Ethical Security Studies: A New Research Agenda

Routledge (2016)

Abstract
At a time of grave ethical failure in global security affairs, this is the first book to bring together emerging theoretical debates on ethics and ethical reasoning within security studies. In this volume, working from a diverse range of perspectives—poststructuralism, liberalism, feminism, just war, securitization, and critical theory—leading scholars in the field of security studies consider the potential for ethical visions of security, and lay the ground for a new field: "ethical security studies". These ethical ‘visions’ of security engage directly with the meaning and value of security and security practice, and consider four key questions: • Who, or what, should be secured? • What are the fundamental grounds and commitments of different security ethics? • Who or what are the most legitimate agents, providers or speakers of security? • What do ethical security practices look like? What ethical principles, arguments, or procedures, will generate and guide ethical security practices? Informed by a rich understanding of the intellectual and historical experience of security, the contributors advance innovative methodological, analytical, political and ethical arguments that represent the cutting edge of the field. This book opens a new phase of collaboration and growth that promises to have great benefits for the more humane, effective and ethical practice of security politics. This book will be of much interest to students of critical security studies, ethics, philosophy, and international relations
Keywords No keywords specified (fix it)
Categories (categorize this paper)
ISBN(s) 9781138912328
Options
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

Our Archive


Upload a copy of this paper     Check publisher's policy     Papers currently archived: 47,149
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

No references found.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

The Fascist Moment: Security, Exclusion, Extermination.Mark Neocleous - 2009 - Studies in Social Justice 3 (1):23-37.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Reve{a,I}Ling the Risks.Wolter Pieters - 2010 - Techne 14 (3):194-206.

Analytics

Added to PP index
2016-01-20

Total views
2 ( #1,309,850 of 2,289,437 )

Recent downloads (6 months)
1 ( #840,769 of 2,289,437 )

How can I increase my downloads?

Downloads

My notes

Sign in to use this feature