- Preface
- Acknowledgements
- New to this edition
- Notes on Contributors
- List of Figures
- List of Tables
- List of Boxes
- Guided Tour of Learning Features
- Guided Tour of the Online Resource Centre
- 1. Introduction
- Part 1 Approaches to Security
- 2. Realism
- 3. Liberalism
- 4. Historical Materialism
- 5. Peace Studies
- 6. Social Constructivism
- 7. Critical Security Studies
- 8. Critical Interventions
- 9. Postcolonialism
- 10. Human Security
- 11. Gender and Security
- 12. Securitization
- Part 2 Deepening and Broadening Security
- 13. Military Security
- 14. Regime Security
- 15. Societal Security
- 16. Environmental Security
- 17. Economic Security
- 18. Globalization, Development, and Security
- Part 3 Traditional and Non-Traditional Security
- 19. Coercive Diplomacy
- 20. Weapons of Mass Destruction
- 21. Terrorism
- 22. Humanitarian Intervention
- 23. Energy Security
- 24. The Weapons Trade
- 25. Health and Security
- 26. Transnational Crime
- 27. Cyber-Security
- 28. After the Return to Theory
- Glossary
- References
- Index
(p. 277) Part 3 Traditional and Non-Traditional Security
- Author(s):
Alan Collins
This chapter examines how coercive diplomacy has emerged as a strategy for states in dealing with the opponent without resorting to full-scale war. Coercive diplomacy involves the use of military threats and/or limited force (sticks) coupled with inducements and assurances (carrots) in order to influence the opponent to do something it would prefer not to. This chapter first explains what coercive diplomacy is and considers its requirements for success. It then shows how states have employed coercive diplomacy to manage crises and conflicts during the three strategic eras that followed the end of the Cold War. It also discusses the importance of the strategic context in shaping the use of coercive diplomacy by presenting two case studies, one relating to the United States’s conflict with Libya due to the latter’s weapons of mass destruction, and the other relating to Russia’s military involvement in Ukraine.
Access to the complete content on Politics Trove requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
Please subscribe or login to access full text content.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.
For questions on access or troubleshooting, please check our FAQs, and if you can't find the answer there, please contact us.
- Preface
- Acknowledgements
- New to this edition
- Notes on Contributors
- List of Figures
- List of Tables
- List of Boxes
- Guided Tour of Learning Features
- Guided Tour of the Online Resource Centre
- 1. Introduction
- Part 1 Approaches to Security
- 2. Realism
- 3. Liberalism
- 4. Historical Materialism
- 5. Peace Studies
- 6. Social Constructivism
- 7. Critical Security Studies
- 8. Critical Interventions
- 9. Postcolonialism
- 10. Human Security
- 11. Gender and Security
- 12. Securitization
- Part 2 Deepening and Broadening Security
- 13. Military Security
- 14. Regime Security
- 15. Societal Security
- 16. Environmental Security
- 17. Economic Security
- 18. Globalization, Development, and Security
- Part 3 Traditional and Non-Traditional Security
- 19. Coercive Diplomacy
- 20. Weapons of Mass Destruction
- 21. Terrorism
- 22. Humanitarian Intervention
- 23. Energy Security
- 24. The Weapons Trade
- 25. Health and Security
- 26. Transnational Crime
- 27. Cyber-Security
- 28. After the Return to Theory
- Glossary
- References
- Index