Skip to main content Accessibility help
×
Hostname: page-component-586b7cd67f-dlnhk Total loading time: 0 Render date: 2024-11-20T11:28:43.340Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  05 December 2015

Philippe Bourbeau
Affiliation:
University of Cambridge
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Security
Dialogue across Disciplines
, pp. 219 - 281
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Abdelal, R., and Kirshner, J. (1999) “Strategy, Economic Relations, and the Definition of National Interests.” In Blanchard, J.-M. F., Mansfield, E. D. and Ripsman, N. M. (eds.) Power and the Purse: The Political Economy of National Security. London: Frank Cass, 119–156.Google Scholar
Abrahamsen, R., and Williams, M. C. (2011) Security beyond the State: Private Security in International Politics. Cambridge: Cambridge University Press.Google Scholar
Achen, C., and Snidal, D. (1989) “Rational Deterrence Theory and Comparative Case Studies.” World Politics 41(2): 143–169.CrossRefGoogle Scholar
Ackerly, B. A., Stern, M., and True, J. (eds.) (2006) Feminist Methodologies for International Relations. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Adams, R. E., and Serpe, R. T. (2000) “Social Integration, Fear of Crime, and Life Satisfaction.” Sociological Perspectives 43(4): 605–629.CrossRefGoogle Scholar
Adler, E., and Pouliot, V. (eds.) (2011) International Practices. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Adler-Nissen, R. (2012) Bourdieu in International Relations. London: Routledge.Google Scholar
Adler, E. (1997) “Seizing the Middle Ground: Constructivism in World Politics.” European Journal of International Relations 3(3): 319–363.CrossRefGoogle Scholar
Adler, Emanuel (2012) “Consuructivism and International Relations: Sources, Contributions, and Debates.” In Carlsnaes, W., Risse, T., and Simmons, B. A. (eds.) Handbook of International Relations. London: Sage, 112–144.Google Scholar
Agamben, G. (2005) State of Exception. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Agnew, J. (1994) “The Territorial Trap: The Geographical Assumptions of International Relations Theory.” Review of International Political Economy 1(1): 53–80.CrossRefGoogle Scholar
Ahmad, M. (2002) “Homeland Insecurity: Racial Violence the Day after September 11.” Social Text 20: 101–115.CrossRefGoogle Scholar
Aisen, A., and Veiga, F. J. (2010) “How Does Political Instability Affect Economic Growth?” IMF Working Paper, No 11/12.
Albrecht, P., and Moe, L. W. (2014) “The Simultaneity of Authority in Hybrid Orders.” Peacebuilding 11: 1–16.Google Scholar
Albro, R., Marcus, G., McNamara, L. A.et al. (2011) Anthropologists in the Securityscape: Ethics, Practice, and Professional Identity. Walnut Creek, CA: Left Coast Press.Google Scholar
Alford, R. (2011) “The Self-Judging WTO Security Exception.” Utah Law Review (3): 697–759.Google Scholar
Alker, H. (2006) “On Securitization Politics As Contexted Texts and Talk.” Journal of International Relations and Development 9(1): 70–80.CrossRefGoogle Scholar
Alkire, S. (2003) “A Conceptual Framework for Human Security: Working Paper 2.” CRISE Working Paper. Centre for Research on Inequality. Oxford: Human Security and Ethnicity.Google Scholar
Allhoff, F. (2012) Terrorism, Ticking Time-Bombs, and Torture. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Allport, G. W. (1960) “The Ego in Contemporary Psychology.” In Personality and Social Encounter: Selected Essays. Boston: Beacon Press, 71–93.Google Scholar
Allport, G. W. (1954) The Nature of Prejudice. Oxford: Addison-Wesley.Google Scholar
Altheide, D. L. (1975) “The Irony of Security.” Urban Life (now Journal of Contemporary Ethnography) 4: 179–196.Google Scholar
Altheide, David L. (2004) “Consuming Terrorism.” Symbolic Interactionism 27: 289–308.CrossRefGoogle Scholar
Altheide, David L. (2009) “Moral Panic: From Sociological Concept to Public Discourse.” Crime, Media, Culture: An International Journal 5(1): 79–99.CrossRefGoogle Scholar
Amenta, E. (2006) When Movements Matter: The Townsend Plan and the Rise of Social Security. Princeton, NJ: Princeton University Press.Google Scholar
Amodio, D. M. (2009) “Intergroup Anxiety Effects on the Control of Racial Stereotypes: A Psychoneuroendocrine Analysis.” Journal of Experimental Social Psychology 45(1): 60–67.CrossRefGoogle Scholar
Andersen, S. M., Saribay, A., and Thorpe, J. S. (2008) “Simple Kindness Can Go a Long Way: Relationships, Social Identity, and Engagement.” Social Psychology 39(1): 59–69.CrossRefGoogle Scholar
Anderson, B. (1983) Imagined Communities: Reflections on the Origin and Spread of Nationalism. London: Verso.Google Scholar
Anderson, E. S. (1999) “What Is the Point of Equality?Ethics 109: 287–337.CrossRefGoogle Scholar
Andreas, P. (2008) Policing the Globe: Criminalisation and Crime Control in International Relations. Oxford: Oxford University Press.Google Scholar
Andreas, Peter (2009) Border Games: Policing the U.S.-Mexico divide, Ithaca, NY: Cornell University Press.Google Scholar
Anghie, A. (2007) Imperialism, Sovereignty and the Making of International Law. Cambridge: Cambridge University Press.Google Scholar
Appelbaum, E., Bernhardt, A. D., and Murnane, R. J. (eds.) (2006) Low-Wage America: How Employers Are Reshaping Opportunity in the Workplace. New York: Russell Sage Foundation.Google Scholar
Aradau, C., and van Munster, R. (2007) “Governing Terrorism through Risk: Taking Precautions (Un)Knowing the Future.” European Journal of International Relations 13(1): 89–115.CrossRefGoogle Scholar
Arends, J. F. M. (2008) “From Homer to Hobbes and Beyond – Aspects of “Security” in the European Tradition.” In Brauch, H. G., Spring, Ú. O., Mesjasz, C.et al. (eds.) Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century. New York: Springer.Google Scholar
Arkin, R. M., Carroll, P. J., and Oleson, K. C. (2010) “Commentary: The End of the Beginning.” In Arkin, R. M., Oleson, K. C., and Carroll, P. J. (eds.) Handbook of the Uncertain Self. New York: Psychology Press, 444–448.Google Scholar
Aron, R. (1966) Peace and War: A Theory of International Relations. Weudenfield: Weudenfield and Nicholson.Google Scholar
Ashley, R., and Walker, R. B. J. (1990a) “Special Issue: Speaking the Language of Exile: Dissidence in International Studies.” International Studies Quarterly 34(3): 259–417.CrossRefGoogle Scholar
Ashley, Richard and Walker, R. B. J. (1990b) “Introduction: Speaking the Language of Exile: Dissident Thought in International Studies.” International Studies Quarterly 34(3): 259–268.CrossRefGoogle Scholar
Ayoob, M. (1995) Third World Security Predicament: State Making, Regional Conflict and the International System. Boulder, CO: Lynne Rienner.Google Scholar
Baechler, G., and Spillman, K. R. (eds.) (1996) Environmental Degradation as a Cause of War: Regional and Country Studies, Vols. 2 and 3. Bern: Swiss Peace Foundation/Swiss Federal Institute of Technology.Google Scholar
Baechler, G., Boege, V., Kloetzli, S.et al. (1996) Environmental Degradation as a Cause of War: Environmental Conflicts in the Third World and Ways for Their Peaceful Resolution, Vol. 1. Bern: Swiss Peace Foundation/Swiss Federal Institute of Technology.Google Scholar
Bail, C. A. (2012) “The Fringe Effect: Civil Society Organizations and the Evolution of Media Discourse about Islam since the September 11th Attacks.” American Sociological Review 77: 855–879.CrossRefGoogle Scholar
Bajc, V. (2013) “Sociological Reflections on Security through Surveillance.” Sociological Forum 28: 615–23.CrossRefGoogle Scholar
Baker, J. C., Lachman, B. E., Frelinger, D. R.et al. (2004) Mapping the Risks: Assessing the Homeland Security Implications of Publicly Available Geospatial Information. Santa Monica: Rand Corporation.Google Scholar
Baker, T., and Simon, J. (eds.) (2002) Embracing Risk: The Changing Culture of Insurance and Responsibility. Chicago: University of Chicago Press.Google Scholar
Bakker, K. and Bridge, G. (2006) “Material Worlds? Resource Geographies and the Matter of Nature.” Progress in Human Geography 30(1): 5–27.CrossRefGoogle Scholar
Bakker, K. (2012) “Water Security: Research Challenges and Opportunities.” Science 337(6097): 914–915.CrossRefGoogle ScholarPubMed
Baldwin, D. (1985) Economic Statecraft. Princeton, NJ: Princeton University Press.Google Scholar
Baldwin, David (1995) “Security Studies and the End of the Cold War.” World Politics 48(1): 117–141.CrossRefGoogle Scholar
Baldwin, David (1997) “The Concept of Security.” Review of International Studies 23(1): 5–26.CrossRefGoogle Scholar
Baldwin, E. R. (2003) “Staking Claim to Employment Law Remedies for Undocumented Immigrant Workers After Hoffman Plastic Compounds, Inc. v. NLRB.” Seattle University Law Review 27: 233–271.Google Scholar
Balzacq, T. (2005) “The Three Faces of Securitization: Political Agency, Audience and Context.” European Journal of International Relations 11(2): 171–201.CrossRefGoogle Scholar
Balzacq, Thierry (2011) “Enquiries into Methods: A New Framework for Securitization Analysis.” In Balzacq, T. (ed.) Securitization Theory: How Security Problems and Dissolve. London: Routledge, 31–54.Google Scholar
Balzacq, Thierry (2014) “Discourse Analysis and Process-Tracing: The Significance of Triangulation to Critical Security Studies.” Critical Studies on Security 2(3): 377–381.CrossRefGoogle Scholar
Bandura, A. (1999) “Moral Disengagement in the Perpetration of Inhumanities.” Personality and Social Psychology Review 3(3): 193–209.CrossRefGoogle ScholarPubMed
Bankston, C. L. III, Barnshaw, J., Bevc, C.et al. (2010) The Sociology of Katrina: Perspectives on a Modern Catastrophe, Lanham, MD: Rowman & Littlefield.Google Scholar
Bar-Tal, D. (2007) “Sociopsychological Foundations of Intractable Conflicts.” American Behavioral Scientist 50(11): 1430–1453.CrossRefGoogle Scholar
Bar-Tal, D. (2009) “Reconciliation As a Foundation of Culture of Peace.” In de Rivera, J. (ed.) Handbook on Building Cultures of Peace. New York: Springer, 363–377.Google Scholar
Bar-Tal, D., and Jacobson, D. (1998) “A Psychological Perspective on Security.” Applied Psychology: An International Review 47(1): 59–71.CrossRefGoogle Scholar
Barlow, F., Louis, W. R., and Hewstone, M. (2009) “Rejected! Cognitions of Rejection and Intergroup Anxiety As Mediators of the Impact of Cross-Group Friendships on Prejudice.” British Journal of Social Psychology 48(3): 389–405.CrossRefGoogle ScholarPubMed
Barnes, T. J., and Minca, C. (2013) “Nazi Spatial Theory: the Dark Geographies of Carl Schmitt and Walter Christaller.” Annals of the Association of American Geographers 103(3): 669–687.CrossRefGoogle Scholar
Barnes, T. J., and Farish, M. (2006) “Between Regions: Science, Militarism, and American Geography from World War to Cold War.” Annals of the Association of American Geographers 96(4): 807–826.CrossRefGoogle Scholar
Barnes, T. J. (2008) “Geography's Underworld: The Military-Industrial Complex, Mathematical Modelling and the Quantitative Revolution.” Geoforum 39(1): 3–16.CrossRefGoogle Scholar
Barnett, J., and Adger, W. N. (2007) “Climate Change, Human Security and Violent Conflict.” Political Geography 26(6): 639–655.CrossRefGoogle Scholar
Barnett, J. (2001) The Meaning of Environmental Security: Ecological Politics and Policy in the New Security Era. London: Zed Books.Google Scholar
Barnett, M., and Duvall, R. (eds.) (2005) Power in Global Governance. Cambridge: Cambridge University Press.Google Scholar
Barrie, D. G. (2008) “Patrick Colquhoun, the Scottish Enlightenment and Police Reform in Glasgow in the Late Eighteenth Century.” Crime, Histoire and Sociétés/Crime, History and Societies 12(2): 59–79.Google Scholar
Baruzzi, A. (2001) “Immanuel Kant 1712–1778.” In Denzer, H. and Maier, H. (eds.) Klassiker des Politischen Denkens. Nördlingen: C. H. Beck.Google Scholar
Bayley, D., and Shearing, C. (2001) The New Structure of Policing. Washington, DC: National Institute of Justice.Google Scholar
Baylis, J., Smith, S., and Owens, P. (2011) The Globalization of World Politics. Oxford: Oxford University Press.Google Scholar
Bayuk, J. L., Haeley, J., Rohmeyer, P.et al. (2012) Cyber Security Policy Guidebook. Hoboken, NJ: John Wiley & Sons.CrossRefGoogle Scholar
Beattie, J. M. (2006) “Early Detection: The Bow Street Runners in Late Eighteenth-Century London.” In Emsley, C. and Shpayer-Makov, H. (eds.) Police Detectives in History, 1750–1950. Aldershot: Ashgate, 15–32.Google Scholar
Beccaria, C. (1995) On Crimes and Punishments and Other Writings, Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Becarria, C. (1996) “On Crimes and Punishments.” In Muncie, J., and McLaughlin, E. (eds.) Criminological Perspectives: A Reader. London: Thousand Oaks, 15–24.Google Scholar
Beck, C., and Miner, E. (2013) “Who Gets Designated a Terrorist and Why?Social Forces 91: 837–872.CrossRefGoogle Scholar
Beck, C. J. (2008) “The Contribution of Social Movement Theory to Understanding Terrorism.” Sociology Compass 2(5): 1565–1581.CrossRefGoogle Scholar
Beck, U. (1992) Risk Society: Towards a New Modernity. New York: Sage.Google Scholar
Beck, Ulrich (2000) “Risk Society Revisited: Theory, Politics and Research Programmes.” In Adams, B., Beck, U., and Van Loon, J. (eds.) The Risk Society and Beyond: Critical Issues for Social Theory. London: Sage, 211–229.Google Scholar
Becker, H. S. (1963) Outsiders. New York: Free Press of Glencoe.Google Scholar
Becker, J. C., Wright, S. C., Lubensky, M. E.et al. (2013) “Friend or Ally: Whether Cross-Group Contact Undermines Collective Action Depends on What Advantaged Group Members Say (or Don't Say).” Personality and Social Psychology Bulletin 39(4): 442–455.CrossRefGoogle Scholar
Beckett, K., and Herbert, S. (2009) Banished: The New Social Control in Urban America. Oxford: Oxford University Press.CrossRefGoogle Scholar
Béland, D. (2005) Social Security: History and Politics from the New Deal to the Privatization Debate. Lawrence: University Press of Kansas.Google Scholar
Bender, D. E., and Greenwald, R. A. (eds.) (2003) Sweatshop USA: The American Sweatshop in Historical and Global Perspective. New York: Routledge.Google Scholar
Bennett, D. S., and Stam, A. C. (2004) The Behavioral Origins of War, Ann Arbor: University of Michigan Press.Google Scholar
Bentham, J. (1843) “Principles of the Civil Code.” In Hildreth, R. (ed.) The Theory of Legislation. London: Trubner.Google Scholar
Benyshek, D. C., and Watson, J. T. (2006) “Exploring the Thrifty Genotype's Food-Shortage Assumptions: A Cross-Cultural Comparison of Ethnographic Accounts of Food Security among Foraging and Agricultural Societies.” American Journal of Physical Anthropology 131: 120–126.CrossRefGoogle ScholarPubMed
Bergesen, A. H., and Han, Yi (2006) “New Directions for Terrorism Research.” International Journal of Comparative Sociology 46: 133–151.Google Scholar
Berkes, F., Colding, J., and Folke, C. (eds.) (2003) Navigating Social-Ecological Systems: Building Resilience for Complexity and Change. Cambridge: Cambridge University Press.Google Scholar
Bernazzoli, R. M., and Flint, C. (2009) “From Militarization to Securitization: Finding a Concept That Works.” Political Geography 28(8): 449–450.CrossRefGoogle Scholar
Bernstein, P. L. (1996) Against the Gods: The Remarkable Story of Risk. New York: John Wiley & Sons.Google Scholar
Bevir, M., and Rhodes, R. A. W. (2002) “Interpretive Theory.” In Marsh, D. and Stoker, G. (eds.) Theory and Methods in Political Science. Basingstoke: Palgrave Macmillan, 131–152.Google Scholar
Bhambra, G. K. (2007) Rethinking Modernity: Postcolonialism and the Sociological Imagination. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
Bialasiewicz, L., Campbell, D., Elden, S.et al. (2007) “Performing Security: The Imaginative Geographies of Current US Strategy.” Political Geography 26(4): 405–422.CrossRefGoogle Scholar
Bigo, D. (2002) “Security and Immigration: Toward a Critique of the Governmentality of Unease.” Alternatives 27(2): 63–92.CrossRefGoogle Scholar
Bigo, Didier (1996) Polices en Réseaux: L'expérience europeenne. Paris: Presses de Sciences Po.Google Scholar
Bilali, R., Tropp, L. R., and Dasgupta, N. (2012) “Attributions of Responsibility and Perceived Harm in the Aftermath of Mass Violence.” Peace and Conflict: Journal of Peace Psychology 18(1): 21–39.CrossRefGoogle Scholar
Binder, J., Zagefka, H., Brown, R.et al. (2009) “Does Contact Reduce Prejudice or Does Prejudice Reduce Contact? A Longitudinal Test of the Contact Hypothesis among Majority and Minority Groups in Three European Countries.” Journal of Personality and Social Psychology 96(4): 843–856.CrossRefGoogle ScholarPubMed
Birks, D. J. (2005) “Computational Criminology: A Multi-Agent Simulation of Volume Crime Activity.” British Society of Criminology Conference, July 4, 2005, University of Leeds, UK.Google Scholar
Bittner, E. (1973) The Functions of the Police in Modern Society. Brandeis University, National Institute of Mental Health, Center for Studies of Crime and Delinquency.Google Scholar
Blanchard, J.-M. F., Mansfield, E. D., and Ripsman, N. M. (eds.) (1999) Power and the Purse: The Political Economy of National Security. London: Frank Cass.Google Scholar
Bloch, A., Sigona, N., and Zetter, R. (2011) “Migration Routes and Strategies of Young Undocumented Migrants in England: A Qualitative Perspective.” Ethnic and Racial Studies 34(8): 1286–1302.CrossRefGoogle Scholar
Blundell-Wignall, A., Hu, Y., and!Yermo, J. (2008) “Sovereign Wealth and Pension Fund Issues.” OECD Working Papers on Insurance and Private Pensions, No. 14, OECD.Google Scholar
Bobo, L. D. (1999) “Prejudice as Group Position: Microfoundations of a Sociological Approach to Racism and Race Relations.” Journal of Social Issues 55(3): 445–472.CrossRefGoogle Scholar
Bohle, H. G., Downing, T. E., and Watts, M. J. (1994) “Climate Change and Social Vulnerability: Toward a Sociology and Geography of Food Insecurity.” Global Environmental Change 4(1): 37–48.CrossRefGoogle Scholar
Booth, K., and Wheeler, N. J. (2008) The Security Dilemma: Fear, Cooperation and Trust in World Politics. London: Palgrave.Google Scholar
Booth, K. (1991) “Security and Emancipation.” Review of International Studies 17(4): 313–327.CrossRefGoogle Scholar
Booth, Ken (2005) “Beyond Critical Security Studies.” In Booth, K. (ed.) Critical Security Studies and World Politics. London: Lynne Rienner, 259–278.Google Scholar
Booth, Ken (2007) Theory of World Security. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Bosniak, L. (1998) “The Citizenship of Aliens.” Social Text 16(3): 29–35.Google Scholar
Bosniak, Linda (2006) The Citizen and the Alien: Dilemmas of Contemporary Membership. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Bourbeau, P. (2011) The Securitization of Migration: A Study of Movement and Order. London: Routledge.Google Scholar
Bourbeau, Philippe (2013) “Resiliencism: Premises and Promises in Securitization Research.” Resilience: International Policies, Practices and Discourses 1(1): 3–17.CrossRefGoogle Scholar
Bourbeau, Philippe (2014) “Moving Forward Together: Logics of the Securitization Process.” Millennium: Journal of International Studies 43(1): 187–206.CrossRefGoogle Scholar
Bourbeau, Philippe (2015a) “Resiliencism and Security Studies: Initiating a dialogue.” In Balzacq, T. (ed.) Contesting Security: Strategies and Logics. London: Routledge, 173–188.Google Scholar
Bourbeau, Philippe (2015b) “Resilience and International Politics: Premises, Debates and Agenda.” International Studies Review, 17(3): early-view.Google Scholar
Bourhis, R. Y., Sachdev, I., and Gagnon, A. (1994) “Intergroup Research with the Tajfel Matrices: Methodological Notes.” In Zanna, M. P. and Olson, J. M. (eds.) The Psychology of Prejudice: The Ontario Symposium. Hillsdale, NJ: Erlbaum, 209–232.Google Scholar
Bowles, P., and MacPhail, F. (2008) “Introduction to the Special Issue on Pathways from Casual Work to Economic Security: Canadian and International Perspectives.” Social Indicators Research 88(1): 1–13.CrossRefGoogle Scholar
Boyce, J. K., and O'Donnell, M. (eds.) (2007) Peace and the Public Purse: Economic Policies for Postwar Statebuilding. Boulder, CO: Lynne Rienner.Google Scholar
Brady, D. (2005) “The Welfare State and Relative Poverty in Rich Western Democracies, 1967–1997.” Social Forces 83(4): 1329–1364.CrossRefGoogle Scholar
Branscombe, N. R., Ellemers, N., Spears, R.et al. (1999) “The Context and Content of Social Identity Threat.” In Ellemers, N., Spears, R., and Doosje, B. (eds.) Social Identity: Context, Commitment, Content. Oxford: Blackwell Science, 35–58.Google Scholar
Brantingham, P. J., and Brantingham, P. L. (1981) Environmental Criminology. Beverly Hills, CA: Sage.Google Scholar
Brauch, H. G. (2008) “Securitization of Space and Referent Objects.” In Brauch, H. G., Spring, Ú. O., Mesjasz, C.et al. (eds.) Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century. New York: Springer, 323–344.CrossRefGoogle Scholar
Braudel, F. (1979) Civilization and Capitalism 15th–18th Century. Vol. III. The Perspective of the World (translated by Reynolds, S.). Berkeley: University of California Press.Google Scholar
Brecher, R. (2007) Torture and the Ticking Bomb. Oxford: Blackwell.CrossRefGoogle Scholar
Brewer, M. B. (1999) “The Psychology of Prejudice: Ingroup Love or Outgroup Hate?Journal of Social Issues 55(3): 429–444.CrossRefGoogle Scholar
Brewer, M. B., von Hippel, W., and Gooden, M. P. (1999) “Diversity and Organizational Identity: the Problem of Entrée after Entry.” In Prentice, D. A., and Miller, D. T. (eds.) Cultural Divides: Understanding and Overcoming Group Conflict. New York: Russell Sage Foundation, 337–363.Google Scholar
Brock, G. (2009) Global Justice: a Cosmopolitan Account. Oxford: Oxford University Press.CrossRefGoogle Scholar
Brodeur, J. P. (1983) “High and Low Policing: Remarks about the Policing of Political Activities.” Social Problems 30(5): 507–520.CrossRefGoogle Scholar
Brooks, S. G. (1997) “Dueling Realisms (Realism in International Relations).” International Organization 51(3): 445–477.CrossRefGoogle Scholar
Brooks, S. G., and Wohlforth, W. C. (2008) World Out of Balance: International Relations and the Challenge of American Primacy. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Brotherton, D., and Kretsedemas, P. (2008) Keeping Out the Other: A Critical Introduction to Immigration Enforcement Today. New York: Columbia University Press.Google Scholar
Brown, R. (2000) “Social Identity Theory: Past Achievements, Current Problems and Future Challenges.” European Journal of Social Psychology 30(6): 745–778.3.0.CO;2-O>CrossRefGoogle Scholar
Brown, T. (2011) “‘Vulnerability Is Universal’: Considering the Place of ‘Security’ and ‘Vulnerability’ within Contemporary Global Health Discourse.” Social Science and Medicine 72(3): 319–326.CrossRefGoogle ScholarPubMed
Browning, C. S., and McDonald, M. (2013) “The Future of Critical Security Studies: Ethics and the Politics of Security.” European Journal of International Relations 19(2): 235–255.CrossRefGoogle Scholar
De Bruin, B. (2010) “The Liberal Value of Privacy.” Law and Philos 29: 505–534.CrossRefGoogle Scholar
Bruneau, E. G., and Saxe, R. (2012) “The Power of Being Heard: The Benefits of ‘Perspective-Giving’ in the Context of Intergroup Conflict.” Journal of Experimental Social Psychology 48(4): 855–866.CrossRefGoogle Scholar
Bryan, J. (2010) “Force Multipliers: Geography, Militarism, and the Bowman Expeditions.” Political Geography 29(8): 414–416.CrossRefGoogle Scholar
Bubandt, N. (2005) “Vernacular Security: The Politics of Feeling Safe in Global, National and Local Worlds.” Security Dialogue 36(3): 275–296.CrossRefGoogle Scholar
Buchanan, J. M. (1966) “An Individualistic Theory of Political Process.” In Easton, David (ed.) Varieties in Political Theory. Englewood Cliffs, NJ: Prentice-Hall, 25–37.Google Scholar
Bueno de Mesquita, B., Smith, A., Siverson, R. M.et al. (2003) The Logic of Political Survival. Cambridge, MA: MIT Press.Google Scholar
Buhaug, H., and Gates, S. (2002) “The Geography of Civil War.” Journal of Peace Research 39(4): 417–433.CrossRefGoogle Scholar
Buonfino, A. (2004) “Between Unity and Plurality: The Politicization and Securitization of the Discourse of Immigration in Europe.” New Political Science 26: 23–49.CrossRefGoogle Scholar
Burke, A. (2007) Beyond Security, Ethics and Violence: War against the Other. London: Routledge.Google Scholar
Burrell, J. (2010) “In and Out of Rights: Security, Migration, and Human Rights Talk in Postwar Guatemala.” Journal of Latin American and Caribbean Anthropology 15(l): 90–115.CrossRefGoogle Scholar
Burris, S., Drahos, P. and Shearing, C. (2005) “Nodal Governance.” Australian Journal of Legal Philosophy 30: 30–58.Google Scholar
Burton, I., Kates, R. W., and White, G. F. (eds.) (1978) The Environment as Hazard. New York: Guilford Press.Google Scholar
Butler, J. (2011) Bodies That Matter: On the Discursive Limits of Sex. London: Taylor & Francis.Google Scholar
Buzan, B. (1991) People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era. Harvester Wheatsheaf: Lynne Reinner.Google Scholar
Buzan, B. (1994) “The Interdependence of Security and Economic Issues in the ‘New World Order.’” In Stubbs, R., and Underhill, G. R. D. (eds.) Political Economy and the Changing Global Order. New York: St Martin's Press, 89–102.Google Scholar
Buzan, B., and Hansen, L. (2009) The Evolution of International Security Studies. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Buzan, B., and Little, R. (2000) International Systems in World History: Remaking the Study of International Relations. Oxford: Oxford University Press.Google Scholar
Buzan, B., Waever, O., and De Wilde, J. (1998) Security: A New Framework for Analysis. Boulder, CO: Lynne Reiner.Google Scholar
Byers, M. (1997) “Taking the Law Out of International Law: A Critique of the ‘Iterative Perspective.’Harvard International Law Journal 38: 201–206.Google Scholar
c.a.s.e. collective (2006) “Critical Approaches to Security in Europe: A Networked Manifesto.” Security Dialogue 37(4): 443–487.
