Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-gvvz8 Total loading time: 0 Render date: 2024-12-23T07:00:20.050Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  15 February 2024

Rita Floyd
Affiliation:
University of Birmingham
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
The Duty to Secure
From Just to Mandatory Securitization
, pp. 213 - 235
Publisher: Cambridge University Press
Print publication year: 2024

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abbas, T. (2019). ‘Implementing “Prevent” in countering violent extremism in the UK: A left-realist critique’, Critical Social Policy, 39(3), 396412.Google Scholar
Abosede Durokifa, A. and Ijeoma, E. C. (2018). ‘Neo-colonialism and Millennium Development Goals (MDGs) in Africa: A blend of an old wine in a new bottle’, African Journal of Science, Technology, Innovation and Development, 10(3), 355366.Google Scholar
Acharya, A. (2014). Constructing a security community in Southeast Asia: ASEAN and the problem of regional order. London: Routledge.Google Scholar
Adler, E. and Barnett, M. (1998). ‘Security communities in theoretical perspective’ In Adler, Emmanuel and Barnett, Michael (eds.) Security communities, Cambridge: Cambridge University Press, pp. 328.CrossRefGoogle Scholar
African Union. (2000). ‘Constitutive Act of the African Union’, available at: au.int/sites/default/files/pages/34873-file-constitutiveact_en.pdf [accessed 22/05/2022].Google Scholar
Altman, A. and Wellman, C. H. (2009). A liberal theory of international justice. Oxford: Oxford University Press.CrossRefGoogle Scholar
Amnesty International. (2017). Dangerously disproportionate: The ever-expanding national security state in Europe. London: Amnesty International.Google Scholar
Amnesty International. (2018). ‘France: “Dehumanising” counter-terror measures being used to unjustly punish people – New report’, available at: www.amnesty.org.uk/press-releases/france-dehumanising-counter-terror-measures-being-used-unjustly-punish-people-new [accessed 31/03/2022].Google Scholar
Annan, K. (1999). ‘Secretary-General presents his annual report to general assembly’ 20 September 1999, available at: www.un.org/press/en/1999/19990920.sgsm7136.html [accessed 19/06/2023].Google Scholar
Annan, K. (2000). ‘We the peoples: The role of the United Nations in the 21st century, United Nations’, available at: digitallibrary.un.org/record/413745?ln=en [accessed 19/06/2023].Google Scholar
Annan, K. (2005). In larger freedom: Towards development, security and human rights for all, available at: www.un.org/en/ga/search/view_doc.asp?symbol=A/59/2005 [accessed 25/09/2019].Google Scholar
Aradau, C. (2004). ‘Security and the democratic scene: Desecuritization and emancipation’, Journal of International Relations and Development, 7(4), 388413.Google Scholar
Audard, C. (2007). John Rawls. Stocksfield: Acumen.Google Scholar
Aust, A. (2010). Handbook of international law. Cambridge: Cambridge University Press.Google Scholar
Axworthy, L. (2016). ‘Resetting the narrative on peace and security: R2P in the next ten years’ In Bellamy, Alex J. and Dunne, Tim (eds.) The Oxford handbook of the responsibility to protect, Oxford: Oxford University Press, pp. 968983.Google Scholar
Axworthy, L. and Rock, A. (2012). ‘Making R2P work: Now and in the future’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 181193.Google Scholar
Bain, W. (2014). ‘The pluralist-solidarist debate in the English school’ In Navari, Cornelia and Green, Daniel M. (eds.) Guide to the English school in international studies, Chichester: John Wiley & Sons. pp. 159169.Google Scholar
Balzacq, T. (2011). ‘A theory of securitization: Origins, core assumptions, and variants’ In Balzacq, Thierry (ed.) Securitization theory: How security problems emerge and dissolve, London: Routledge, pp. 130.Google Scholar
Baylis, J., Smith, S., and Owens, P. (Eds.). (2020). The globalization of world politics: An introduction to international relations. Oxford: Oxford University Press.Google Scholar
BBC. (2019). ‘Climate emergency is Oxford dictionary’s word of the year 2019’, available at: www.bbc.co.uk/newsround/50499514 [accessed 11/07/2023].Google Scholar
Beauchamp, T. (2019). ‘The principle of beneficence in applied ethics’ In Zalta, Edward N. (ed.) The Stanford encyclopedia of philosophy (Spring 2019 Edition), plato.stanford.edu/archives/spr2019/entries/principle-beneficence/.Google Scholar
Beitz, C. R. (2009). The idea of human rights. Oxford: Oxford University Press.Google Scholar
Belk, R. and Noyes, M. (2012). On the use of offensive cyber capabilities a policy analysis on offensive US cyber policy. Harvard Kennedy School, available at: citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.297.1370&rep=rep1&type=pdf [accessed 18/02/2019].Google Scholar
Bellamy, A. J. (2018). ‘The responsibility to protect’ In Williams, Paul D. and McDonald, Matt (eds.) Security studies: An introduction, Abingdon: Routledge, pp. 235249.Google Scholar
Bellamy, A. J. (2015). ‘The three pillars of the responsibility to protect’, Pensamiento propio, 41(20), 3564.Google Scholar
Bellamy, A. J. (2016). ‘UN security council’ In Bellamy, Alex J. and Dunne, Tim (eds.) The Oxford handbook of the responsibility to protect, Oxford: Oxford University Press, pp. 249268.Google Scholar
Bellamy, A. J. and Williams, P. D. (2012). ‘On the limits of moral hazard: The “responsibility to protect”, armed conflict and mass atrocities’, European Journal of International Relations, 18(3), 539571.Google Scholar
Berenskoetter, F. (2014). ‘Friendship, security and power’, available at eprints.soas.ac.uk/17941/1/berenskoetter-friendship-security-and-power.pdf [accessed 17/10/2019].Google Scholar
Bertrand, S. (2018). ‘Can the subaltern securitize? Postcolonial perspectives on securitization theory and its critics’, European Journal of International Security, 3(3), 281299.CrossRefGoogle Scholar
Betts, A. and Collier, P. (2017). Refuge: Transforming a broken refugee system. London: Penguin, UK.Google Scholar
Betts, A. and Collier, P. (2018). ‘How Europe can reform its migration policy, foreign affairs’, available at: www.foreignaffairs.com/articles/europe/2018-10-05/how-europe-can-reform-its-migration-policy [accessed 20/02/2019].Google Scholar
Biggar, N. (2020). What’s wrong with rights? Oxford: Oxford University Press.Google Scholar
Blackburn, S. (2005). Oxford: Dictionary of philosophy, second edition, Oxford: Oxford University Press.Google Scholar
Bloomfield, A. (2017). ‘Resisting the responsibility to protect’ In Bloomfield, Alan and Scott, Shirley V. (eds.) Norm antipreneurs and the politics of resistance to global normative change, Abingdon: Routledge, pp. 2038.Google Scholar
Booth, K. (1991). ‘Security and emancipation’, Review of International Studies, 17(4), 313326.Google Scholar
Booth, K. (2007). Theory of world security. Cambridge: Cambridge University Press.Google Scholar
Boucher, D. (1998). Political theories of international relations. Oxford: Oxford University Press.Google Scholar
Bourbeau, P. and Vuori, J. A. (2015). ‘Security, resilience and desecuritization: Multidirectional moves and dynamics’, Critical Studies on Security, 3(3), 253268.Google Scholar
Breen-Smyth, M. (2014). ‘Theorising the “suspect community”: Counterterrorism, security practices and the public imagination’, Critical Studies on Terrorism, 7(2), 223240.Google Scholar
Brock, G. (2008). ‘Taxation and global justice: Closing the gap between theory and practice’, Journal of Social Philosophy, 39(2), 161184.Google Scholar
Brock, G. (2009). Global justice: A cosmopolitan account. Oxford: Oxford University Press.Google Scholar
Brock, G. (2017). ‘Global justice’ In Zalta, Edward N. (ed.) The Stanford encyclopedia of philosophy (Spring 2017 Edition), plato.stanford.edu/archives/spr2017/entries/justice-global/Google Scholar
