Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-qsmjn Total loading time: 0 Render date: 2024-04-24T05:01:22.521Z Has data issue: false hasContentIssue false

References

Published online by Cambridge University Press:  19 April 2019

Rita Floyd
Affiliation:
University of Birmingham
Get access
Type
Chapter
Information
The Morality of Security
A Theory of Just Securitization
, pp. 212 - 234
Publisher: Cambridge University Press
Print publication year: 2019

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Alkire, S. (2002) Valuing Freedoms: Sen’s Capability Approach and Poverty Reduction. Oxford: Oxford University Press.Google Scholar
Aloyo, E. (2015) ‘Just War Theory and the Last of the “Last Resort”’, Ethics and International Affairs, 29(2), 187201.Google Scholar
Altman, A. and Wellman, C. H. (2008) ‘From Humanitarian Intervention to Assassination: Human Rights and Political Violence’, Ethics, 118 (2), 228257.Google Scholar
Amnesty, International (2017) ‘Europe: Dangerously Disproportionate: The Ever-Expanding National Security State in Europe’, www.amnesty.org/en/documents/eur01/5342/2017/en/.Google Scholar
Amoore, L. and de Goede, M. (eds.) (2008) Risk and the War on Terror. London: Routledge.Google Scholar
Andrieu, K. (2009) ‘“Sorry for the Genocide”: How Public Apologies Can Help Promote National Reconciliation’, Millennium – Journal of International Studies, 38(1), 323.Google Scholar
Anscombe, E. (1957) Intention. Oxford: Basil Blackwell.Google Scholar
Aradau, C. (2004) ‘Security and the Democratic Scene: Desecuritization and Emancipation’, Journal of International Relations and Development, 7, 388413.Google Scholar
Aradau, C and Van Munster, R. (2007) ‘Governing Terrorism Through Risk: Taking Precautions, (un)Knowing the Future’, European Journal of International Relations, 13(1), 89115.Google Scholar
Aradau, C. Huysmans, J. Neal, A. and Voelkner, N. (2014) Critical Security Methods: New Frameworks For Analysis. Abingdon: Routledge.Google Scholar
Recon, Arizona Border (2018) ‘Rules of Engagement’, accessed 19 June 2018, www.arizonaborderrecon.org/wp-content/uploads/2016/01/AZBR-POLICY-ROE-REV12022015.pdf.Google Scholar
Ashby Wilson, R (ed.) (2005) Human Rights in the War on Terror. Cambridge: Cambridge University Press.Google Scholar
Ashworth, And rew and Zedner, Lucia (2014) Preventative Justice. Oxford: Oxford University Press.Google Scholar
Aus DFAT (Department of Foreign Affairs and Trade) (2013) ‘Kiribati country brief’, accessed 14 August 2013, www.dfat.gov.au/geo/kiribati/kiribati_brief.html.Google Scholar
Austin, J. L. (1965) How to do Things with Eords (ed. Urmson, J.O.). New York: Oxford University Press.Google Scholar
Baker, Deane-Peter (2007) ‘Defending the Common Life: National – Defence After Rodin’. In Rodin, David (ed.) War, Torture and Terrorism. Oxford: Blackwell Publishing, 1934.Google Scholar
Ball, J. (2016) ‘Types of Volcanic Eruptions’, http://geology.com/volcanoes/types-of-volcanic-eruptions/.Google Scholar
Balzacq, Thierry (2005) ‘The Three Faces of Securitization: Political Agency, Audience and Context’, European Journal of International Relations, 11(2), 171201.Google Scholar
Balzacq, Thierry (2010) ‘Constructivism and Securitization Studies’. In Cavelty, Myriam Dunn and Mauer, Victor (eds) The Routledge Handbook of Security Studies. Abingdon: Routledge, 5672.Google Scholar
Balzacq, Thierry (2011a) ‘Enquiries into Methods: A New Framework for Securitization Analysis’. In Balzacq, Thierry (ed.) Securitization Theory: How Security Problems Emerge and Dissolve. Abingdon: Routledge, 3154.Google Scholar
Balzacq, Thierry (2011b) ‘A Theory of Securitization: Origins, Core Assumptions, and Variants’. In Balzacq, Thierry (ed.) Securitization Theory: How Security Problems Emerge and Dissolve. Abingdon: Routledge, 130.Google Scholar
Balzacq, Thierry (ed.) (2011c) Securitization Theory: How Security Problems Emerge and Dissolve. London: Routledge.Google Scholar
Balzacq, Thierry (ed.) (2015a) Contesting Security: Strategies and Logics, Abingdon: Routledge.Google Scholar
Balzacq, Thierry (2015b) ‘The “Essence” of Securitization: Theory, Ideal Type, and a Sociological Science of Security’, International Relations, 29(1), 103113.Google Scholar
Balzacq, Thierry Léonard, Sarah, and Ruzicka, Jan (2016) ‘“Securitization” Revisited: Theory and Cases’, International Relations, 30(4), 494531.Google Scholar
Barnett, Jon (2001) The Meaning of Environmental Security: Ecological Politics and Policy in the New Security Era. London: Zed Books.Google Scholar
BBC (2014) ‘Ethics Guide: What is Just War?’, www.bbc.co.uk/ethics/war/just/what.shtml.Google Scholar
BBC News (2010) ‘Government to compensate ex-Guantanamo Bay detainees’, www.bbc.co.uk/news/uk-11762636.Google Scholar
Beck, Ulrich (1992) Risk Society: Towards a New Modernity (Vol. 17). London: Sage.Google Scholar
Beeby, Alan and Brennan, Anne-Marie (2008) First Ecology: Ecological Principles and Environmental Issues. Oxford: Oxford University Press.Google Scholar
Behnke, Andreas (1999) ‘“Postmodernizing” Security’, paper presented at ECPR Joint Session of Workshops, Mannheim, 26–31 March.Google Scholar
Behnke, And reas (2006) ‘No Way Out: Desecuritization, Emancipation and the Eternal Return of the Political’, Journal of International Relations and Development, 9(1), 6269.Google Scholar
Beitz, C. R. (2009The Idea of Human Rights. Oxford: Oxford University Press.Google Scholar
Bellaby, Ross (2012) ‘What’s the Harm? The Ethics of Intelligence Collection’, Intelligence and National Security, 27(1), 93117.Google Scholar