Caduff, C. (2012) “The Semiotics of Security: Infectious Disease Research and the Biopolitics of Informational Bodies in the United States.” Cultural Anthropology 27: 333–357.CrossRefGoogle ScholarPubMed
Cainkar, L. (2004) “Post 9/11 Domestic Policies Affecting US Arabs and Muslims: A Brief Review.” Comparative Studies of South Asia, Africa and the Middle East 24: 245–248.CrossRefGoogle Scholar
Calavita, K. (2005) Immigrants at the Margins: Law, Race, and Exclusion in Southern Europe. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Caldeira, T. P. R. (1996) “Fortified Enclaves: The New Urban Segregation.” Public Culture 8: 303–328.CrossRefGoogle Scholar
Caldeira, T. (2000) City of Walls: Crime, Segregation, and Citizenship in São Paulo. Berkeley: University of California Press.Google Scholar
Campbell, D. (1998) Writing Security: United States Foreign Policy and the Politics of Identity. Minneapolis: University of Minnesota Press.Google Scholar
Campbell, D. T. (1957) “Factors Relevant to the Validity of Experiments in Social Settings.” Psychological Bulletin 54(4): 297–312.CrossRefGoogle ScholarPubMed
Canetti-Nisim, D., Halperin, E., Sharvit, K.et al. (2009) “A New Stress-Based Model of Political Extremism: Personal Exposure to Terrorism, Psychological Distress, and Exclusionist Political Attitudes.” Journal of Conflict Resolution 53(3): 363–389.CrossRefGoogle ScholarPubMed
Carlsnaes, W. (1992) “The Agency-Structure Problem in Foreign Policy Analysis.” International Studies Quarterly 36(3): 245–270.CrossRefGoogle Scholar
Carr, E. H. (1962) The Twenty Years Crisis, 1919–1939: An Introduction to the Study of International Relations, London: Macmillan.Google Scholar
Carroll, P. J., Wichman, A. L., and Arkin, R. M. (2006) “Security in the Aftermath of 9/11.” Basic and Applied Social Psychology, 28(4): 289–290.CrossRefGoogle Scholar
Cassese, A. (2001) “Terrorism Is Also Disrupting Some Crucial Legal Categories of International Law.“ European Journal of International Law 12(5): 993–1001.CrossRefGoogle Scholar
Caton, S. C., and Zacka, B. (2010) “Abu Ghraib, the Security Apparatus, and the Performativity of Power.” American Ethnologist 37(2): 203–211.CrossRefGoogle Scholar
Chakrabarty, D. (2009) “The Climate of History: Four Theses.” Critical Inquiry 35(2): 197–222.CrossRefGoogle Scholar
Chavez, L. (2008) The Latino Threat: Constructing Immigrants, Citizens and the Nation. Stanford, CA: Stanford University Press.Google Scholar
Checkel, J. T. (2008) Process Tracing. In Klotz, A. and Prakash, D., (eds.) Qualitative Methods in International Relations. Basingstoke: Palgrave Macmillan: 114–130.Google Scholar
Checkel, J. T. (2012) “Theoretical Pluralism in IR: Possibilities and Limits.” In Carlsnaes, W., Risse, T., and Simmons, B. A. (eds.) Handbook of International Relations, London: Sage, 220–242.Google Scholar
Chernoff, F. (2007) Theory and Metatheory in International Relations: Concepts and Contending Accounts. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
Clark, J. H. (2013) “‘My Life Is Like a Novel’: Embodied Geographies of Security in Southeast Turkey.” Geopolitics 18(4): 835–855.CrossRefGoogle Scholar
Clark, M. S., and Lemay, E. R. (2010) “Close Relationships.” In Fiske, S. T., Gilbert, D. T., and Lindzey, G. (eds.) Handbook of Social Psychology, Vol. 2, Hoboken, NJ: John Wiley & Sons, 898–940.Google Scholar
Clarke, L. (1999) Mission Improbable: Using Fantasy Documents to Tame Disaster. Chicago: University of Chicago Press.Google Scholar
Clarke, R. V. G. (1997) Situational Crime Prevention. Monsey, NY: Criminal Justice Press.Google Scholar
Cohen, S. (2001) States of Denial: Knowing about Atrocities and Suffering. Cambridge: Polity.Google Scholar
Cohn, C. (ed.). (2012) Women and Wars: Contested Histories, Uncertain Futures. Cambridge: Polity.Google Scholar
Coleman, M., and Grove, K. (2009) “Biopolitics, Biopower, and the Return of Sovereignty.” Environment and Planning. D, Society and Space 27(3): 489–507.CrossRefGoogle Scholar
Collier, P., and Hoeffler, A. (2002) “On the Incidence of Civil War in Africa.” Journal of Conflict Resolution 46(1): 13–28.CrossRefGoogle Scholar
Collier, P. and Hoeffler, A. (2004) “Greed and Grievance in Cicil War.” Oxford Economic Papers 56: 563–595.CrossRefGoogle Scholar
Collier, S. J., and Lakoff, A. (2008) “The Vulnerability of Vital Systems: How ‘Critical Infrastructure’ Became a Security Problem.” In Dunn, M. and Kristensen, K. S. (eds.) Securing ‘the Homeland’: Critical Infrastructure, Risk and (In)Security. London: Routledge.Google Scholar
Collier, S. J., Lakoff, A., and Rabinow, P. (2004) “Biosecurity: Towards an Anthropology of the Contemporary.” Anthropology Today 20: 3–7.CrossRefGoogle Scholar
Collins, A. (2013) Contemporary Security Studies, Oxford: Oxford University Press.Google Scholar
Collins, R. (2008) Violence: A Micro-Sociological Theory. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Cooley, A. (2008) Base Politics: Democratic Change and the US Military Overseas. Ithaca, NY: Cornell University Press.Google Scholar
Cooper, M., and Walker, J. (2011) “Genealogies of Resilience: From Systems Ecology to the Political Economy of Crisis Adaptation.” Security Dialogue 41.Google Scholar
Cooper, M. (2010) “Turbulence: Between Financial and Environmental Crisis.” Theory, Culture, and Society 27: 1–24.Google Scholar
Cornelius, W. A. (2004) “Controlling “Unwanted” Immigration: Lessons from the United States, 1993–2004.” Working Paper Number 92, Center for Comparative Immigration Studies. San Diego: University of California.Google Scholar
Cornish, D. B. (1994) “The Procedural Analysis of Offending and Its Relevance for Institutional Prevention.” Crime Prevention Studies 3: 151–196.Google Scholar
Coutin, S. B. (1995) “Smugglers or Samaritans in Tucson, Arizona: Producing and Contesting Legal Truth.” American Ethnologist 22(3): 549–571.CrossRefGoogle Scholar
Coutin, S. B. (1999) “Citizenship and Clandestiny among Salvadoran Immigrants.” Political and Legal Anthropology Review 22(2): 53–63.CrossRefGoogle Scholar
Coutin, Susan B. (2000) Legalizing Moves: Salvadoran Immigrants’ Struggle for U.S. Residency. Ann Arbor: University of Michigan Press.Google Scholar
Coutin, Susan B. (2003) “Borderlands, Illegality and the Spaces of Non-Existence.” In Perry, R., and Maurer, B. (eds.) Globalization and Governmentalities. Minneapolis: University of Minnesota Press, 171–202.Google Scholar
Coutin, Susan B. (2007) Nations of Emigrants: Shifting Boundaries of Citizenship in El Salvador and the United States. Ithaca, NY: Cornell University Press.Google Scholar
Cowen, D. and Smith, N. (2009) “After Geopolitics? From the Geopolitical Social to Geoeconomics.” Antipode 41(1): 22–48.CrossRefGoogle Scholar
Cox, R. W. (1986) “Social Forces, States and World Orders: Beyond International Relations Theory.” In Keohane, R. O. (ed.) Neorealism and Its Critics. New York: Columbia University Press, 204–253.Google Scholar
Crampton, J. W., Roberts, S. M., and Poorthuis, A. (2014) “The New Political Economy of Geographical Intelligence.” Annals of the Association of American Geographers 104(1): 196–214.CrossRefGoogle Scholar
Crang, M., and Graham, S. (2007) “Sentient Cities: Ambient Intelligence and the Politics of Urban Space.” Information, Communication and Society 10(6): 789–817.CrossRefGoogle Scholar
Critchley, T. A. (1978) A History of Police in England and Wales. London: Constable.Google Scholar
Crocker, J., and Garcia, J. A. (2009) “Downward and Upward Spirals in Intergroup Interactions: The Role of Egosystem and Ecosystem Goals.” In Nelson, T. D. (ed.) Handbook of Prejudice, Stereotyping, and Discrimination. New York: Psychology Press, 229–245.Google Scholar
Cuomo, D. (2013) “Security and Fear: The Geopolitics of Intimate Partner Violence Policing.” Geopolitics 18(4): 856–874.CrossRefGoogle Scholar
Curley, M. G., and Wong, S.-l. (eds.) (2008) Security and Migration in Asia: The Dynamics of Securitisation. London: Routledge.Google Scholar
Cutter, S., Richardson, D. B., and Wilbanks, T. J. (2003) The Geographic Dimension of Terrorism. London: Routledge.Google Scholar
Dalby, S. (1988) “Geopolitical Discourse: The Soviet Union as Other.” Alternatives 13(4): 415–442.CrossRefGoogle Scholar
Dalby, S. (2002) Environmental Security. Minneapolis: University of Minnesota Press.Google Scholar
Dalby, S. (2009) Security and Environmental Change. Cambridge: Polity.Google Scholar
Dalby, S., and O'Tuathail, G. (2002) Rethinking Geopolitics, Routledge.Google Scholar
Davis, R. C., and Erez, E. (1998) Immigrant Populations as Victims: Toward a Multicultural Criminal Justice System. National Institute of Justice: Research in Brief.Google Scholar
De Genova, N. (2002) “Migrant ‘Illegality’ and Deportability in Everyday Life.” Annual Review of Anthropology 31: 419–447.CrossRefGoogle Scholar
De Genova, Nicholas (2005) Working the Boundaries: Race, Space and “Illegality” in Mexican Chicago. Durham, NC: Duke University Press.CrossRefGoogle Scholar
De Genova, Nicholas (2007) “The Production of Culprits: From Deportability to Detainability in the Aftermath of ‘Homeland Security.’Citizenship Studies 11: 421–448.CrossRefGoogle Scholar
De Genova, Nicholas (2009) “Conflicts of Mobility, and the Mobility of Conflict: Rightlessness, Presence, Subjectivity, Freedom.” Subjectivity 29: 445–466.CrossRefGoogle Scholar
De Genova, Nicholas (2010) “The Queer Politics of Migration: Reflections on ‘Illegality’ and Incorrigibility.” Studies in Social Justice 4(2): 101–126.CrossRefGoogle Scholar
de Goede, M. (2008) “Beyond Risk: Premediation and the Post 9/11 Security Imagination.” Security Dialogue 39(2–3): 155–176.CrossRefGoogle Scholar
Deal, J. L. (2010) “Torture by Cieng: Ethical Theory Meets Social Practice among the Dinka Agaar of South Sudan.” American Anthropologist 112(4): 563–575.CrossRefGoogle ScholarPubMed
Debrix, F., and Barder, A. (2011) Beyond Biopolitics: Theory, Violence, and Horror in World Politics. London: Routledge.Google Scholar
Déclaration des droits de l'homme et du citoyen, 1789.
Del Rosso, J. (2011) “The Textual Mediation of Denial: Congress, Abu Ghraib, and the Construction of an Isolated Incident.” Social Problems 58: 165–188.CrossRefGoogle Scholar
Del Rosso, Jared (2014) “Textuality and the Social Organization of Denial: Abu Ghraib, Guantanamo, and the Meanings of U.S. Interrogation Policies.” Sociological Forum 29: 52–74.Google Scholar
Der Derian, J., and Shapiro, M. J. (1989) International/Intertextual Relations: Postmodern Readings of World Politics. Lexington, MA: Lexington Books.Google Scholar
Der Derian, J. (1995) “The Value of Security: Hobbes, Marx, Nietzsche, and Baudrillard.” In Lipschultz, R. D. (ed.) On Security. New York: Columbia University Press, 24–45.Google Scholar
Dershowitz, A. (2004) “Tortured Reasoning.” In Levinson, S. Torture: A Collection. Oxford: Oxford University Press, 257–280.Google Scholar
Deudney, D. (1990) “The Case against Linking Environmental Degradation and National Security.” Millennium: Journal of International Studies 19(3): 461–476.CrossRefGoogle Scholar
Deudney, D. (2007) Bounding Power: Republican Security Theory from the Polis to the Global Village. Princeton, NJ: Princeton University Press.Google Scholar
Devine, P. G., and Vasquez, K. A. (1998) “The Rocky Road to Positive Intergroup Relations.” In Eberhardt, J., and Fiske, S. T. (eds.) Confronting Racism: the Problem and the Response. Thousand Oaks, CA: Sage, 234–262.Google Scholar
de Wet, E. (2004) The Chapter VII Powers of the United Nations Security Council. Oxford: Hart.Google Scholar
Diener, A. C., and Hagen, J. (2009) “Theorizing Borders in a ‘Borderless World’: Globalization, Territory and Identity.” Geography Compass 3(3): 1196–1216.CrossRefGoogle Scholar
Dillon, M., and Reid, J. (2009) The Liberal Way of War: Killing to Make Life Live. London: Routledge.Google Scholar
Dittmer, J., and Dodds, K. (2008) “Popular Geopolitics Past and Future: Fandom, Identities and Audiences.” Geopolitics 13(3): 437–457.CrossRefGoogle Scholar
Ditton, J. (1979) Controlology: Beyond the New Criminology. London: MacMillan.CrossRefGoogle Scholar
Dixon, J., Durrheim, K., Tredoux, C. G.et al. (2010) “Challenging the Stubborn Core of Opposition to Equality: Racial Contact and Policy Attitudes.” Political Psychology 31(6): 831–855.CrossRefGoogle Scholar
Dixon, J., Durrheim, K., Tredoux, C.et al. (2010) “A Paradox of Integration, Interracial Contact, Prejudice Reduction, and Perceptions of Racial Discrimination.” Journal of Social Issues 66(2): 401–416.CrossRefGoogle Scholar
Dixon, J., Tropp, L. R., Durrheim, K.et al. (2010) “‘Let Them Eat Harmony’: Prejudice-Reduction Strategies and Attitudes of Historically Disadvantaged Groups.” Current Directions in Psychological Science 19(2): 76–80.CrossRefGoogle Scholar
Dombrowski, P. (2005) Guns and Butter – the Political Economy of International Security. London: Lynne Rienner.Google Scholar
Donnan, H., and Wilson, T. M. (eds.) (2010) Borderlands: Ethnographic Approaches to Security, Power, and Identity. Lanham, MD: University Press of America.Google Scholar
Doosje, B., Loseman, A., and Van den Bos, K. (2013) “Determinants of Radicalization of Islamic Youth in the Netherlands: Personal Uncertainty, Perceived Injustice, and Perceived Group Threat.” Journal of Social Issues 69(3): 586–604.CrossRefGoogle Scholar
Dos Santos, T. (1996) “The Structure of Dependence.” In Goddard, C. R., Passé-Smith, J. T., and Conklin, J. (eds.) International Political Economy: State-Market Relations in the Changing Global Order. Boulder, CO: Lynne Rienner, 149–165.Google Scholar
Doty, R. L. (2007) “States of Exception on the Mexico–U.S. Border: Security, “Decisions” and Civilian Border Patrols.” International Political Sociology 1(2): 113–137.CrossRefGoogle Scholar
Dovidio, J. F., Gaertner, S. L., and Saguy, T. (2009) “Commonality and the Complexity of ‘We’: Social Attitudes and Social Change.” Personality and Social Psychology Review 13(1): 3–20.CrossRefGoogle ScholarPubMed
Dovidio, J. F., Saguy, T., West, T. V.et al. (2012) “Divergent Intergroup Perspectives.” In Tropp, L. R. (ed.) The Oxford Handbook of Intergroup Conflict. New York: Oxford University Press, 158–175.Google Scholar
Dowler, L., and Sharp, J. (2001) “A Feminist Geopolitics?Space and Polity 5(3): 165–176.CrossRefGoogle Scholar
Downs, A. (1957) “An Economic Theory of Political Action in a Democracy.” The Journal of Political Economy 65(2): 135–150.CrossRefGoogle Scholar
Doyle, M. (1986) “Liberalism and World Politics.” American Political Science Review 80(4): 1151–1163.CrossRefGoogle Scholar
Dryzek, J. S. (2006) “Revolutions without Enemies: Key Transformations in Political Science.” American Political Science Review 100(4): 487–492.CrossRefGoogle Scholar
Dubartell, D. (2006) “Computer-Mediated Communication: Human-to-Human Communication across the Internet.” Journal of Linguistic Anthropology 16(2): 284–285.CrossRefGoogle Scholar
Dunn Cavelty, M. (2013) “From Cyber-Bombs to Political-Fallout: Threat Representations with an Impact.” International Studies Review 15(1): 105–122.CrossRefGoogle Scholar
Dunne, T., and Schmidt, B. C. (2011) “Realism.” In Baylis, J., Smith, S., and Owens, P.et al. (eds.) The Globalization of World Politics. Oxford: Oxford University Press, 84–99.Google Scholar
Dunoff, J., and Pollack, M. (2012) What Can International Relations Learn from International Law? Temple University Legal Studies Research Paper No. 2012-14: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2037299.
