12.07.2015 Views

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

eferences 281Bernstein, Richard and Ross Munro (1997) ‘China I: The Coming Conflict withAmerica’, Foreign Affairs, 76:2, 18–32.Bertram, Christoph (1981/2) ‘The Implications <strong>of</strong> Theatre Nuclear Weapons inEurope’, Foreign Affairs, 60:2, 305–26.Betts, Richard K. (1979a) ‘Incentives for Nuclear Weapons: India, Pakistan, Iran’,Asian Survey, 19:11, 1053–72.(1979b) ‘A Diplomatic Bomb for South Africa’, International Security, 4:2, 91–115.(1993) ‘Wealth, Power and Instability: East Asia and <strong>the</strong> United States After <strong>the</strong>Cold War’, International Security, 18:3, 34–77.(1997) ‘Should Strategic Studies Survive’, World Politics, 50:1, 7–33.(1998) ‘The New Threat <strong>of</strong> Mass Destruction’, Foreign Affairs, 77:1, 26–41.(2002) ‘The S<strong>of</strong>t Underbelly <strong>of</strong> American Primacy: Tactical Advantages <strong>of</strong> Terror’,Political Science Quarterly, 117:1, 19–36.Betz, David (2007) ‘Redesigning Land Forces for Wars Amongst <strong>the</strong> People’, ContemporarySecurity Policy, 28:2, 221–43.Bhatia, Shyam (1988) Nuclear Rivals in <strong>the</strong> Middle East, NewYork:Routledge.Bhimaya, Kotera (1994) ‘Nuclear Deterrence in South Asia: Civil–Military Relationsand Decision-making’, Asian Survey, 34:7, 647–61.Bhupendra, Jasani and Frank Barnaby (1984) Verification Technologies: The Casefor Surveillance by Consent, Leamington Spa: Berg.Bi, Jianxiang (2007) ‘The Culture <strong>of</strong> Self-Destruction: Pyongyang’s Struggle forRegime Survival’, Contemporary Security Policy, 28:2, 244–66.Biddle, Stephen (1998) ‘The Past as Prologue: Assessing Theories <strong>of</strong> Future Warfare’,Security Studies, 8:1, 1–74.Biddle, Stephen and Robert Zinkle (1996) ‘Technology, Civil–Military Relationsand Warfare in <strong>the</strong> Developing World’, Journal <strong>of</strong> Strategic Studies, 19:2,171–212.Bigo, Didier (2002) ‘Security and Immigration: Toward a Critique <strong>of</strong> <strong>the</strong> Governmentality<strong>of</strong> Unease’, Alternatives, 27: Supplement, 63–92.Bilgin, Pinar (2003) ‘Individual and Societal Dimensions <strong>of</strong> Security’, InternationalStudies Review, 5:2, 203–22.(2004a) Regional Security in <strong>the</strong> Middle East: A Critical Perspective, London:Routledge.(2004b) ‘Whose “Middle East”? Geopolitical Inventions and Practices <strong>of</strong> Security’,International Relations, 18:1, 25–41.(2004c) ‘International Politics <strong>of</strong> Women’s (In)Security: Rejoinder to MaryCaprioli’, Security Dialogue, 35:4, 499–504.(2008) ‘Thinking Past “Western” IR?’, Third World Quarterly, 29:1, 5–23.Biswas, Shampa (2001) ‘“Nuclear Apar<strong>the</strong>id” as Political Position: Race as a PostcolonialResource?’, Alternatives, 26:4, 485–522.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!