- Preface
- Acknowledgements
- New to this edition
- Notes on Contributors
- List of Figures
- List of Tables
- List of Boxes
- Guided Tour of Learning Features
- Guided Tour of the Online Resource Centre
- 1. Introduction
- Part 1 Approaches to Security
- 2. Realism
- 3. Liberalism
- 4. Historical Materialism
- 5. Peace Studies
- 6. Social Constructivism
- 7. Critical Security Studies
- 8. Critical Interventions
- 9. Postcolonialism
- 10. Human Security
- 11. Gender and Security
- 12. Securitization
- Part 2 Deepening and Broadening Security
- 13. Military Security
- 14. Regime Security
- 15. Societal Security
- 16. Environmental Security
- 17. Economic Security
- 18. Globalization, Development, and Security
- Part 3 Traditional and Non-Traditional Security
- 19. Coercive Diplomacy
- 20. Weapons of Mass Destruction
- 21. Terrorism
- 22. Humanitarian Intervention
- 23. Energy Security
- 24. The Weapons Trade
- 25. Health and Security
- 26. Transnational Crime
- 27. Cyber-Security
- 28. After the Return to Theory
- Glossary
- References
- Index
(p. 87) 7. Critical Security Studies: A Schismatic History
- Chapter:
- (p. 87) 7. Critical Security Studies: A Schismatic History
- Author(s):
David Mutimer
- DOI:
- 10.1093/hepl/9780198708315.003.0007
This chapter provides a partial history of the label ‘Critical Security Studies’ and the way it has developed and fragmented since the early 1990s. It considers the primary claims of the major divisions that have emerged within the literatures to which the label has been applied: constructivism, critical theory, and poststructuralism. It looks at the 1994 conference held at York University in Toronto entitled Strategies in Conflict: Critical Approaches to Security Studies, which spawned a book called Critical Security Studies: Concepts and Cases (1997b), and Security: A New Framework for Analysis (1998), which was published to serve as a relatively comprehensive statement of ‘securitization studies’, or the Copenhagen School. The chapter argues that Critical Security Studies needs to foster an ‘ethos of critique’ in either the study or refusal of security. Finally, it examines Ken Booth’s views on poststructuralism as part of a broad Critical Security Studies.
Access to the complete content on Politics Trove requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
Please subscribe or login to access full text content.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.
For questions on access or troubleshooting, please check our FAQs, and if you can't find the answer there, please contact us.
- Preface
- Acknowledgements
- New to this edition
- Notes on Contributors
- List of Figures
- List of Tables
- List of Boxes
- Guided Tour of Learning Features
- Guided Tour of the Online Resource Centre
- 1. Introduction
- Part 1 Approaches to Security
- 2. Realism
- 3. Liberalism
- 4. Historical Materialism
- 5. Peace Studies
- 6. Social Constructivism
- 7. Critical Security Studies
- 8. Critical Interventions
- 9. Postcolonialism
- 10. Human Security
- 11. Gender and Security
- 12. Securitization
- Part 2 Deepening and Broadening Security
- 13. Military Security
- 14. Regime Security
- 15. Societal Security
- 16. Environmental Security
- 17. Economic Security
- 18. Globalization, Development, and Security
- Part 3 Traditional and Non-Traditional Security
- 19. Coercive Diplomacy
- 20. Weapons of Mass Destruction
- 21. Terrorism
- 22. Humanitarian Intervention
- 23. Energy Security
- 24. The Weapons Trade
- 25. Health and Security
- 26. Transnational Crime
- 27. Cyber-Security
- 28. After the Return to Theory
- Glossary
- References
- Index