Dupont, B. (2008) “Hacking the Panopticon: Distributed Online Surveillance and Resistance.” Sociology of Crime Law and Deviance 10: 259–280.Google Scholar
Dupont, Benoit (2013) “The Proliferation of Cyber Security Strategies and Their Implications for Privacy.” In Benyekhlef, K., and Mitjans, E. (eds.) Circulation international de l'information et securitie. Montreal: Les Editions Themis, 67–80.Google Scholar
Elcioglu, E. F. (2010) “Producing Precarity: The Temporary Staffing in the Labor Market.” Qualitative Sociology 33(1): 117–136.CrossRefGoogle Scholar
Earle, E. M. (1986) “Adam Smith, Alexander Hamilton, Friedrich List: The Economic Foundations of Military Power.” In Paret, P. (ed.) Makers of Modern Strategy. Oxford: Clarendon, 217–261.Google Scholar
Easton, D. (1953) The Political System. Chicago: University of Chicago Press.Google Scholar
Eberl, O., and Niesen, P. (2011) Zum ewigen Frieden. Mit den Passagen zum Völkerrecht und Weltbürgerrecht aus Kants Rechtslehre (To Perpetual Peace, with Commentary). Frankfurt: Suhrkamp.Google Scholar
Eck, J. E., and Eck, E. B. (2012) “Crime Place and Pollution.” Criminology and Public Policy 11(2): 281–316.CrossRefGoogle Scholar
Eck, J. E. (1995) “Examining Routine Activity Theory: A Review of Two Books.” Justice Quarterly 12(4): 783–797.CrossRefGoogle Scholar
Eden, L. (2004) Whole World On Fire: Organizations, Knowledge, and Nuclear Weapons Devastation. Ithaca, NY: Cornell University Press.Google Scholar
Eilstrup-Sangiovanni, M. (2009) “The End of Balance-of-Power Theory? A Comment on Wohlforth et al.'s ‘Testing Balance-of-Power Theory in World History.’European Journal of International Relations 15(2): 347–380.CrossRefGoogle Scholar
Eisenhut, D. (2010) “Sovereignty, National Security and International Treaty Law: The Standard of Review of International Courts and Tribunals with Regard to ‘Security Exceptions.’Archiv des Völkerreechts 48(4): 431–466.Google Scholar
Elbe, S. (2006) “Should HIV/AIDS Be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security.” International Studies Quarterly 50: 119–144.CrossRefGoogle Scholar
Elchardus, M., De Groof, S., and Smits, W. (2008) “Rational Fear or Represented Malaise: A Crucial Test of Two Paradigms Explaining Fear of Crime.” Sociological Perspectives 51(3): 453–471.CrossRefGoogle Scholar
Elden, S. (2009) Terror and Territory: The Spatial Extent of Sovereignty. Minneapolis: University of Minnesota Press.Google Scholar
Elden, S. (2013) “Secure the Volume: Vertical Geopolitics and the Depth of Power.” Political Geography 34: 35–51.CrossRefGoogle Scholar
Elliott, A. (2002) “Beck's Sociology of Risk: A Critical Assessment.” Sociology 36(2): 293–315.CrossRefGoogle Scholar
Emsley, C. (1986) “Detection and Prevention: The Old English Police and the New 1750–1900.” Historical Social Research/Historische Sozialforschung, 37: 69–88.Google Scholar
Enloe, C. (1989) Bananas, Bases and Beaches: Making Feminist Sense of International Politics. London: Pinter.Google Scholar
Enloe, Cynthia (2000) Maneuvers: The International Politics of Militarizing Women's Lives. Berkeley: University of California Press.Google Scholar
Erickson, K. (1976) Everything in Its Path: Destruction of Community in the Buffalo Creek Flood. New York: Simon & Schuster.Google Scholar
Ericson, R. V., Doyle, A., and Barry, D. (2003) Insurance as Governance. Toronto: University of Toronto Press.Google Scholar
Ericson, R. V. (1994) “The Division of Expert Knowledge in Policing and Security.” British Journal of Sociology 45(2): 149–175.CrossRefGoogle Scholar
Ericson, Richard V. (2007) Crime in An Insecure World. Cambridge: Polity.Google Scholar
Eriksen, T. H., Bal, E., and Salemink, O. (eds.) (2010) A World of Insecurity: Anthropological Perspectives on Human Security. New York: Pluto Press.Google Scholar
Evans-Pritchard, E. E. (1937) Witchcraft, Oracles and Magic among the Azande. Oxford: Clarendon.Google Scholar
Ewald, F. (1991) “Insurance and Risk.” In Burchell, G., Gordon, C., and Miller, P. (eds.) The Foucault Effect: Studies in Governmentality. Chicago: University of Chicago Press, 197–210.Google Scholar
Eyal, G., and Pok, G. (2015) “What is security expertise? From the sociology of professions to an analysis of networks of expertise.” In Berling, T. V., and Bueger, C. (eds.) Security Expertise: Practice, Power and Responsibility. London: Routledge, 37–59.Google Scholar
Eyal, G. (2006) The Disenchantment of the Orient: Expertise in Arab Affairs and the Israeli State. Stanford, CA: Stanford University Press.Google Scholar
Faist, T. (2002) “Extension du Domaine de la Lutte: International Migration and Security before and after September 11, 2001.” International Migration Review 36: 7–14.Google Scholar
Fassbender, B. (2009) The United Nations Charter as the Constitution of the International Community. Leiden: Martinus Nijhoff, Koninklijke Brill NV.CrossRefGoogle Scholar
Fassin, D. (2013) Enforcing Order: An Ethnography of Urban Policing. Cambridge: Polity.Google Scholar
Fazal, T. M. (2014) “Dead Wrong? Battle Deaths, Military Medicine, and Exaggerated Reports of War's Demise.“ International Security 39(1): 95–125.CrossRefGoogle Scholar
Fearon, J. D., and Wendt, A. (2002) “Rationalism v. Constructivism: A Skeptical View.” In Carlsnaes, W., Risse, T., and Simmons, B. A. (eds.) Handbook of International Relations. London: Sage, 52–72.Google Scholar
Fearon, J. D., and Laitin, D. D. (2008) “Integrating Qualitative and Quantitative Methods.” In Box-Steffensmeier, J. M., Brady, H. E., and Collier, D. (eds.) Oxford Handbook of Political Methodology. Oxford: Oxford University Press, 756–778.Google Scholar
Feaver, P. D., Hellmann, G., Schweller, R. L.et al. (2000) “Brother, Can You Spare a Paradigm? (or Was Anybody Ever a Realist?): Correspondence.” International Security 25(1): 165–193.CrossRefGoogle Scholar
Federico, C. M., Golec, A., and Dial, J. L. (2005) “The Relationship between the Need for Closure and Support for Military Action against Iraq: Moderating Effects of National Attachment.” Personality and Social Psychology Bulletin 31(5): 621–632.CrossRefGoogle ScholarPubMed
Feldman, G. (2011) The Migration Apparatus: Security, Labor, and Policymaking in the European Union. Stanford, CA: Stanford University Press.Google Scholar
Feldman, I. (2010) “Ad Hoc Humanity: UN Peacekeeping and the Limits of International Community in Gaza.” American Anthropologist 112(3): 416–429.CrossRefGoogle Scholar
Felson, M. (1995) “Those Who Discourage Crime.” Crime and Place 4: 53–66.Google Scholar
Felson, M., and Boba, R. L. (2010) Crime and Every Day Life. London: Sage.CrossRefGoogle Scholar
Ferris, J. R. (1989) Money, Men and Diplomacy. Ithaca, NY: Cornell University Press.Google Scholar
Fierke, K. (2007) Critical Approaches to International Security. London: Polity.Google Scholar
Fine, J. (2006) Worker Centers: Organizing Communities at the Edge of the Dream. Ithaca, NY: Cornell University Press.Google Scholar
Finnemore, M. (2003) The Purpose of Intervention: Changing Beliefs about the Use of Force. Ithaca, NY: Cornell University Press.Google Scholar
Fischer, C. S., and Mattson, G. (2009) “Is America Fragmenting?Annual Review of Sociology 35(1): 435–455.CrossRefGoogle Scholar
Fiske, S. T. (2004) Social Beings: A Core Motives Approach to Social Psychology. New York: Wiley.Google Scholar
Fiske, S. T., and Taylor, S. E. (2013) Social Cognition: From Brains to Culture, London: Sage.CrossRefGoogle Scholar
Flint, C. (2003) “Terrorism and Counterterrorism: Geographic Research Questions and Agendas.” The Professional Geographer 55(2): 161–169.Google Scholar
Floyd, R. (2010) Security and the Environment: Securitisation Theory and US Environmental Security Policy. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Floyd, Rita (2011) “Can Securitization Be Used in Normative Analysis? Towards Just Securitization Theory.” Security Dialogue 42(4–5): 427–439.CrossRefGoogle Scholar
Floyd, Rita (2015) “Just and Unjust Desecuritizations.” In Balzacq, Thierry (ed.) Contesting Security: Strategies and logics. London: Routledge, 122–138.Google Scholar
Fluri, J. (2011) “Armored Peacocks and Proxy Bodies: Gender Geopolitics in Aid/Development Spaces of Afghanistan.” Gender, Place and Culture 18(4): 519–536.CrossRefGoogle Scholar
Fordham, B. (1998) Building the Cold War Consensus: The Political Economy of U.S. National Security Policy. Ann Arbor, MI: University of Michigan Press.CrossRefGoogle Scholar
Fosher, K. B. (2009) Under Construction: Making Homeland Security at the Local Level. Chicago: University of Chicago Press.Google Scholar
Fouberg, E. H., Murphy, A. B., and De Blij, H. J. (2012) Human Geography: People, Place, and Culture. Hoboken, NJ: Wiley.Google Scholar
Foucault, M. (1978) “About the Concept of the “Dangerous Individual” in 19th Century Legal Psychiatry.” International Journal of Law and Psychiatry 1: 1–18.CrossRefGoogle ScholarPubMed
Foucault, Michel (1980) Power/Knowledge: Selected Interviews and Other Writings, 1972–1977. New York: Random House.Google Scholar
Foucault, Michel (2004) Security, Territory, Population. New York: Picador.Google Scholar
Freedman, L. (2012) “Does Strategic Studies Have a Future?” In Baylis, J., Wirtz, J. J., and Gray, C. S. (eds.) Strategy in the Contemporary World, Oxford: Oxford University Press, 378–391.Google Scholar
Freudenburg, W. R., Gramling, R., Laska, S. et al. (2012) Catastrophe in the Making: The Engineering of Katrina and the Disasters of Tomorrow. Washington, DC: Island Press.CrossRefGoogle Scholar
Friedberg, A. (1989) “The Political Economy of American Strategy.” World Politics 41(3): 381–406.CrossRefGoogle Scholar
Froehling, O. (1997) “The Cyberspace ‘War of Ink and Internet’ in Chiapas, Mexico.” Geographical Review 87(2): 291–307.CrossRefGoogle Scholar
Froestad, J., and Shearing, C. (2013) Security Governance, Policing, and Local Capacity: Advances in Police Theory and Practice Series. Boca Raton, FL: CRC Press.Google Scholar
Frois, C. (2013) Peripheral Vision: Politics, Technology, and Surveillance. New York: Berghahn Books.Google Scholar
Gaertner, S. L., and Dovidio, J. F. (2000) Reducing Intergroup Bias: The Common Ingroup Identity Model. New York: Psychology Press.Google Scholar
Gaertner, S. L., Dovidio, J. F., and Bachman, B. A. (1996) “Revisiting the Contact Hypothesis: The Induction of a Common Ingroup Identity.” International Journal of Intercultural Relations 20(3–4): 271–290.CrossRefGoogle Scholar
Gaertner, S. L., Mann, J., Murrell, A.et al. (1989) “Reducing Intergroup Bias: The Benefits of Recategorization.” Journal of Personality and Social Psychology, 57(2): 239–249.CrossRefGoogle Scholar
Gallie, W. B. (1955) “Essentially Contested Concepts.” Proceedings of the Aristotelian Society 56: 167–198.Google Scholar
Gambetti, Z., and Godoy-Anativia, M. (eds.) (2013) Rhetorics of Insecurity: Belonging and Violence in the Neoliberal Era. New York: NYU Press and the Social Science Research Council.CrossRefGoogle Scholar
Gartner, S. S. (2008) “The Multiple Effects of Casualties on Public Support for War: An Experimental Approach.” American Political Science Review 102(1): 95–106.CrossRefGoogle Scholar
Gartzke, E. (2007) “The Capitalist Peace.” American Journal of Political Science 51(1): 166–91.CrossRefGoogle Scholar
Gasper, D. (2005) “Securing Humanity: Situating ‘Human Security’ as Concept and Discourse.” Journal of Human Development 6(2): 221–245.CrossRefGoogle Scholar
Schwarzenberger, G. (1965) The Inductive Method in International Law. London: Stevens and Sons.Google Scholar
George, A. L., and Bennett, A. (2005) Case Studies and Theory Development in the Social Sciences. Cambridge, MA: MIT Press.Google Scholar
Gheciu, A. (2005) NATO in the “New Europe”: The Politics of International Socialization after the Cold War. Stanford, CA: Stanford University Press.Google Scholar
Gibbard, A., and Blackburn, S. (1992) “Morality and Thick Concepts.” Proceedings of the Aristotelian Society, Supplementary Vol. 66: 267–299.CrossRefGoogle Scholar
Gibbons, F. X., and McCoy, S. B. (1991) “Self-Esteem, Similarity, and Reactions to Active Versus Passive Downward Comparison.” Journal of Personality and Social Psychology 60(3): 414–424.CrossRefGoogle Scholar
Gibbs, C. M., Gore, E., McGarrell, E. F.et al. (2010) “Introducing Conservation Criminology.” British Journal of Criminology 50(1): 124–144.CrossRefGoogle Scholar
Giddens, A. (1990) The Consequences of Modernity. Cambridge: Polity.Google Scholar
Giddens, Anthony (1991) Modernity and Self-Identity. Cambridge: Polity.Google Scholar
Gilpin, R. (1975) US Power and the Multinational Corporation: The Political Economy of Foreign Direct Investment. New York: Basic Books.CrossRefGoogle Scholar
Gilpin, Robert (1981) War and Change in World Politics. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Gilpin, Robert (1984) “The Richness of the Tradition of Political Realism.” International Organization 38(2): 287–304.CrossRefGoogle Scholar
Gilpin, Robert (1987) The Political Economy of International Relations. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Glaser, C. L. (1994–1995) “Realists as Optimists: Cooperation as Self-Help.” International Security 19(3): 50–90.CrossRefGoogle Scholar
Glaser, Charles L. (1997) “The Security Dilemma Revisited.” World Politics 50(1): 171–201.CrossRefGoogle Scholar
Glaser, Charles L. (2003) “Structural Realism in a More Complex World.” Review of International Studies 29(3): 403–414.CrossRefGoogle Scholar
Glaser, Charles L. (2010) Rational Theory of International Politics: The Logic of Competition and Cooperation. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Glasford, D. E., and Dovidio, J. F. (2011) “E Pluribus Unum: Dual Identity and Minority Group Members’ Motivation to Engage in Contact, as Well as Social Change.” Journal of Experimental Social Psychology 47(5): 1021–1024.CrossRefGoogle Scholar
Glassner, B. (1999) The Culture of Fear. New York: Basic Books.Google Scholar
Glassner, Barry (2010) The Culture of Fear: Why Americans Are Afraid of the Wrong Things, New York: Basic Books.Google Scholar
Gleeson, S. (2009) “From Rights to Claims: The Role of Civil Society in Making Rights Real for Vulnerable Workers.” Law and Society Review 43(3): 699–700.CrossRefGoogle Scholar
Glick Schiller, N., and Caglar, A. (2010) Locating Migration: Rescaling Cities and Migrants. Ithaca, NY: Cornell University Press.Google Scholar
Go, J. (2012) Patterns of Empire: The British and American Empires, 1688 to the Present. Cambridge: Cambridge University Press.Google Scholar
Gold, J. R., and Revill, G. (2000) Landscapes of Defense. Don Mills, Canada: Pearson Education.Google Scholar
Goldsmith, J. L., and Posner, E. A. (2006) The Limits of International Law. Oxford: Oxford University Press.Google Scholar
Goldstein, D. M. (2003) “‘In Our Own Hands’: Lynching, Justice, and the Law in Bolivia.” American Ethnologist 30(l): 22–43.CrossRefGoogle Scholar
Goldstein, Daniel M. (2004) The Spectacular City: Violence and Performance in Urban Bolivia. Durham, NC: Duke University Press.CrossRefGoogle Scholar
Goldstein, Daniel M. (2007) “Human Rights as Culprit, Human Rights as Victim: Rights and Security in the State of Exception.” In Goodale, M., and Merry, S. E. (eds.) The Practice of Human Rights: Tracking Law between the Global and the Local. Cambridge: Cambridge University Press, 49–77.Google Scholar
Goldstein, Daniel M. (2010a) “Toward a Critical Anthropology of Security.” Current Anthropology 51(4): 487–517.CrossRefGoogle Scholar
Goldstein, Daniel M. (2010b) “Security and the Culture Expert: Dilemmas of an Engaged Anthropology.” Political and Legal Anthropology Review (PoLAR) 33(1): 126–142.Google Scholar
Goldstein, Daniel M. (2012a) Outlawed: Between Security and Rights in a Bolivian City. Durham, NC: Duke University Press.CrossRefGoogle Scholar
Goldstein, Daniel M. (2012b) “Securitized Immigration in a New Jersey Town.” Russell Sage Foundation: www.russellsage.org/blog/contributor/Daniel%20Goldstein (accessed November 4, 2013).Google Scholar
Goldstein, Daniel M. (2014) “Qualitative Research in Dangerous Places: Becoming an “Ethnographer” of Violence and Personal Safety” Social Science Research Council, Drugs, Security and Democracy Program, DSD Working Papers on Research Security: no. 1: www.ssrc.org/pages/qualitative-research-in-dangerous-places-becoming-an-ethnographer-of-violence-and-personal-safety/ (accessed September 30, 2014).
