Cambridge: Polity Press, 2004.
[50]
C. Peoples, N. Vaughan-Williams, and Ebooks Corporation Limited, Critical security studies: an introduction. London: Routledge, 2010 [Online]. Available: http://www.GLA.eblib.com/patron/FullRecord.aspx?p=547344
[51]
‘Security Dialogue -- Collected Resources : September 2004 : Special section on what is “human security”?’, vol. 35, no. 3, 2004 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://journals.sagepub.com/toc/sdib/35/3
[52]
R. Paris, ‘Human Security: Paradigm Shift or Hot Air?’, vol. 26, no. 2, pp. 87–102, Jan. 2001 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://muse.jhu.edu/article/14359
[53]
S. Tadjbakhsh and A. M. Chenoy, Human security: concepts and implications, vol. Routledge advances in international relations and global politics. London: Routledge, 2007.
[54]
K. Bajpai, ‘The Idea of Human Security’, International Studies, vol. 40, no. 3, pp. 195–228, Aug. 2003, doi: 10.1177/002088170304000301.
[55]
A. Collins, Ed., Contemporary security studies, Fourth edition. Oxford, United Kingdom: Oxford University Press, 2016.
[56]
P. D. Williams and M. McDonald, Eds., Security studies: an introduction, Third edition. London: Routledge, 2018 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090
[57]
A. Collins, Ed., Contemporary security studies, Fourth edition. Oxford, United Kingdom: Oxford University Press, 2016.
[58]
H. Stritzel, ‘Towards a Theory of Securitization: Copenhagen and Beyond’, European Journal of International Relations, vol. 13, no. 3, pp. 357–383, Sep. 2007, doi: 10.1177/1354066107080128.
[59]
C. McInnes and S. Rushton, ‘HIV/AIDS and securitization theory’, European Journal of International Relations, vol. 19, no. 1, pp. 115–138, Mar. 2013, doi: 10.1177/1354066111425258.
[60]
M. McDonald, ‘Securitization and the Construction of Security’, European Journal of International Relations, vol. 14, no. 4, pp. 563–587, Dec. 2008, doi: 10.1177/1354066108097553.
[61]
R. D. Lipschutz, On security, vol. New directions in world politics. New York, N.Y.: Columbia University Press, 1995.
[62]
B. Buzan, O. Wæver, and J. de Wilde, Security: a new framework for analysis. Boulder, Colo: Lynne Rienner Pub, 1998.
[63]
T. Balzacq, ‘The Three Faces of Securitization: Political Agency, Audience and Context’, European Journal of International Relations, vol. 11, no. 2, pp. 171–201, Jun. 2005, doi: 10.1177/1354066105052960.
[64]
U. P. Gad, ‘Special Issue: The Politics of Securitization’, vol. 42, pp. 315–328 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://sdi.sagepub.com/content/42/4-5.toc
[65]
P. D. Williams and M. McDonald, Eds., Security studies: an introduction, Third edition. London: Routledge, 2018 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090
[66]
B. Mcsweeney, ‘Identity and security: Buzan and the Copenhagen school’, Review of International Studies, vol. 22, no. 01, Jan. 1996, doi: 10.1017/S0260210500118467.
[67]
O. F. KNUDSEN, ‘Post-Copenhagen Security Studies: Desecuritizing Securitization’, Security Dialogue, vol. 32, no. 3, pp. 355–368, Sep. 2001, doi: 10.1177/0967010601032003007.
[68]
C. Peoples, N. Vaughan-Williams, and Ebooks Corporation Limited, Critical security studies: an introduction. London: Routledge, 2010 [Online]. Available: http://www.GLA.eblib.com/patron/FullRecord.aspx?p=547344
[69]
C. Peoples, N. Vaughan-Williams, and Ebooks Corporation Limited, Critical security studies: an introduction. London: Routledge, 2010 [Online]. Available: http://www.GLA.eblib.com/patron/FullRecord.aspx?p=547344
[70]
R. W. Jones, ‘‘Message in a bottle’? Theory and praxis in critical security studies’, Contemporary Security Policy, vol. 16, no. 3, pp. 299–319, Dec. 1995, doi: 10.1080/13523269508404119.
[71]
K. Booth, ‘Security and Emancipation’, Review of International Studies, vol. 17, no. 4, pp. 313–326, 1991 [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/20097269
[72]
M. Bourne and D. Bulley, ‘Securing the human in critical security studies: the insecurity of a secure ethics’, European Security, vol. 20, no. 3, pp. 453–471, Sep. 2011, doi: 10.1080/09662839.2011.572070.
[73]
K. Booth, ‘Anchored in Tahrir Square’, European Security, vol. 20, no. 3, pp. 473–479, Sep. 2011, doi: 10.1080/09662839.2011.609169.
[74]
R. Wyn Jones, Security, strategy, and critical theory, vol. Critical security studies. Boulder, Colo: Lynne Rienner Publishers, 1999.