Bellamy, Alex J. (2006) Just Wars: From Cicero to Iraq. Cambridge: Polity Press.Google Scholar
Bellamy, Alex J.(2008) ‘The Responsibilities of Victory: Jus Post Bellum and the Just War’, Review of International Studies, 34, 601625.Google Scholar
Bellamy, Alex J.and McDonald, Matt (2004) ‘Securing International Society: Towards an English School Discourse of Security’, Australian Journal of Political Science, 39(2), 307330.Google Scholar
Bellamy, Richard (2007) Political Constitutionalism: A Republican Defence of the Constitutionality of Democracy. Cambridge: Cambridge University Press.Google Scholar
Berenskoetter, F. (2007) ‘Friends, There Are No Friends? An Intimate Reframing of the International’Millennium35(3), 647676.Google Scholar
Bigo, Didier (2002) ‘Security and Immigration: Toward a Critique of the Governmentality of Unease’, Alternatives27(1 supp.), 6392.Google Scholar
Bigo, Didier (2008) ‘International Political Sociology’. In Williams, Paul (ed.) Security Studies an Introduction. Abingdon: Routledge, chapter 9.Google Scholar
Bin Laden, Osama (2006a) ‘Declaration of War against the Americans Occuping the Land of the Two Holy Places’. In Rapoport, David C. (ed.) Terrorism: Critical Concepts in Political Science. Abingdon: Routledge, 271294.Google Scholar
Laden, Bin(2006b) ‘Jihad against Jews and Crusaders’. In Rapoport, David C. (ed.) Terrorism: Critical Concepts in Political Science. Abingdon: Routledge, 295297.Google Scholar
Blackburn, Simon (2005) Oxford: Dictionary of Philosophy 2nd edn. Oxford: Oxford University Press.Google Scholar
Bohman, James and Rehg, William, ‘Jürgen Habermas’. In Edward N. Zalta (ed.), The Stanford Encyclopedia of Philosophy (Winter 2011 edn), http://plato.stanford.edu/archives/win2011/entries/habermas/.Google Scholar
Booth, Ken (1991) ‘Security and Emancipation’, Review of International Studies, 17(4), 313326.Google Scholar
Booth, Ken(2001) ‘Ten flaws of Just War’. In Booth, Ken (ed.) The Kosovo Tragedy: The Human Rights Dimensions. London: Frank Cass Publishers, 314324.Google Scholar
Booth, Ken (2005) ‘Emancipation’. In Booth, Ken (ed.) Critical Security Studies and World Politics. Boulder CO: Lynne Rienner, 181187.Google Scholar
Booth, Ken (2007) Theory of World Security. Cambridge: Cambridge University Press.Google Scholar
Booth, Ken (2012) ‘Challenging the Ideas that Made Us: An Interview with Ken Booth’. In Brincat, Shannon, Lima, Laura and Nunes, João (eds), Critical Theory in International Relations and Security Studies: Interviews and Reflections. Abingdon: Routledge.Google Scholar
Booth, Kenand Wheeler, N. J. (2008) The Security Dilemma: Fear, Cooperation and Trust in World Politics. Basingstoke: Palgrave.Google Scholar
Booth, Kenand Wheeler, N. J and Wheeler, N. J. (2013) ‘Uncertainty’. In Williams, Paul (ed.) Security Studies: An Introduction. Abingdon: Routledge, 137154.Google Scholar
Bourbeau, Philippe (2011) The Securitization of Migration. Abingdon: Routledge.Google Scholar
Bourbeau, Philippe and Vuori, J. A. (2015) ‘Security, Resilience and Desecuritization: Multidirectional Moves and Dynamics’, Critical Studies on Security3(3), 253268.Google Scholar
Brandt, Richard (2003) ‘Towards a Credible Form of Utilitarianism’. In Darwell, Stephen (ed.) Consequentialism. Oxford: Blackwell Publishing.Google Scholar
Brandt Ford, S. (2013) ‘Jus ad vim and the just use of lethal force-short-of-war’. In Fritz Allhoff, Nicholas G. Evans and Henschke, Adam (eds) Routledge Handbook of Ethics and War. Abinghdon: Routledge, 6375.Google Scholar
Brock, Gillian (2009) Global Justice: A Cosmopolitan Account. Oxford: Oxford University Press.Google Scholar
Browning, Christopher S. and McDonald, Matt (2013) ‘The Future of Critical Security Studies: Ethics and the Politics of Security’, European Journal of International Relations, 19(2), 235255.Google Scholar
Brunstetter, Daniel and Braun, Megan (2011). ‘The Implications of Drones on the just War Tradition’, Ethics & International Affairs, 25(3), 337358.Google Scholar
Brunstetter, Daniel and Braun, Megan (2013) ‘From jus ad bellum to jus ad vim: Recalibrating Our Understanding of the Moral Use of Force’, Ethics & International Affairs, 27(1), 87106.Google Scholar
Buchanan, Allen (2007) ‘Justifying Preventive War’. In Shue, Henry and Rodin, David (eds) Preemption: Military Action and Moral Justification. Oxford: Oxford University Press, 126142.Google Scholar
Bufacchi, Vittorio and Arrigo, Jean Maria (2007) ‘Torture, Terrorism and the State: A refutation of the Ticking-Time Bomb Argument’, Journal of Applied Philosophy, 3, 23.Google Scholar
Bull, Hedley (2002) The Anarchical Society: A Study of Order in World Politics, 3rd edn. Basingstoke: Palgrave Macmillan.Google Scholar
Bunn, Matthew (2010a) ‘Nuclear terrorism: A strategy for prevention’. In Brown, Michael E., Coté, Owen R. Jr, Lynn-Jones, Sean M. and Miller, Steven (eds) Going Nuclear: Nuclear Proliferation and International Security in the 21st Century. Cambridge, MA: MIT Press, 329–367.Google Scholar
Bunn, Matthew(2010b) ‘Nuclear Smuggling: The Expert View’, The Guardian, 7 November 2010.Google Scholar
Bunn, Matthewand Wier, A. (2005) ‘The Seven Myths of Nuclear Terrorism’, Current History, 104(681), 153161.Google Scholar
Bunzel, Cole (2015) From Paper State to Caliphate: The Ideology of the Islamic State. The Brookings Project on U.S. Relations with the Islamic World Analysis Paper No. 19, March 2015.Google Scholar
Burgess, J. Peter (ed.) (2010) The Routledge Handbook of New Security Studies. Abingdon: Routledge.Google Scholar
Burke, Anthony (2013) ‘Security Cosmopolitanism’, Critical Studies on Security, 1(1), 1328.Google Scholar