Gomberg-Muńoz, R., and Nussbaum-Barberena, L. (2011) “Is U.S. Immigration Policy Labor Policy? Immigration Enforcement, Undocumented Workers, and the State.” Human Organization 70(4): 366–337.CrossRefGoogle Scholar
González, R. J. (2007) “Towards Mercenary Anthroplogy? The New US Army Counterinsurgency Manual FM 3–24 and the Military-Anthropology Complex.” Anthropology Today 23: 14–19.CrossRefGoogle Scholar
Goodin, R. E., and Jackson, F. (2007) “Freedom from Fear.” Philosophy and Public Affairs 35: 249–265.CrossRefGoogle Scholar
Goodwin, J. (2006a) “A Theory of Categorical Terrorism.” Social Forces 84: 2027–2047.CrossRefGoogle Scholar
Goodwin, Jeff (2006b) “What Do We Really Know about (Suicide) Terrorism?Sociological Forum 21: 315–330.CrossRefGoogle Scholar
Gorard, S., and Taylor, C. (2004) “What Is ‘Triangulation’?Building Research Capacity 7: 7–9.Google Scholar
Gordon, C., and Arian, A. (2001) “Threat and Decision Making.” Journal of Conflict Resolution 45(2): 196–215.CrossRefGoogle Scholar
Gordon, J. (2007) Suburban Sweatshops: The Fight for Immigrant Rights. Cambridge, MA: Belknap Press.Google Scholar
Graham, S. (2008) Cities, War, and Terrorism: Towards an Urban Geopolitics. Oxford: John Wiley & Sons.Google Scholar
Graham, S. (2011) Cities under Siege: The New Military Urbanism. New York: Verso Books.Google Scholar
Graham, S., and Gregory, D. (2009) “Security.” In Johnston, R., Gregory, D., Pratt, G.et al. (eds.) Dictionary of Human Geography. Chischester: Wiley.Google Scholar
Gray, J. N. (1977) “On the Contestability of Social and Political Concepts.” Political Theory 5: 331–348.Google Scholar
Grayson, K. (2008) “Human Security as Power/Knowledge: The Biopolitics of a Definitional Debate.” Cambridge Review of International Affairs 21(3): 384–401.CrossRefGoogle Scholar
Greenwald, A. G., Pratkanis, A. R., Leippe, M. R.et al. (1986) “Under What Conditions Does a Theory Obstruct Research Progress?Psychological Review 95(4): 216–229.Google Scholar
Gregory, D. J., and Pred, A. R. (2007) Violent Geographies: Fear, Terror, and Political Violence. New York: CRC Press.Google Scholar
Gregory, D. (2003) “Defiled Cities.” Singapore Journal of Tropical Geography 24(3): 307–326.CrossRefGoogle Scholar
Gregory, Derek (2004) The Colonial Present: Afghanistan, Palestine, Iraq, London: Wiley-Blackwell.Google Scholar
Gregory, Derek (2006) “The Black Flag: Guantanamo Bay and the Space of Exception.” Geografiska Annaler: Sesies B, Human Geography 88(4): 405–427.Google Scholar
Gregory, Derek (2011) “The Everywhere War.” The Geographical Journal 177(3): 238–250.CrossRefGoogle Scholar
Gregory, D., and Graham, S. (2009) “Militarism.” In Johnston, R., Gregory, D., Pratt, G.et al. (eds.) Dictionary of Human Geography. Chischester: Wiley, 464–465.Google Scholar
Griffin, J. (1986) Well-Being: Its Meaning, Measurement and Moral Importance. Oxford: Clarendon Press.Google Scholar
Griffin, J. (2008) On Human Rights. Oxford: Oxford University Press.CrossRefGoogle Scholar
Grimshaw, R., and Jefferson, T. (1987) Interpreting Policework: Policy and Practice in Forms of Beat Policing. London: Allen and Unwin.Google Scholar
Gros, F. (2012) Le principe sécurité. Paris: Gallimard.Google Scholar
Gross, J. J. (2002) “Emotion Regulation: Affective, Cognitive, and Social Consequences.” Psychophysiology 39(3): 281–291.CrossRefGoogle ScholarPubMed
Guillemin, J/ (2005) Biological Weapons: From the Invention of State-Sponsored Programs to Contemporary Bioterrorism. New York: Columbia University Press.Google Scholar
Gusfield, J. R. (1996) Contested Meanings: The Construction of Alcohol Problems. Madison: University of Wisconsin Press.Google Scholar
Gusterson, H. (2005) “Spies in Our Midst.” Anthropology News 46(6): 39–40.CrossRefGoogle Scholar
Gusterson, H., and Besteman, C. (eds.) (2009) The Insecure American: How We Got Here and What We Should Do about It. Berkeley: University of California Press.Google Scholar
Guzman, A. (2012) The Consent Problem in International Law. Berkeley Law School, University of California: www.escholarship.org/uc/blewp (accessed March 5, 2012).Google Scholar
Guzzini, S. (2000) “A Reconstruction of Constructivism in International Relations.” European Journal of International Relations 6(2): 147–182.CrossRefGoogle Scholar
Habermas, J. (1968) Erkenntnis und Interesse. Frankfurt a.M: Surkamp.Google Scholar
Hadjimatheou, K. (2014) “The Relative Moral Risks of Untargeted and Targeted Surveillance.” Ethic Theory Moral Practices 17: 187–201.Google Scholar
Haggman, B. (1998) “Rudolf Kjellen and Modern Swedish Geopolitics.” Geopolitics 3(2): 99–112.CrossRefGoogle Scholar
Haglund, D. G. (1986) “The New Geopolitics of Minerals: An Inquiry into the Changing International Significance of Strategic Minerals.” Political Geography Quarterly 5(3): 221–240.CrossRefGoogle Scholar
Hagmann, J., and Dunn Cavelty, M. (2012) “National Risk Registers: Security Scientism and the Propagation of Permanent Insecurity.” Security Dialogue 43(1): 80–97.CrossRefGoogle Scholar
Hajjar, L. (2013) Torture. New York: Routledge.Google Scholar
Hale, C. R. (2008) “Introduction.” In Hale, C. R. (ed.) Engaging Contradictions: Theory, Politics and Methods of Activist Scholarship. Berkeley: University of California Press, 1–30.Google Scholar
Halperin, E., and Gross, J. J. (2011) “Emotion Regulation in Violent Conflict: Reappraisal, Hope, and Support for Humanitarian Aid to the Opponent in Wartime.” Cognition and Emotion 25(7): 1228–1236.CrossRefGoogle ScholarPubMed
Hamilton, D. L., and Sherman, S. J. (1996) “Perceiving Persons and Groups.” Psychological Review 103(2): 336.CrossRefGoogle ScholarPubMed
Hamilton, J. A., and Placas, A. J. (2011) “Anthropology Becoming …? The 2010 Sociocultural Anthropology Year in Review.” American Anthropologist 113(2): 246–261.CrossRefGoogle Scholar
Hammond, M. (1963) “Res olim dissociabiles: Principatus ac Libertas: Liberty under the Early Roman Empire.” Harvard Studies in Classical Philology 67: 93–113.CrossRefGoogle Scholar
Hansen, L. (2006) Security As Practice: Discourse Analysis and the Bosnian War. London: Routledge.Google Scholar
Hansen, L. (2012) “Reconstructing Desecuritisation: The Normative-Political in the Copenhagen School and Directions for How to Apply It.” Review of International Studies 38(6): 525–546.CrossRefGoogle Scholar
Harcourt, B. (2001) Illusion of Order: The False Promise of Broken Windows Policing. Cambridge, MA: Harvard University Press.Google Scholar
Harcourt, Bernard (2012) Symposium of the Future of Risk. Chicago Centre for Contemporary Theory, May 11, 2012: www.youtube.com/watch?v=PBDPubwsDXo (accessed July 9, 2014).Google Scholar
Hardy, M., and Hazelrigg, L. (2010) Pension Puzzles: Social Security and the Great Debate. New York: Russell Sage Foundation.Google Scholar
Hart, H. (1961) The Concept of Law. Oxford: Oxford University Press.Google Scholar
Harvey, D. (2006) “Space as a Keyword.” In Castree, N., and Gregory, D. (eds.) David Harvey: A Critical Reader. Oxford: Blackwell, 270–293.Google Scholar
Hawi, D. R., Saguy, T., Dovidio, J.et al. (2012) When Positive Expectations Are Not Met. Symposium presentation at the annual meeting of the Society for Experimental Social Psychology (SESP), Austin, Texas.Google Scholar
Hayes, J. (2009) “Identity and Securitization in the Democratic Peace: The United States and the Divergence of Response to India and Iran's Nuclear Programs.” International Studies Quarterly 53(4): 977–999.CrossRefGoogle Scholar
Hedstrom, P., and Swedberg, R. (eds.) (1998) Social Mechanisms: An Analytical Approach to Social Theory. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Hegel, G. F. (1952) Philosophy of Right. Oxford: Oxford University Press Translation.CrossRefGoogle Scholar
Hegel, G. F. (1967) The Philosophy of Right. Oxford: Oxford University Press.Google Scholar
Hegel, G. F. (1975) Lectures on the Philosophy of World History: Introduction (translated by Nisbet, H. B.). Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Heidegger, M. (1977) The Question Concerning Technology (translated by Lovitt, W.). New York: Harper & Row.Google Scholar
Heimer, C. (1989) Reactive Risk and Rational Action: Managing Moral Hazard in Insurance Contracts. San Francisco: University of California Press.Google Scholar
Henrich, J., Heine, S. J., and Norenzayan, A. (2010) “The Weirdest People in the World?Behavioral and Brain Sciences 33(2–3): 61–83.CrossRefGoogle Scholar
Herbert, D. T. (1982) The Geography of Urban Crime. London: Longman.Google Scholar
Herbert, S. (1996) “Morality in Law Enforcement: Chasing ‘Bad Guys’ with the Los Angeles Police Department.” Law and Society Review 30(4): 799–818.CrossRefGoogle Scholar
Herington, J. (2012) “The Concept of Security.” In Enemark, C., and Selgelid, M. J. (eds.) Ethics and Security Aspects of Infectious Disease Control: Interdisciplinary Perspectives. Aldershot: Ashgate, 7–26.Google Scholar
Herz, J. (1951) Political Realism and Political Idealism: A Study in Theories and Realities. Chicago: University of Chicago Press.Google Scholar
Heske, H. (1987) “Karl Haushofer: His Role in German Geopolitics and in Nazi politics.” Political Geography Quarterly 6(2): 135–144.CrossRefGoogle Scholar
Hewstone, M., Cairns, E., Voci, A.et al. (2006) “Intergroup Contact, Forgiveness, and Experience of ‘The Troubles’ in Northern Ireland.” Journal of Social Issues 62(1): 99–120.CrossRefGoogle Scholar
Hewstone, M., Rubin, M., and Willis, H. (2002) “Intergroup Bias.” Annual Review of Psychology 53(1): 575–604.CrossRefGoogle ScholarPubMed
Hicks, A. (2000) Social Democracy and Welfare Capitalism: A Century of Income Security Politics. Ithaca, NY: Cornell University Press.Google Scholar
Higgins, R. (1994) Problems and Process: International Law and How We Use It. Oxford: Oxford University Press.Google Scholar
Hillier, A. E. (2005) “Residential Security Maps and Neighborhood Appraisals: The Home Owners’ Loan Corporation and the Case of Philadelphia.” Social Science History 29(2): 207–233.Google Scholar
Hillyard, P., Pantazis, C., Tombs, S.et al. (2004) Beyond Criminology: Taking Harm Seriously. London: Pluto Press.Google Scholar
Hobbes, T. (1651/1968) Leviathan. London: Penguin.Google Scholar
Hobbes, Thomas (1994) “De Corpore Politico.” In Gaskin, J. C. (ed.) Human Nature and De Corpore Politico. Oxford: Oxford University Press, 183–228.Google Scholar
Hobden, S., and Wyn Jones, R. (2011) “Marxist Theories of International Relations.” In Baylis, J., Smith, S., and Owens, P. (eds.) The Globalization of World Politics. Oxford: Oxford University Press, 130–147.Google Scholar
Hobson, J. A. (1988 [1938, 1902]) Imperialism: A Study, London: Unwin Hyman.Google Scholar
Hogg, M. A. (2003) “Social Identity.” In Leary, M. R., and Tangney, J. (eds.) Handbook of Self and Identity. New York: Guilford Press, 462–479.Google Scholar
Hogg, M. A. (2007) “Uncertainty-Identity Theory.” In Zanna, M. P. (ed.) Advances in Experimental Social Psychology, Vol. 39. San Diego: Elsevier Academic Press, 39–62.Google Scholar
Hogg, M. A. (2010) “Human Groups, Social Categories, and Collective Self: Social Identity and the Management of Self-Uncertainty.” In Arkin, R. M., Oleson, K. C., and Carroll, P. J. (eds.) Handbook of the Uncertain Self. New York: Psychology Press, 401–420.Google Scholar
Hogg, M. A., and Abrams, D. (1988) Social Identifications: A Social Psychology of Intergroup Relations and Group Processes. London: Routledge.Google Scholar
Hogg, M. A., and Adelman, J. (2013) “Uncertainty–Identity Theory: Extreme Groups, Radical Behavior, and Authoritarian Leadership.” Journal of Social Issues 69(3): 436–454.CrossRefGoogle Scholar
Holbaard, M., and Pedersen, M. A. (eds.) (2013) Times of Security: Ethnographies of Fear, Protest and the Future. London: Routledge.Google Scholar
Hollenberg, S. (2013) Challenges and Opportunities for Judicial Protection of Human Rights against Decisions of the United Nations Security Council. Dissertation, Faculty of Law, University of Amsterdam.Google Scholar
Hollis, M., and Smith, S. (1990) Explaining and Understanding International Relations. Oxford: Oxford University Press.Google Scholar
Holmes, J. (2008) “Space and the Secure Base in Agoraphobia: A Qualitative Survey.” Area 40(3): 375–382.CrossRefGoogle Scholar
Homer-Dixon, T. F. (1999) Environment, Scarcity and Violence. Princeton, NJ: Princeton University Press.Google Scholar
Homer-Dixon, T. F., and Blitt, J. (eds.) (1998) Ecoviolence: Links among Environment, Population and Security. Lanham, MD: Rowan & Littlefield.Google Scholar
Homolar, A. (2010) “The Political Economy of National Security.” Review of International Political Economy 17(2): 410–423.CrossRefGoogle Scholar
Honig, B. (2001) Democracy and the Foreigner. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Hönke, J., and Müller, M. (2012) “Governing (In)Security in a Postcolonial World: Transnational Entanglements and the Worldliness of ‘Local’ Practice.” Security Dialogue 43(5): 383–401.CrossRefGoogle Scholar
Hoogensen, G., and Stuvøy, K. (2006) “Gender, Resistance and Human Security.” Security Dialogue 37(2): 207–228.CrossRefGoogle Scholar
Hooks, G., and Mosher, C. (2005) “Outrages against Personal Dignity: Rationalizing Abuse and Torture in the War on Terror.” Social Forces 83: 1627–1646.CrossRefGoogle Scholar
Hornsey, M. J., and Hogg, M. A. (2000) “Assimilation and Diversity: An Integrative Model of Subgroup Relations.” Personality and Social Psychology Review 4(2): 143–156.CrossRefGoogle Scholar
Huddy, L., Feldman, S., and Weber, C. (2007) “The Political Consequences of Perceived Threat and Felt Insecurity.” Annals of the American Academy of Political and Social Science 614(1): 131–153.CrossRefGoogle Scholar
Huddy, L., Feldman, S., Taber, C.et al. (2005) “Threat, Anxiety, and Support of Antiterrorism Policies.” American Journal of Political Science 49(3): 593–608.CrossRefGoogle Scholar
Huddy, L., Khatib, N., and Capelos, T. (2002) “Trends: Reactions to the Terrorist Attacks of September 11, 2001.” The Public Opinion Quarterly 66(3): 418–450.Google Scholar
Hughes, J., Rohloff, A., David, M.et al.)2011) “Foreword: Moral Panics in the Contemporary World.” Crime, Media, Culture: An International Journal 7(3): 211–214.CrossRefGoogle Scholar
Huish, R. (2008) “Human Security and Food Security in Geographical Study: Pragmatic Concepts or Elusive Theory?Geography Compass 2(5): 1386–1403.CrossRefGoogle Scholar
Hurd, I. (2007) After Anarchy: Legitimacy and Power in the United Nations Security Council. Princeton, NJ: Princeton University Press.Google Scholar
Huysmans, J. (2006) The Politics of Insecurity: Fear, Migration and Asylum in the EU. London: Routledge.Google Scholar
Huysmans, Jef (2014) Security Unbound: Enacting Democratic Limits. London: Routledge.Google Scholar
Hwang, J., and Sampson, R. J. (2014) “Divergent Pathways of Gentrification Racial Inequality and the Social Order of Renewal in Chicago Neighborhoods.” American Sociological Review 79(4): 726–751.CrossRefGoogle Scholar
Hyndman, J. (2000) Managing Displacement: Refugees and the Politics of Humanitarianism. Minneapolis: University of Minnesota Press.Google Scholar
Hyndman, J. (2004) “Mind the Gap: Bridging Feminist and Political Geography through Geopolitics.” Political Geography 23(3): 307–322.CrossRefGoogle Scholar
Hyndman, J. (2007) “The Securitization of Fear in Post-Tsunami Sri Lanka.” Annals of the Association of American Geographers 97(2): 361–372.CrossRefGoogle Scholar
Hyndman, J., and De Alwis, M. (2004) “Bodies, Shrines, and Roads: Violence, (Im)Mobility and Displacement in Sri Lanka.” Gender, Place and Culture 11(4): 535–557.CrossRefGoogle Scholar
Ingram, A. (2008) “Pandemic Anxiety and Global Health Security.” In Pain, R. and Smith, S. J. (eds.) Fear: Critical Geopolitics and Everyday Life. London: Ashgate, 75–85.Google Scholar
Ingram, A., and Dodds, K. (2012) Spaces of Security and Insecurity: Geographies of the War on Terror. Farnham: Ashgate.Google Scholar
Ingram, A., and Dodds, K. (eds.) (2009) Spaces of Security and Insecurity: Geographies of the War on Terror. Farnham: Ashgate.Google Scholar
Iyer, A., Leach, C., and Crosby, F. J. (2003) “White Guilt and Racial Compensation: The Benefits and Limits of Self-Focus.” Personality and Social Psychology Bulletin 29(1): 117–129.CrossRefGoogle ScholarPubMed
Jackson, P. T. (2011) The Conduct of Enquiry in International Relations. London: Routledge.Google Scholar
Jackson, R. H., and Sørensen, G. (2007) Introduction to International Relations: Theories and Approaches. Oxford: Oxford University Press.Google Scholar
Jacobs, J. (1970) The Economy of Cities. New York: Random House.Google Scholar
Jaffe, R. (2012) “Criminal Dons and Extralegal Security Privatization in Downtown Kingston, Jamaica.” Singapore Journal of Tropical Geography 33: 184–197.CrossRefGoogle Scholar
Jervis, R. (1976) Perception and Misperception in International Politics. Princeton, NJ: Princeton University Press.Google Scholar
Jervis, R. (1978) “Cooperation Under the Security Dilemma.“ World Politics 167–214.CrossRef
John, S. (2011) “Security, Knowledge and Well-Being.” Journal of Moral Philosophy 8(1): 68–91.CrossRefGoogle Scholar
Johns, F. (2013) Non-Legality in International Law: Unruly Law. Cambridge: Cambridge University Press.Google Scholar
Johnson, B. R., Onwuegbuzie, A. J., and Turner, L. A. (2007) “Toward a Definition of Mixed Methods Research.” Journal of Mixed Methods Research 1(2): 112–133.CrossRefGoogle Scholar
Johnson, E., Morehouse, H., and Dalby, S.et al. (2014) “After the Anthropocene Politics and!Geographic Inquiry for a New Epoch.” Progress in Human Geography 38(3): 439–456.CrossRefGoogle Scholar
Johnston, L., and Shearing, C. (2003) Governing Security: Explorations of Policing and Justice. London: Routledge.Google Scholar
Johnston, R. (2010) “Sixty Years of Change in Human Geography.” In Backhouse, R., and Fontaine, P. (eds.) The History of Social Sciences since 1945. Cambridge: Cambridge University Press: 155–182.Google Scholar
Jonas, E., and Fritsche, I. (2013) “Destined to Die but Not to Wage War: How Existential Threat Can Contribute to Escalation or De-Escalation of Violent Intergroup Conflict.” American Psychologist 68: 543–558.CrossRefGoogle ScholarPubMed
Kagan, S. (2009) “Well-Being as Enjoying the Good.” Philosophical Perspectives 23: 253–272.CrossRefGoogle Scholar
Kahl, C. H. (2005) “Plight or Plounder? Natural Resources and Civil War.” In Dombrowski, P. (ed.) Guns and Butter – the Political Economy of International Security. Boulder, CO: Lynne Rienner.Google Scholar
Kahler, M. (1998) “Rationality in International Relation.”!International Organisation 52(4): 919–941.CrossRefGoogle Scholar
Kammerhofer, J. (2009) “Gaps, the Nuclear Weapons Advisory Opinion and the Structure of International Legal Argument between Theory and Practice.” British Yearbook of International Law (2009) 80(1): 333–360.Google Scholar
Kaplan, R. (2012) The Revenge of Geography: What the Map Tells Us about Coming Conflicts and the Battle against Fate. New York: Random House.Google Scholar
Kapstein, E. (1989–1990) “Losing Control: National Security and the Global Economy.” The National Interest 18: 85–90.Google Scholar
Katz, C. (2008) “Me and My Monkey: What's Hiding in the Security State.” In Pain, R., and Smith, S. (eds.) Fear: Critical Geopolitics and Everyday Life. Farnham: Ashgate, 59–72.Google Scholar
Katzenstein, P. J. (ed.) (1996) The Culture of National Security: Norms and Identity in World Politics. New York: Columbia University Press.Google Scholar
Kelsen, H. (1960) Reine Rechtslehre. Wien: Deuticke Verlag.Google Scholar
Kelty, C. (2005) “Geeks, Social Imaginaries, and Recursive Publics.” Cultural Anthropology 20(2): 185–214.CrossRefGoogle Scholar
Kemp, A., Raijman, R., Resnik, J.et al. (2010) “Contesting the Limits of Political Participation: Latinos and Black African Migrant Workers in Israel.” Ethnic and Racial Studies 23(1): 94–119.Google Scholar
Kennedy, D. (1987) International Legal Structures. Baden Baden: Nomos.Google Scholar
Kennedy, P. (1984) “The First World War and the International Power System.” International Security 9(1): 7–40.CrossRefGoogle Scholar
Kent, A. (2006) “Reconfiguring Security: Buddhism and Moral Legitimacy in Cambodia.” Security Dialogue 37(3): 343–361.CrossRefGoogle Scholar
Keohane, R. O. and Nye, J. S. (1977) Power and Interdependence: World Politics in Transition. Boston: Little, Brown.Google Scholar
Kessler, O. (2011) “Beyond Sectors, before the World: Finance, Security and Risk.” Security Dialogue 42(2): 197–215.CrossRefGoogle Scholar
Kestnbaum, M. (2009) “The Sociology of War and the Military.” Annual Review of Sociology 35: 235–254.CrossRefGoogle Scholar
Khimm, S. (2012) Obama is Deporting Immigrants Faster than Bush: Republicans Don't Think That's Fast Enough. Washington Post blog, August 27: www.washingtonpost.com/blogs/wonkblog/wp/2012/08/27/obama-is-deporting-more-immigrants-than-bush-republicans-dont-think-thats-enough/ (accessed October 27, 2012).
Kindleberger, C. P. (2013) The World in Depression 1929–1939, Oakland: University of California Press.Google Scholar
King, G., Keohane, R., and Verba, S. (1994) Designing Social Inquiry: Scientific Inference in Qualitative Research. Princeton, NJ: Princeton University Press.Google Scholar
King, G., and Murray, C. J. L. (2001) “Rethinking Human Security.” Political Science Quarterly 116: 585–610.CrossRefGoogle Scholar
Kinnvall, C. (2004) “Globalization and Religious Nationalism: Self, Identity, and the Search for Ontological Security.” Political Psychology 25(5): 741–767.CrossRefGoogle Scholar
Kirshner, J. (1998) “Political Economy in Security Studies after the Cold War.” Review of International Political Economy 5(1): 64–91.CrossRefGoogle Scholar
Kirshner, J. (2007) Appeasing Bankers: Financial Caution on the Road to War. Princeton, NJ: Princeton University Press.Google Scholar
Klabbers, J. (2009) “The Bridge Crack'd: A Critical Look at Interdisciplinary Relation.” International Relations 23(1): 119–125.CrossRefGoogle Scholar
Klinenberg, E. (2002) Heat Wave: A Social Autopsy of Disaster in Chicago. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Klinkenberg, B. (2007) “Geospatial Technologies and the Geographies of Hope and Fear.” Annals of the Association of American Geographers 97(2): 350–360.CrossRefGoogle Scholar
Knorr, K. (1957) “The Concept of Economic Potential for War.” World Politics 10(1): 49–62.CrossRefGoogle Scholar
Knorr, K. (1973) Power and Wealth: The Political Economy of National Power. London: Macmillan.CrossRefGoogle Scholar
Knorr, K. (1975) The Power of Nations. New York: Basic Books.Google Scholar
Knorr, K. (1978) Economic Issues and National Security. Lawrence: University Press of Kansas.Google Scholar
Konrad, V., and Nicol, H. N. (2011) “Border Culture, the Boundary between Canada and the United States of America, and the Advancement of Borderlands Theory.” Geopolitics 16(1): 70–90.CrossRefGoogle Scholar
Koopman, S. (2011) “Alter-Geopolitics: Other Securities Are Happening.” Geoforum 42(3): 274–284.CrossRefGoogle Scholar
Kopinak, J. K. (1999) “The Use of Triangulation in the Study of Refugee Well-Being.” Quality Quantity 33(2): 169–183.CrossRefGoogle Scholar
Koskenniemi, M. (2004) The Gentle Civilizer of Nations: The Rise and Fall of International Law 1870–1960. Cambridge: Cambridge University Press.Google Scholar
Koskenniemi, M., (2005) From Apology to Utopia, the Structure of International Legal Argument. Cambridge: Cambridge University Press (originally published in 1989 with Finnish Lawyers’ Publishing Company; reissued with a new epilogue in 2005).Google Scholar
Koskenniemi, M. (2010) Methodology of International Law, Max Planck Encyclopedia of Public International Law, Heidelberg and Oxford: www.mpepil.com/subscriber_article?script=yesand id=/epil/entries/law-9780199231690-e1440and recno=34and letter=M (accessed July 25, 2010).
