12.07.2015 Views

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

eferences 279Baudrillard, Jean (1995) The Gulf War Did Not Take Place, Bloomington: IndianaUniversity Press.Baylis, John, Ken Booth, John Garnett and Phil Williams (1975) ContemporaryStrategy: Theories and Policies, London:CroomHelm.(1987) Contemporary Strategy: Theories and Concepts, vol.1,London:CroomHelm.Beaton, Leonard (1966) Must <strong>the</strong> Bomb Spread? Harmondsworth: Penguin.Beaufre, Andre (1965) An Introduction to Strategy, London: Faber & Faber.Becher, Klaus (2004) ‘Has-been, Wannabe or Leader: Europe’s Role in <strong>the</strong> WorldAfter <strong>the</strong> 2003 European Security Strategy’, European Security, 13:4, 345–59.Beck, Ulrich (1992) Risk Society: Towards a New Modernity, London:SAGE.(1999) World Risk Society, Cambridge: Polity Press.(2002) ‘The Terrorist Threat: World Risk Society Revisited’, Theory, Culture andSociety, 19:4, 39–55.Becker, Joerg (1973) ‘Racism in Children’s and Young People’s Literature in <strong>the</strong>Western World’, Journal <strong>of</strong> Peace Research, 10:3, 295–303.Beeson, Mark (2006) ‘American Hegemony and Regionalism: The Rise <strong>of</strong> East Asiaand <strong>the</strong> End <strong>of</strong> <strong>the</strong> Asia–Pacific’, Geopolitics, 11:4, 541–60.Behnke, Andreas (2006) ‘No Way Out: Desecuritization, Emancipation and <strong>the</strong>Eternal Return <strong>of</strong> <strong>the</strong> Political – A Reply to Aradau’, Journal <strong>of</strong> InternationalRelations and Development, 9:1, 62–9.Beier, J. Marshall (2007) ‘Grave Misgivings: Allegory, Catharsis, Composition’,Security Dialogue, 38:2, 251–70.Bell, Colleen (2006) ‘Biopolitical Governance in Canada’s National Security Policy’,Security Dialogue, 37:2, 147–65.Bell, J. Bowyer (1975) Transnational Terror, Washington, DC; Stanford, CA, AmericanEnterprise Institute for Public Policy Research; Hoover Institution onWar, R<strong>evolution</strong> and Peace (AEI-Hoover Policy Studies, 17. Hoover InstitutionStudies, 53).Bellamy, Alex J. and Matt McDonald (2002) ‘“The Utility <strong>of</strong> Human Security”:Which Humans? What Security? A Reply to Thomas and Tow’, Security Dialogue,33:3, 373–77.Bellany, Ian (1975) ‘The Richardson Theory <strong>of</strong> “Arms Races”: Themes and Variations’,British Journal <strong>of</strong> International Studies, 1:2, 19–30.(1996) ‘Defensive Arms and <strong>the</strong> Security Dilemma: A Cybernetic Approach’,Journal <strong>of</strong> Peace Research, 33:3, 262–71.(ed.) (2007) Terrorism and Weapons <strong>of</strong> Mass Destruction, Basingstoke: Palgrave.Bendrath, Ralph (2003) ‘The American Cyber-Angst and <strong>the</strong> Real World – AnyLink?’, in Robert Latham (ed.) Bombs and Bandwith: The Emerging RelationshipBetween Information Technology and Security, New York: The New Press,49–73.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!