scispace - formally typeset
Journal ArticleDOI

The Renaissance of Security Studies

Stephen M. Walt
- 01 Jun 1991 - 
- Vol. 35, Iss: 2, pp 211-239
Reads0
Chats0
TLDR
A survey of the evolution of security studies, focusing on recent developments in the field can be found in this article, which provides a guide to the current research agenda and some practical lessons for managing the field in the years ahead.
Abstract
This article examines the evolution of security studies, focusing on recent developments in the field. It provides a survey of the field, a guide to the current research agenda, and some practical lessons for managing the field in the years ahead. Security studies remains an interdisciplinary enterprise, but its earlier preoccupation with nuclear issues has broadened to include topics such as grand strategy, conventional warfare, and the domestic sources of international conflict, among others. Work in the field is increasingly rigorous and theoretically inclined, which reflects the marriage between security studies and social science and its improved standing within the academic world. Because national security will remain a problem for states and because an independent scholarly community contributes to effective public policy in this area, the renaissance of security studies is an important positive development for the field of international relations.

read more

Content maybe subject to copyright    Report

The Renaissance of Security Studies
Author(s): Stephen M. Walt
Source:
International Studies Quarterly,
Vol. 35, No. 2 (Jun., 1991), pp. 211-239
Published by: Blackwell Publishing on behalf of The International Studies Association
Stable URL: http://www.jstor.org/stable/2600471
Accessed: 09/02/2010 21:42
Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at
http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless
you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you
may use content in the JSTOR archive only for your personal, non-commercial use.
Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at
http://www.jstor.org/action/showPublisher?publisherCode=black.
Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed
page of such transmission.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of
content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms
of scholarship. For more information about JSTOR, please contact support@jstor.org.
The International Studies Association and Blackwell Publishing are collaborating with JSTOR to digitize,
preserve and extend access to International Studies Quarterly.
http://www.jstor.org





Citations
More filters
Journal ArticleDOI

Human Security: Paradigm Shift or Hot Air?

TL;DR: Although deanitions of human security vary, most formulations emphasize the welfare of ordinary people.
Journal ArticleDOI

The Three Faces of Securitization: Political Agency, Audience and Context

TL;DR: It is argued that a speech act view of security does not provide adequate grounding upon which to examine security practices in ‘real situations’, and three basic assumptions are put forward that an effective securitization is audience-centered, context-dependent and power-laden.
Book

The Evolution of International Security Studies

TL;DR: A survey of the literature and institutions of International Security Studies (ISS) can be found in this paper, along with a detailed institutional account of ISS in terms of its journals, departments, think tanks and funding sources.
Book

국제정치이론 = Theory of international politics

TL;DR: The seeker after the truth is not one who studies the writings of the ancients and, following his natural disposition, puts his trust in them, but rather, one who suspects his faith in them and questions what he gathers from them, the one who submits to argument and demonstration, and not to the sayings of a human being whose nature is fraught with all kinds of imperfection and deformation as mentioned in this paper.
References
More filters
Journal ArticleDOI

Beyond Rational Deterrence: The Struggle for New Conceptions

Abstract: Throughout the nuclear era, United States strategic defense policy has been conceptualized in terms of the rational theory of decision. Though this has been on balance a happy arrangement for the primary policy of deterrence, there are anomalies in the theory which make its extension to problems of arms control problematic and which lead to well-known doubts about crisis stability. Given the seriousness of the latter issues, it is well to consider the implications of alternative theories of the decision process. A competitive theory of the decision process can be found; that theory, labeled here the cybernetic theory, leads to distinctly different conclusions concerning major matters of defense policy such as force sizing, force targeting, and arms-negotiation strategy. It is very unlikely that such an unfamiliar and underdeveloped theory could either quickly or completely replace established rational conceptions of defense policy, but some plausible marginal adjustments are suggested.
Journal ArticleDOI

Détente and Deterrence: Anglo-German Relations, 1911-1914

TL;DR: The First World War is often cited as an example of inadvertent conflict caused by unduly bellicose foreign and military policies as discussed by the authors, and several variations on this theme have been prominent.
Book

New Weapons, Old Politics: America's Military Procurement Muddle

TL;DR: McNaugher as discussed by the authors argues that the technical needs of engineers and military planners clash sharply with the political demands of Congress and argues that time and flexibility are precisely what political pressures remove from the acquisitions process.