Kosterman, R., and Feshbach, S. (1989) “Toward a Measure of Patriotic and Nationalistic Attitudes.” Political Psychology,!10(2): 257–274.CrossRefGoogle Scholar
Kramer, R. M., and Messick, D. M. (1998) Getting By with a Little Help from Our Enemies: Collective Paranoia and Its Role in Intergroup Relations. In Sedikides, C., Schopler, J., and Insko, C. A. (eds.) Intergroup Cognition and Intergroup Behavior. New York: Psychology Press, 233–255.Google Scholar
Kramer, R. M., and Wei, J. (1999) Social Uncertainty and the Problem of Trust in Social Groups: The Social Self in Doubt. In Tyler, T. R, Kramer, R. M., and John, O. P. (eds.) The Psychology of the Social Self. Mahwah, NJ: Lawrence Erlbaum Associates, 145–168.Google Scholar
Krasner, S. D. (1976) “State Power and the Structure of International Trade.” World Politics 28(3): 317–347.CrossRefGoogle Scholar
Kratochwil, F. (1989) Rules, Norms and Decisions. London: Cambridge University Press.CrossRefGoogle Scholar
Krause, K., and Williams, M. C. (1997) Critical Security Studies: Concepts and Cases. Minneapolis: University of Minnesota Press.Google Scholar
Krause, K. (1998) “Critical Theory and Security Studies: The Research Programme of ‘Critical Security Studies.’Cooperation and Conflict 33(3): 298–333.CrossRefGoogle Scholar
Kretsedemas, P. (2008) “Immigration Enforcement and the Complication of National Sovereignty: Understanding Local Enforcement as an Exercise in Neoliberal Governance.” American Quarterly 60: 553–573.Google Scholar
Kupchik, A. (2010) Homeroom Security: School Discipline in an Age of Fear. New York: New York University Press.CrossRefGoogle Scholar
Kurzman, C. (2011) The Missing Martyrs: Why There Are So Few Muslim Terrorists. Oxford: Oxford University Press.CrossRefGoogle Scholar
Kuus, M. (2002) “European Integration in Identity Narratives in Estonia: A Quest for Security.” Journal of Peace Research 39(1): 91–108.CrossRefGoogle Scholar
Kuus, M. (2002) “Sovereignty for Security? The Discourse of Sovereignty in Estonia.” Political Geography 21(3): 393–412.CrossRefGoogle Scholar
Kydd, A. H. (2005) Trust and Mistrust in International Relations. Princeton, NJ: Princeton University Press.Google Scholar
Lacoste, Y. (1976) La géographie, ça sert, d'abord, à faire la guerre. Paris: Éditions François Maspéro.Google Scholar
Lafree, G., and Dugan, L. (2004) “How Does Studying Terrorism Compare to Studying Crime?” In Deflem, M. (ed.) Terrorism and Counter-Terrorism: Criminological Perspectives. Amsterdam: Elsevier, 53–74.Google Scholar
Laitin, D. D. (2002) Comparative Politics: The State of the Subdiscipline. In Katznelson, I., and Miller, H. V. (eds.) Political Science: The State of the Discipline. New York: Norton.Google Scholar
Lakoff, A., and Collier, S. J. (eds.) (2008) Biosecurity Interventions: Global Health and Security in Question. New York: Columbia University Press.CrossRefGoogle Scholar
Lakoff, A. (2007) “Preparing for the Next Emergency.” Public Culture 19: 247–271.CrossRefGoogle Scholar
Lakoff, Andrew (2008) “The Generic Biothreat; or, How We Became Unprepared.” Cultural Anthropology 23: 399–428.CrossRefGoogle Scholar
Lamphere, L. (2003) “The Perils and Prospects of an Engaged Anthropology.” Social Anthropology 11(2): 153–168.CrossRefGoogle Scholar
Lancaster, R. N. (2011) Sex Panic and the Punitive State. Berkeley: University of California Press.CrossRefGoogle Scholar
Lane, J., Rader, N. E., Henson, B.et al. (2014) Fear of Crime in the United States: Causes, Consequences, and Contradictions. Durham, NC: Carolina Academic Press.Google Scholar
Larchanché, S. (2012) “Intangible Obstacles: Health Implications of Stigmatization, Structural Violence, and Fear among Undocumented Immigrants in France.” Social Science and Medicine 74: 858–863.CrossRefGoogle ScholarPubMed
Lasswell, H. D. (1950) National Security and Individual Freedom. New York: McGraw-Hill.Google Scholar
Latour, B. (2013) War and Peace in an Age of Ecological Conflicts. Lecture prepared for the Peter Wall Institute, Vancouver, September 23.Google Scholar
Lawrence, G., Lyons, K., and Wallington, T. (eds.) (2013) Food Security, Nutrition and Sustainability. London: Earthscan.Google Scholar
Laycock, G. (2003) Launching Crime Science. London: Jill Dando Institute of Crime Science, University College London.Google Scholar
Lazreg, M. (2008) Torture and the Twilight of Empire: From Algiers to Baghdad. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Le Billon, P. (2012) Wars of Plunder: Conflicts, Profits and the Politics of Resources. New York: Columbia University Press.Google Scholar
Leach, C., Iyer, A., and Pedersen, A. (2006) “Anger and Guilt about Ingroup Advantage Explain the Willingness for Political Action.” Personality and Social Psychology Bulletin 32(9): 1232–1245.CrossRefGoogle ScholarPubMed
Legg, S. (2005) “Foucault's Population Geographies: Classifications, Biopolitics and Governmental Spaces.” Population, Space and Place 11(3): 137–156.CrossRefGoogle Scholar
Legro, J. W. and Moravcsik, A. (1999) “Is Anybody Still a Realist?International Security 24(2): 5–55.CrossRefGoogle Scholar
Leibniz, G. W. (1864) Letter of 1705, Die Werke von Leibniz. Klindworth: Hannover.Google Scholar
Leidner, B., and Castano, E. (2012) “Morality Shifting in the Context of Intergroup Violence.” European Journal of Social Psychology 42(1): 82–91.CrossRefGoogle Scholar
Leidner, B., Castano, E., Zaiser, E.et al. (2010) “Ingroup Glorification, Moral Disengagement, and Justice in the Context of Collective Violence.” Personality and Social Psychology Bulletin 36(8): 1115–1129.CrossRefGoogle ScholarPubMed
Leidner, B., Tropp, L. R., and Lickel, B. (2013) “Bringing Science to Bear—on Peace, Not War: Elaborating on Psychology's Potential to Promote Peace.” American Psychologist 68(7): 514–526.CrossRefGoogle Scholar
Leman-Langlois, S., and Shearing, C. (2004) “Repairing the Future: The South African Truth and Reconciliation Commission at Work.” In Gilligan, G., and Pratt, J. (eds.) Crime, Truth and Justice: Official Enquiry, Discourse, Knowledge. Cullompton: Willan, 222–242.Google Scholar
Lemert, E. F. (2010) “Secondary Deviance.” In Williams, F.P. III, and McShane, M.D. (eds.) Criminology Theory: Selected Classic Readings. Oxford: Elsevier199–204.Google Scholar
Léonard, S. (2010) “EU Border Security and Migration in the European Union: FRONTEX and Securitization through Practices.” European Security 19(2): 231–254.CrossRefGoogle Scholar
Lerner, J. S., Gonzalez, R. M., Small, D. A.et al. (2003) “Effects of Fear and Anger on Perceived Risks of Terrorism: A National Field Experiment.” Psychological Science 14(2): 144–150.CrossRefGoogle ScholarPubMed
Lessig, L. (1996) “The Zones of Cyberspace.” Stanford Law Review 48(5): 1403–1411.CrossRefGoogle Scholar
Leverentz, A. (2012) “Narratives of Crime and Criminals: How Places Socially Construct the Crime Problem.” Sociological Forum 27(2): 348–371.CrossRefGoogle Scholar
Levin, S., van Laar, C., and Sidanius, J. (2003) “The Effects of Ingroup and Outgroup Friendship on Ethnic Attitudes in College: A Longitudinal Study.” Group Processes and Intergroup Relations 6(1): 76–92.CrossRefGoogle Scholar
LeVine, R. A., and Campbell, D. T. (1972) Ethnocentrism: Theories of Conflict, Ethnic Attitudes, and Group Behavior. Oxford: John Wiley & Sons.Google Scholar
Levy, J. S. (1997) “Prospect Theory, Rational Choice, and International Relations.” International Studies Quarterly 41(1): 87–112.CrossRefGoogle Scholar
Levy, J. S., and Thompson, W. R. (2010) “Balancing on Land and at Sea: Do States Ally against the Leading Global Power?International Security 35(1): 7–43.CrossRefGoogle Scholar
Lickel, B. (2012) “Retribution and Revenge.” In Tropp, L. R. (ed.) The Oxford Handbook of Intergroup Conflict. New York: Oxford University Press, 89–105.Google Scholar
Lickel, B., Miller, N., Stenstrom, D. M.et al. (2006) “Vicarious Retribution: The Role of Collective Blame in Intergroup Aggression.” Personality and Social Psychology Review 10(4): 372–390.CrossRefGoogle ScholarPubMed
Liddell, H. G., and Scott, R. (1940) A Greek-English Lexicon, Oxford: Clarendon Press.Google Scholar
Liebes, T. (1992) “Decoding Television News: The Political Discourse of Israeli Hawks and Doves.” Theory and Society 21: 357–381.CrossRefGoogle Scholar
Light, J. (2003) From Warfare to Welfare: Defense Intellectuals and Urban Problems in Cold War America. Johns Hopkins University Press.Google Scholar
Lim, C. L., and Elias, O. A. (1998) The Paradox of Consensualism in International Law. Den Haag: Kluwer.Google Scholar
Linklater, A., and Suganami, H. (2006) The English School of International Relations: a Contemporary Reassessment. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
List, C. (2006) “Republican Freedom and the Rule of Law.” Politics Philosophy Economics 5: 201–220.CrossRefGoogle Scholar
Loader, I. (2009) “Ice Cream and Incarceration: On Appetites for Security and Punishment.” Punishment and Society 11(2): 241–257.CrossRefGoogle Scholar
Loader, I., and Walker, N. (2007) Civilizing Security. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Lobell, S. E., Ripsman, N. M., and Taliaferro, J. W. (eds.) (2009) Neoclassical Realism, the State, and Foreign Policy. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Lobo-Guerrero, L. (2008) “‘Pirates,’ Stewards, and the Securitisation of Global Circulation.” International Political Sociology 3(2): 219–235.Google Scholar
Locke, J. (1690) Two Treatises of Government, Everyman's Library. London: J. M. Dent and Sons.Google Scholar
Lotfi, S., and Koohsari, M. J. (2009) “Analyzing Accessibility Dimension of Urban Quality of Life: Where Urban Designers Face Duality between Subjective and Objective Reading of Place.” Social Indicators Research 94(3): 417–435.CrossRefGoogle Scholar
Low, S. M. (1997) “Urban Fear: Building the Fortress City.” City and Society 9(1): 53–71.CrossRefGoogle Scholar
Low, Setha M. (2003) Behind the Gates: Life, Security, and the Pursuit of Happiness in Fortress America. New York: Routledge.Google Scholar
Low, S. M. (2004) Behind the Gates: Life, Security, and the Pursuit of Happiness in Fortress America. New York: Routledge.Google Scholar
Low, S. M., and Merry, S. E. (2010) “Engaged Anthropology: Diversity and Dilemmas.” Current Anthropology 51(Supplement 2): S203–S226.CrossRefGoogle Scholar
Löwenheim, O., and Heimann, G. (2008) “Revenge in International Politics.” Security Studies 17(4): 685–724.CrossRefGoogle Scholar
Lowry, R. P. (1972) “Toward a Sociology of Secrecy and Security Systems.” Social Problems 19(4): 437–450.CrossRefGoogle Scholar
Lupton, D., and Tulloch, J. (1999) “Theorizing Fear of Crime: Beyond the Rational/Irrational Opposition.” The British Journal of Sociology 50(3): 507–523.CrossRefGoogle ScholarPubMed
Luthar, S. S. (ed.) (2003) Resilience and Vulnerability: Adaptation in the Context of Childhood Adversities. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Lutz, C. (2001) Homefront: A Military City and the American Twentieth Century. Boston: Beacon.Google Scholar
Lynch, F. R. (2011) One Nation under AARP: The Fight over Medicare, Social Security, and America's Future. Berkeley: University of California Press.Google Scholar
Lynch, M., and Stretesky, P. (2011) “Similarities between Green Criminology and Green Science: Towards a Typology of Green Criminology.” International Journal of Comparative and Applied Criminal Justice 35(4): 293–306.CrossRefGoogle Scholar
Lynch, M., and Stretesky, P. (2014) Exploring Green Criminology. Farnham, UK: Ashgate.Google Scholar
Lyon, D., and Murakami Wood, D. (2012) “Security, Surveillance, and Sociological Analysis.” Canadian Review of Sociology/Revue Canadienne de Sociologie 49(4): 317–327.CrossRefGoogle Scholar
MacKenzie, M. (2009) “Securitization and Desecuritization: Female Soldiers and the Reconstruction of Women in Post-Conflict Sierra Leone.” Security Studies 18(2): 241–261.CrossRefGoogle Scholar
Macmillan, J. (2004) “Liberalism and the Democratic Peace.” Review of International Studies 30(2): 179–200.CrossRefGoogle Scholar
Maguire, M., Frois, C., and Zurawski, N. (eds.) (2014) “Introduction.” The Anthropology of Security: Perspectives from the Frontline of Policing, Counter-terrorism and Border Control. London: Pluto, 118–138.Google Scholar
Maguire, M. (2009) “The Birth of Biometric Security.” Anthropology Today 25: 9–14.CrossRefGoogle Scholar
Maguire, Mark (2014) Counter-Terrorism in European Airports. In Maguire, M., Frois, C., and Zurawski, N. (eds.) The Anthropology of Security: Perspectives from the Frontline of Policing, Counter-Terrorism and Border Control. London: Pluto, 118–138.Google Scholar
Malesevic, S. (2010) The Sociology of War and Violence. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Maliniak, D., Peterson, S., and Tierney, M. J. (2012) TRIP Around the World: Teaching, Research, and Policy Views of International Relations Faculty in 20 Countries. Williamsburg, VA: College of William and Mary.Google Scholar
Malinowski, B. (1922) Argonauts of the Western Pacific. London: George Routledge and Sons.Google Scholar
Mallard, G., and Lakoff, A. (2011) “How Claims to Know the Future Are Used to Understand the Present.” In Camic, C., Gross, N., and Lamont, M. (eds.) Social Knowledge in the Making. Chicago: University of Chicago Press, 339–378.Google Scholar
Mamadouh, V. (2004) “Geography and War, Geographers and Peace.” In Flint, C. (ed.) The Geography of War and Peace: from Death Camps to Diplomats. Oxford: Oxford University Press: 26–60.Google Scholar
Maoz, I., and McCauley, C. (2008) “Threat, Dehumanization, and Support for Retaliatory Aggressive Policies in Asymmetric Conflict.” Journal of Conflict Resolution 52(1): 93–116.CrossRefGoogle Scholar
Marcus, G. E., Sullivan, J. L., Theiss-Morse, E.et al. (1995) With Malice Toward Some: How People Make Civil Liberties Judgments. New York: Cambridge University Press.CrossRefGoogle Scholar
Marigold, D. C., McGregor, I., and Zanna, M. P. (2010) “Defensive Conviction as Emotion Regulation: Goal Mechanisms and Interpersonal Implications.” In Arkin, R. M., Oleson, K. C., and Carroll, P. J. (eds.) Handbook of the uncertain self. New York: Psychology Press, 232–248.Google Scholar
Martin, N., Morales, S., and Theodore, N. (2007) “Migrant Worker Centers: Contending with Downgrading in the Low-Wage Labor Market.” Geojournal 68: 155–165.CrossRefGoogle Scholar
Martin, P. L. (2003) Promise Unfulfilled: Unions, Immigration, and the Farm Workers. Ithaca, NY: ILR Press.Google Scholar
Maruyama, G., and Ryan, C. S. (2014) Research Methods in Social Relations, West Sussex: Wiley-Blackwell.Google Scholar
Masco, J. (2006) The Nuclear Borderlands: The Manhattan Project in Post-Cold War New Mexico. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Masco, Joseph (2010) “Response to “Toward a Critical Anthropology of Security.” Current Anthropology 51.Google Scholar
Maslow, A. H. (1943) “A Theory of Human Motivation.” Psychological Review 50(4): 370–396.CrossRefGoogle Scholar
Maslow, A. H. (1962) Toward a Psychology of Being. Princeton, NJ: D Van Nostrand.CrossRefGoogle Scholar
Massaro, V., and Williams, J. (2013) “Feminist Geopolitics: Sedefining the Geopolitical, Complicating (In) Security.” Geography Compass 7(8): 567–577.CrossRefGoogle Scholar
Massey, D. (1992) “Politics and Space/Time.” New Left Review 192: 65–84.Google Scholar
Massey, D. (2005) For Space. London: Sage.Google Scholar
Mathew, G. (1943) “The Character of the Gallienic Renaissance.” The Journal of Roman Studies 33: 65–70.CrossRefGoogle Scholar
Mathews, J. T. (1989) “Redefining Security.” Foreign Affairs 68(2): 162–177.CrossRefGoogle ScholarPubMed
Matthew, R. A., Barnett, J., McDonald, B.et al. (2009) Global Environmental Change and Human Security. Cambridge, MA: MIT Press.Google Scholar
Mayall, J. (1990) Nationalism and International Society. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
McDonald, M. (2008) “Securitization and the Construction of Security.” European Journal of International Relations 14(4): 563–587.CrossRefGoogle Scholar
McDonald, M. (2013) “Discourses of Climate Security.” Political Geography 33: 42–51.CrossRefGoogle Scholar
McFate, M. (2005) “The Military Utility of Understanding Adversary Culture.” Joint Force Quarterly 38: 42–48.Google Scholar
McGhee, D. (2010) Security, Citizenship and Human Rights: Shared Values in Uncertain Times. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
McGregor, I., Haji, R., and Kang, S. (2008) Can Ingroup Affirmation Relieve Outgroup Derogation?Journal of Experimental Social Psychology 44(5): 1395–1401.CrossRefGoogle Scholar
McGregor, I., Haji, R., Nash, K. A.et al. (2008) “Religious Zeal and the Uncertain Self.” Basic and Applied Social Psychology 30(2): 183–188.CrossRefGoogle Scholar
McMahan, J. (2002) The Ethics of Killing: Problems at the Margins of Life. Oxford: Oxford University Press.CrossRefGoogle Scholar
McNamara, L. A., and Rubinstein, R. A. (2011) “Introduction: Scholars, Security, Citizenship: Anthropology and the State at War.” In McNamara, L. A., and Rubinstein, R. A. (eds.) Dangerous Liaisons: Anthropologists and the National Security State. Santa Fe, NM: SAR Press, xiii–xxxiv.Google Scholar
McNevin, A. (2006) “Political Belonging in a Neoliberal Era: The Struggle of the Sans-Papiers.” Citizenship Studies 10(2): 135–151.CrossRefGoogle Scholar
McSweeney, B. (1999) Security, Identity and Interests: A Sociology of International Relations. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Meade, M. (2012) “The Geography of Life and Death: Deeper, Broader, and Much More Complex.” Annals of the Association of American Geographers 102(5): 1219–1227.CrossRefGoogle Scholar
Mearsheimer, J. J. (1990) “Back to the Future: Instability in Europe after the Cold War.” International Security 15(1): 5–56.CrossRefGoogle Scholar
Mearsheimer, J. J. (1994–1995) “The False Promise of International Institutions.” International Security 19(3): 5–49.CrossRefGoogle Scholar
Mearsheimer, J. J. (2001) The Tragedy of Great Power Politics. New York: W. W. Norton.Google Scholar
Megoran, N. (2006) “For Ethnography in Political Geography: Experiencing and Re-Imagining Ferghana Valley Boundary Closures.” Political Geography 25(6): 622–640.CrossRefGoogle Scholar
Meikle, S. (1996) “Aristotle on Business.” The Classical Quarterly 64(1): 138–151.Google Scholar
Mencken, H. L. (1918) In Defence of Women. New York: Octagon.Google Scholar
Menjívar, C. (2006) “Liminal Legality: Salvadoran and Guatemalan Immigrants’ Lives in the United States.” American Journal of Sociology 111: 999–1037.CrossRefGoogle Scholar
Mercer, J. (1995) “Anarchy and Identity.” International Organization 49(2): 229–252.CrossRefGoogle Scholar
Mercer, J. (2005) “Rationality and Psychology in International Politics.” International Organization 59(1): 77–106.CrossRefGoogle Scholar
Mercer, J. (2010) “Emotional Beliefs.” International Organization 64(1): 1–31.CrossRefGoogle Scholar
Metzl, J. M. (2010) The Protest Psychosis: How Schizophrenia Became a Black Disease. Boston: Beacon.Google Scholar
Miethe, T. D. (1995) “Fear and Withdrawal from Urban Life.” Annals of the American Academy of Political and Social Science 539: 14–27.CrossRefGoogle Scholar
Mildner, S. A. (2011) Konfliktrisiko Rohstoffe? Herausforderungen und Chancen im Umgang mit knappen Ressourcen (Resources as conflict risk? Challenges and opportunities in dealing with scarce resources). Berlin: Studie der Stiftung Wissenschaft und Politik.Google Scholar
Mill, J. S. (1991) “Utilitarianism.” In Gray, J. (ed.) On Liberty and Other Essays. Oxford: Oxford University Press.Google Scholar
Miller, D., and Mills, T. (2009) “The Terror Experts and the Mainstream Media: The Expert Nexus and Its Dominance in the News Media.” Critical Studies on Terrorism 2(3): 414–437.CrossRefGoogle Scholar
Miller, S. E. (2010) “The Hegemonic Illusion? Traditional Strategic Studies in Context.” Security Dialogue 41(6): 639–648.CrossRefGoogle Scholar
Milner, H. V. (1998) “Rationalizing Politics: The Emerging Synthesis of International, American, and Comparative Politics.” International Organisation 52(4): 759–786.CrossRefGoogle Scholar
Milward, A. S. (1977) War, Economy and Society. Berkeley: University of California Press.Google Scholar
Mintz, A., Redd, S. B., and Vedlitz, A. (2006) “Can We Generalize from Student Experiments to the Real World in Political Science, Military Affairs, and International Relations?Journal of Conflict Resolution 50(5): 757–776.CrossRefGoogle Scholar
Mitzen, J. (2006) “Ontological Security in World Politics: State Identity and the Security Dilemma.” European Journal of International Relations 12(3): 341–370.CrossRefGoogle Scholar
Mize, R. L., and Swords, A. C. S. (2010) Consuming Mexican Labor: From the Bracero Program to NAFTA. Toronto: University of Toronto Press.Google Scholar
Mohr, J. W., Wagner-Pacifici, R., Breiger, R. L.et al. (2013) “Graphing the Grammar of Motives in National Security Strategies: Cultural Interpretation, Automated Text Analysis and the Drama of Global Politics.” Poetics 41(6) 670–700.CrossRefGoogle Scholar
Molden, D. C., Lee, A. Y., and Higgins, E. (2008) “Motivations for Promotion and Prevention.” In Shah, J. Y., and Gardner, W. L. (eds.) Handbook of Motivation Science. New York: Guilford Press, 169–187.Google Scholar
Molotch, H. (2012) Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger. Princeton, NJ: Princeton University Press.Google Scholar
Monahan, T. (ed.) (2006) Surveillance and Security: Technological Politics and Power in Everyday Life. New York: Routledge.Google Scholar
Monteith, M. J., and Spicer, C. (2000) “Contents and Correlates of Whites’ and Blacks’ Racial Attitudes.” Journal of Experimental Social Psychology 36(2): 125–154.CrossRefGoogle Scholar
Mooney, P. H., and Hunt, S. A. (2000) “Food Security: The Elaboration of Contested Claims to a Consensus Frame.” Rural Sociology 74(4): 469–497.Google Scholar
Moran, T. H. (1990) “The Globalisation of America's Defense Industries: Managing the Threat of Foreign Dependence.” International Security 15(1): 57–99.CrossRefGoogle Scholar
Moravcsik, A. (1997) “Taking Preferences Seriously: A Liberal Theory of International Politics.” International Organization 51(4): 513–553.CrossRefGoogle Scholar
Morgan, P. M. (2003) Deterrence Now. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Morgenthau, H. J. (1929) Die internationale Rechtspflege, ihr Wesen und ihre Grenzen. Leipzig: Universitätsverlag von Noske.Google Scholar
Morgenthau, H. (1965) Politics Among Nations: The Struggle for Power and Peace, New York: Knopf.Google Scholar
Morgenthau, H. (1978) Politics among Nations, New York: Knopf.Google Scholar
Morgenthau, H. (1985) Politics among Nations, New York: Knopf.Google Scholar
Mountz, A., and Hyndman, J. (2006) “Feminist Approaches to the Global Intimate.” Women's Studies Quarterly 4(1): 446–463.Google Scholar
Muffels, R. J. A. (ed.) (2008) Flexibility and Employment Security in Europe: Labour Markets in Transition. Northampton, MA: Edward Elgar.CrossRefGoogle Scholar
Mummendey, A., and Wenzel, M. (1999) “Social Discrimination and Tolerance in Intergroup Relations: Reactions to Intergroup Difference.” Personality and Social Psychology Review 3(2): 158–174.CrossRefGoogle ScholarPubMed
Murphy, K. (2004) “The Role of Trust in Nurturing Compliance: A Study of Accused Tax Avoiders.” Law and Human Behavior 28(2): 187–209.CrossRefGoogle ScholarPubMed
Mutimer, D., Grayson, K., and Beier, J. M. (2013) “Critical Studies on Security: An Introduction.” Critical Studies on Security 1(1): 1–12.CrossRefGoogle Scholar
Nadler, A., and Shnabel, N. (2008) “Instrumental and Socioemotional Paths to Intergroup Reconciliation and the Needs-Based Model of Socioemotional Reconciliation.” In Nadler, A., Malloy, T. E., and Fisher, J. D. (eds.) The Social Psychology of Intergroup Reconciliation. New York: Oxford University Press, 37–56.CrossRefGoogle Scholar
Nagel, J. (2011) “Climate Change, Public Opinion, and the Military Security Complex.” The Sociological Quarterly 52(2): 203–210.CrossRefGoogle Scholar
Nally, D. (2008) “‘That Coming Storm’: The Irish Poor Law, Colonial Biopolitics, and the Great Famine.” Annals of the Association of American Geographers 98(3): 714–741.CrossRefGoogle Scholar
Narang, V. (2014) Nuclear Strategy in the Modern Era: Regional Powers and International Conflict: Regional Powers and International Conflict. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Narizny, K. (2007) The Political Economy of Grand Strategy. Ithaca, NY: Cornell University Press.Google Scholar
Neocleous, M. (2008) Critique of Security. Edinburgh: Edinburgh University Press.CrossRefGoogle Scholar
Neumann, I. B. (2002) “Returning Practices to the Linguistic Turn: The Case of Diplomacy.” Millennium: Journal of International Studies 31(3): 627–651.CrossRefGoogle Scholar
Neumann, R. P. (2004) “Moral and Discursive Geographies in the War for Biodiversity in Africa.” Political Geography 23(7): 813–837.CrossRefGoogle Scholar
Newcomb, T. M. (1943) Personality and Social Change. New York: Dryden.Google Scholar
Newman, O. (1972) Defensible Space. New York: Macmillan.Google Scholar
Newnham, R. E. (2002) Deutsche Mark Diplomacy: Positive Economic Sanctions in German-Russian Relations. University Park: Pennsylvania State University Press.Google Scholar
Newton, L. (2008) Illegal, Alien or Immigrant: The Politics of Immigration Reform. New York: New York University Press.Google Scholar
Ngoc, A. C., and Wyatt, T. (2012) “A Green Criminological Exploration of Illegal Wildlife.” Asian Criminology 8(2): 129–142.Google Scholar
Niou, E. M. S., Ordeshook, P. C., and Rose, G. F. (1989) The Balance of Power. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Nissenbaum, H. (1998) “Protecting Privacy in an Information Age: The Problem of Privacy in Public.” Law and Philosophy 17: 559–596.Google Scholar
Noble, G. (2005) “The Discomfort of Strangers: Racism, Incivility and Ontological Security in a Relaxed and Comfortable Nation.” Journal of Intercultural Studies 26(1–2): 107–120.CrossRefGoogle Scholar
Nollkaemper, A. (2002) “Review of Security Council Decisions by National Court.” German Yearbook of International Law 165–202.