Burke, Anthony Lee-Koo, Katharina and McDonald, Matt (2014) Ethics and Global Security: A Cosmopolitan Approach (Routledge Critical Security Studies). Abingdon: Routledge.Google Scholar
Burton, Fletcher M. (2013) ‘Bosnia and Herzegovina: Breaking the Vicious Cycle’, Security Community: The OSCE Magazine, 2 June, 2831.Google Scholar
Buzan, Barry(1996) ‘The Timeless Wisdom of Realism?’ In Smith, Steve, Booth, Ken and Zalewski, Marysia (eds) International Theory: Positivism & Beyond. Cambridge: Cambridge University Press, 4765 .Google Scholar
Buzan, Barry (2010) ‘The English School and International Security’. In Cavelty, Myriam Dunn and Mauer, Victor (eds) The Routledge Handbook of Security Studies. Abingdon: Routledge, 3444.Google Scholar
Buzan, Barry (2015) ‘The English School: A Neglected Approach to International Security Studies’. Security Dialogue, 46(2), 126143.Google Scholar
Buzan, Barryand Hansen, Lene (2009) The Evolution of International Security Studies. Cambridge: Cambridge University Press.Google Scholar
Campbell, David (1998) Writing Security: United States Foreign Policy and the Politics of Identity, revd edn. Minneapolis, MN: University of Minnesota Press.Google Scholar
Caney, Simon (2005a) Justice beyond Borders. Oxford: Oxford University Press.Google Scholar
Caney, Simon (2005b) ‘Cosmopolitan Justice, Responsibility and Global Climate Change’, Leiden Journal of International Law, 18, 747775.Google Scholar
Caney, Simon (2006) ‘Environmental Degradation, Reparations, and the Moral Significance of History’, Journal of Social Science, 37(3), 464482.Google Scholar
Caney, Simon (2010a) ‘Climate Change and the Duties of the Advantaged’, Critical Review of International Social and Political Philosophy, 13(1), 203228.Google Scholar
Caney, Simon (2010b) ‘Climate Change, Human Rights, and Moral Thresholds’. In Gardiner, S. M., Caney, S., Jamieson, D. and Shue, H. (2010) Climate Ethics: Essential Readings. Oxford: Oxford University Press, 163177.Google Scholar
Carmola, Kateri (2005) ‘The Concept of Proportionality: Old Questions and New Ambiguities’. In Evans, Mark (ed.) Just War Theory: A Reappraisal. Edinburgh: Edinburgh University Press, 93113.Google Scholar
CDC – Centres for Disease Control and Prevention (2013) ‘Cholera in Haiti’, http://wwwnc.cdc.gov/travel/notices/watch/haiti-cholera.Google Scholar
David, Chandler and Hynek, Nik (eds) (2011) Critical Perspectives on Human Security: Rethinking Emancipation and Power in International Relations, Prio Series. Abingdon: Routledge.Google Scholar
Chapman, P. (2012) ‘Entire nation of Kiribati to be relocated over rising sea level threat’, Daily Telegraph, 7 March 2012, www.telegraph.co.uk/news/worldnews/australiaandthepacific/kiribati/9127576/Entire-nation-of-Kiribati-to-be-relocated-over-rising-sea-level-threat.htm.Google Scholar
Chilcot, J. (2016) ‘The Report of the Iraq Inquiry Executive Summary, House of Commons’, www.iraqinquiry.org.uk/media/247921/the-report-of-the-iraq-inquiry_executive-summary.pdf.Google Scholar
Ciută, Felix (2009) ‘Security and the Problem of Context: A Hermeneutical Critique of Securitization Theory’, Review of International Studies, 35, 301326.Google Scholar
Clifford, George. M. (2017) ‘Just Counterterrorism’, Critical Studies on Terrorism, 10(1), 6792.Google Scholar
Coady, C. A. J (2008) Morality and Political Violence. Cambridge: Cambridge University Press.Google Scholar
Coady, C. A. J (2014) ‘The Problem of Dirty Hands’, The Stanford Encyclopedia of Philosophy (Spring 2014 edition), https://plato.stanford.edu/archives/spr2014/entries/dirty-hands/.Google Scholar
Cochran, Molly (2008) ‘The Ethics of the English School’. In Reus-Smit, Christian and Snidal, Duncan (eds.) The Oxford Handbook of International Relations. Oxford: Oxford University Press, 286–297.Google Scholar
Collier, Paul (2013Exodus: How Migration Is Changing Our World. Oxford: Oxford University Press.Google Scholar
Collins, Alan (2005) ‘Securitization, Frankenstein’s Monster and Malaysian Education’, The Pacific Review, 18(4), 567588.Google Scholar
Collins, Alan (ed.) (2007, 2012 and 2016) Contemporary Security Studies. Oxford: Oxford University Press.Google Scholar
Cooper, Neil and Turner, Mandy (2013) ‘The Iron Fist of Liberal Intervention Inside The Velvet Glove of Kantian Idealism: A Response to Burke’, Critical Studies on Security, 1(1), 3541.Google Scholar
Corry, Olaf (2012) ‘Securitisation and “Riskification”: Second-order Security and the Politics of Climate Change’, Millennium: Journal of International Studies, 40(2), 235258.Google Scholar
Côté, Adam (2016) ‘Agents without Agency: Assessing the Role of the Audience in Securitization Theory’. Security Dialogue, 47(6), 541558.Google Scholar
Crawford, Neta C. (2007) ‘The False Promise of Preventative War: The “New Security Consensus” and a More Insecure World’. In Shue, Henry and Rodin, David (eds) Preemption: Military Action and Moral Justification. Oxford: Oxford University Press, 89125.Google Scholar
Croft, Stuart (2006) Culture, Crisis and America’s War on Terror. Cambridge: Cambridge University Press.Google Scholar
Croft, Stuart (2012) Securitizing Islam. Cambridge: Cambridge University Press.Google Scholar
Croft, Stuart and Terriff, T. (eds) (2000) Critical Reflections on Security and Change. London: Frank Cass Publishers.Google Scholar
Cui, Shunji and Jia, Li (2011) ‘(De)securitizing Frontier Security in China: Beyond the Positive and Negative Debate’, Cooperation and Conflict, 46: 144165.Google Scholar