Brown, C. R. (1998). ‘Common-Sense Ethics’, doi:10.4324/9780415249126-L011-1. Routledge Encyclopaedia of Philosophy, Taylor and Francis, www.rep.routledge.com/articles/thematic/common-sense-ethics/v-1.Google Scholar
Browning, C. S. and McDonald, M. (2013). ‘The future of critical security studies: Ethics and the politics of security’, European Journal of International Relations, 19(2), 235255.CrossRefGoogle Scholar
Brunstetter, D. and Braun, M. (2013). ‘From jus ad bellum to jus ad vim: Recalibrating our understanding of the moral use of force’, Ethics & International Affairs, 27(1), 87106.Google Scholar
Brunstetter, D. (2021). Just and unjust uses of limited force: A moral argument with contemporary illustrations. Oxford: Oxford University Press.Google Scholar
Buchanan, A. (2018). Institutionalizing the just war. Oxford: Oxford University Press.Google Scholar
Buckley, E. (2006). Invoking Article 5, NATO Review, summer 2006.Google Scholar
Burke, A. (2020). ‘Review of the morality of security: A theory of just securitization’. By Rita Floyd. Cambridge: Cambridge University Press, 2019. 258p. $99.00 cloth. Perspectives on Politics, September 2020 | Vol. 18/No. 3, 1009-10.Google Scholar
Burke, A., Lee-Koo, K., and McDonald, M. (2014). Ethics and global security: A cosmopolitan approach. Abingdon: Routledge.Google Scholar
Buzan, B. (2004). From international to world society?: English school theory and the social structure of globalisation. Cambridge: Cambridge University Press.Google Scholar
Buzan, B., Wæver, O., and de Wilde, J.. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner Publishers.Google Scholar
Cabinet Office. (2010). A strong Britain in an age of uncertainty: The national security strategy (Vol. 7953). London: The Stationery Office.Google Scholar
Cambridge Online Dictionary. (2019). ‘Mandatory’, dictionary.cambridge.org/dictionary/english/mandatory [accessed 19/07/2019].Google Scholar
Caney, S. (2005). Justice beyond borders: A global political theory. Oxford: Oxford University Press.Google Scholar
Caney, S. (2010). ‘Cosmopolitan justice, responsibility, and global climate change’. In Gardiner, Stephen M., Caney, Simon, Jamieson, Dale, and Shue, Henry (eds.) Climate ethics: Essential readings. Oxford: Oxford University Press, pp. 122145.Google Scholar
Castree, N., Kitchin, R., and Rogers, A. (2013). A dictionary of human geography. Oxford: Oxford University Press.Google Scholar
Cater, C. and Malone, D. M. (2016). ‘The genesis of R2P: Kofi Anna’s intervention dilemma’ In Bellamy, Alex J. and Dunne, Tim (eds.) The Oxford handbook of the responsibility to protect, Oxford: Oxford University Press, pp. 114132.Google Scholar
Centre for Research on the Epidemiology of Disasters (CRED). (2015). ‘The Human Cost of Natural Disasters’, available at reliefweb.int/report/world/human-cost-natural-disasters-2015-global-perspective [accessed 22/06/2021].Google Scholar
Chalk, F., Dallaire, R., and Matthews, K. (2012). ‘The responsibility to react’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 3649.Google Scholar
Chandler, D. and Hynek, N. (Eds.). (2011). Critical perspectives on human security: Rethinking emancipation and power in international relations. London: Routledge.Google Scholar
Chertoff, M. and Rasmussen, A. F. (2019). ‘The Unhackable Election: What it takes to defend democracy’. Foreign Affairs, January/February 2019, pp. 156–164.Google Scholar
Chesterman, S. (2001). Just war or just peace? Humanitarian intervention and international law. Oxford: Oxford University Press.Google Scholar
Chigwedere, P., Seage, G. R. 3rd, Gruskin, S., Lee, T. H., and Essex, M. (2008). ‘Estimating the lost benefits of antiretroviral drug use in South Africa’. Journal of Acquired Immune Deficiency Syndromes 49(4), 410415. doi: 10.1097/qai.0b013e31818a6cd5. PMID: 19186354.Google Scholar
Cholbi, M. (2017). ‘Suicide’ In Zalta, Edward N. (ed.) The Stanford encyclopedia of philosophy (Fall 2017 Edition), plato.stanford.edu/archives/fall2017/entries/suicide/.Google Scholar
Clarke, M. (2011). ‘Curious Victory for NATO in Libya’, London: Royal United Services Institute (RUSI) available here rusi.org/commentary/curious-victory-nato-libya [accessed 08/04/2019].Google Scholar
Cochran, M. (2014). ‘Normative theory in the English school’ In Navari, Cornelia and Green, Daniel M. (eds.) Guide to the English school in international studies, Chichester: John Wiley & Sons, pp. 205221.Google Scholar
Cohen, R. (2012). ‘From sovereign responsibility to R2P’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 72.Google Scholar
Collier, P. (2007). The bottom billion: Why the poorest countries are failing and what can be done about it. Oxford University Press.Google Scholar
Conca, K. and Dabelko, G. D. (Eds.). (2002). Environmental peacemaking. Washington, DC: Woodrow Wilson Center Press.Google Scholar
Corera, G. (2019). ‘NATO: Cyber-attack on One Nation Is an Attack on All’, 27 August 2019 BBC news website available at: www.bbc.co.uk/news/technology-49488614 [accessed 26/02/2021].Google Scholar
Corry, O. (2012). ‘Securitisation and “riskification”: Second-order security and the politics of climate change’, Millennium, 40(2), 235258.CrossRefGoogle Scholar
Côté, A. (2016). ‘Agents without agency: Assessing the role of the audience in securitization theory’, Security Dialogue, 47(6), 541558.Google Scholar
Coticchia, F. and Davidson, J. W. (2019). Italian foreign policy during Matteo Renzi’s government: A domestically focused outsider and the world. Lanham: Rowman & Littlefield.Google Scholar
Council on Foreign Relations. (2018). ‘The UN Security Council’, available here www.cfr.org/backgrounder/un-security-council [accessed 25/07/2019].Google Scholar
Delmas, C. (2018). A duty to resist: When disobedience should be uncivil. Oxford: Oxford University Press.CrossRefGoogle Scholar
Deutsche Welle. (2017). ‘NATO: Russia Targeted German Army with Fake News Campaign’, available at www.dw.com/en/nato-russia-targeted-german-army-with-fake-news-campaign/a-37591978 [accessed 07/10/2019].Google Scholar
Dey, A., Heinemann, C., and Unger, C. (2017). ‘Das Rätsel um die Kosten des G20-Gipfels’ Hamburger Abendblatt available www.abendblatt.de/hamburg/g20/article211016533/Das-Raetsel-um-die-Kosten.html [accessed 05/04/2019].Google Scholar
Dill, J. (2016). ‘Forcible alternatives to war’ In Ohlin, Jens David (ed.) Theoretical boundaries of armed conflict and human rights. ASIL Studies in International Legal Theory, New York, USA: Cambridge University Press, pp. 289314.CrossRefGoogle Scholar
Dimari, G. and Papadakis, N. (2022). ‘The securitization of the Covid-19 pandemic in Greece: A just or unjust securitization?’, Quality & Quantity doi.org/10.1007/s11135-022-01341-9Google Scholar
Dobos, N. and Coady, C. A. J. (2014). ‘All or nothing: Are there any “merely permissible” armed humanitarian interventions?’ In Scheid, Don E. (eds.) The ethics of armed humanitarian intervention, Cambridge: Cambridge University Press, pp. 7894.Google Scholar
Doherty, K. (2014). ‘What an Ebola Curfew Looks Like’, The Guardian, 15 December 2014 available www.theguardian.com/cities/2014/dec/15/ebola-curfew-sierra-leone-freetown-photographs [accessed 25/02/2019].Google Scholar
Donnelly, J. (2003). Universal human rights in theory & practice, 2nd edition, Ithaca: Cornell University Press.Google Scholar
Doyal, L. and Gough, I. (1991). A theory of human needs, Basingstoke: Macmillan.Google Scholar
Doyle, M. (2016). ‘R2P before and after Libya’ In Bellamy, Alex J. and Dunne, Tim (eds.) The Oxford handbook of the responsibility to protect, Oxford: Oxford University Press, pp. 673690.Google Scholar
