Linked e-resources

Details

Dedication ; Preface; Acknowledgments; Contents; List of Figures; List of Tables; Chapter 1: Introduction; Perceptions ofßThreat andßTheories ofßInternational Security; Research Design andßHypothesis; Overview; Hypothesis; Variables; Hypothesis Overview: Systems Creation Versus Systems Destruction; Chapters Outline; Scholarly Contributions andßGoals; Closing Remarks; Notes; Works Cited; Chapter 2: Theoretical Framework; The International System inßWaltzian Realism: Capabilities-Centric; The International System Today: Vulnerabilities-Centric.

Vulnerability andßtheßImportance ofßReferent Objects: Human Beings, Not StatesSystemic Vulnerabilities andßTheir Origins: Defining Its Distribution AcrossßStates; Gaining andßLosing State Power Status: TheßImportance ofßStudying theßDistribution ofßVulnerabilities toßPeriods ofßSystemic Change; The Role ofßtheßHegemon: Systems-Creation andßSystems-Destruction; Interventions: TheßDuty ofßtheßHegemon; Conclusion: TheßInternational System inßtheßTwenty-First Century; Note; Works Cited; Chapter 3: State and Power Vulnerability; Sources ofßSystemic State Vulnerability.

Systemic Reach ofßState VulnerabilityPrescriptions: TheßBalance ofßPower Containment Foreign Policy; Conclusion; Notes; Works Cited; Chapter 4: Economic Vulnerability; Sources ofßSystemic Economic Vulnerability; Systemic Reach ofßEconomic Vulnerability; Russia: TheßLimits ofßRevisionism; United States Power: TheßEconomy asßArchitect andßAchilles Heel; China's Domestic Overstretch; Overview; Prescriptions: Economic Development andßGlobal Governance3; Conclusion; Notes; Works Cited; Chapter 5: Environmental andßHealth Vulnerabilities; Sources ofßEnvironmental/Health Systemic Vulnerability.

Systemic ReachPotential Prescriptions: Working WithinßDisembedded Liberalism; Conclusion; Works Cited; Chapter 6: Political Vulnerabilities andßTransnational Threats; Sources ofßSystemic Political Vulnerabilities; Systemic Reach ofßPolitical Vulnerability; Potential Prescriptions: Smarter Strategies; Silence is Golden Strategy andßtheßMushroom Effect: TheßLessons ofßSun Tzu; Conclusion; Notes; Works Cited; Chapter 7: Cyber-Vulnerability; Sources ofßSystemic Cyber-Vulnerabilities; Systemic Reach ofßCyber-Vulnerabilities; Potential Prescriptions: No Easy Task; Conclusions; Works Cited.

Chapter 8: Recommendations: Desecuritization, Prioritization andßDefensive Foreign PolicyForeign Policy inßtheßTwenty-First Century: TowardßaßDefensive Foreign Policy; Systemic Vulnerabilities: Decision-Makers andßThinking; Priortization ThroughßDesecuritization: Shifting Focus1; Desecuritization asßaßProcess ofßReprioritization; Ranked Order ofßPrioritization; Public Goods andßHuman Security: Systems Survival; Conclusion; Note; Works Cited; Chapter 9: Think Weak, Act Weak: AßLook into State Mentalities; Introduction; Mentalities andßtheßProcess ofßMutual Constitution: TheßFramework.

Browse Subjects

Show more subjects...

Statistics

from
to
Export