Nyers, P. (ed.) (2009) Securitizations of Citizenship. London: Routledge.Google Scholar
Nyers, Peter (2003) “Abject Cosmopolitanism: The Politics of Protection in the Anti-Deportation Movement.” Third World Quarterly 24(6): 1069–1093.CrossRefGoogle Scholar
Nyers, Peter (2010) “No One Is Illegal between City and Nation.” Studies in Social Justice 4(2): 127–143.Google Scholar
O'Connell, M. E. (2012) “Cyber Security without Cyber War.” Journal of Conflict and Security Law 17(2): 187–209.CrossRefGoogle Scholar
O'Connell, M. E., (2013) The International Law of Drones, ASIL Insights, American Society of International Law: www.asil.org/insights/volume/14/issue/37/international-law-drones;
Öhman, A., and Mineka, S. (2001) “Fears, phobias, and preparedness: toward an evolved module of fear and fear learning.” Psychological Review 108(3), 483.CrossRefGoogle ScholarPubMed
O'Loughlin, J., and Heske, H. (1991) “From ‘Geopolitik’ to ‘Géopolitique’: Converting a Discipline for War to a Discipline for Peace.” In Kliot, N., and Waterman, S. (eds.) The Political Geography of Conflict and Peace. LondonBellhaven Press, 37–59.Google Scholar
O'Neill, K. L., and Kedron, T. (eds.) (2013) Securing the City: Neoliberalism, Space, and Insecurity in Postwar Guatemala. Durham, NC: Duke University Press.Google Scholar
O'Tuathail, G. (1996) “An Anti-Geopolitical Eye: Maggie O'Kane in Bosnia, 1992–93.” Gender, Place and Culture: A Journal of Feminist Geography 3(2): 171–186.CrossRefGoogle Scholar
O'Tuathail, G. (1996) Critical Geopolitics: The Politics of Writing Global Space. London: Routledge.Google Scholar
O'Donovan, A. M. (2005) “‘Immigrant Workers and Workers’ Compensation after Hoffman Plastic Compounds, Inc. v. N.L.R.B.” NYU Review of Law and Social Change 30: 299–324.Google Scholar
O'Malley, P. (2004) Risk, Uncertainty and Government. London: Glasshouse Press.Google Scholar
O'Malley, P. (2004) “The Uncertain Promise of Risk.” Australian and New Zealand Journal of Criminology 37(3): 323–343.CrossRefGoogle Scholar
O'Malley, P. (2008) “Governmentality and Risk.” In Jens, O., and Zinn, J. O. (eds.) Social Theories on Risk and Uncertainty: An Introduction. Oxford and Malden, MA: Blackwell, 52–76.Google Scholar
O'Malley, P. (2009) The Currency of Justice: Fines and Damages in Consumer Societies. Routledge.Google Scholar
O'Tuathail, G. (2000) “The Postmodern Geopolitical Condition: States, Statecraft, and Security at the Millennium.” Annals of the Association of American Geographers 90(1): 166–178.CrossRefGoogle Scholar
Ochs, J. (2011) Security and Suspicion: An Ethnography of Everyday Life in Israel. Philadelphia: University of Pennsylvania Press.CrossRefGoogle Scholar
Ogata, S., and Sen, A. (2003) Human Security Now: Final Report of the Commission on Human Security. New York: Commission on Human Security.Google Scholar
Oliner, S. P., and Oliner, P. M. (1988) The Altruistic Personality: Rescuers of Jews in Nazi Europe. New York: Free Press.Google Scholar
Ong, A. (1999) Flexible Citizenship. Durham, NC: Duke University Press.Google Scholar
Onuf, N. G. (1989) World of Our Making : Rules and Rule in Social Theory and International Relations. Columbia: University of South Carolina Press.Google Scholar
Orend, B. (2013) The Morality of War, Peterborough: Broadview Press.Google Scholar
Owczarzak, J. (2009) “Defining HIV Risk and Determining Responsibility in Postsocialist Poland.” Medical Anthropology Quarterly 23: 417–435.CrossRefGoogle ScholarPubMed
Owen, T. (2008) “Measuring Human Security: Methodological Challenges and the Importance of Geographically Referenced Determinants.” In Liotta, P. H., Mouat, D. A., Kepner, W. G.et al. (eds.) Environmental Change and Human Security: Recognizing and Acting on Hazard Impacts. New York: Springer, 35–64.Google Scholar
Owen, T., and Martin, M. (eds.) (2014) Routledge Handbook of Human Security. London: Routledge.Google Scholar
Owen, T. (2004) “Human Security-Conflict, Critique and Consensus: Colloquium Remarks and a Proposal for a Threshold-Based Definition.” Security Dialogue 35(3): 373–387.CrossRefGoogle Scholar
Oxford Latin Dictionary (1982) Oxford: Oxford University Press.
Paasche, T. F. (2013) “‘The Softer Side of Security’: The Role of Social Development in Cape Town's Policing Network.” Geoforum 45: 259–265.CrossRefGoogle Scholar
Pain, R., and Smith, S. J. (2012) Fear: Critical Geopolitics and Everyday Life. Farnham, UK: Ashgate.Google Scholar
Painter, J. (2008) Geographies of Space and Power. London: Sage.CrossRefGoogle Scholar
Palacio, J. F. (2013) “Was Geopolitics Born 60 Years before Mahan and Mackinder? The Forgotten Contribution of Friedrich List.” L'Espace Politique. Revue en ligne de géographie politique et de géopolitique (21).Google Scholar
Palan, R. (2013) “Introduction.” In Palan, R. (ed.) Global Political Economy: Contemporary Theories, London: Routledge, 1–18.Google Scholar
Paldam, M. (1998) “Does Economic Growth Lead to Political Stability?” In Borner, S. and Paldam, M. (eds.) The Political Dimensions of Growth: IEA Conference, New York: Macmillan, 171–190.Google Scholar
Paluck, E. (2009) “Reducing Intergroup Prejudice and Conflict Using the Media: A Field Experiment in Rwanda.” Journal of Personality and Social Psychology 96(3): 574–587.CrossRefGoogle ScholarPubMed
Paluck, E. (2012) “Interventions Aimed at the Reduction of Prejudice and Conflict.” In Tropp, L. R. (ed.) The Oxford Handbook of Intergroup Conflict. New York: Oxford University Press, 179–192.Google Scholar
Paluck, E., and Cialdini, R. (2014) “Field research methods.” In Reis, H., and Judd, C. (eds.) Handbook of Research Methods in Social and Personality Psychology. New York: Cambridge University Press, 81–97.Google Scholar
Pape, R. A. (2005) “Soft Balancing against the United States.” International Security 30(1): 7–45.CrossRefGoogle Scholar
Parfit, D. (2011) On What Matters. Oxford: Oxford University Press.Google Scholar
Paris, R. (2001) “Human Security: Paradigm Shift or Hot Air?International Security 26(2): 87–102.CrossRefGoogle Scholar
Paris, R. (2004) “Still an Inscrutable Concept.” Security Dialogue 35(3): 370–372.CrossRefGoogle Scholar
Patomaeki, H. (ed.) (2008) The Political Economy of Global Security. New York: Routledge.Google Scholar
Paul, T. V. (2005) “Soft Balancing in the Age of US Primacy.” International Security 30(1): 46–71.CrossRefGoogle Scholar
Paulus, A. (2001) “International Law after Post-Modernity: Towards a Renewal or Decline of International.” Law Leiden Journal of International Law (4):727–755.Google Scholar
Pedersen, M. A., and Holbraad, M. (2013) “Introduction: Times of Security.” In Times of Security: Ethnographies of Fear, Protest and the Future. Holbraad, M., and Pedersen, M. A. (eds.) New York and London: Routledge, 1–27.Google Scholar
Peluso, N. L. (1993) “Coercing Conservation? The Politics of State Resource Control.” Global Environmental Change 3(2): 199–217.Google Scholar
Peluso, N. L., and Watts, M. (2001) Violent Environments. Ithaca, NY: Cornell University Press.Google Scholar
Peluso, N. L., and Vandergeest, P. (2011) “Political Ecologies of War and Forests: Counterinsurgencies and the Making of National Natures.” Annals of the Association of American Geographers 101(3): 587–608.CrossRefGoogle Scholar
Pereira, C., Vala, J., and Costa-Lopes, R. (2010) “From Prejudice to Discrimination: The Legitimizing Role of Perceived Threat in Discrimination against Immigrants.” European Journal of Social Psychology 40(7): 1231–1250.CrossRefGoogle Scholar
Perrin, A. J. (2005) “National Threat and Political Culture: Authoritarianism, Antiauthoritarianism, and the September 11 Attacks.” Political Psychology 26: 2: 167–194.CrossRefGoogle Scholar
Perrow, C. (1984) Normal Accidents: Living with High-Risk Technologies. Princeton, NJ: Princeton University Press.Google Scholar
Petersen, K. L. (2012) “Risk Analysis – a Field within Security Studies?European Journal of International Relations 18(4): 693–717.CrossRefGoogle Scholar
Pettigrew, T. F. (1998) “Intergroup Contact Theory.” Annual Review of Psychology 4: 965–985.Google Scholar
Pettigrew, T. F., and Tropp, L. R. (2008) “How Does Intergroup Contact Reduce Prejudice? Meta-Analytic Tests of Three Mediators.” European Journal of Social Psychology 38(6): 922–934.CrossRefGoogle Scholar
Pettigrew, T. F., and Tropp, L. R. (2011) When Groups Meet: The Dynamics of Intergroup Contact. New York: Psychology Press.Google Scholar
Pettigrew, T. F., Wagner, U., and Christ, O. (2010) “Population Ratios and Prejudice: Modelling Both Contact and Threat Effects.” Journal of Ethnic and Migration Studies 36(4): 635–650.CrossRefGoogle Scholar
Pettit, P. (1991) “Consequentialism.” In Singer, P. (ed.) A Companion to Ethics. Oxford: Blackwell, 230–240.Google Scholar
Pettit, P. (1996) “Freedom as Antipower.” Ethics 106: 576–604.CrossRefGoogle Scholar
Pettit, P. (1999) Republicanism: A Theory of Freedom and Government. Oxford: Oxford University Press.CrossRefGoogle Scholar
Pettit, P. (2008) “Freedom and Probability: A Comment on Goodin and Jackson.” Philosophy and Public Affairs 36: 206–220.CrossRefGoogle Scholar
Peutz, N. (2006) “Embarking on an Anthropology of Removal.” Current Anthropology 47: 217–241.CrossRefGoogle Scholar
Philo, C. (2012) “Security of Geography/Geography of Security.” Transactions of the Institute of British Geographers 37(1): 1–7.CrossRefGoogle Scholar
Pinter, B., and Greenwald, A. G. (2011) “A Comparison of Minimal Group Induction Procedures.” Group Processes and Intergroup Relations 14(1): 81–98.CrossRefGoogle Scholar
Pirages, D. (1997) “Demographic Change and Ecological Security.” Environmental Change and Security Project Report 3: 37–46.Google Scholar
Plant, E. (2004) “Responses to Interracial Interactions over Time.” Personality and Social Psychology Bulletin 30(11): 1458–1471.CrossRefGoogle ScholarPubMed
Plant, E., and Devine, P. G. (2003) “The Antecedents and Implications of Interracial Anxiety.” Personality and Social Psychology Bulletin 29(6): 790–801.CrossRefGoogle ScholarPubMed
Posen, B. R. (1993) “The Security Dilemma and Ethnic Conflict.” Survival 35(1): 27–47.CrossRefGoogle Scholar
Pottier, J. (2000) Anthropology of Food: The Social Dynamics of Food Security. Cambridge: Polity Press.Google Scholar
Pouliot, V. (2008) “The Logic of Practicality: A Theory of Practice of Security Communities.” International Organization 62(2): 257–288.CrossRefGoogle Scholar
Powell, R. (1991) “Absolute and Relative Gains in International Relations Theory.” The American Political Science Review 85(4): 1303–1320.CrossRefGoogle Scholar
Price, D. (2011) Weaponizing Anthropology: Social Science in Service of the Militarized State. Oakland, CA: AK Press.Google Scholar
Price, R. (1997) The Chemical Weapons Taboo. Ithaca, NY: Cornell University Press.Google Scholar
Price, R., and Reus-Smit, C. (1998) “Dangerous Liaisons? Critical International Theory and Constructivism.” European Journal of International Relations 4(3): 259–294.CrossRefGoogle Scholar
Price, R., and Tannenwald, N. (1996) “Norms and Deterrence: The Nuclear and Chemical Weapons Taboos.” In Katzenstein, P. J. (ed.) The Culture of National Security: Norms and Identity in World Politics. New York: Columbia University Press, 114–152.Google Scholar
Purcell, B. S. (2008) Undocumented and Working: Reconciling the Disconnect between U.S. Immigration Policy and Employment Benefits Available to Undocumented Workers. University of San Francisco Law Review 43: 197–226.Google Scholar
Purdie-Vaughns, V., Steele, C. M., Davies, P. G.et al. (2008) “Social Identity Contingencies: How Diversity Cues Signal Threat or Safety for African Americans in Mainstream Institutions.” Journal of Personality and Social Psychology 94(4): 615–630.CrossRefGoogle ScholarPubMed
Purser, G. (2013) “Precarious Work.” Contexts 12(4): 74–76.CrossRefGoogle Scholar
Quackenbush, S. L. (2006) “Not Only Whether but Whom: Three-Party Extended Deterrence.” Journal of Conflict Resolution 50(4): 562–583.CrossRefGoogle Scholar
Quadagno, J. (1998) “Creating a Capital Investment Welfare State: The New American Exceptionalism.” American Sociological Review 64(1) 1–11.Google Scholar
Rabinow, P. (1984) The Foucault Reader. London: Penguin.Google Scholar
Radzinowicz, L. (1956) A History of English Criminal Law and Its Administration from 1750, Vol. 2. London: Stevens and Sons.Google Scholar
Radzinowicz, L. (1957) A History of English Criminal Law and Its Administration from 1750, Vol. 3. London: Stevens and Sons.Google Scholar
Radzinowicz, L. (1968) A History of English Criminal Law and Its Administration from 1750, Vol. 4. London: Stevens and Sons.Google Scholar
Ragin, C. C., Nagel, J., and White, P. (2004) Workshop on Scientific Foundations of Qualitative Research. National Science Foundation. Chicago.Google Scholar
Raleigh, C., and Urdal, H. (2007) “Climate Change, Environmental Degradation and Armed Conflict.” Political Geography 26(6): 674–694.CrossRefGoogle Scholar
Raleigh, C., and Hegre, H. V. (2009) “Population Size, Concentration, and Civil War: A Geographically Disaggregated Analysis.” Political Geography 28(4): 224–238.CrossRefGoogle Scholar
Ramadan, A. (2013) “Spatialising the Refugee Camp.” Transactions of the Institute of British Geographers 38(1): 65–77.CrossRefGoogle Scholar
Ranasinghe, P. (2013) “Discourse, Practice and the Production of the Polysemy of Security.” Theoretical Criminology 17: 89–107.CrossRefGoogle Scholar
Rasler, K., and Thompson, W. (1983) “Global Wars, Public Debts, and the Long Cycle.” World Politics 35(4): 489–516.CrossRefGoogle Scholar
Rawls, J. (1971) A Theory of Justice. Cambridge, MA: Harvard University Press.Google Scholar
Rawls, J. (1985) “Justice as Fairness: Political not Metaphysical.” Philosophy and Public Affairs 14: 223–251.Google Scholar
Raworth, K. (2012) “A Safe and Just Space for Humanity: Can We Live within the Doughnut.” Oxfam Policy and Practice: Climate Change and Resilience 8(1): 1–26.Google Scholar
Reader, S. (2006) “Does a Basic Needs Approach Need Capabilities?Journal of Political Philosophy 14: 337–350.CrossRefGoogle Scholar
Reid-Henry, S. (2007) “Exceptional Sovereignty? Guantanamo Bay and the Re-Colonial Present.” Antipode 39(4): 627–648.CrossRefGoogle Scholar
Reis, H. T., and Gosling, S. D. (2010) “Social Psychological Methods Outside the Laboratory.” In Fiske, S., Gilbert, D., and Lindzey, G. (eds.) Handbook of Social Psychology, Vol. 1. Hoboken, NJ: Wiley, 82–114.Google Scholar
Reus-Smit, C. (2004) American Power and World Order. Cambridge: Polity Press.Google Scholar
Reus-Smit, C. (2003) “Politics and International Legal Obligation.” European Journal of International Relations 9(4) 591–625.CrossRefGoogle Scholar
Reynald, D. M. (2011) Guarding against Crime: a Theoretical and Empirical Elaboration of the Routine Activity Concept. London: Ashgate.Google Scholar
Reynolds, E. A. (1998) Before the Bobbies: The Night Watch and Police Reform in Metropolitan London 1720–1830. Stanford, CA: Stanford University Press.CrossRefGoogle Scholar
Rhodes, L. A. (2004) Total Confinement: Madness and Reason in the Maximum Security Prison. Berkeley: University of California Press.Google Scholar
Riek, B. M., Mania, E. W., and Gaertner, S. L. (2006) “Intergroup Threat and Outgroup Attitudes: A Meta-Analytic Review.” Personality and Social Psychology Review 10(4): 336–353.Google ScholarPubMed
Rigakos, G. (2002) The New Parapolice: Risk Markets and Commodified Social Control. Toronto: University of Toronto Press.CrossRefGoogle Scholar
Ripsman, N. M. and Paul, T. V. (2005) “Globalisation and the National Security State: A Framework for Analysis.” International Studies Review 7(2): 199–227.CrossRefGoogle Scholar
Roccas, S., and Elster, A. (2012) “Group Identities.” In Tropp, L. R. (ed.) The Oxford Handbook of Intergroup Conflict. New York: Oxford University Press, 106–122.Google Scholar
Roccas, S., Klar, Y., and Liviatan, I. (2006) “The Paradox of Group-Based Guilt: Modes of National Identification, Conflict Vehemence, and Reactions to the In-Group's Moral Violations.” Journal of Personality and Social Psychology 91(4): 698–711.CrossRefGoogle ScholarPubMed
Roccas, S., Sagiv, L., Schwartz, S.et al. (2008) “Toward a Unifying Model of Identification with Groups: Integrating Theoretical Perspectives.” Personality and Social Psychology Review 12(3): 280–306.CrossRefGoogle Scholar
Rocco, R. (1999) “The Formation of Latino Citizenship in Southeast Los Angeles.” Citizenship Studies 3(2): 253–266.CrossRefGoogle Scholar
Rockstrom, J., Steffen, W. L., Noone, K.et al. (2009) “Planetary Boundaries: Exploring the Safe Operating Space for Humanity.” Ecology and Society 14(2): 32.CrossRefGoogle Scholar
Roemer, J. E. (1983) “Unequal Exchange, Labor Migration, and International Capital Flows: A Theoretical Synthesis.” In Desai, P. (ed.) Marxism, Central Planning and the Soviet Economy. Cambridge, MA: MIT Press.Google Scholar
Rogne, Leah, Estes, Carroll, Grossman, Brian R.et al. (eds.) (2009) Social Insurance and Social Justice: Social Security, Medicare and the Campaign against Entitlements. New York: Springer.Google Scholar
Ron, J. (2003) Frontiers and Ghettos: State Violence in Serbia and Israel. Berkeley: University of California Press.Google Scholar
Rose, G. (1998) “Neoclassical Realism and Theories of Foreign Policy.” World Politics 51(1): 144–172.CrossRefGoogle Scholar
Rosen, D. (2005) Armies of the Young: Child Soldiers in War and Terrorism. New Brunswick, NJ: Rutgers University Press.Google Scholar
Rosenhek, Z. (1999) “The Politics of Claims-Making by Labour Migrants in Israel.” Journal of Ethnic and Migration Studies 25(4): 575–595.CrossRefGoogle Scholar
Rossi, U. (2013) “On Life As a Fictitious Commodity: Cities and the Biopolitics of Late Neoliberalism.” International Journal of Urban and Regional Research 37(3): 1067–1074.CrossRefGoogle Scholar
Rothschild, E. (1995) “What Is Security.” Daedalus 124(3): 53–98.Google Scholar
Rouhana, N. N., and Fiske, S. T. (1995) “Perception of Power, Threat, and Conflict Intensity in Asymmetric Intergroup Conflict: Arab and Jewish Citizens of Israel.” Journal of Conflict Resolution 39(1): 49–81.CrossRefGoogle Scholar
Routledge, P. (2003) “Anti-Geopolitics.” In Agnew, J.Mitchell, K., and O'Tuathail, G. (eds). A Companion to Political Geography. Oxford: Blackwell, 236–248Google Scholar
Rubel, A. (2007) “Privacy and the USA Patriot Act: Rights, the Value of Rights, and Autonomy.” Law Philos 26: 119–159.CrossRefGoogle Scholar
Ruggie, J. G. (1983) “Continuity and Transformation in the World Polity: Toward a Neorealist Synthesis.” World Politics 35(2): 261–285.CrossRefGoogle Scholar
Ruggie, J. G. (1998) “What Makes the World Hang Together? Neo-Utilitarianism and the Social Constructivist Challenge.” International Organisation 52(4): 855–885.CrossRefGoogle Scholar
Russett, B. (1993) Grasping the Democratic Peace. Princeton, NJ: Princeton University Press.Google Scholar
Russett, B. M. (1968) Economic Theories of International Politics. Chicago: Markham.Google Scholar
Rutherford, P., and Rutherford, S. (2013a) “The Confusions and Exuberances of Biopolitics.” Geography Compass 7(6): 412–422.CrossRefGoogle Scholar
Rutherford, S. and Rutherford, P. (2013b) “Geography and Biopolitics.” Geography Compass 7(6): 423–434.CrossRefGoogle Scholar
Sacco, V. F. (1995) “Media Constructions of Crime.” Annals of the American Academy of Political and Social Science 539: 141–154.CrossRefGoogle Scholar
Sagan, S. D., and Waltz, K. N. (2012) The Spread of Nuclear Weapons: An enduring debate, . New York: W. W. Norton.Google Scholar
Saguy, T., Tausch, N., Dovidio, J. F.et al. (2009) “The Irony of Harmony: Intergroup Contact Can Produce False Expectations for Equality.” Psychological Science 20(1): 114–121.CrossRefGoogle ScholarPubMed
Saguy, T., Tropp, L. R., and Hawi, D. (2013) “The Role of Group Power in Intergroup Contact.” In Hodson, G., and Hewstone, M. (eds.) Advances in Intergroup Contact. New York: Psychology Press, 113–131.Google Scholar
Salter, M. B. (2008) “Securitization and Desecuritization: Dramaturgical Analysis and the Canadian Aviation Transport Security Authority.” Journal of International Relations and Development 11(4): 321–349.CrossRefGoogle Scholar
Salter, M. B., and Mutlu, C. E. (2013) Research Methods in Critical Security Studies: An Introduction. London: Routledge.Google Scholar
Sanyal, R. (2012) “Refugees and the City: An Urban Discussion.” Geography Compass 6(11): 633–644.CrossRefGoogle Scholar
Sartori, A. E. (2005) Deterrence by Diplomacy. Princeton, NJ: Princeton University Press.Google Scholar
Scanlan, S. J. (2003) “Food Security and Comparative Sociology: Research, Theories, and Concepts.” International Journal of Sociology 33(3): 88–111.CrossRefGoogle Scholar
Schelling, T. C. (1960) The Strategy of Conflict. Cambridge, MA: Harvard University Press.Google Scholar
Schlatter, R. (1945) “Thomas Hobbes and Thucydides.” Journal of the History of Ideas 6: 350–362.CrossRefGoogle Scholar
Schmidt, B. (1998) The Political Discourse of Anarchy: A Disciplinary History of International Relations. Albany: State University of New York Press.Google Scholar
Schmitt, M. (2010) “The Interpretative Guide on the Notion of Direct Participation in Hostilities: A Critical Analysis”, National Security Journal: http://harvardnsj.org/2010/05/the-interpretive-guidance-on-the-notion-of-direct-participation-in-hostilities-a-critical-analysis/ (accessed September 2014).