Duffield, M. (2007). Development, security and unending war: Governing the world of peoples. Cambridge: Polity.Google Scholar
Dunford, R. and Neu, M. (2019). Just war and the responsibility to protect: A critique. London: Zed Books.Google Scholar
Dunn Cavelty, M. (2010). ‘Cyber-threats’ In Cavelty, Myriam Dunn and Mauer, Victor (eds.) The Routledge handbook of security studies, Abingdon: Routledge, pp. 180189.Google Scholar
Dyzenhaus, D. (2010). ‘The “organic law” of Ex Parte Milligan’ In Sarat, Austin (eds.) Sovereignty, emergency, legality, Cambridge: Cambridge University Press, pp. 1656.Google Scholar
Dworkin, G. (2020). ‘Paternalism’ In Zalta, Edward N. (ed.) The Stanford encyclopedia of philosophy (Fall 2020 Edition), plato.stanford.edu/archives/fall2020/entries/paternalism/.Google Scholar
Eckersley, R. (2007). ‘Ecological intervention: Prospects and limits’, Ethics & International Affairs, 21(3), 293316.Google Scholar
Egerton, F. (2012). ‘What is right with R2P?’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 7784.Google Scholar
Erskine, T. (2003). ‘Introduction: Making sense of “responsibility” in international relations – key questions and concepts’. In Can institutions have responsibilities? collective moral agency and international relations. London: Palgrave Macmillan UK, pp. 116.Google Scholar
Erskine, T. (2016). ‘Moral agents of protection and supplementary responsibilities to protect’ In Bellamy, Alex J. and Dunne, Tim (eds.) The Oxford handbook of the responsibility to protect, Oxford: Oxford University Press, pp. 167185.Google Scholar
ESCR. (2019). ‘Non-State Actors’, available at www.escr-net.org/resources/non-state-actors [accessed 12/11/2019].Google Scholar
EUCOM. (2018). ‘House Armed Services Committee Hearing On Security Challenges In Europe’, 16 March, available at www.eucom.mil/transcript/36275/test [accessed 7/11/2023].Google Scholar
EUR-Lex. (2023). ‘Mutual Defence Clause’, available at eur-lex.europa.eu/EN/legal-content/glossary/mutual-defence-clause.html [accessed 11/7/23].Google Scholar
EUROPA. (2019). ‘The EU in Brief: Goals and Values’ available at europa.eu/european-union/about-eu/eu-in-brief_en [accessed 22/07/2019].Google Scholar
European Centre for Disease Prevention and Control. (2019). ‘Factsheet about Dengue Fever’ available at ecdc.europa.eu/en/dengue-fever/facts/factsheet [accessed 25/02/2019].Google Scholar
European Commission. (2016). Directorate-General for Communication, Juncker, J., State of the Union 2016, Publications Office of the European Union, 2016, data.europa.eu/doi/10.2775/968989Google Scholar
European Union. (2016). ‘A Global Strategy for the European Union’s Foreign And Security Policy‐Shared Vision, Common Action: A Stronger Europe’.Google Scholar
European Union External Action Service. (2016). ‘European Neighborhood Policy (ENP)’ available at eeas.europa.eu/diplomatic-network/european-neighbourhood-policy-enp/330/european-neighbourhood-policy-enp_enGoogle Scholar
Evangelista, M. (2008). Law, ethics, and the war on terror. Cambridge: Polity.Google Scholar
Evans, G. (2009). ‘The responsibility to protect in environmental emergencies’, Proceedings of the Annual Meeting (American Society of International Law), 103, 2732.Google Scholar
Evans, G. and Newnham, J. (1998). The Penguin dictionary of international relations. London: Penguin Group USA.Google Scholar
Fabre, C. (2007). ‘Mandatory rescue killings’, The Journal of Political Philosophy, 15(4), 363384.Google Scholar
Fabre, C. (2012). Cosmopolitan war. Oxford: Oxford University Press.CrossRefGoogle Scholar
Falkner, R. (2016). ‘The Paris Agreement and the new logic of international climate politics’, International Affairs, 92(5), 11071125.Google Scholar
Feinberg, J. (1961). ‘Supererogation and rules’, Ethics, 71(4), 276288.Google Scholar
Fierke, K. M. (2007). Critical approaches to international security. Cambridge: Polity.Google Scholar
Finlay, C. J. (2015). Terrorism and the right to resist: A theory of just revolutionary war. Cambridge: Cambridge University Press, 2015.Google Scholar
Flinch Midtgaard, S. (2021). ‘Paternalism, Oxford Research Encyclopaedia of Politics’, doi.org/10.1093/acrefore/9780190228637.013.201Google Scholar
Floyd, J. (2017a). Is political philosophy impossible?: Thoughts and behaviour in normative political theory. Cambridge: Cambridge University Press.Google Scholar
Floyd, J. (2017b). ‘Rawls methodological blueprint’, European Journal of Political Theory, 16(3), 367381.Google Scholar
Floyd, R. (2010). Security and the environment: Securitization theory and US environmental security policy. Cambridge: Cambridge University Press.Google Scholar
Floyd, R. (2011). ‘Why we need needs-based justifications of human rights’, Journal of International Political Theory, 7(1), 103115.Google Scholar
Floyd, R. (2016a). ‘Extraordinary or ordinary emergency measures: What, and who, defines the “success” of securitisation?’, Cambridge Review of International Affairs, 29(2), 677694.Google Scholar
Floyd, R. (2016b). ‘The promises of just securitization theories’ In Nyman, Jonna and Burke, Anthony (eds.) Ethical security studies: A new research agenda, London: Routledge, pp. 7588.Google Scholar
Floyd, R. (2018). ‘Parallels with the hate speech debate: The pros and cons of criminalising harmful securitising requests’, Review of International Studies, 44(1), 4363.Google Scholar
Floyd, R. (2019a) The morality of security: A theory of just securitization. Cambridge: Cambridge University Press.Google Scholar
Floyd, R. (2019b). ‘Collective securitization in the EU: Normative dimensions’, West European Politics, 42(2), 391412.Google Scholar
Floyd, R. (2019c). ‘States, last resort, and the obligation to securitize’, Polity, 51(2), 378394.Google Scholar
Floyd, R. (2019d). ‘Evidence of securitisation in the economic sector of security in Europe? Russia’s economic blackmail of Ukraine and the EU’s conditional bailout of Cyprus’, European Security, 28(2), 173192, DOI: 10.1080/09662839.2019.1604509Google Scholar
Floyd, R. (2021). ‘Securitisation and the function of functional actors’, Critical Studies on Security, 9(2), 8197, DOI: 10.1080/21624887.2020.1827590Google Scholar
Floyd, R. (2022). ‘The morality of security: A reply to critics and where to from here’, European Journal of International Security, 7(2), 275282.Google Scholar
Foreign Affairs Council. (2014). ‘Council Condemns the Illegal Referendum in Crimea’, 17 March available at www.consilium.europa.eu/en/meetings/fac/2014/03/17/ [accessed 05/06/2020].Google Scholar
Fox, C. (2019). ‘What’s special about the insult of paternalism?’, Law and Philosophy, 38(3), 313334.Google Scholar
Frederick, D. (2015). ‘Pro tanto obligations and Ceteris-Paribus rules’, Journal of Moral Philosophy, 1, 255266.Google Scholar
Friend, C. (2004). ‘Social Contract Theory’ Internet Encyclopaedia of Philosophy available at www.iep.utm.edu/soc-cont/ [accessed 06/03/2019].Google Scholar
Fritz, O., Christen, E., Sinabell, F., and Hinz, J. (2017). ‘Russia’s and the EU’s sanctions. Economic and trade effects, compliance and the way forward’. WIFO Studies.Google Scholar
Frowe, H. (2011). The ethics of war and peace: An introduction, Abingdon: Routledge.Google Scholar
Frowe, H. (2014a). Defensive killing. Oxford: Oxford University Press.Google Scholar
Frowe, H. (2014b). ‘Judging armed humanitarian intervention’ In Scheid, Don E. (eds.) The ethics of armed humanitarian intervention, Cambridge: Cambridge University Press, pp. 95112.Google Scholar
Frowe, H. (2016). The ethics of war and peace, second edition, Abingdon: Routledge.Google Scholar
Frowe, H. (2018). ‘Lesser-evil justifications for harming: Why we’re required to turn the trolley’, The Philosophical Quarterly, 68(272), 460480.Google Scholar