Telegraph, Daily (2009) ‘Chris Packham: “Giant pandas should be allowed to die out”’, 22 September 2009, www.telegraph.co.uk/earth/wildlife/6216775/Chris-Packham-Giant-pandas-should-be-allowed-to-die-out.htmlDalby, Simon (2009Security and Environmental Change. Cambridge: Polity.Google Scholar
Daniels, N. (2013) ‘Reflective Equilibrium’, The Stanford Encyclopedia of Philosophy (Winter 2013 Edition), http://plato.stanford.edu/archives/win2013/entries/reflective-equilibrium/.Google Scholar
Davies, S. (2008) ‘Securitizing Infectious Disease’, International Affairs, 84(2), 295313.Google Scholar
Dean, H. (2010) Understanding Human Need. Bristol: The Policy Press.Google Scholar
De Londras, Fiona (2011) Detention in the ‘War on Terror’: Can Human Rights Fight Back? Cambridge: Cambridge University Press.Google Scholar
Den Boer, M. and Kolthoff, E. (2010) (eds), Ethics and Security. The Hague: Eleven International Publishing.Google Scholar
Dershowitz, A. (2002) Why Terrorism Works. New Haven CT: Yale University Press.Google Scholar
Detraz, Nicole (2012) International Security and Gender. Abingdon: Routledge.Google Scholar
Deudney, Daniel (1990) ‘The Case Against Linking Environmental Degradation and National Security’, Millennium, 19(3), 461476.Google Scholar
De Wilde, Jaap (2008) ‘Environmental Security Deconstructed’. In Brauch, H. G., Grin, J., Mesjasz, C., Dunay, P., Chadha Behera, N., Chourou, B., Oswald Spring, U., Liotta, P. H. and Kameri-Mbote, P. (eds) Globalisation and Environmental Challenges: Reconceptualising Security in the 21st Century. Berlin: Springer-Verlag, 595602.Google Scholar
De Wilde, Jaap (2012) ‘Review of Security and the Environment: Securitization Theory and US Environmental Security Policy, London: Cambridge University Press 2010’, Perspectives on Politics, 10(1), 213214.Google Scholar
Dexter, Helen (2016) ‘War, Ethics and the Individual’. In Nyman, Jonna and Burke, Anthony (eds) Ethical Security Studies. Abingdon: Routledge, 174188.Google Scholar
Dill, Janina (2015Legitimate Targets?: Social Construction, International Law and US BombingCambridge: Cambridge University Press.Google Scholar
Dill, Janina (2016) ‘Forcible Alternatives to War: Legitimate Violence in 21st Century International Relations’. In Ohlin, Jens David (ed.) Theoretical Boundaries of Armed Conflict and Human Rights. Cambridge: Cambridge University Press, 289316.Google Scholar
Alkopher, Dingott, Tal and Blanc, Emmanuelle (2017) ‘Schengen Area Shaken: The Impact of Immigration-Related Threat Perceptions on the European Security Community’, Journal of International Relations and Development, 20(3), 511542.Google Scholar
Donnelly, Jack (2008) ‘The Ethics of Realism’. In Reus-Smit, C. and Snidal, D. (eds) The Oxford Handbook of International Relations. Oxford: Oxford University Press, 150162.Google Scholar
Donovan, G. H., Butry, D. T., Michael, Y. L., Prestemon, J. P., Liebhold, A. M., Gatziolis, D., and Mao, M. Y. (2013) ‘The Relationship Between Trees and Human Health: Evidence from the Spread of the Emerald Ash Borer’, American Journal of Preventive Medicine, 44(2), 139145.Google Scholar
Dopagne, J. (2011) ‘The European Air Traffic Management Response to Volcanic Ash Crises: Towards Institutionalised Aviation Crisis Management’, Journal of Business Continuity & Emergency Planning, 5(2), 103117.Google Scholar
Doyal, Len and Gough, Ian (1991) A Theory of Human Needs. Basingstoke: Macmillan.Google Scholar
Doyal, Lesley with Doyal, Len (2013) Living with HIV and Dying with Aids. Farnham: Ashgate.Google Scholar
Duffield, M. (2012) Challenging Environments: Danger, Resilience and the Aid Industry, Security Dialogue, 43(5), 475492.Google Scholar
Duffield, M. and Waddell, N. (2006) ‘Securing Humans in a Dangerous World’, International Politics, 43(1), 123.Google Scholar
Duffy, R. (2015) ‘Responsibility to Protect? Ecocide, Interventionism and Saving Biodiversity.’ Paper presented at the PSA.Google Scholar
Dunne, Tim and Wheeler, Nick J. (2004) ‘“We the Peoples”: Contending Discourses of Security in Human Rights Theory and Practice’, International Relations, 18(1), 923.Google Scholar
Cavelty, Dunn, Myriam and Victor Mauer (2010) The Routledge Handbook of Security Studies. London: Routledge.Google Scholar
Dworkin, R. (2003) ‘Terror and the Attack on Civil Liberties’, New York Review of Books, 50(17).Google Scholar
Dyzenhaus, D. (2010) ‘The “organic law” of Ex Parte Milligan’. In Sarat, Austin (ed.) Sovereignty, Emergency, Legality. Cambridge: Cambridge University Press, 1656.Google Scholar
Eckersley, R. (2007) ‘Ecological Intervention: Prospects and limits’, Ethics and International Affairs, 21(3), 292316.Google Scholar
Elbe, S. (2006) ‘Should HIV/AIDS be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security’, International Studies Quarterly, 50(1), 119144.Google Scholar
Elbe, S.(2010) Security and Global Health. Cambridge: Polity Press.Google Scholar
Ericson, R. (2007) Crime in an Insecure World. Cambridge: Polity Press.Google Scholar
Erskine, T. (2003) ‘Introduction: Making Sense of Responsibility in International Relations: Key Questions and Concepts’. In Erskine, Toni (ed.) Can Institutions have Responsibilities? Collective Moral Agency and International Relations. Basingstoke: Palgrave, 118.Google Scholar
European Commission (2013) Press Release on Statement by the European Commission on the Capital Controls imposed by the Republic of Cyprus, Brussels, 28 March.Google Scholar
Evangelista, M. (2008) Law, Ethics, and the War on Terror. Cambridge: Polity Press.Google Scholar
Evans, M. (2005) ‘Moral Theory and the Idea of a Just War’. In Evans, M. (ed.) Just War Theory: A Reappraisal. Edinburgh: Edinburgh University Press, 124.Google Scholar