Schram, A., and van Riel, A. (1993) “Weimar Economic Decline, Nazi Economic Recovery, and the Stabilisation of Political Dictatorship.” Journal of Economic History 53(1): 71–105.Google Scholar
Schur, E. F., and Maher, V. (1973) Radical Nonintervention: Rethinking the Delinquency Problem. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
Schuurman, N. (2006) “Formalization Matters: Critical GIS and Ontology Research.” Annals of the Association of American Geographers 96(4): 726–739.CrossRefGoogle Scholar
Schweller, R. L. (2004) “Unanswered Threats: A Neoclassical Realist Theory of Underbalancing.” International Security 29(2): 159–201.CrossRefGoogle Scholar
Schweller, R. L. (2006) Unanswered Threats: Political Constraints on the Balance of Power. Princeton, NJ: Princeton University Press.Google Scholar
Schweller, R. L. and Wohlforth, W. C. (2000) “Power Test: Evaluating Realism in Response to the End of the Cold War.” Security Studies 9(3): 60–107.CrossRefGoogle Scholar
Selgelid, M. J., and Enemark, C. (2008) “Infectious Diseases, Security and Ethics: The Case of HIV/AIDS.” Bioethics 22: 457–465.CrossRefGoogle ScholarPubMed
Selmeski, B. R. (2007) “Who Are the Security Anthropologists?Anthropology News 48: 11–12.CrossRefGoogle Scholar
Shakespeare, W. (1988) The Tragedy of Macbeth, William Shakespeare: The Complete Works, Oxford: Clarendon Press.Google Scholar
Shami, S., and Godoy-Anativia, M. (2007) “Did the Events of 9/11 Change the Field of Middle East Studies?International Journal of Middle East Studies 39(3): 346–349.Google Scholar
Shamir, M., and Sagiv-Schifter, T. (2006) “Conflict, Identity, and Tolerance: Israel in the Al-Aqsa Intifada.” Political Psychology 27(4): 569–595.CrossRefGoogle Scholar
Sharp, J. P. (1993) “Publishing American Identity: Popular Geopolitics, Myth and the Reader's Digest.” Political Geography 12(6): 491–503.CrossRefGoogle Scholar
Sharp, J. P. (2000) “Remasculinising Geo-Politics? Comments on Gearoid O'Tuathail's ‘Critical Geopolitics.’Political Geography 19(3): 361–364.CrossRefGoogle Scholar
Sharp, J. P. (2013) “Africa's Colonial Present: Development, Violence and Postcolonial Security.” In Huggan, G. (ed.) Oxford Handbook of Postcolonial Studies. Oxford: Oxford University Press, 235–252.Google Scholar
Shaw, M. (2003) International Law, Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Shearing, C. (1989) “Decriminalising Criminology.” Canadian Journal of Criminology 31(2): 169–178.Google Scholar
Shearing, C., and Stenning, P. C. (1987) “Say ‘Cheese’: The Disney Order That Is Not So Mickey Mouse.” In Shearing, C., and Stenning, P. C. (eds.) Private Policing. Newbury, CA: Sage, 317–323.Google Scholar
Shearing, C., and Marks, M. (2011) “Criminology's Disney World: The Ethnographer's Ride of South African Criminal Justice.” In Bosworth, M. and Hoyle, C. (eds.) What Is Criminology. Oxford: Oxfore University Press, 125–140.Google Scholar
Shearing, C., and Stenning, P. C. (1980) “Snowflakes or Good Pinches? Private Security's Contribution to Modern Policing.” In Donelan, R. (ed.) The Maintenance of Order in Society. Ottawa: Canadian Police College, 96–105.Google Scholar
Shearing, C., and Wood, J. (2007) Imagining Security. Cullompton: Willan.Google Scholar
Shepherd, L. J. (2008) Gender, Violence and Security: Discourse as Practice. London: Zeb Books.Google Scholar
Shepherd, L. J. (2013) Critical Approaches to Security: An Introduction to Theories and Methods. London: Routledge.Google Scholar
Sherman, L. W. (2009) “Evidence and Liberty: The Promise of Experimental Criminology.” Criminology and Criminal Justice 9(1): 5–28.CrossRefGoogle Scholar
Sherman, Lawrence W. (1995) “Public Regulation of Private Crime Prevention.” Annals of the American Academy of Political and Social Science 539: 102–113.CrossRefGoogle Scholar
Sherraden, M., and McBride, A. M. (2010) Striving to Save: Creating Policies for Financial Security of Low-Income Families. Ann Arbor: University of Michigan Press.CrossRefGoogle Scholar
Shklar, J. (1986) Legalism; Law, Morals and Political Trials. Cambridge, MA: Harvard University Press (originally published in 1964).Google Scholar
Shnabel, N., Nadler, A., Ullrich, J.et al. (2009) “Promoting Reconciliation through the Satisfaction of the Emotional Needs of Victimized and Perpetrating Group Members: The Needs-Based Model of Reconciliation.” Personality and Social Psychology Bulletin 35(8): 1021–1030.CrossRefGoogle ScholarPubMed
Shue, H. (1980) Basic Rights: Subsistence, Affluence, and US Foreign Policy. Princeton, NJ: Princeton University Press.Google Scholar
Sidanius, J., Feshbach, S., Levin, S.et al. (1997) “The Interface between Ethnic and National Attachment: Ethnic Pluralism or Ethnic Dominance?Public Opinion Quarterly 61(1): 102–133.CrossRefGoogle Scholar
Silbey, S. S. (2009) “Taming Prometheus: Talk about Safety and Culture.” Annual Review of Sociology 35: 341–369.CrossRefGoogle Scholar
Silverman, D. (1997) Qualitative Research: Theory, Method and Practice. Thousand Oaks, CA: Sage.Google Scholar
Simko, C. (2012) “Rhetorics of Suffering : September 11 Commemorations as Theodicy.” American Sociological Review 77: 880.CrossRefGoogle Scholar
Simon, J. (2007) Governing through Crime: How the War on Crime Transformed American Democracy and Created a Culture of Fear. Oxford: Oxford University Press.Google Scholar
Singer, D. J., and Small, M. (1972) The Wages of War, 1816–1965: A Statistical Handbook. New York: John Wiley.Google Scholar
Sjoberg, L. (2013) Gendering Global Conflict: Toward a Feminist Theory of War. New York: Columbia University Press.Google Scholar
Skidmore, M. (2003) “Darker than Midnight: Fear, Vulnerability, and Terror Making in Urban Burma.” American Ethnologist 30: 5–21.CrossRefGoogle Scholar
Skidmore, Monique (2008) “Scholarship, Advocacy, and the Politics of Engagement in Burma (Myanmar).” In Sanford, V. and Angel-Ajani, A. (eds.) Engaged Observer: Anthropology, Advocacy, and Activism. New Brunswick, NJ: Rutgers University Press, 42–59.Google Scholar
Skitka, L. J., Bauman, C. W., Aramovich, N. P.et al. (2006) “Confrontational and Preventative Policy Responses to Terrorism: Anger Wants a Fight and Fear Wants ‘Them’ to Go Away.” Basic and Applied Social Psychology 28(4): 375–384.CrossRefGoogle Scholar
Skogan, W. (1986) “Fear of Crime and Neighborhood Change.” Crime and Justice 8: 203–229.CrossRefGoogle Scholar
Smith, J. R., and Louis, W. R. (2008) “Do as We Say and as We Do: The Interplay of Descriptive and Injunctive Group Norms in the Attitude-Behaviour Relationship.” British Journal of Social Psychology 47(4): 647–666.CrossRefGoogle Scholar
Smith, N. (2003) American Empire: Roosevelt's Geographer and the Prelude to Globalization, Berkeley: University of California Press.Google Scholar
Smith, N. (2010) Urban Politics, Urban Security. Cambridge, MA: Harvard Graduate School.Google Scholar
Smith, S. (1996) “Positivism and Beyond.” In Smith, S., Booth, K., and Zalewski, M. (eds.) International Theory: Positivism and Beyond. Cambridge: Cambridge University Press: 11–46.CrossRefGoogle Scholar
Smith, S. (2005) “The Contested Concept of Security.” In Booth, K. (ed.) Critical Security Studies and World Politics. Boulder, CO: Lynne Rienner.Google Scholar
Smith, T. W., Rasinski, K. A., and Toce, M. (2001) America Rebounds: A National Study of Public Response to the September 11th Terrorist Attacks. Chicago: NORC.Google Scholar
Sommerville, M., Essex, J., and Le Billon, P. (2014) “The ‘Global Food Crisis’ and the Geopolitics of Food Security.” Geopolitics 19(2): 239–265.CrossRefGoogle Scholar
Sorell, T. (2007) “Hobbes's Moral Philosophy.” In Springborg, P. (ed.) The Cambridge Companion to Hobbes's Leviathan. Cambridge: Cambridge University Press, 128–156.Google Scholar
South, N., and Brisman, A. (2013) “Critical Green Criminology, Environmental Rights and Crimes of Exploitation.” In Winlow, S., and Atkinson, R. (eds.) New Directions in Crime and Deviancy. London: Routledge, 99–110.Google Scholar
Spanovic, M., Lickel, B., Denson, T. F.et al. (2010) “Fear and Anger As Predictors of Motivation for Intergroup Aggression: Evidence from Serbia and Republika Srpska.” Group Processes and Intergroup Relations 13(6): 725–739.CrossRefGoogle Scholar
Sparke, M. B. (2006) “A Neoliberal Nexus: Economy, Security and the Biopolitics of Citizenship on the Border.” Political Geography 25(2): 151–180.CrossRefGoogle Scholar
Sparke, M. B. (2007) “Geopolitical Fears, Geoeconomic Hopes, and the Responsibilities of Geography.” Annals of the Association of American Geographers 97(2): 338–349.CrossRefGoogle Scholar
Springer, S. (2008) “The Nonillusory Effects of Neoliberalisation: Linking Geographies of Poverty, Inequality, and Violence.” Geoforum 39(4): 1520–1525.CrossRefGoogle Scholar
Springer, S. (2012) “Anarchism! What Geography Still Ought to Be.” Antipode 44(5): 1605–1624.CrossRefGoogle Scholar
Springer, S., Chi, H., Crampton, J.et al. (2012) “Leaky Geopolitics: The Ruptures and Transgressions of Wikileaks.” Geopolitics 17(3): 681–711.CrossRefGoogle Scholar
Sprout, H., and Sprout, M. (1957) “Environmental Factors in the Study of International Politics.” Journal of Conflict Resolution 1(4): 309–328.Google Scholar
Spruyt, H. (1994) The Sovereign State and Its Competitors: An Analysis of Systems Change. Princeton, NJ: Princeton University Press.Google Scholar
Squires, G., and Hartman, C. (2006) There Is No Such Thing as a Natural Disaster: Race, Class, and Hurricane Katrina. New York: Routledge.Google Scholar
Staerklé, C., Sidanius, J., Green, E. T.et al. (2010) “Ethnic Minority-Majority Asymmetry in National Attitudes around the World: A Multilevel Analysis.” Political Psychology, 31(4): 491–519.CrossRefGoogle Scholar
Stampnitzky, L. 2013a. Disciplining Terror: How Experts Invented Terrorism. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Stampnitzky, Lisa. 2013b. “Toward a Sociology of ‘Security.’Sociological Forum 6: 281–333.Google Scholar
States, I. C. o. A. (1933) Convention on the Rights and Duties of States (Inter-American). Montevideo Convention on the Rights and Duties of States: www.oas.org/juridico/english/treaties/a-40.html.
Staub, E. (1997) “Blind versus Constructive Patriotism: Moving from Embeddedness in the Group to Critical Loyalty and Action.” In Bar-Tal, D., and Staub, E. (eds.) Patriotism: In the Lives of Individuals and Nations. Chicago: Nelson-Hall, 213–228.Google Scholar
Steans, J. (1998) Gender and International Relations: An Introduction. Cambridge: Polity.Google Scholar
Steele, B. J. (2008) Ontological Security in International Relations:Self-Identity and the IR State. London: Routledge.Google Scholar
Steele, C. M., and Aronson, J. (1995) “Stereotype Threat and the Intellectual Test Performance of African Americans.” Journal of Personality And Social Psychology 69(5): 797–811.CrossRefGoogle ScholarPubMed
Steffen, W., Crutzen, P., and McNeill, J. (2007) “The Anthropocene: Are Humans Now Overwhelming the Great Forces of Nature.” Ambio 36(8): 614–621.CrossRefGoogle ScholarPubMed
Steffen, W., Persson, Å., Deutsch, L.et al. (2011) “The Anthropocene: From Global Change to Planetary Stewardship.” Ambio 40: 739–761.CrossRefGoogle ScholarPubMed
Steinmetz, G. (ed.) (2013) Sociology and Empire: The Imperial Entanglements of a Discipline. Durham, NC: Duke University Press.CrossRefGoogle Scholar
Stephan, C., and Stephan, W. G. (2000) “The Measurement of Racial and Ethnic Identity.” International Journal of Intercultural Relations 24(5): 541–552.CrossRefGoogle Scholar
Stephan, W. G., and Renfro, C. (2002) “The Role of Threat in Intergroup Relations.” In Mackie, D. M. and Smith, E. R. (eds.) From Prejudice to Intergroup Emotions: Differentiated Reactions to Social Groups. New York: Psychology Press, 191–207.Google Scholar
Stephan, W. G., Renfro, C., Esses, V. M.et al. (2005) “The Effects of Feeling Threatened on Attitudes Toward Immigrants.” International Journal of Intercultural Relations 29(1): 1–19.CrossRefGoogle Scholar
Stephan, W. G., and Stephan, C. W. (1985) “Intergroup Anxiety.” Journal of Social Issues 41(3): 157–175.CrossRefGoogle Scholar
Stephan, W. G., Ybarra, O., and Morrison, K. (2009) “Intergroup Threat Theory.” In Nelson, T. D. (ed.) Handbook of Prejudice, Stereotyping, and Discrimination. New York: Psychology Press, 43–59.Google Scholar
Stepputat, F. (2012) “Knowledge Production in the Security-Development Nexus: An Ethnographic Reflection.” Security Dialogue 43(5): 439–455.CrossRefGoogle Scholar
Sterio, M. (2012) “The United States’ Use of Drones in the War on Terror: The (Il)legality of Targeted Killings under International Law.” Case Western Reserve Journal of International Law 45: 197–214.Google Scholar
Sterling, B. (2009) The Caryatids. New York: Del Rey.Google Scholar
Stinchcombe, A. L. (1963) “Institutions of Privacy in the Determination of Police Administrative Practice.” American Journal of Sociology 69(2): 150–160.CrossRefGoogle Scholar
Stokes, D. E. (1997) Pasteur's Quadrant: Basic Science and Technological Innovation. Washington, DC: Brookings Institution Press.Google Scholar
Stouffer, Samuel A., Lumsdaine, R., Williams, M.et al. (1949) The American Soldier: Combat and Its Aftermath. Princeton, NJ: Princeton University Press.Google Scholar
Strachan, H. (2013) The Direction of War: Contemporary Strategy in Historical Perspective. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Strange, S. (1982) “Cave! Hic Dragones: A Critique of Regime Analysis.” International Organization 36(2): 479–496.CrossRefGoogle Scholar
Strange, S. (1988) States and Markets. New York: Basil Blackwell.Google Scholar
Striker, G. (1990) “Ataraxia: Happiness as Tranquility.” The Monist 73: 97–110.CrossRefGoogle Scholar
Stritzel, H. (2007) “Towards a Theory of Securitization: Copenhagen and Beyond.” European Journal of International Relations 13(3): 357–383.CrossRefGoogle Scholar
Stubbs, R., and Underhill, G. R. D. (eds.) (1994) Political Economy and the Changing Global Order. New York: St Martin's Press.CrossRefGoogle Scholar
Sundberg, J. (2011) “Diabolic Caminos in the Desert and Cat Fights on the Rio: A Posthumanist Political Ecology of Boundary Enforcement in the United States–Mexico Borderlands.” Annals of the Association of American Geographers 101(2): 318–336.CrossRefGoogle Scholar
Sutton, B., and Norgaard, K. M. (2013) “Cultures of Denial: Avoiding Knowledge of State Violations of Human Rights in Argentina and the United States.” Sociological Forum 28: 495–524.CrossRefGoogle Scholar
Swanton, C. (1985) “On the ‘Essential Contestedness’ of Political Concepts.” Ethics 95: 811–827.CrossRefGoogle Scholar
Swart, H., Hewstone, M., Christ, O.et al. (2011) Affective Mediators of Intergroup Contact: A Three-Wave Longitudinal Study in South Africa. Journal of Personality and Social Psychology 101(6): 1221–1238.CrossRefGoogle ScholarPubMed
Sweetser, C. (2009) “Humanity as Alpha and Omega of International Law, Four Replies to Anne Peters.” European Journal of International Law 20: 545–567.CrossRefGoogle Scholar
Swyngedouw, E. (1999) “Modernity and Hybridity: Nature, Regeneracionismo, and the Production of the Spanish Waterscape, 1890–1930.” Annals of the Association of American Geographers 89(3): 443–465.CrossRefGoogle Scholar
Sylvester, C. (2006) “Bare Life as a Development/Postcolonial Problematic.” The Geographical Journal 172(1): 66–77.CrossRefGoogle Scholar
Sylvester, C. (2007a) “Anatomy of a Footnote.” Security Dialogue 38(4): 547–558.CrossRefGoogle Scholar
Sylvester, C. (2007b) “Whither the International at the End of IR.” Millennium: Journal of International Studies 35(3): 551–573.CrossRefGoogle Scholar
Szeto, A. H., and Sorrentino, R. M. (2010) “Uncertainty Orientation: Myths, Truths, and the Interface of Motivation and Cognition.” In Arkin, R. M., Oleson, K. C., and Carroll, P. J. (eds.) Handbook of the Uncertain Self. New York: Psychology Press, 101–121.Google Scholar
Tajfel, H., Billig, M. G., Bundy, R. P.et al. (1971) “Social Categorization and Intergroup Behaviour.” European Journal of Social Psychology 1(2): 149–178.CrossRefGoogle Scholar
Tajfel, H., and Turner, J. C. (1986) “The Social Identity Theory of Intergroup Behaviour.” In Worchel, S., and Austin, W. G. (eds.) Psychology of Intergroup Relations. Chicago: Nelson Hall, 7–24.Google Scholar
Taliaferro, J. W. (2000–2001) “Security Seeking under Anarchy: Defensive Realism Revisited.” International Security 25(3): 128–161.Google Scholar
Taliaferro, J. W. (2004) Balancing Risks: Great Power Intervention in the Periphery. Ithaca, NY: Cornell University Press.Google Scholar
Tang, S. (2009) “The Security Dilemma: A Conceptual Analysis.” Security Studies 18(3): 587–623.CrossRefGoogle Scholar
Tannenwald, N. (1999) “The Nuclear Taboo: The United States and the Normative Basis of Nuclear Non-Use.” International Organization 53(3): 433–468.CrossRefGoogle Scholar
Tannenwald, N. (2007) Nuclear Taboo: the United States and the Non-Use of Nuclear Weapons since 1945. New York: Cambridge University Press.CrossRefGoogle Scholar
Tarrant, M., Branscombe, N. R., Warner, R. H.et al. (2012) “Social Identity and Perceptions of Torture: It's Moral When We Do It.” Journal of Experimental Social Psychology, 48(2): 513–518.CrossRefGoogle Scholar
Taussig, M. 1984. “Culture of Terror–Space of Death: Roger Casement's Putumayo Report and the Explanation of Torture”. Comparative Studies in Society and History 26(3): 467–497.CrossRefGoogle Scholar
Taylor, I., Walton, P., and Young, J. (1975) Critical Criminology. London: Routledge. (reprinted 2011).Google Scholar
Taylor, R. B. (1995) “The Impact of Crime on Communities.” Annals of the American Academy of Political and Social Science 539: 28–45.CrossRefGoogle Scholar
Thoits, P. A. (1989) “The Sociology of Emotions.” Annual Review of Sociology 15: 317–342.CrossRefGoogle Scholar
Thomas, C. (2000) Global Governance, Development and Human Security: The Challenge of Poverty and Inequality. London: Pluto Press.Google Scholar
Thomas, N., and Tow, W. T. (2002) “The Utility of Human Security: Sovereignty and Humanitarian Intervention.” Security Dialogue 33: 177–192.CrossRefGoogle Scholar
Thongchai, W. (1994) Siam Mapped: A History of the Geo-Body of a Nation. Honolulu: University of Hawaii Press.Google Scholar
Thrift, N. J. (2011) “Lifeworld Inc.: And What to Do about It.” Environment and Planning D: Society and Space 29(1): 5–26.CrossRefGoogle Scholar
Thucydides, (1843) History of the Peloponnesian War. London: Bohn.Google Scholar
Tickner, J. A. (1992) Gender in International Relations: Feminist Perspectives on Achieving Global Security. New York: Columbia University Press.Google Scholar
Tickner, J. A. (1997) “You Just Don't Understand: Troubled Engagements between Feminists and IR Theorists.” International Studies Quarterly 41(4): 611–632.CrossRefGoogle Scholar
Ticktin, M. (2011) Casualties of Care: Immigration and the Politics of Humanitarianism in France. Berkeley: University of California Press.CrossRefGoogle Scholar
Till, K. E., Sundberg, J., Pullan, W.et al. (2013) “Interventions in the Political Geographies of Walls.” Political Geography 33: 52–62.CrossRefGoogle Scholar
Tilly, C. (2006) “Terror as Strategy and Relational Process.” International Journal of Comparative Sociology 46: 11–32.Google Scholar
Tilly, Charles.(1992) Coercion, Capital and European States, 990–1992. Boston: Wiley-Blackwell.Google Scholar
Trawalter, S., Todd, A. R., Baird, A. A.et al. (2008) “Attending to threat: Race-based patterns of selective attention.Journal of Experimental Social Psychology 44(5): 1322–1327.CrossRefGoogle ScholarPubMed
Trawalter, S. A., and Shelton, J. (2009) “Predicting Behavior during Interracial Interactions: A Stress and Coping Approach.” Personality and Social Psychology Review 13(4): 243–268.CrossRefGoogle ScholarPubMed
Tropp, L. R., Hawi, D. R., Van Laar, C.et al. (2012) “Cross-Ethnic Friendships, Perceived Discrimination, and Their Effects on Ethnic Activism over Time: A Longitudinal Investigation of Three Ethnic Minority Groups.” British Journal of Social Psychology 51(2): 257–272.CrossRefGoogle ScholarPubMed
Tropp, L. R., and Pettigrew, T. F. (2005) “Relationships between Intergroup Contact and Prejudice among Minority and Majority Status Groups.” Psychological Science 16(12): 951–957.CrossRefGoogle ScholarPubMed
Trubowitz, P. (1998) Defining the National Interest: Conflict and Change in American Foreign Policy. Chicago: University of Chicago Press.Google Scholar
Tucker, B. (2012) “Do Risk and Time Experimental Choices Represent Individual Strategies for Coping with Poverty or Conformity to Social Norms? Evidence from Rural Southwestern Madagascar.” Current Anthropology 53(2): 149–180.CrossRefGoogle Scholar
Turk, A. T. (2004) “Sociology of Terrorism.” Annual Review of Sociology 30: 271–286.CrossRefGoogle Scholar
Turner, J. C., Hogg, M. A., Oakes, P. J.et al. (1987) Rediscovering the Social Group: A Self-Categorization Theory. Cambridge, MA: Basil Blackwell.Google Scholar
Tyler, J. (2008) The Killing of Cambodia: Geopolitics, Genocide and the Unmaking of Space. London: Ashgate.Google Scholar
Tyler, T. (2006) Why People Obey the Law. Princeton, NJ: Princeton University Press.Google Scholar
Tyler, T. R., and Blader, S. L. (2003) “The Group Engagement Model: Procedural Justice, Social Identity, and Cooperative Behavior.” Personality and Social Psychology Review 7(4): 349–361.CrossRefGoogle Scholar
Tyner, J. A. (2012) Genocide and the Geographical Imagination: Life and Death in Germany, China, and Cambodia. Lanham, MD: Rowman & Littlefield.Google Scholar
Ullman, R. H. (1983) “Redefining Security.” International Security 8: 129–153.CrossRefGoogle Scholar
United Nations (1994) Human Development Report: New Dimensions of Human Security. New York: UNDP.