Fukuyama, F. (2018). ‘Against identity politics: The new tribalism and the crisis of democracy’, Foreign Affairs, 97, 90.Google Scholar
Gardner, J. (2001). ‘The mysterious case of the reasonable person’, The University of Toronto Law Journal, 51, 273.Google Scholar
Gardner, J., (2015). ‘The many faces of the reasonable person’, Law Quarterly Review, 131(1), 563584.Google Scholar
Gauthier, D. P. (1969). The logic of Leviathan: The moral and political theory of Thomas Hobbes. Oxford: Oxford University Press.Google Scholar
Glanville, L. (2013). Sovereignty and the responsibility to protect. Chicago: University of Chicago Press.Google Scholar
Glanville, L. (2014). ‘Is just intervention morally obligatory?’ In Gentry, Caron E. and Eckert, Amy E. (eds.) The future of just war, Athens: University of Georgia Press, pp. 4861.Google Scholar
Glanville, L. (2021). Sharing responsibility: The history and future of protection from atrocities. Chicago: University of Chicago Press.Google Scholar
Glanville, L. and Pattison, J. (2021). ‘Where to protect? Prioritization and the responsibility to protect’, Ethics & International Affairs, 35(2), 213225.Google Scholar
Goodin, R. E. (1988). ‘What is so special about our fellow countrymen?’, Ethics, 98(4), 663686.Google Scholar
Graham, G. (2008). Ethics and international relations, second edition, Oxford: Blackwell Publishing.Google Scholar
Griffin, J. (2008). On human rights. Oxford: Oxford University Press.Google Scholar
Grigore, N. (2019). ‘On why there is a problem of supererogation’, Philosophia, 47(4), 11411163.Google Scholar
Gross, M. and Meisels, T. (Eds.) (2017). Soft war: The ethics of unarmed conflict. Cambridge: Cambridge University Press.Google Scholar
Halbfinger, D. M. (2020). ‘Virus Soars Among Ultra-Orthodox Jews as Many Flout Israel’s Rules’ New York Times, 30 May 2020.Google Scholar
Hansen, L. (2012). ‘Reconstructing desecuritization: The normative-political in the Copenhagen School and directions for how to apply it’, Review of International Studies, 38(03), 525546.Google Scholar
Hansen, L. (2020). ‘Are “core” feminist critiques of securitization theory racist? A reply to Alison Howell and Melanie Richter-Montpetit’, Security Dialogue, 51(4), 378385.Google Scholar
Hansen, L., & Nissenbaum, H. (2009). ‘Digital disaster, cyber security, and the Copenhagen School’, International studies quarterly, 53(4), 11551175.Google Scholar
Harms, W. and Juncker, P. (2019). ‘Wie regeln andere EU-Länder die Grundsicherung?’ Taggesschau, 6.03.2019Google Scholar
Harrington, J. (2012). ‘R2P and natural disasters’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 141150.Google Scholar
Haworth, L. (1955). ‘Common sense morality’, Ethics, 65(4), 250260.Google Scholar
Hehir, A. (2017). ‘“Utopian in the right sense”: The responsibility to protect and the logical necessity of reform’, Ethics & International Affairs, 31(3), 335355.CrossRefGoogle Scholar
Hehir, A. (2019). Hollow norms and the responsibility to protect. London: Palgrave.Google Scholar
Hehir, A. and Lang, A. (2015). ‘The impact of the security council on the efficacy of the international criminal court and the responsibility to protect’, Criminal Law Forum, 26, 153179.Google Scholar
Herington, J. (2013). ‘The concept of security: Uncertainty, Evidence and Value’, PhD diss., Australian National University.Google Scholar
Herington, J. (2015). ‘Philosophy: The concepts of security, fear, liberty, and the state’ In Bourbeau, Philippe (ed.) Security: Dialogue across disciplines, Cambridge: Cambridge University Press, pp. 2244.Google Scholar
Heyd, D. (2019). ‘Supererogation’ In Zalta, Edward N. (ed.) The Stanford encyclopedia of philosophy (Winter 2019 Edition), plato.stanford.edu/archives/win2019/entries/supererogation/.Google Scholar
Hill, M., Campanale, D. and Joel, G. (2021). ‘“Their goal is to destroy everyone”: Uighur camp detainees allege systematic rape’, BBC News 02, February 2021.Google Scholar
HM Government. (2015). ‘National Security Strategy and Strategic Defence and Security Review 2015: A Secure and Prosperous United Kingdom’. www.un.org/press/en/1999/19990920.sgsm7136.html [accessed 24/06/2019].Google Scholar
Hobbes, T. (2002). ‘The Project Gutenberg eBook of Leviathan’, available at www.gutenberg.org/files/3207/3207-h/3207-h.htmGoogle Scholar
Hoogensen Gjørv, G. (2012). ‘Security by any other name: Negative security, positive security, and a multi-actor security approach’, Review of International Studies, 38(4), 835859.Google Scholar
House of Commons Foreign Affairs Committee. (2016–17). ‘Libya: Examination of intervention and collapse and the UK’s future policy options Third Report of Session 2016–17’, London: House of Commons.Google Scholar
Howell, A., & Richter-Montpetit, M. (2020). ‘Is securitization theory racist? Civilizationism, methodological whiteness, and antiblack thought in the Copenhagen School’. Security Dialogue, 51(1), 322.Google Scholar
Hurrell, A. (2014). ‘Order and justice’ In Navari, Cornelia and Green, Daniel M. (eds.) Guide to the English school in international studies, Chichester: John Wiley & Sons, pp. 143158, chapter 9.Google Scholar
Huysmans, J. (2011). ‘What’s in an act? On security speech acts and little security nothings’, Security Dialogue, 42(4–5), 371383.Google Scholar
ICISS. (2001). The responsibility to protect: Report of the international commission on intervention and state sovereignty. Ottawa: The International Development Research Centre.Google Scholar
IISS. (1992). ‘The challenge of self-determination’, Strategic Survey, 93 1992 – (1), 1623.Google Scholar
Jackson, R. (2000). The global covenant: Human conduct in a world of states. Oxford: Oxford University Press.Google Scholar
Janse, R. (2006). ‘The legitimacy of humanitarian interventions’, Leiden Journal of International Law, 19(3), 669692.Google Scholar
Jenkins, S. (2017). ‘If we overreact to this attack on Paris then terrorism will “just never end”’ The Guardian, 21 April 2017.Google Scholar
Jeske, D. (2014). ‘Special obligations’ In Zalta, Edward N. (ed.) The Stanford encyclopedia of philosophy (Spring 2014 Edition), plato.stanford.edu/archives/spr2014/entries/special-obligations/.Google Scholar
Johansen, R. C. (2006). ‘Proposal for a United Nations emergency peace service to prevent genocide and crimes against humanity’ In Johansen, Robert C. (ed.) A United Nations emergency peace service: To prevent genocide and crimes against humanity, New York: World Federalist Movement, pp. 2342.Google Scholar
Kaldor, M. (2012). New and old wars 3rd edition, Cambridge: Polity.Google Scholar
Kasic, A. (2014). ‘Australia’s Border Control: The Anxiety of a Nation’, Unpublished Master’s Thesis available at: projekter.aau.dk/projekter/files/198384830/Thesis_Australia_s_Border_Control.pdf [accessed 24/07/2023].Google Scholar
Keating, T. (2012). ‘Mobilising the troops: Generating the political will to act’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 115125.Google Scholar
Kegley, C. W. and Wittkopf, E. R. (2001). World politics: Trend and transformation, 8th edition, Bedford/St.Martin’s: Macmillan Press.Google Scholar
Ki-Moon, B. (2009). Implementing the responsibility to protect Report of the Secretary-General, A/63/677, 12 January 2009.Google Scholar
Ki-Moon, B. (2012). Responsibility to protect: Timely and decisive response, Report of the Secretary-General A/66/874–S/2012/578, 25 July 2012.Google Scholar
Kleine, K. (2015). ‘Will R2P be ready when disaster strikes? – The rationale of the responsibility to protect in an environmental context’, The International Journal of Human Rights, 19(8), 11761189.Google Scholar
Kramer, M. and Harlan, J. (2019). ‘Parkland Shooting: Where Gun Control and School Safety Stand Today’ The New York Times, 13 February 2019 available at www.nytimes.com/2019/02/13/us/parkland-shooting.html [accessed 29/07/2019].Google Scholar