Evans, M. (2009) ‘Moral Responsibilities and the Conflicting Demands of Jus Post Bellum’, Ethics & International Affairs, 23(2), 147164.Google Scholar
Fabre, C. (2012) Cosmopolitan War. Oxford: Oxford University Press.Google Scholar
Fabre, C. (2015) ‘War Exit’, Ethics, April, 631–652.Google Scholar
Fabre, C. (2018) ‘War’s Aftermath and the Ethics of War’. In Lazar, Seth and Frowe, Helen (eds), The Oxford Handbook of the Ethics of War. Oxford: Oxford University Press, ch. 26.Google Scholar
Falk, R. (2005) ‘Legality and Legitimacy: The Quest for Principled Flexibility and Restraint’, Review of International Studies, 31, 3350.Google Scholar
Falkner, R. (2016) ‘The Paris Agreement and the New Logic of International Climate Politics’, International Affairs92(5), 11071125.Google Scholar
Farwell, James P. (2014) ‘The Media Strategy of ISIS’, Survival, 56(6), 4955.Google Scholar
Feldman, L. C. (2010) ‘The Banality of Emergency: On the Time and Space of “Political Necessity”’. In Sarat, Austin (ed.) Sovereignty, Emergency, Legality. Cambridge: Cambridge University Press, 136164.Google Scholar
Fierke, K. M. (2007) Critical Approaches to International Security. Cambridge: Polity Press.Google Scholar
Finlay, C. (2015) Terrorism and the Right to Resist: A Theory of Just Revolutionary War. Cambridge: Cambridge University Press.Google Scholar
Floyd, Jonathan (2017b) ‘Rawls’ Methodological Blueprint’, European Journal of Political Theory 16(3), 367381.Google Scholar
Floyd, Jonathan (2016) ‘Analytics and Continentals: Divided by Nature but United by Praxis?’, European Journal of Political Theory, 15(2), 155171.Google Scholar
Floyd, Jonathan (2017b) Is Political Philosophy Impossible? Thoughts and Behaviour in Normative Political Theory. Cambridge: Cambridge University Press.Google Scholar
Floyd, Rita (2007a) ‘Towards a Consequentialist Evaluation of Security: Bringing Together the Copenhagen School and the Welsh School of Security Studies’, Review of International Studies, 33(2), 327350.Google Scholar
Floyd, Rita (2007b) ‘Human Security and the Copenhagen School’s Securitization Approach: Conceptualising Human Security as a Securitising Move’, Human Security Journal, 5, 3849.Google Scholar
Floyd, Rita (2010) Security and the Environment: Securitisation Theory and US Environmental Security Policy. Cambridge: Cambridge University Press.Google Scholar
Floyd, Rita (2011a) ‘Can Securitization Theory Be Used in Normative Analysis? Towards a Just Securitization Theory’, Security Dialogue, 42(4–5), 427439.Google Scholar
Floyd, Rita (2011b) ‘Why We Need Needs-Based Justifications of Human Rights’, Journal of International Political Theory, 7(1), 103115.Google Scholar
Floyd, Rita (2013a) ‘Analyst, Theory and Security: A New Framework for Understanding Environmental Security Studies’. In Floyd, R. and Matthew, Richard A. (eds) Environmental Security: Approaches and Issues. Abingdon: Routledge, 2136.Google Scholar
Floyd, Rita (2013b) ‘Whither Environmental Security Studies: An Afterword’. In Floyd, R. and Matthew, Richard A. (eds) Environmental Security: Approaches and Issues. Abingdon: Routledge, 279288.Google Scholar
Floyd, Rita (2015) ‘The Question of Value Added: A Reply to Burke’, Critical Studies on Security, 3 (2), 162166.Google Scholar
Floyd, Rita (2017b) ‘Parallels with the Hate Speech Debate: The Pros and Cons of Criminalising Harmful Securitising Requests’, Review of International Studies, doi:10.1017/S0260210517000328.Google Scholar
Floyd, Rita (2019a) ‘Collective Securitization in the EU: Normative Dimensions’, West European Politics, First view at https://doi.org/10.1080/01402382.2018.1510200.Google Scholar
Floyd, Rita (2019b) ‘States, Last Resort and the Obligation to Securitize’, Polity, forthcoming.Google Scholar
Floyd, Rita (2019c) ‘Securitizing the Environment’. In Matthew, R., Murphy, C., Nizkorodov, E., Goodrich, K., Hooper, A., Maharramli, B., Purcell, M. & Wagle, P. (ed.) Routledge Handbook of Environmental Security. Abingdon, New York: Routledge (in press).Google Scholar
Floyd, Rita and Croft, S. (2011) ‘European Non-traditional Security theory: From Theory to Practice’, Geopolitics, History, and International Relations, 3(2), 152179.Google Scholar
Ford, S. B. (2013) ‘Just Use of Lethal Force-Short-of-War’. Routledge Handbook of Ethics and War: Just War Theory in the 21st Century. Abingdon: Routledge, 6375.Google Scholar
Fotion, N. (2000) John Searle. Teddington: Acumen Publishing.Google Scholar
Fredericksen, H. D. (2004) ‘Water: Israeli strategy, implications for peace and the viability of Palestine’ Macro Center Working Papers Paper 9, http://docs.rwu.edu/cmpd_working_papers/9.Google Scholar
Fredman, S. (2007) ‘The Positive Right to Security’. In Goold, Benjamin J. and Lazarus, Liora (eds) Security and Human Rights. Oxford: Hart Publishing, 307324.Google Scholar
Frowe, Helen (2011) The Ethics of War and Peace. Abingdon: Routledge.Google Scholar
Frowe, Helen (2014) Defensive Killing. OUP: Oxford.Google Scholar
Frowe, Helen (2016a) ‘On the Redundancy of Jus ad Vim: A Response to Daniel Brunstetter and Megan Braun’, Ethics & International Affairs, 30(01), 117129.Google Scholar
Frowe, Helen (2016b) The Ethics of War and Peace, 2nd edn. Abingdon: Routledge.Google Scholar
Gaeta, P. (1999) The Defence of Superior Orders: The Statute of International Criminal Court Versus Customary International Law, European Journal of International Law, 10(1), 172191.Google Scholar
Gasper, D. (1996) ‘Needs and Basic Needs – a Clarification of Foundational Concepts for Development Ethics and Policy’. ISS Working Paper 210, The Hague.Google Scholar