Valverde, M. (2001) “Governing Security, Governing through Security.” In Daniels, R. J., Macklem, P., and Roach, K. (eds.) The Security of Freedom: Essays on Canada's Anti-Terrorism Bill. Toronto: University of Toronto Press.Google Scholar
Valverde, Mariana (2011) “Questions of Security: A Framework for Research.” Theoretical Criminology 15(1): 3–22.CrossRefGoogle Scholar
Valverde, M., and Cirak, M. (2002) “Governing Bodies, Creating Gay Spaces: Security in ‘Gay’ Downtown Toronto.” British Journal of Criminology 43: 102–121.Google Scholar
Valverde, M., and Wood, J. (2001) “In the Name of Security.” University of Toronto Bulletin 16: 1.Google Scholar
Van den Bos, K. (2001) “Uncertainty Management: The Influence of Uncertainty Salience on Reactions to Perceived Procedural Fairness.” Journal of Personality and Social Psychology 80(6): 931–941.CrossRefGoogle ScholarPubMed
Van den Bos, K., and Lind, E. (2010) “The Social Psychology of Fairness and the Regulation of Personal Uncertainty.” In Arkin, R. M., Oleson, K. C., and Carroll, P. J. (eds.) Handbook of the Uncertain Self. New York: Psychology Press, 122–141.Google Scholar
Van Evera, S. (1999) Causes of War: Structures of Power and the Roots of International Conflict. Ithaca, NY: Cornell University Press.Google Scholar
Varsanyi, M. (2006) “Interrogating ‘Urban Citizenship’ vis-à-vis Undocumented Migration.” Citizenship Studies 10(2): 229–249.CrossRefGoogle Scholar
Vaughn, D. (1997) The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA. Chicago: University of Chicago Press.CrossRefGoogle Scholar
Vélez-Torres, I. (2014) “Governmental Extractivism in Colombia: Legislation, Securitization and the Local Settings of Mining Control.” Political Geography 38: 68–78.CrossRefGoogle Scholar
Veneziani, R. “Global Capitalism and Imperialism Theory: Methodological and Substantive Insights from Rosa Luxemburg.” Review of Political Economy 21(2): 195–211.
Vesselinov, E. (2008) “Members Only: Gated Communities and Residential Segregation in the Metropolitan United States.” Sociological Forum 23(3): 536–555.CrossRefGoogle Scholar
Vollhardt, J. (2010) “Enhanced External and Culturally Sensitive Attributions after Extended Intercultural Contact.” British Journal of Social Psychology 49(2): 363–383.CrossRefGoogle ScholarPubMed
von Clausewitz, C. (1873) On War (translated by Graham, J. J.). London: Trübner.Google Scholar
Von Hirsch, A. (1993) Censure and Sanctions. Oxford: Clarendon Press.Google Scholar
Vorauer, J. D. (2006) “An Information Search Model of Evaluative Concerns in Intergroup Interaction.” Psychological Review 113(4): 862–886.CrossRefGoogle ScholarPubMed
Vuori, J. A. (2008) “Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-Democratic Political Orders.” European Journal of International Relations 14(1): 65–100.CrossRefGoogle Scholar
Vuori, J. A. (2011) “Religion Bites: Falungong, Securitization/Desecuritization in the People's Republic of China.” In Balzacq, T. (ed.) Securitization Theory: How Security Problems Emerge and Dissolve. London: Routledge: 186–211.Google Scholar
Vuori, Juha A. (2014) Critical Security and Chinese Politics: The Anti-Falungong Campaign. London: Routledge.Google Scholar
Waever, O. (1993) Securitization and Descecuritization. Copenhagen: Centre for Peace and Conflict Research.Google Scholar
Waever, O. (1995) “Securitisation and De-Securitisation.” In Lipschutz, R. D. (ed.) On Security. New York: Columbia University Press, 46–86.Google Scholar
Waever, O. (1996) “European Security Identities.” Journal of Common Market Studies 34(1): 103–132.Google Scholar
Wagner, U., and Hewstone, M. (2012) “Intergroup Contact.” In Tropp, L. R. (ed.) The Oxford Handbook of Intergroup Conflict. New York: Oxford University Press, 193–209.Google Scholar
Wagner-Pacifici, R. (1995) Discourse and Destruction: The City of Philadelphia versus MOVE. Chicago: University of Chicago Press.Google Scholar
Wahl, R. (2014) “Justice, Context, and Violence: Law Enforcement Officers on Why They Torture.” Law and Society Review 48(4): 807–836.CrossRefGoogle Scholar
Walby, K., and Lippert, R. (2014) Corporate Security in the 21st Century: Theory and Practice in International Perspective. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
Walder, A. G. (2009) “Political Sociology and Social Movements.” Annual Review of Sociology 35(1): 393–412.CrossRefGoogle Scholar
Waldron, J. (2003) Security and Liberty: The Image of Balance. The Journal of Political Philosophy 11: 191–210.CrossRefGoogle Scholar
Waldron, J. (2006) “Safety and Security.” Nebraska Law Review 85(2): 454–507.Google Scholar
Waldron, J. (2009) “Security as a Basic Right (after 9/11).” In Beitz, C. R., and Goodin, R. E. (eds.) Global Basic Rights. Oxford: Oxford University Press., 207–226.Google Scholar
Walker, R. B. J. (1990) “Security, Sovereignty, and the Challenge of World Politics.” Alternatives 15(1): 3–27.CrossRefGoogle Scholar
Walker, R. B. J. (1993) Inside/Outside: International Relations as Political Theory. Cambridge: Cambridge University Press.Google Scholar
Walker, R. B. J. (1997) “The Subject of Security.” Critical Security Studies. In Krause, K., and Williams, M. C. (eds.) Minneapolis: University of Minnessota Press, 61–82.Google Scholar
Walklate, S. (1998) “Crime and Community: Fear or Trust?The British Journal of Sociology 49(4): 550–569.CrossRefGoogle Scholar
Waller, I., and Sansfacon, D. (2000) Investing Wisely in Crime Prevention: International Experiences. US Department of Justice, Office of Justice Programs, Bureau of Justice Assistance.Google Scholar
Walt, S. M. (1987) The Origins of Alliances. Ithaca, NY: Cornell University Press.Google Scholar
Walt, S. M. (1991) “The Renaissance of Security Studies.” International Studies Quarterly 35(2): 211–239.CrossRefGoogle Scholar
Walt, S. M. (2002) “The Enduring Relevance of the Realist Tradition.” Political Science: the State of the Discipline. Katznelson, I., and Miller, H. V. (eds.) New York: Norton: 197–234.Google Scholar
Walt, S. M. (2009) “Alliances in a Unipolar World.” World Politics 61(1): 86–120.CrossRefGoogle Scholar
Walters, W. (2002) “Deportation, Expulsion, and the International Police of Aliens.” Citizenship Studies 6(3): 265–292.CrossRefGoogle Scholar
Walters, William (2004) “Secure Borders, Safe Haven, Domopolitics.” Citizenship Studies 8(3): 237–260.CrossRefGoogle Scholar
Waltz, K. N. (1959) Man, the State, and War: A Theoretical Analysis. New York: Columbia University Press.Google Scholar
Waltz, K. N. (1979) Theory of International Politics. Reading, MA: Addison-Wesley.Google Scholar
Waltz, K. N. (1981) “The Spread of Nuclear Weapons: More May Better.” Adelphi Papers 171. London: International Institute for Strategic Studies.Google Scholar
Waltz, K. N. (1990) “Realist Thought and Neorealist Theory.” Journal of International Affairs 44(1): 21–37.Google Scholar
Walzer, M. (2000) Just and Unjust Wars: a Moral Argument with Historical Illustrations, New York: Basic Books.Google Scholar
Walzer, M. (2006) Just and Unjust Wars. a Moral Argument with Historical Illustrations, New York: Basic Books.Google Scholar
Waterston, A. (1997) Street Addicts in the Political Economy. Philadelphia: Temple University Press.Google Scholar
Weil, P. (1983) “Towards Relative Normativity in International Law?American Journal of International Law 77(3): 413–442.CrossRefGoogle Scholar
Weldes, J., Laffey, M., Gusterson, H.et al. (1999) Cultures of Insecurity: States, Communities, and the Production of Danger. Minneapolis: University of Minnesota Press.Google Scholar
Welker, M. A. (2009) “Corporate Security Begins in the Community: Mining, the Corporate Social Responsibility Industry, and Environmental Advocacy in Indonesia.” Cultural Anthropology 24(1): 142–179.CrossRefGoogle Scholar
Wendt, A. (1987) “The Agent-Structure Problem in International Relations Theory.” International Organization 41(3): 335–370.CrossRefGoogle Scholar
Wendt, A. (1992) “Anarchy Is What States Make of It: The Social Construction of Power Politics.” International Organization 46(2): 391–425.CrossRefGoogle Scholar
Wendt, A. (1994) “Collective Identity Formation and the International State.” American Political Science Review 88(2): 384–396.CrossRefGoogle Scholar
Wendt, A. (1995) “Constructing International Politics.” International Security: 71–81.CrossRef
Wendt, A. (1999) Social Theory of International Politics. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Werner, W. G., (2010) “The Use of Law in International Political Sociology.” International Political Sociology (4): 3.Google Scholar
White, A. (2011) “The New Political Economy of Private Security.” Theoretical Criminology 16(1): 85–101.Google Scholar
White, R. (2009) Global Environmental Harm: Criminological Perspectives. Cullumpton, Devon: Willan.Google Scholar
Wieviorka, M. (2009) Violence: A New Approach (translated by Macey, D.). Los Angeles: Sage.Google Scholar
Wight, C. (2006) Agents, Structures and International Relations: Politics as Ontology. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Wildavsky, A. (1988) Searching for Safety. New Brunswick, NJ: Transaction.Google Scholar
Wilder, D. A. (1984) “Intergroup Contact: The Typical Member and the Exception to the Rule.” Journal of Experimental Social Psychology 20: 177–194.CrossRefGoogle Scholar
Wilder, D. A. (1993) “The Role of Anxiety in Facilitating Stereotypic Judgments of Outgroup Behavior.” In Mackie, D. M., and Hamilton, D. (eds.) Affect, Cognition, and Stereotyping: Interactive Processes in Group Perception. San Diego, CA: Academic Press, 87–109.Google Scholar
Wilkinson, C. (2011) “The Limits of Spoken Words: From Meta-Narratives to Experience in Security.” In Balzacq, T. (ed.) Securitization Theory: How Security Problems Emerge and Dissolve. London: Routledge: 94–115.Google Scholar
Williams, B. (1981) Moral Luck. Oxford: Oxford University Press.CrossRefGoogle Scholar
Williams, M. C. (2003) “Words, Images, Enemies: Securitization and International Politics.” International Studies Quarterly 47(4): 511–531.CrossRefGoogle Scholar
Williams, M. C. (2007) Culture and Security: Symbolic Power and the Politics of International Security. London: Routledge.CrossRefGoogle Scholar
Williams, M. C. (2011) “Securitization and the Liberalism of Fear.” Security Dialogue 42(4–5): 453–463.CrossRefGoogle Scholar
Williams, M. C., and Krause, K. (1997) “Preface: Toward Critical Security Studies.” Critical Security Studies: Concepts and Cases. Minneapolis: University of Minnesota Press, vvi–xxi.Google Scholar
Williams, M. J. (2008) “(In)Security Studies, Reflexive Modernization and the Risk Society.” Cooperation and Conflict 43(1): 57–79.CrossRefGoogle Scholar
Williams, P. (2013) Security Studies: An Introduction, London: Routledge.Google Scholar
Williamson, O. E. (2000) “The New Institutional Economics: Taking Stock, Looking Ahead.” Journal of Economic Literature 38(3): 595–613.CrossRefGoogle Scholar
Wilson, R. A. (ed.) (2005) Human Rights in the “War on Terror.”Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Wilson, S., and Ebert, N. (2013) “Precarious Work: Economic, Sociological and Political Perspectives.” The Economic and Labour Relations Review 24(3): 263–278.CrossRefGoogle Scholar
Wilson, T. D., Aronson, E., and Carlsmith, K. (2010) “The Art of Laboratory Experimentation.” In Fiske, S. T., Gilbert, D. T., and Lindzey, G. (eds.) Handbook of Social Psychology, Vol. 1. Hoboken, NJ: Wiley, 51–81.Google Scholar
Wimmer, A. (2012) Waves of War: Nationalism, State Formation, and Ethnic Exclusion in the Modern World. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Wishnie, M. J. (2003) “Immigrants and the Right to Petition.” NYU Law Review 78: 667–748.Google Scholar
Wisner, B., Blaikie, P., Cannon, T.et al. (2004) At Risk: Natural Hazards, People's Vulnerability and Disasters, London: Routledge.Google Scholar
Wittgenstein, L. (1953) Philosophical Investigations. Oxford: Basil Blackwell.Google Scholar
Wohlforth, W. C. (1993) The Elusive Balance: Power and Perceptions during the Cold War. Ithaca, NY: Cornell University Press.Google Scholar
Wohlforth, W. C. (2009) “Statement from the New Editor-in-Chief.” Security Studies 18(1): 1–3.CrossRefGoogle Scholar
Wohlforth, W. C., Little, R., Kaufman, S. J.et al. (2007) “Testing Balance-of-Power Theory in World History.” European Journal of International Relations 13(2): 155–185.CrossRefGoogle Scholar
Wohlforth, W. C. (2011) “No-One Loves a Realist Explanation.” International Politics 48(4/5): 441–459.CrossRefGoogle Scholar
Wohlforth, William C. (2009) “Realism and Security Studies.” In Dunn Cavelty, M., and Mauer, V. (eds.) The Routledge Handbook for Security Studies. London: Routledge, 9–20.Google Scholar
Wolf, E. R. (1999) Peasant Wars of the Twentieth Century. Norman: University of Oklahoma Press.Google Scholar
Wolfers, A. (1952) “‘National Security’ as an Ambiguous Symbol.” Political Science Quarterly 67(4): 481–502.CrossRefGoogle Scholar
Wood, J., and Dupont, B. (eds.) (2006) Democracy, Society and the Governance of Security. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Wood, J., and Shearing, C. (2007) Imagining Security. London: Routledge.Google Scholar
Woodward, R. (2005) “From Military Geography to Militarism's Geographies: Disciplinary Engagements with the Geographies of Militarism and Military Activities.” Progress in Human Geography 29(6): 718–740.CrossRefGoogle Scholar
Wright, M. W. (2013) “Feminicidio, Narcoviolence, and Gentrification in Ciudad Juarez: The Feminist Fight.” Environment and Planning D: Society and Space 31(5): 830–845.CrossRefGoogle Scholar
Wright, S. C., Aron, A., and Tropp, L. R. (2002) Including Others (and Groups) in the Self: Self-Expansion and Intergroup Relations. In Forgas, J. P., and Williams, K. D. (eds.) The Social Self: Cognitive, Interpersonal and Intergroup Perspectives. Philadelphia: Psychology Press, 343–363.Google Scholar
Yar, M. (2013) Cybercrime and Society. London: Sage.Google Scholar
Yarwood, R. (2007) “The Geographies of Policing.” Progress in Human Geography 31(4): 447–465.CrossRefGoogle Scholar
Zack, N. (2009) Ethics for Disaster. Lanham, MD: Rowman & Littlefield.Google Scholar
Zagare, F. C., and Kilgour, M. D. (2000) Perfect Deterrence. Cambridge: Cambridge University Presss.CrossRefGoogle Scholar
Zalewski, M., and Enloe, C. (1995) “Questions about Identity in International Relations.” In Booth, K. and Smith, S. (eds.) International Relations Theory Today. London: Polity, 279–305.Google Scholar
Zedner, L. (2003) “The Concept of Security: An Agenda for Comparative Analysis.” Legal Studies 23: 153.CrossRefGoogle Scholar
Zedner, L. (2006) “Policing before and after the Police: The Historical Antecedents of Contemporary Crime Control.” British Journal of Criminology 46(1): 78–96.CrossRefGoogle Scholar
Zedner, L. (2009) Security. London: Routledge.Google Scholar
Zeiderman, A. (2013) “Living Dangerously: Biopolitics and Urban Citizenship in Bogotá, Colombia.” American Ethnologist 40(1): 71–87.CrossRefGoogle Scholar
Zick, A., Pettigrew, T. F., and Wagner, U. (2008) “Ethnic Prejudice and Discrimination in Europe.” Journal of Social Issues 64(2): 233–251.CrossRefGoogle Scholar
Ziegler, J. N. (1991) “Semiconductors.” Daedalus 120(4): 155–182.Google Scholar
Zilberg, E. (2011) Spaces of Detention: The Making of a Transnational Gang Crisis between Los Angeles and San Salvador. Durham, NC: Duke University Press.CrossRefGoogle Scholar
Zürn, M., Binder, M., and Ecker-Ehrhardt, M. (2012) “International Authority and Its Politicization.” International Theory 4(1): 69–106.CrossRefGoogle Scholar
Council of Canadian Academies (2014) Future of Canadian Policing Models. Ottawa: Council of Canadian Academies.
Dutch Advisory Committee on Issues of Public International Law, Armed Drones, 2013: http://cms.webbeat.net/ContentSuite/upload/cav/doc/Main_conclusions_of_CAVV_advice_on_armed_drones.pdf.
Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, 18 September 2013, General Assembly, A/68/389;
Tallinn Manual on the International Law Applicable to Cyber Warfare: Prepared by the International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence, Schmitt, Michael N. (general ed.) Cambridge: Cambridge University Press 2013.Google Scholar
American Society of International Law Website: www.asil.org/mission.cfm (accessed July 22, 2013)
African Society of International Law Website: www.aail-aadi.org/#!about-us/ch88 (accessed July 22, 2013)
Asian Society of International Law Website: http://asiansil-jp.org/en/ (accessed July 22, 2013)
Australian and New Zealand Society of International Law Website: http://anzsil.anu.edu.au/; (accessed July 22, 2013)
European Society of International Law Website, at: www.esil-sedi.eu/node/177 (accessed 22 July 2013)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Edited by Philippe Bourbeau, University of Cambridge
  • Book: Security
  • Online publication: 05 December 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316227671.011
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Edited by Philippe Bourbeau, University of Cambridge
  • Book: Security
  • Online publication: 05 December 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316227671.011
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Edited by Philippe Bourbeau, University of Cambridge
  • Book: Security
  • Online publication: 05 December 2015
  • Chapter DOI: https://doi.org/10.1017/CBO9781316227671.011
Available formats
×