12.07.2015 Views

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

288 referencesCarmola, Kateri (2007) Private Security Contractors and New Wars: Risk, Law andEthics, London: Routledge.Carpenter, R. Charli (2002) ‘Gender Theory in World Politics: Contributionsfrom a Nonfeminist Standpoint?’, International Studies Review, 4:3, 153–65.(2003) ‘Women and Children First: Gender, Norms, and Humanitarian Evacuationin <strong>the</strong> Balkans 1991–1995’, International Organization, 57:4, 661–94.(2006) ‘Recognizing Gender-based Violence Against Civilian Men and Boys inConflict Situations’, Security Dialogue, 37:1, 83–104.Carpenter, Ted G. (1991) ‘The New World Disorder’, Foreign Policy, 84, 24–39.(1998) ‘Managing a Great Power Relationship: The US, China and East AsianSecurity’, Journal <strong>of</strong> Strategic Studies, 21:1, 1–20.(2003) ‘The Bush Administration’s Security Strategy: Implications for TransatlanticRelations’, Cambridge Review <strong>of</strong> International Affairs, 16:3, 511–24.Carr, Caleb (1996/7) ‘Terrorism as Warfare: The Lessons <strong>of</strong> Military History’, WorldPolicy Journal, 13:4, 1–12.Carr, E. H. (1946) The Twenty Years’ Crisis, 1919–1939: An Introduction to <strong>the</strong> Study<strong>of</strong> International Relations, 2nd edn, London: Macmillan.Carranza, Mario E. (2002) ‘At <strong>the</strong> Crossroads: US Non-proliferation Policy TowardsSouthAsiaAfter<strong>the</strong>IndianandPakistaniTests’,Contemporary Security Policy,23:1, 93–128.(2006) ‘Can <strong>the</strong> NPT Survive? The Theory and Practice <strong>of</strong> US Nuclear NonproliferationPolicy after September 11’, Contemporary Security Policy, 27:3,489–525.(2007) ‘From Non-Proliferation to Post-Proliferation: Explaining <strong>the</strong> US–IndiaNuclear Deal’, Contemporary Security Policy, 28:3, 464–93.Carson, Rachel (1962 [1991]) Silent Spring, Harmondsworth: Penguin.Carter, Ashton B. (2001/2) ‘The Architecture <strong>of</strong> Government in <strong>the</strong> Face <strong>of</strong> Terrorism’,International Security, 26:3, 5–23.Carter, Ashton B., John Deutch and Philip Zelikow (1998) ‘Catastrophic Terrorism’,Foreign Affairs, 77:6, 80–94.Carver, Terrell (ed.) (2003) ‘The Forum: Gender and International Relations’, InternationalStudies Review, 5:2, 287–302.Carver, Terrell, Molly Cochran and Judith Squires (1998) ‘Gendering Jones’, Review<strong>of</strong> International Studies, 24:2, 283–97.CASE (2006) ‘Critical Approaches to Security in Europe: A Networked Manifesto’,Security Dialogue, 37:4, 443–87.Casetti, Emilio (2003) ‘Power Shifts and Economic Development: When Will ChinaOvertake <strong>the</strong> USA?’, Journal <strong>of</strong> Peace Research, 40:6, 661–76.Cassidy, Robert M. (2006) Counterinsurgency and <strong>the</strong> Global War on Terror: MilitaryCulture and Irregular War, Westport: Praeger.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!