Gasper, D. (2007) ‘Conceptualising Human Needs and Wellbeing’. In Ian Gough, J. McGregor, Allister and Camfield, Laura (eds) Wellbeing in Developing Countries: From Theory to Research. Cambridge: Cambridge University Press, 4770.Google Scholar
Gearty, C. (2013) Liberty & Security. Cambridge: Polity Press.Google Scholar
GIZ (Deutsche Gesellschaft für internationale Zusammenarbeit) (2013) ‘Project for Training, Education and Consulting for Tsunami Early Warning System (PROTECTS) – Capacity Development in Local Communities’, www.giz.de/en/worldwide/16692.html.Google Scholar
Gosepath, S. (2011) ‘Equality’, The Stanford Encyclopedia of Philosophy (Spring 2011), http://plato.stanford.edu/archives/spr2011/entries/equality/.Google Scholar
Gough, Ian (1994) ‘Economic Institutions and the Satisfaction of Human Needs’, Journal of Economic Issues, 28(1), 2566.Google Scholar
Gough, Ian (2000) Global Capital, Human Needs and Social Policies. Basingstoke: Palgrave.Google Scholar
Gough, Ian (2013) ‘Lists and Thresholds: Comparing the Doyal-Gough Theory of Human Need with Nussbaum’s Capabilities Approach’. In Comim, Flavio and Nussbaum, Martha C., (eds) Capabilities, Gender, Equality: Towards Fundamental Entitlements. Cambridge: Cambridge University Press.Google Scholar
Gough, Ian (2017Heat, Greed and Human Need: Climate Change, Capitalism and Sustainable Wellbeing. Cheltenham: Edward Elgar Publishing.Google Scholar
Gough, Ian Allister McGregor, J. and Camfield, Laura (2007) ‘Theorising Wellbeing in International Development’. In Ian Gough, J. McGregor, Allister and Camfield, Laura (eds) Wellbeing in Developing Countries: From Theory to Research. Cambridge: Cambridge University Press, 343.Google Scholar
Greenwald, G., MacAskill, E. and Poitras, Laura (2013) ‘Q&A with NSA Whistleblower Edward Snowden: “I do not expect to see home again”’ The Guardian, www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance.Google Scholar
Greer, S. (2010) ‘Anti-terrorist Laws and the United Kingdom’s “Suspect Muslim Community”’, British Journal of Criminology, 50, 11711190.Google Scholar
Griffin, James (2009) On Human Rights, Oxford: Oxford University Press.Google Scholar
Guardian, The (2009) ‘Police pay compensation to De Menezes family’, 23 November, www.theguardian.com/uk/2009/nov/23/de-menezes-family-compensation-stockwell.Google Scholar
Guardian (2013) ‘US House defence bill blocks Obama’s plan to close Guantánamo Bay prison’, 14 June, www.theguardian.com/world/2013/jun/14/house-defense-bill-obama-guantanamo.Google Scholar
Gudmundsson, M. T., Thordarson, T., Höskuldsson, Á., et al. (2012) Ash Generation and distribution from The April–May 2010 Eruption of Eyjafjallajökull, Iceland, Scientific Reports, 2.Google Scholar
Guzzini, S. (2011). Securitization as a Causal Mechanism. Security Dialogue, 42(4–5), 329341.Google Scholar
Hague, W. (2013) ‘Data Snooping: Law Abiding Citizens Have “Nothing to Fear”, says Hague – video’, 9 June, The Guardian, www.theguardian.com/uk/video/2013/jun/09/data-snooping-law-abiding-citizens-nothing-fear-hague-video.Google Scholar
Hansen, Lene (2000) ‘The Little Mermaid’s Silent Dilemma and the Absence of Gender in the Copenhagen School’, Millennium, 29(2), 285306.Google Scholar
Hansen, Lene (2006) Security as Practice: Discourse Analysis and the Bosnian War. Abingdon: Routledge.Google Scholar
Hansen, Lene(2012), ‘Reconstructing Desecuritisation: The Normative-Political in the Copenhagen School and Directions for How to Apply It’, Review of International Studies, 7(4), 525546.Google Scholar
Harding, L. (2014) The Snowden Files: The Inside Story of the World’s Most Wanted Man. London: Guardian Faber Publishing, Kindle edition.Google Scholar
Hartmann, B. (2010) ‘Rethinking Climate Refugees and Climate Conflict: Rhetoric, Reality and the Politics of Policy Discourse’, Journal of International Development, 22, 233246.Google Scholar
Hayden, P. (2005) ‘Security beyond the State: Cosmopolitanism, Peace, and the Role of Just War Theory’. In Evans, M. (ed.) Just War Theory: A Reappraisal. Edinburgh: Edinburgh University Press, 157–176.Google Scholar
Hayward, C. (2013) ‘Situating and Abandoning Geoengineering: A Typology of Five Responses to Climate Change’, Political Science & Politics, 46(01), 2327.Google Scholar
Herington, Jonathan (2012) ‘The Concept of Security’. In Selgelid, Micheal and Enemark (eds), Christian Ethical and Security Aspects of Infectious Disease Control: Interdisciplinary Perspectives. Abingdon: Ashgate Publishing, 725.Google Scholar
Herington, Jonathan(2013) ‘The Concept of Security: Uncertainty, Evidence and Value’, PhD diss., Australian National University.Google Scholar
Herington, Jonathan (2015) ‘Liberty, Fear and the State: Philosophical Perspectives on Security’. In Bourbeau, P. (ed.) Security: Dialogue across disciplines. Cambridge: Cambridge University Press.Google Scholar
Hicks, N. (2005) ‘The Impact of Counter Terror on the Promotion and Protection of Human Rights: A Global Perspective’. In Wilson, Richard Ashby (ed.) Human Rights in the ‘War on Terror’. Cambridge: Cambridge University Press, 209224.Google Scholar
Holsti, K. J. (2004) Taming the Sovereigns. Cambridge: Cambridge University Press.Google Scholar
Honig, B. (2009) Emergency Politics: Paradox, Law, Democracy. Princeton, NJ: Princeton University Press.Google Scholar
Hoogensen Gjørv, G. (2012) ‘Security by Any Other Name: Negative Security, Positive Security, and a Multi-Actor Approach’, Review of International Studies, 38(4).Google Scholar