Kramer, M. and Itzkowitz Shifrinson, J. R. (2017). ‘Correspondence: NATO enlargement – Was there a promise?’, International Security, 42(1) (Summer 2017), 189192.Google Scholar
Krieger, D., Mendlovitz, S., and Pace, W. (2006). ‘Introduction’ In Johansen, Robert C. (ed.) A United Nations emergency peace service: To prevent genocide and crimes against humanity, New York: World Federalist Movement, pp. 1120.Google Scholar
Krieger, Z., &and Roth, A. I. (2007). ‘Nuclear weapons in neo-realist theory’, International Studies Review, 9(3), 369384.Google Scholar
Ladenburg, T. (2007). ‘Woodrow Wilson and the League of Nations, Digital History’, available at www.digitalhistory.uh.edu/teachers/lesson_plans/pdfs/unit8_12.pdfGoogle Scholar
Lango, J. W. (2014). The ethics of armed conflict: A cosmopolitan just war theory. Edinburgh: Edinburgh University Press.Google Scholar
Lazar, N. C. (2009). States of emergency in liberal democracies. Cambridge: Cambridge University Press.Google Scholar
Lazar, S. (2012). ‘Necessity in self-defense and war’, Philosophy & Public Affairs, 40(1), 344.Google Scholar
Linn, L. (2015). ‘Ebola Diaries: From Denial and Fear to Action’, available at www.who.int/features/2015/ebola-diaries-linn/en/ [accessed 11/02/2019].Google Scholar
Loader, I. (2022). ‘Not just securitization: On the limits of limiting security practices’, European Journal of International Security, 7, 252256.Google Scholar
Luck, E. C. (2009). ‘Environmental Emergencies and the Responsibility to Protect: A Bridge Too Far?’, Proceedings of the ASIL Annual Meeting (Vol. 103, pp. 32–38). Cambridge: Cambridge University Press.Google Scholar
Lukianoff, G. and Haidt, J. (2019). The coddling of the American mind: How good intentions and bad ideas are setting up a generation for failure. London: Penguin Books.Google Scholar
Lyotard, J. F. (1984). The postmodern condition: A report on knowledge. Manchester: Manchester University Press.Google Scholar
Makahamadze, T. and Sibanda, F. (2021). ‘Gratuitous benefit for the ZANU-PF government? Securitisation of COVID-19 and authoritarian politics in Zimbabwe’, African Security Review, DOI: 10.1080/10246029.2021.1982739Google Scholar
Mahdavi, M. (2012). ‘R2P in the Middle East and North Africa’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 257275.Google Scholar
Mahdavi, M. (2015). ‘A postcolonial critique of responsibility to protect the Middle East’, Perceptions, xx(1), 736.Google Scholar
Malone, L. A. (2009). ‘Green helmets: Eco-intervention in the twenty-first century’, Proceedings of the ASIL Annual Meeting, 103, 1927.Google Scholar
Maquire, L. (2016). ‘Identity Politics’ Philosophy Talks’ available at www.philosophytalk.org/blog/identity-politics [accessed 24/07/2023].Google Scholar
Mareš, M. (2011). ‘Terrorism-free zone in East Central Europe? Strategic environment, risk tendencies, and causes of limited terrorist activities in the Visegrad Group countries’, Terrorism and Political Violence, 23(2), 233253.Google Scholar
Martin, R. (2014). ‘Overlapping consensus’ In Mandle, John and Reidy, David (eds.) The Cambridge Rawls Lexicon, Cambridge: Cambridge University Press, pp. 588594.Google Scholar
McClean, E. (2014). ‘Hard evidence: Who uses veto in the UN Security Council most often – And for what?’ The Conversation, 31 July 2014.Google Scholar
McDonald, M. (2012). Security, the environment and emancipation: Contestation over environmental change. Abingdon: Routledge.Google Scholar
McGuire, B. (2016). ‘How Climate Change Triggers Earthquakes, Tsunamis and Volcanoes’, The Guardian, 16 October, available at www.theguardian.com/world/2016/oct/16/climate-change-triggers-earthquakes-tsunamis-volcanoes [accessed 24/07/2023].Google Scholar
McInnes, C. and Rushton, S. (2013). ‘HIV/AIDS and securitization theory’, European Journal of International Relations, 19(1), 115138.Google Scholar
McLaughlin, K. (2017). ‘Jihadist Terrorists Have Long Had Spain in Their Sights – Here’s Why’ The Conversation, 18 August available at theconversation.com/jihadist-terrorists-have-long-had-spain-in-their-sights-heres-why-82703 [accessed 4/4/2019].Google Scholar
McMahan, J. (2004). ‘The ethics of killing in war’, Ethics, 114(4), Symposium on Terrorism, War, and Justice (July 2004), 693733.Google Scholar
McMahan, J. (2005). ‘Just cause for war’, Ethics & International Affairs, 19(3), 121.Google Scholar
McMahan, J. (2006). ‘The ethics of killing in war’, Philosophia, 34, 2341.Google Scholar
McMahan, J. (2008). ‘The morality of war and the law of war’ In Rodin, David and Shue, Henry (eds.) Just and unjust warriors: The moral and legal status of soldiers, Oxford: Oxford University Press, pp. 1943.Google Scholar
McMahan, J. (2009). Killing in war, Oxford: Oxford University Press.Google Scholar
McMahan, J. (2010). ‘Humanitarian intervention, consent, and proportionality’ In Davis, N. Ann, Keshen, Richard, and McMahan, Jeff (eds.) Ethics and humanity: themes from the philosophy of Jonathan Glover, Oxford: Oxford University Press, pp. 4573.Google Scholar
McMahan, J. (2018). ‘Foreword’ In May, Larry (eds.) The Cambridge handbook of the just war, Cambridge: Cambridge University Press, pp. ixxiii.Google Scholar
McSweeney, B. (1996). ‘Identity and security: Buzan and the Copenhagen School’, Review of International Studies, 22(1), 8193.Google Scholar
Mearsheimer, J. J. (2014). ‘Why the Ukraine crisis is the West’s fault: The liberal delusions that provoked Putin’, Foreign Affairs, 93, 77.Google Scholar
Medcalf, J. (2005). NATO: A beginner’s guide. Oxford: Oneworld.Google Scholar
Meierding, E. (2013). ‘Climate change and conflict: Avoiding small talk about the weather’, International Studies Review, 15(2), 185203.Google Scholar
Memorandum on Security Assurances in Connection with Ukraine’s Accession to the Treaty on the Non-Proliferation of Nuclear Weapons. (1994). 5 December; available at www.pircenter.org/media/content/files/12/13943175580.pdf [accessed 17/10/2019].Google Scholar
Miller, D. (2001). ‘Distributing responsibilities’, The Journal of Political Philosophy, 9(4), 453471.Google Scholar
Miller, D. (2007). National responsibility and global justice. Oxford: Oxford University Press.Google Scholar
Miller, D. (2009). ‘The responsibility to protect human rights’ In Meyer, Lukas H. (ed.) Legitimacy, justice and public international law, Cambridge: Cambridge University Press, pp. 232251.Google Scholar
Miller, D. (2016). Strangers in our midst: The political philosophy of immigration, Oxford: Oxford University Press.Google Scholar
Morello, C. (2017). ‘U.S. Threatens Countries with Loss of Aid over U.N. Vote on Jerusalem’, The Washington Post, 20 December 2017, available at: www.washingtonpost.com/world/national-security/us-threatens-countries-with-loss-of-aid-over-un-jerusalem-vote/2017/12/20/3ddacadc-e5bc-11e7-833f-155031558ff4_story.html?utm_term=.ea2e73e6b9b7 [accessed 26/02/2019].Google Scholar
Morris, J. and Wheeler, N. (2016). ‘The responsibility not to veto: A responsibility too far?’ In Bellamy, Alex J. and Dunne, Tim (eds.) The Oxford handbook of the responsibility to protect, Oxford: Oxford University Press, pp. 227248.Google Scholar
Morkevicius, V. (2022). ‘How do Russia’s reasons for war stack up? An expert on “just war” explains’, The Conversation Published: March 5, 2022, 1.39pm GMTGoogle Scholar
Mueller, J. E. (2006). Overblown: How politicians and the terrorism industry inflate national security threats, and why we believe them. New York City: Simon & Schuster.Google Scholar
Müller, G. and Ischinger, W. (2020). ‘Entwicklung und Sicherheit gehören zusammen’ FAZ, 14 February available at www.faz.net/aktuell/politik/sicherheitskonferenz/muenchner-sicherheitskonferenz-gastbeitrag-von-gerd-mueller-und-wolfgang-ischinger-16632571.html?GEPC=s5 [accessed 17.02.2020].Google Scholar