[75]
A. Collins, Ed., Contemporary security studies, Fourth edition. Oxford, United Kingdom: Oxford University Press, 2016.
[76]
K. Booth and Askews & Holts Library Services, Theory of world security, vol. Cambridge Studies in International Relations. Cambridge: Cambridge University Press, 2007 [Online]. Available: https://www.vlebooks.com/vleweb/product/openreader?id=GlasgowUni&isbn=9781107174818
[77]
R. W. Cox, ‘Social Forces, States and World Orders: Beyond International Relations Theory’, Millennium - Journal of International Studies, vol. 10, no. 2, pp. 126–155, Jun. 1981, doi: 10.1177/03058298810100020501.
[78]
K. M. Fierke and Ebooks Corporation Limited, Critical approaches to international security, Second edition. Cambridge: Polity Press, 2015 [Online]. Available: http://GLA.eblib.com/patron/FullRecord.aspx?p=1986959
[79]
A. Bilgic, ‘“Real people in real places”: Conceptualizing power for emancipatory security through Tahrir’, Security Dialogue, vol. 46, no. 3, pp. 272–290, Jun. 2015, doi: 10.1177/0967010615575360.
[80]
P. D. Williams and M. McDonald, Eds., Security studies: an introduction, Third edition. London: Routledge, 2018 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090
[81]
P. D. Williams and M. McDonald, Eds., Security studies: an introduction, Third edition. London: Routledge, 2018 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090
[82]
M. De Larrinaga and M. G. Doucet, ‘Sovereign Power and the Biopolitics of Human Security’, Security Dialogue, vol. 39, no. 5, pp. 517–537, Oct. 2008, doi: 10.1177/0967010608096148.
[83]
C. Bell, ‘Surveillance Strategies and Populations at Risk: Biopolitical Governance in Canada’s National Security Policy’, Security Dialogue, vol. 37, no. 2, pp. 147–165, Jun. 2006, doi: 10.1177/0967010606066168.
[84]
R. L. Doty, ‘States of Exception on the Mexico?U.S. Border: Security, “Decisions,” and Civilian Border Patrols’, International Political Sociology, vol. 1, no. 2, pp. 113–137, Jun. 2007, doi: 10.1111/j.1749-5687.2007.00008.x.
[85]
D. Bigo and Centre d’études sur les conflits (Paris, France), Illiberal practices of liberal regimes: the (in)security games, vol. Collection Cultures&conflits. Paris: L’Harmattan, 2006.
[86]
D. Bigo and A. Tsoukala, Terror, insecurity and liberty: illiberal practices of liberal regimes after 9/11, vol. Routledge studies in liberty and security. London: Routledge, 2008.
[87]
D. Campbell and Ebooks Corporation Limited, Writing security: United States foreign policy and the politics of identity, Revised edition. Manchester: Manchester University Press, 1998 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=310792
[88]
M. Dillon, Politics of security: towards a political philosophy of continental thought. London: Routledge, 1996.
[89]
A. Finlayson and J. Valentine, Politics and post-structuralism: an introduction. Edinburgh: Edinburgh University Press, 2002.
[90]
A. W. Neal, ‘Foucault in Guantanamo: Towards an Archaeology of the Exception’, Security Dialogue, vol. 37, no. 1, pp. 31–46, Mar. 2006, doi: 10.1177/0967010606064135.
[91]
R. B. J. Walker, ‘Lines of Insecurity: International, Imperial, Exceptional’, Security Dialogue, vol. 37, no. 1, pp. 65–82, Mar. 2006, doi: 10.1177/0967010606064137.
[92]
S. M. Walt, ‘The Renaissance of Security Studies’, International Studies Quarterly, vol. 35, no. 2, Jun. 1991, doi: 10.2307/2600471. [Online]. Available: https://ezproxy.lib.gla.ac.uk/login?url=https://www.jstor.org/stable/2600471
[93]
P. D. Williams and M. McDonald, Eds., Security studies: an introduction, Third edition. London: Routledge, 2018 [Online]. Available: https://ebookcentral.proquest.com/lib/gla/detail.action?docID=5295090
[94]
A. Collins, Ed., Contemporary security studies, Fourth edition. Oxford, United Kingdom: Oxford University Press, 2016.
[95]
C. Rowley and J. Weldes, ‘The evolution of international security studies and the everyday: Suggestions from the Buffyverse’, Security Dialogue, vol. 43, no. 6, pp. 513–530, Dec. 2012, doi: 10.1177/0967010612463490.
[96]
B. Buzan, L. Hansen, and Askews & Holts Library Services, The evolution of international security studies. Cambridge: Cambridge University Press, 2009 [Online]. Available: https://www.vlebooks.com/vleweb/product/openreader?id=GlasgowUni&isbn=9781107197817
[97]
K. Booth, Theory of world security, vol. Cambridge Studies in International Relations. Cambridge: Cambridge University Press, 2007 [Online]. Available: https://www.vlebooks.com/vleweb/product/openreader?id=GlasgowUni&isbn=9781107174818
[98]
A. Bennett, C. Elman, and J. M. Owen, ‘Security Studies and Recent Developments in Qualitative and Multi-Method Research’, Security Studies, vol. 23, no. 4, pp. 657–662, Oct. 2014, doi: 10.1080/09636412.2014.970832.