Hoogensen Gjørv, G. and Rottem, Svein Vigeland (2004) ‘Gender Identity and the Subject of Security’, Security Dialogue, 35(2), 155171.Google Scholar
Hurka, T. (2005) ‘Proportionality in the Morality of War’, Philosophy & Public Affairs, 33(1), 3466.Google Scholar
Hussain, D. (2009) ‘Fencing off Bangladesh’, The Guardian, 5 September, www.theguardian.com/commentisfree/2009/sep/05/bangladesh-india-border-fence.Google Scholar
Huysmans, Jeff (1998) ‘Desecuritization and the Aesthetics of Horror in Political Realism’, Millennium: Journal of International Studies, 27(3), 569589.Google Scholar
Huysmans, Jeff (2000) ‘The European Union and the Securitization of Migration’, Journal of Common Market Studies, 38(5), 751777.Google Scholar
Huysmans, Jeff (2002) ‘Defining Social Constructivism in Security Studies. The Normative Dilemma of Writing Security’. Alternatives 27 supplement, 4162.Google Scholar
Huysmans, Jeff (2006) The Politics of Insecurity: Fear, Migration and Asylum in the EU, Abingdon: Routledge.Google Scholar
Huysmans, Jeff (2011) ‘What’s in an Act? On Security Speech Acts and Little Security Nothings’, Security Dialogue, 42(4–5), 371383.Google Scholar
Huysmans, Jeff (2014) Security Unbound: Enacting Democratic Limits, Abingdon: Routledge.Google Scholar
Nik, Hynek, and Chandler, David (2011) ‘Introduction: Emancipation and Power in Human Security’. In Chandler, David and Hynek, Nik (eds.) Critical Perspectives on Human Security: Rethinking Emancipation and Power in International Relations, Prio Series. Abingdon: Routledge, 110.Google Scholar
Nik, Hynek, and Chandler, David (2013). ‘No Emancipatory Alternative, No Critical Security Studies’, Critical Studies on Security, 1(1), 4663.Google Scholar
Ignatieff, M. (2004) The Lesser Evil: Political Ethics in the age of Terror. Toronto: Penguin Books.Google Scholar
Jackson, N. J. (2006) ‘International Organizations, Security Dichotomies and the Trafficking of Persons and Narcotics in Post-Soviet Central Asia: A Critique of the Securitization Framework’. Security Dialogue, 37(3), 299317.Google Scholar
Jackson, R. (2000) The Global Covenant: Human Conduct in a World of States. Oxford: Oxford University Press.Google Scholar
Jamieson, Dale (1993) ‘Method and Moral Theory’. In Singer, Peter (ed.) A Companion to Ethics. Oxford: Blackwell Publishing, 476487.Google Scholar
Jarvis, L. and Legrand, T. (2016) ‘“I am somewhat puzzled.” Questions, Audiences and Securitization in the Proscription of Terrorist Organisations’, Security Dialogue48(2), 149167.Google Scholar
Jepson, P. and Ladle, R. (2010) Conservation. Oxford: Oneworld.Google Scholar
Jervis, R. (1976) Perception and Misperception in International Politics. Princeton, NJ: Princeton University Press.Google Scholar
Justus, F.K., (2015) ‘Coupled Effects on Kenyan Horticulture Following the 2008/2009 Post-election Violence and the 2010 Volcanic Eruption of Eyjafjallajökull’. Natural Hazards, 76(2), 12051218.Google Scholar
Karyotis, G., and Skleparis, D. (2013) ‘Qui Bono? The Winners and Losers of Securitising Migration’, Griffith Law Review, 22(3), 683706.Google Scholar
Kennedy, D. (2012) ‘Lawfare and Warfare’. In Crawford, James and Koskenniemi, Martti (eds) The Cambridge Companion to International Law. Cambridge: Cambridge University Press, 158183.Google Scholar
Kerr, R. A. (2010) ‘Iceland’s Volcano Proving Tough to Predict’, www.sciencemag.org/news/2010/04/icelands-volcano-proving-tough-predict.Google Scholar
Kessler, O. (2010) ‘Risk’. In Peter Burgess, J. (ed.) The Routledge Handbook of the New Security Studies. London: Routledge.Google Scholar
Kurki, M. (2008) Causation in International Relations. Cambridge: Cambridge University Press.Google Scholar
Lazar, Nomi C. (2013/2009) States of Emergency in Liberal Democracies. Cambridge: Cambridge University Press.Google Scholar
Lazar, Seth (2010) ‘The Responsibility Dilemma for Killing in War’, Philosophy & Public Affairs, 38, 180213.Google Scholar
Lazar, Seth (2012) ‘Necessity in Self-Defense and War’, Philosophy & Public Affairs, 40(1), 344.Google Scholar
Lazar, Seth (2017) ‘War’, The Stanford Encyclopedia of Philosophy, https://plato.stanford.edu/archives/spr2017/entries/war/.Google Scholar
Lazarus, L. (2007) ‘Mapping the Right to Security’. In Goold, Benjamin J. and Lazarus, Liora (eds) Security and Human Rights. Oxford: Hart Publishing, 325346.Google Scholar
Leander, A. (2010) ‘The Privatization of International Security’. In Cavelty, Myriam Dunn and Mauer, Victor (eds) The Routledge Handbook of Security Studies. Abingdon: Routledge, 200210.Google Scholar
Léonard, S., and Kaunert, C. (2011) ‘Reconceptualizing the Audience in Securitization Theory’. In T. Balzaq (ed.) Securitization Theory: How Security Problems Emerge and Dissolve, 5776.Google Scholar
Lichtenberg, J. (2008) ‘How to Judge Soldiers Whose Cause is Unjust’. In Rodin, David and Shue, Henry (eds) Just and Unjust Warriors: The Moral and Legal Status of Soldiers. Oxford: Oxford University Press, 112130.Google Scholar
Lipschutz, R. (1995) On Security, New York: Columbia University Press.Google Scholar
Living Rainforest, This (2013) ‘Anti-cancer: Rosy Periwinkle’, www.livingrainforest.org/about-rainforests/anti-cancer-rosy-periwinkle/.Google Scholar
Loader, I. and Walker, N. (2007) Civilizing Security, Cambridge University Press.Google Scholar
Lu, C. (2018) ‘Reconciliation and Reparations’. In Lazar, Seth and Frowe, Helen (eds) The Oxford Handbook of the Ethics of War. Oxford: Oxford University Press, ch. 28.Google Scholar
Luban, D. (2005a) ‘Eight Fallacies About Liberty and Security’. In Wilson, Richard Ashby (ed.) Human Rights in the ‘War on Terror’. Cambridge: Cambridge University Press, 242257.Google Scholar