Mulgan, T. (2001). The demands of consequentialism. Oxford: Oxford University Press.Google Scholar
Nagel, T. (2005). ‘The problem of global justice’, Philosophy & Public Affairs, 33(2), 113147.Google Scholar
NATO. (2021a). ‘NATO 2030 Young Leaders’ Recommendations and Conversation with the Secretary General’, 4 Feb 2021, available at www.nato.int/cps/en/natohq/opinions_181209.htm?selectedLocale=enGoogle Scholar
NATO. (2021b). ‘NATO in a Competitive World’, 5 October, available at www.nato.int/cps/en/natohq/opinions_187140.htmGoogle Scholar
NATO. (1949/2019). ‘The North Atlantic Treaty’, 10 April 2019, available at www.nato.int/cps/en/natolive/official_texts_17120.htm [accessed 25/09/2019].Google Scholar
NATO. (2019). ‘Relations with Sweden’ available at www.nato.int/cps/en/natohq/topics_52535.htm [accessed 9/08/2021].Google Scholar
NATO. (2018). ‘Resilience and Article 3’ 25 June 18 available at www.nato.int/cps/en/natohq/topics_132722.htm [accessed 1/05/2019].Google Scholar
NATO. (2010). ‘Strategic Concept “Active Engagement, Modern Defence”’ available at www.nato.int/cps/en/natohq/topics_82705.htm [accessed 12/04/2023].Google Scholar
Neal, A. (2013). ‘Legislative practices’ In Salter, Mark B. and Mutlu, Can E. (eds.) Research methods in critical security studies, Abingdon: Routledge, pp. 125128.Google Scholar
Neal, A. (2019). Security as politics: Beyond the state of exception. Edinburgh, Edinburgh University Press.Google Scholar
Neocleous, M. (2008). Critique of security. Edinburgh: Edinburgh University Press.Google Scholar
Nyman, J. (2018). The energy security paradox: Rethinking energy (in) security in the United States and China. Oxford: Oxford University Press.Google Scholar
Oberman, K. (2015). ‘The myth of the optional war: Why states are required to wage the wars they are permitted to wage’, Philosophy & Public Affairs, 43(4), 255286.Google Scholar
O’Driscoll, C. and Lang, A. F. J. (2013). ‘The just war tradition and the practice of political authority’ In O’Driscoll, Cian, Lang, Antony F. Jr., and Williams, John. (eds.) Just war: Authority, tradition, and practice, Georgetown, Washington, DC: Georgetown University Press, pp. 116.Google Scholar
Official Journal of the European Union (2017). ‘Commission Recommendation (EU) 2017/1584 of 13 September 2017 on coordinated response to large-scale cybersecurity incidents and crises’, available at eur-lex.europa.eu/eli/reco/2017/1584/ojGoogle Scholar
O’Neill, K. (2009). The environment and international relations. Cambridge: Cambridge University Press.Google Scholar
Orend, B. (2006). The morality of war. Peterborough, Ontario: Broadview Press.Google Scholar
Orend, B. (2019). War and political theory. Cambridge: Polity.Google Scholar
Orford, A. (2012). ‘Constituting order’ In Crawford, James and Koskenniemi, Martti (eds.) The Cambridge companion to international law, Cambridge: Cambridge University Press, pp. 271289.Google Scholar
Owens, D. (2015). ‘On Duty’, Philosophy Bites podcast, 2 September 2002, available at philosophybites.com/2015/09/david-owens-on-duty.htmlGoogle Scholar
Owens, P. (2012). ‘Human security and the rise of the social’, Review of International Studies, 38(3), 547567.Google Scholar
Oxford Lib Guide. (2018). ‘United Kingdom Law: Case la’, available here ox.libguides.com/c.php?g=422832&p=2887381 [accessed 20/06/2019].Google Scholar
Panke, D. (2016). ‘Living in an imperfect world? Incomplete contracting & the rational Design of International Organizations’. Journal of International Organizations Studies, 7(1), 2538.Google Scholar
Panke, D. (2017). ‘Regional actors in international security negotiations’, European Journal of Security Research, 2, 521.Google Scholar
Parfit, D. (2011). On what matters, Vol 1. Oxford: Oxford University Press.Google Scholar
Parry, J. (2017a). ‘Legitimate authority and the ethics of war: A map of the terrain’, Ethics & International Affairs, 31(2), 169189.Google Scholar
Parry, J. (2017b). ‘Defensive harm, consent, and intervention’, Philosophy & Public Affairs, 45(4), 356396.Google Scholar
Parry, J. (2022). ‘What’s wrong with paternalism?’ Jurisprudence Discussion Group, Oxford: Oxford University available at www.youtube.com/watch?v=IfLcAJbi6LAGoogle Scholar
Pattison, J. (2010). Humanitarian intervention and the responsibility to protect: Who should intervene?. Oxford: Oxford University Press.Google Scholar
Pattison, J. (2014). The morality of private war. Oxford: Oxford University Press.Google Scholar
Pattison, J. (2018). The alternatives to war. Oxford: Oxford University Press.Google Scholar
Pattison, J. (2022). ‘Beyond imperfection: The demands of the international responsibility to protect’, Global Responsibility to Protect, 14, 105108.Google Scholar
Peeters, W., De Smet, A., Diependaele, L., Sterckx, S., McNeal, R. H., and De Smet, A. (2015). Climate change and individual responsibility: Agency, moral disengagement and the motivational gap. Basingstoke: Palgrave McMillan.Google Scholar
Peter, F. (2017). ‘Political legitimacy’ In Zalta, Edward N. (ed.) The Stanford encyclopedia of philosophy, plato.stanford.edu/archives/sum2017/entries/legitimacy/Google Scholar
Peters, A. (2009). ‘Treaty Making Powers’ Max Planck Encyclopaedia of Public International Law [MPEPIL], Oxford; Oxford Public International Law available at: opil.ouplaw.com/view/10.1093/law:epil/9780199231690/law-9780199231690-e1494Google Scholar
Philipsen, L. (2020). ‘Performative securitization: From conditions of success to conditions of possibility’, Journal of International Relations and Development, 23(1), 139163.Google Scholar
Pinker, S. (2011). The better angels of our nature. New York, NY: Viking.Google Scholar
Pogge, T. (2007). John Rawls: His life and theory of justice. Oxford: Oxford University Press.Google Scholar
Pogge, T. W. (2001). ‘Eradicating systemic poverty: Brief for a global resources dividend’, Journal of Human Development, 2(1), 5977.Google Scholar
Polko, P. and Ratajczak, S. (2021). ‘Vaccination as a matter of security and security management in European Union’, European Research Studies Journal, 24(Special 4), 446456.Google Scholar
Pouliot, V. (2010). International security in practice: The politics of NATO-Russia diplomacy. Cambridge: Cambridge University Press.Google Scholar
Rachels, J. (1986). The elements of moral philosophy. New York: McGraw-Hill/Random.Google Scholar
Rafanelli, L. M. (2021). Promoting justice across borders: The ethics of reform intervention. Oxford: Oxford University Press.Google Scholar
Rasmussen, A. (2016). ‘Crisis in Libya: Who’s to blame?’ | UpFront, available here www.youtube.com/watch?v=AZHB28DnXYU [accessed 9/11/23].Google Scholar
Rasmussen, A. (2019). ‘NATO Boss: Libya Still a “Model Intervention” available at: www.aljazeera.com/programmes/upfront/2016/10/nato-boss-libya-model-intervention-161022075802390.html [accessed 23/09/2019].Google Scholar
Rawls, J. (1996). Political liberalism. Cambridge, MA: Harvard University Press.Google Scholar
Rawls, J. (1997). ‘The idea of public reason revisited’, The University of Chicago Law Review, Summer, 64(3), 765807.Google Scholar
Rawls, J. (2001). The law of peoples. Cambridge: Harvard University Press.Google Scholar
Raz, J. (1986). The morality of freedom. Oxford: Clarendon Press.Google Scholar
Ripstein, A. (1998). Equality, responsibility, and the law. Cambridge: Cambridge University Press.Google Scholar
Risse, M. (2012). On global justice. Princeton: Princeton University Press.Google Scholar
Roberts, A. and Kingsbury, B. (1993). ‘Introduction: The UN’s roles in international society since 1945’ In Roberts, Adam and Kingsbury, Benedict (eds.) United Nations, divided world: The UN’s roles in international relations, Oxford: Clarendon Press, pp. 162.Google Scholar
