- Preface
- Acknowledgements
- New to this Edition
- Notes on Contributors
- List of Figures
- List of Tables
- List of Boxes
- How to use this Book
- Online Resources
- 1. Introduction: What is Security Studies?
- Part 1 Approaches to Security
- 2. Realism
- 3. Liberalism and Liberal Internationalism
- 4. Historical Materialism
- 5. Peace Studies
- 6. Social Constructivism
- 7. Critical Security Studies: A Schismatic History
- 8. Poststructural Insights: Making Subjects and Objects of Security
- 9. Postcolonialism
- 10. Human Security
- 11. Gender and Security
- 12. Securitization
- Part 2 Deepening and Broadening Security
- 13. Military Security
- 14. Regime Security
- 15. Societal Security
- 16. Environmental Security
- 17. Economic Security
- 18. Globalization, Development, and Security
- Part 3 Traditional and Non-Traditional Security
- 19. Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts
- 20. Weapons of Mass Destruction
- 21. Terrorism
- 22. Humanitarian Intervention
- 23. Energy Security
- 24. The Weapons Trade
- 25. Health and Security
- 26. Transnational Crime
- 27. Cyber-Security
- 28. After the Return to Theory: The Past, Present, and Future of Security Studies
- Glossary
- References
- Index
(p. 253) 17. Economic Security
- Chapter:
- (p. 253) 17. Economic Security
- Author(s):
Gary M. Shiffman
- DOI:
- 10.1093/hepl/9780198804109.003.0017
This chapter examines the concept of economic security as a framework for analysing and countering organized violence. It first provides a brief historical overview of the economic science of security and applies economic theory to Security Studies. Through various case studies, this approach allows the reader to understand how states leverage traditional economic tools to influence, alter, and deter another actor’s behaviour. The chapter considers three categories of organized violence: warfare, crime, and insurgency. It shows that the various decision makers involved in combating organized violence have different goals and face different constraints. It also describes five vectors of economic incentives: goals, resource constraints, institutional constraints, information, and time. Finally, it discusses four economic tools of security policy: sanctions, trade, finance, and aid.
Access to the complete content on Politics Trove requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
Please subscribe or login to access full text content.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.
For questions on access or troubleshooting, please check our FAQs, and if you can't find the answer there, please contact us.
- Preface
- Acknowledgements
- New to this Edition
- Notes on Contributors
- List of Figures
- List of Tables
- List of Boxes
- How to use this Book
- Online Resources
- 1. Introduction: What is Security Studies?
- Part 1 Approaches to Security
- 2. Realism
- 3. Liberalism and Liberal Internationalism
- 4. Historical Materialism
- 5. Peace Studies
- 6. Social Constructivism
- 7. Critical Security Studies: A Schismatic History
- 8. Poststructural Insights: Making Subjects and Objects of Security
- 9. Postcolonialism
- 10. Human Security
- 11. Gender and Security
- 12. Securitization
- Part 2 Deepening and Broadening Security
- 13. Military Security
- 14. Regime Security
- 15. Societal Security
- 16. Environmental Security
- 17. Economic Security
- 18. Globalization, Development, and Security
- Part 3 Traditional and Non-Traditional Security
- 19. Coercive Diplomacy: Countering War-Threatening Crises and Armed Conflicts
- 20. Weapons of Mass Destruction
- 21. Terrorism
- 22. Humanitarian Intervention
- 23. Energy Security
- 24. The Weapons Trade
- 25. Health and Security
- 26. Transnational Crime
- 27. Cyber-Security
- 28. After the Return to Theory: The Past, Present, and Future of Security Studies
- Glossary
- References
- Index