FREE SHIPPING BOTH WAYS
ON EVERY ORDER!
LIST PRICE:
$145.00

OUR PRICE:
$100.49

You may extend rentals at any time.


Contesting Security : Strategies and Logics

ISBN: 9780415643863 | 0415643864
Edition: 1st
Format: Hardcover
Publisher: Routledge
Pub. Date: 1/11/2015

Why Rent from Knetbooks?

Because Knetbooks knows college students. Our rental program is designed to save you time and money. Whether you need a textbook for a semester, quarter or even a summer session, we have an option for you. Simply select a rental period, enter your information and your book will be on its way!

Top 5 reasons to order all your textbooks from Knetbooks:

  • We have the lowest prices on thousands of popular textbooks
  • Free shipping both ways on ALL orders
  • Most orders ship within 48 hours
  • Need your book longer than expected? Extending your rental is simple
  • Our customer support team is always here to help
This book aims to address the issue of what the extent to which the 'logic of security', which underpins securitization, can be contained, rolled back or dismantled. One obstacle to studying how and whether security can be contested is perhaps the entrenched discussions between proponents of desecuritization and students of emancipation. Moreover, within each camp, scholars disagree, often strongly, upon the meaning of the concept they use and upon what it entails in practice. Recently, two new concepts have been invoked in order to capture different modalities of contesting the logic of security, namely resistance and resilience. As useful as such concepts might be, though, they put forward their own interpretations and generally ignore others. One aim of this volume is to bring different approaches that aim to counter security logic to confront one another and substantiate their respective analytical value, through empirical evidence. The book comprises four sections, each investigating one specific modality of contesting security: desecuritization, emancipation, resistance and resilience. The overriding objective of this volume is to clearly map out the different ways in which a dominant register of meaning that shapes a specific security formation is debased. These strategies are examined, compared and assessed, in different political and cultural environments. This book will be of much interest to students of critical security studies, securitisation theory, social theory, and IR in general.


Please wait while this item is added to your cart...