Rodin, D. (2002). War & self-defense. Oxford: Oxford University Press.Google Scholar
Roff, H. M. (2013). Global justice, Kant and the responsibility to protect. London: Routledge.Google Scholar
Rotaru, V. (2020). ‘Silencing the contestant. Legitimizing Crimea’s annexation by mimicking the West’, European Security, 1, 96118.Google Scholar
Rotberg, R. I. (2004). ‘The failure and collapse of nation-states: Breakdown, prevention, and repair’ In Rotberg, Robert (ed.) When states fail: Causes and consequences, Princeton: Princeton University Press, pp. 149.Google Scholar
Runciman, D. (2003). ‘Moral responsibility and the problem of representing the state’ In Erskine, Toni (ed.) Can institutions have responsibilities?, London: Palgrave Macmillan, pp. 4150.Google Scholar
Sagan, S. D. and Waltz, K. N. (2010). ‘Is nuclear zero the best option?’, The National Interest, (109), 8896.Google Scholar
Sarat, A. (2010). ‘Introduction: Towards new conceptions of the relationship of law and sovereignty under conditions of emergency’ In Sarat, Austin (ed.) Sovereignty, emergency, legality, Cambridge: Cambridge University Press, pp. 115.Google Scholar
Scheid, D. E. (2014). ‘Introduction to armed humanitarian intervention’ In Scheid, Don E. (ed.) The ethics of armed humanitarian intervention, Cambridge: Cambridge University Press, pp. 325.Google Scholar
Schimmelfennig, F. (2001). ‘The community trap: Liberal norms, rhetorical action, and the Eastern enlargement of the European Union’, International Organization, 55(1), 4780.Google Scholar
Scott, L. (2020). ‘International history in the twentieth century’ In Baylis, John, Smith, Steve, and Owens, Patricia (eds.) The globalisation of world politics, Oxford: Oxford University Press, pp. 5469.Google Scholar
Selby, J., Daoust, G., and Hoffman, C. (2022). Divided environments: An international political ecology of climate change, water and security. Cambridge: Cambridge University Press.Google Scholar
Shea, J. (2019). ‘NATO at 70: An Opportunity to Recalibrate’ Nato Review 5.04.2019, available here: www.nato.int/docu/review/2019/Also-in-2019/nato-at-70-an-opportunity-to-recalibrate/EN/index.htm [accessed 25/07/2019].Google Scholar
Shue, H. (2018). ‘Last resort and proportionality’ In Lazar, Seth and Frowe, Helen (eds). The Oxford handbook of the ethics of war, Oxford: Oxford University Press, pp. 260276.Google Scholar
Singer, P. (1972). ‘Famine, affluence, and morality’, Philosophy & Public Affairs, 1(3), 229243.Google Scholar
Singer, P. (2013). ‘The Why and How of Effective Altruism’ TED Talk available here www.ted.com/talks/peter_singer_the_why_and_how_of_effective_altruism [accessed 08/04/2019].Google Scholar
Smith, D. (2018). Trump Grants Troops Guarding Border Authority to Use “Lethal Force” – Report’ The Guardian, 21 November 2018, available at: www.theguardian.com/us-news/2018/nov/21/trump-us-mexico-border-troops-decision-memorandum-force-report [accessed 18/02/2019].Google Scholar
Soanes, C. (2000). The compact English dictionary. Oxford: Oxford University Press.Google Scholar
Sorell, T. (2013). Emergencies and politics: A sober Hobbesian approach. Cambridge: Cambridge University Press.Google Scholar
Sperling, J. and Webber, M. (2017). ‘NATO and the Ukraine crisis: Collective securitisation’, European Journal of International Security, 2(1), 1946.CrossRefGoogle Scholar
Sperling, J. and Webber, M. (2019). ‘The European Union: Security governance and collective securitisation’, West European Politics, 42(2), 228260.Google Scholar
Statman, D. (2008). ‘On the success condition for legitimate self-defense’, Ethics, 118(4), 659686.Google Scholar
Steinberger, P. J. (2002). ‘Hobbesian resistance’, American Journal of Political Science, 46(4), 856865.Google Scholar
Stoltenberg, J. (2020). ‘Remarks on Launching #NATO2030 – Strengthening the Alliance in an Increasingly Competitive World’, 8 June 2020, available at www.nato.int/cps/en/natohq/opinions_176197.htmGoogle Scholar
Stritzel, H. (2007). ‘Towards a theory of securitization: Copenhagen and beyond’, European Journal of International Relations, 13(3), 357383.Google Scholar
Tesón, F. R. (2014). ‘The moral basis of armed humanitarian intervention’ In Scheid, Don E. (eds.) The ethics of armed humanitarian intervention, Cambridge: Cambridge University Press, pp. 6177.Google Scholar
Tesón, F. R., and Van der Vossen, B. (2017). Debating humanitarian intervention: Should we try to save strangers?. Oxford: Oxford University Press.Google Scholar
Thakur, R. (2017). The United Nations, peace and security: From collective security to the responsibility to protect, second edition, Cambridge: Cambridge University Press.Google Scholar
The General Secretariat of the Council (GSC). (2020). ‘EU at the UN General Assembly’ available at www.consilium.europa.eu/en/policies/unga/ [accessed 4/02/20].Google Scholar
Thumfart, J. (2022). ‘The (Il)Legitimacy of cybersecurity. An application of just securitization theory to cybersecurity based on the principle of subsidiarity (November 17, 2022)’, Applied Cybersecurity & Internet Governance, 1(1), 97120.Google Scholar
Topgyal, T. (2016). ‘The Tibetan self-immolations as counter-securitization: Towards an inter-unit theory of securitization’, Asian Security, 12(3), 166187.Google Scholar
Trahan, J. (2020). Existing legal limits to security council veto power in the face of atrocity crimes. Cambridge: Cambridge University Press.Google Scholar
Trahan, J. (2022). ‘Why the veto power is not unlimited: A response to critiques of, and questions about, existing legal limits to the veto power in the face of atrocity crimes’, Case Western Reserve Journal of International Law, 54, 109 (2022). Available at: scholarlycommons.law.case.edu/jil/vol54/iss1/9Google Scholar
Trump, D. J. (2017). National security strategy of the United States of America. Executive Office of The President Washington DC Washington United States.Google Scholar
UN. (2005). ‘Vienna Convention on the Law of Treaties 1969’ available at legal.un.org/ilc/texts/instruments/english/conventions/1_1_1969.pdf [accessed 05/02/2020].Google Scholar
UN. (2019). ‘UN Charter’ (full text) available at www.un.org/en/sections/un-charter/un-charter-full-text/ [accessed 15/07/2019].Google Scholar
UNA. (2015). ‘UN Security Council and the Responsibility to Protect: Voluntary Restraint of the Veto in Situations of Mass Atrocity Briefing by UNA – UK’, October 2015, available at una.org.uk/sites/default/files/Veto%20R2P%20code%20of%20conduct%20briefing%20October%202015%20update_0.pdf [accessed 9/08/2021].Google Scholar
UN University. (2013). ‘David Miller – Extent and Limits of Global Justice’ available at: www.youtube.com/watch?v=8RkoKxuCUvU [accessed 25/09/2019].Google Scholar
UNFCCC. (2018). ‘The Paris Agreement’, 22 October 2018, available at unfccc.int/process-and-meetings/the-paris-agreement/the-paris-agreement [accessed 26/02/2019].Google Scholar
UNGA. (2005). ‘Resolution Adopted by the General Assembly on 16 September 2005’ available at www.un.org/en/development/desa/population/migration/generalassembly/docs/globalcompact/A_RES_60_1.pdf [accessed 25/06/2019].Google Scholar
Varden, H. (2011). ‘Duties, positive and negative’ In Chatterjee, Deen K. (ed.) Encyclopedia of global justice, Dordrecht: Springer, pp. 281283.Google Scholar
Vuori, J. (2008). ‘Illocutionary logic and strands of securitization: Applying the theory of securitization to the study of non-democratic political orders’, European Journal of International Relations, 14, 6599.Google Scholar
Wæver, O. (1989). ‘Security, The Speech Act: Analysing the Politics of a Word’ unpublished paper, presented at the Research Training Seminar, Sostrup Manor, revised Jerusalem/Tel Aviv 25–26 June 1989.Google Scholar
Wæver, O. (1995). ‘Securitization and desecuritization’ In Lipschutz, Ronnie D. (ed.) On security, New York: Columbia University Press, pp. 4686.Google Scholar
Wæver, O. (2003). ‘Securitisation: Taking stock of a Research Programme in Security Studies’, unpublished manuscript.Google Scholar
Wæver, O. (2008). ‘The changing agenda of societal security’ In Brauch, H. G., et al., (eds.) Globalization and environmental challenges, Berlin, Heidelberg: Springer, pp. 581593.Google Scholar
Wæver, O. (2011). ‘Politics, security, theory’, Security Dialogue, 42(4–5), 465480.Google Scholar
Wæver, O. (2015). ‘The theory act: Responsibility and exactitude as seen from securitizationInternational Relations, 29(1), 121127.Google Scholar
Wæver, O. (2017). ‘Afterword: The Arctic security constellation’, Politik, 20(3). doi.org/10.7146/politik.v20i3.97157Google Scholar
Wæver, O. and Buzan, B. (2020). ‘Racism and responsibility – The critical limits of deepfake methodology in security studies: A reply to Howell and Richter-Montpetit’, Security Dialogue, 51(4), 386394. doi: 10.1177/0967010620916153.Google Scholar
Walker, S. (2018). ‘Hungary to Criminalise Migrant Helpers with “Stop Soros” Legislation’, The Guardian, 29 May 2018, available at: www.theguardian.com/world/2018/may/29/hungary-criminalises-migrant-helpers-stop-george-soros-legislation [accessed 20/02/2019].Google Scholar
Wallander, C. A. (2018). ‘NATO’s enemies within: How democratic decline could destroy the alliance’, Foreign Affairs, 97, 70.Google Scholar
Walt, S. (2019). ‘Who Will Save the Amazon (and How)?’ Foreign Policy, 5 August 2019, available at foreignpolicy.com/2019/08/05/who-will-invade-brazil-to-save-the-amazon/ [accessed 5/6/2020].Google Scholar
Walzer, M. (1990). ‘The communitarian critique of liberalism’. Political Theory, 18(1), 623. www.jstor.org/stable/191477Google Scholar
Walzer, M. (2006 [1977]). Just and unjust wars: A moral argument with historical illustrations, fourth edition, New York: Basic Books.Google Scholar
Watts, J. (2016). ‘Zika Virus Command Center leads Biggest Military Operation in Brazil’s History’ The Guardian 30 March 2016 www.theguardian.com/world/2016/mar/30/brazil-zika-war-virus-military-operation [accessed 25/02/2019].Google Scholar
Webber, M. (2009). ‘Thinking NATO through Theoretically’ Paper presented to the ECPR Joint Sessions, Lisbon 14–19 April 2009-04-08 Workshop 24: ‘Theorizing NATO’Google Scholar
Weber, M. (1946). Politics as Vocation available at polisci2.ucsd.edu/foundation/documents/03Weber1918.pdf [accessed 7/03/2019].Google Scholar
Weinberg, J. (2011). ‘Is government supererogation possible?’, Pacific Philosophical Quarterly, 92, 263281.Google Scholar
Weiss, T. G. (2006). ‘R2P after 9/11 and the World Summit’, Wisconsin, International Law Journal, 24, 741.Google Scholar
Weiss, T. G. (2016). What’s wrong with the United Nations and how to fix it, 3rd edition, Cambridge: Polity.Google Scholar
Weiss, T. G. and Thakur, R. (2010). Global governance and the UN: A unfinished journey. Bloomington and Indianapolis: Indiana University Press.Google Scholar
Wellman, C. H. and Cole, P. (2011). Debating the ethics of immigration: Is there a right to exclude?. Oxford: Oxford University Press.Google Scholar
Welsh, J. (2012). ‘Who should act? Collective responsibility and the responsibility to protect’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 103114.Google Scholar
Welsh, J. (2013). ‘The Evolution of the Responsibility to Protect: Securing Individuals in a World of States’ Centre for International Governance Innovation available at: www.youtube.com/watch?v=P3WJZND3z8M [accessed 07/10/2019].Google Scholar
Welsh, J. (2016). ‘R2P’s next ten years: Deepening and extending the consensus’ In Bellamy, Alex J. and Dunne, Tim (eds.) The Oxford handbook of the responsibility to protect, Oxford: Oxford University Press, pp. 984999.Google Scholar
Welsh, J. M. (2019). ‘Norm robustness and the responsibility to protect’, Journal of Global Security Studies, 4(1), 5372.Google Scholar
Wenar, L. (2021). ‘John Rawls’ In Zalta, Edward N. (ed.) The Stanford encyclopaedia of philosophy (Summer 2021 Edition), plato.stanford.edu/archives/sum2021/entries/rawls/.Google Scholar
West, D. M. (2016). ‘Internet Shutdowns Cost Countries $2.4 Billion Last Year, Center for Technology Innovation at Brookings’, available at www.brookings.edu/wp-content/uploads/2016/10/intenet-shutdowns-v-3.pdf [accessed 18/02/2019].Google Scholar
Wheeler, N. J. (2018). Trusting enemies. Oxford: Oxford University Press.Google Scholar
Wheeler, N. and Dunne, T. (2012). ‘Operationalising protective intervention: Alternative models of authorisation’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 87102.Google Scholar
Wheeler, N. J. and Dunne, T.. (1998). ‘Good international citizenship: A third way for British foreign policy’, International Affairs, 74(4), 847870.Google Scholar
WHO. (2012). ‘Global Strategy for Dengue Prevention and Control 2012–2020’ available at: afro.who.int/sites/default/files/2017-06/9789241504034_eng.pdf [accessed 25/02/2019].Google Scholar
WHO. (2017). ‘Vector Borne Diseases, 31 October 2017’, available at: www.who.int/news-room/fact-sheets/detail/vector-borne-diseases [accessed 20/02/2019].Google Scholar
WHO. (2018). ‘Dengue: A Mosquito-Borne Disease’ available at: www.who.int/bangladesh/news/detail/28-05-2018-dengue-a-mosquito-borne-disease [accessed 10/04/2023].Google Scholar
WHO. (2023). DROUGHT available at: [accessed 10/04/2023].Google Scholar
Whyte, C. and Mazanec, B. (2018). Understanding cyber warfare: Politics, policy and strategy. London: Routledge.Google Scholar
Williams, G. L. and Jones, B. J. (2001). ‘Collective security or collective defence?’ In Williams, Geoffrey Lee and Jones, Barkley Jared (eds.) NATO and the transatlantic alliance in the 21st century, London: Palgrave Macmillan, pp. 8796.Google Scholar
Williams, J. (2015). Ethics, diversity & world politics. Oxford: Oxford University Press.Google Scholar
Wolfendale, J. (2017). ‘Defining war’ In Gross, Michael L. and Meisels, Tamar (eds.) Soft war: The ethics of unarmed conflict, Cambridge: Cambridge University Press, pp. 1632.Google Scholar
Wolfendale, J. (2022). White supremacy as an existential threat: A response to Rita Floyd’s The morality of security: A theory of just securitization, European Journal of International Security, 7(2), May 2022, 248282. DOI: doi.org/10.1017/eis.2022.3.Google Scholar
Woollard, F. (2015). Doing & allowing harm. Oxford: Oxford University Press.Google Scholar
Woollard, F. (2016). ‘Doing and allowing’, Oxford Bibliographies, 1. DOI: 10.1093/obo/9780195396577-0304Google Scholar
Woocher, L. (2012). ‘The responsibility to prevent’ In Knight, W. Andy and Egerton, Frazer (eds.) The Routledge handbook of the responsibility to protect, London: Routledge, pp. 2235.Google Scholar
Young, S. P. (2006). ‘Rawlsian reasonableness: A problematic presumption?’, Canadian Journal of Political Science, 39(1), 159180.Google Scholar
Zedner, L. (2009). Security. Abingdon: Routledge.Google Scholar
Zimmerman, M. J. (2010). ‘Responsibility: Act and omission’ In Skorupski, John (ed.) The Routledge companion to ethics, London: Routledge, pp. 607616.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Rita Floyd, University of Birmingham
  • Book: The Duty to Secure
  • Online publication: 15 February 2024
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Rita Floyd, University of Birmingham
  • Book: The Duty to Secure
  • Online publication: 15 February 2024
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Rita Floyd, University of Birmingham
  • Book: The Duty to Secure
  • Online publication: 15 February 2024
Available formats
×