Luban, D. (2005b) ‘Liberalism, Torture, and the Ticking Time Bomb’, Virginia Law Review, 91, 1425.Google Scholar
Luban, D. (2007) ‘Preventative War and Human Rights’. In Shue, Henry and Rodin, David (eds) Preemption: Military Action and Moral Justification, Oxford: Oxford University Press, 171201.Google Scholar
Luban, D. and Engel, M. J. (2014) ‘Intersections of Torture and Power: An Interview with David Luban’, Georgetown Journal of International Affairs15(2), 110116.Google Scholar
Lynch, M. (2008) ‘Lie to Me: Sanctions on Iraq, Moral Argument and the International Politics of Hypocrisy’. In Price, R. M. (ed.) Moral Limit and Possibility in World Politics. Cambridge: Cambridge University Press, 165196.Google Scholar
MacFarlane, S. N. and Foong Kong, Y. (2006) Human Security and the UN: A Critical History. Bloomington, IN: Indiana University Press.Google Scholar
Mærli, M. B. (2011) ‘The Threat of Nuclear Terrorism’. In Njølstad, Olav (ed.) Nuclear Proliferation and International Order: Challenges to the Non-Proliferation Treaty. Abingdon: Routledge, 107126.Google Scholar
Mahr, K. (2018) ‘How Cape Town Was Saved from Running Out of Water’, The Guardian, 4 May 2018.Google Scholar
Malley, R. and Finer, J. (2018) ‘The Long Shadow of 9/11: How Counterterrorism Warps U.S. Foreign Policy’, Foreign Affairs, July/August, 5869.Google Scholar
Manningham-Buller, E. (2007) ‘Partnership and Continuous Improvement in Countering Twenty-First Century Terrorism’, Policing, 1(1), 4345.Google Scholar
Mautner, Thomas (2000) The Penguin Dictionary of Philosophy, London: Penguin Books.Google Scholar
May, L. (2012) After War Ends: A Philosophical Perspective, Cambridge: Cambridge University Press.Google Scholar
Mayer, Stephan F. Cynthia McPherson Frantz, Emma Bruehlman-Senecal and Kyffin Dolliver (2009) ‘Why Is Nature Beneficial?: The Role of Connectedness to Nature’, Environment and Behavior, 41(5), 607643.Google Scholar
McCarthy, J. J. (ed.) (2001) Climate Change 2001: Impacts, Adaptation, and Vulnerability: Contribution of Working Group II to the Third Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge: Cambridge University Press.Google Scholar
McDonald, B. (2010) ‘Global Health and Human Security: Addressing Impacts from Globalization and Environmental Change’, in Matthew, R. A., Barnett, J., McDonald, B. and O’Brien, K. L. (eds) Global Environmental Change and Human Security. Cambridge, MA: MIT Press, 6467.Google Scholar
McDonald, Matt (2008) ‘Securitization and the Construction of Security’. European Journal of International Relations, 14(4), 563587.Google Scholar
McDonald, Matt (2012) Security, the Environment and Emancipation: Contestation over Environmental Change. Abingdon: Routledge.Google Scholar
McInnes, Colin and Rushton, Simon (2013) ‘HIV/AIDS and Securitization Theory’, European Journal of International Relations, 19(1), 115138.Google Scholar
McLeod, O. (2008) ‘Desert’, The Stanford Encyclopedia of Philosophy, http://plato.stanford.edu/archives/win2008/entries/desert/.Google Scholar
McMahan, Jeff (2005) ‘Just Cause for War’, Ethics and International Affairs, 19(3), 121.Google Scholar
McMahan, Jeff (2008) ‘The Morality of War and the Law of War’. In Rodin, David and Shue, Henry (eds) Just and Unjust Warriors: The Moral and Legal Status of Soldiers. Oxford: Oxford University Press, 19–43.Google Scholar
McMahan, Jeff (2009a) ‘Intention, Permissibility, Terrorism, and War’, Philosophical Perspectives, Ethics, 23, 345372.Google Scholar
McMahan, Jeff (2009b) Killing in War. Oxford: Oxford University Press.Google Scholar
McMahan, Jeff (2009–10) ‘Proportionality in Self-Defense and War’ Note to Stanford Political Theory Workshop, unpublished.Google Scholar
McMahan, Jeff (2010a) ‘The Just Distribution of Harm Between Combatants and Noncombatants’, Philosophy & Public Affairs, 38(4), 342–379.Google Scholar
McMahan, Jeff (2010b) ‘Humanitarian Intervention, Consent, and Proportionality’. In Ann Davis, N., Keshen, Richard and McMahan, Jeff (eds) Ethics and Humanity: Themes from the Philosophy of Jonathan Glover. Oxford: Oxford University Press, 4573.Google Scholar
McMahan, Jeff (2012) ‘Rethinking the “Just War” Part 1 and 2.’ The New York Times.Google Scholar
McMahan, Jeff (2014) ‘Liability, Proportionality, and the Number of Aggressors, Penultimate draft, August 2014, unpublished manuscript.Google Scholar
McMahan, Jeff (2015) ‘Proportionality and Time’ Ethics, April, 696719.Google Scholar
McMahan, Jeff (2018a) Foreword. In May, Larry (eds) The Cambridge Handbook of the Just War, Cambridge: Cambridge University Press, ix-xiii.Google Scholar
McMahan, Jeff (2018b) ‘Proportionality and Necessity in Jus in Bello’. In Lazar, Seth and Frowe, Helen (eds) The Oxford Handbook of the Ethics of War. Oxford: Oxford University Press, ch. 21.Google Scholar
McMahan, Jeff and McKim, Robert (1993) ‘The Just War and the Gulf War’, Canadian Journal of Philosophy, 23(4), 501541.Google Scholar
McPherson, L. K. (2007) ‘Is Terrorism Distinctively Wrong?’, Ethics117(3), 524546.Google Scholar
McSweeney, B. (1999) Security, Identity and Interests: A Sociology of International Relations. Cambridge: Cambridge University Press.Google Scholar
Mearsheimer, J. J., 2014. Why the Ukraine Crisis Is the West’s Fault. Foreign Affairs, 93(5), 7789.Google Scholar
Mely Caballero, A., Emmers, R. and Acharya, Amitav (eds) (2006) Non-Traditional Security in Asia: Dilemmas in Securitization. Abingdon: Ashgate Publishing.Google Scholar
Mertens, T. and Goodwin, M. (2007) ‘Democracy and Torture: When the People Decide’. In Hocking, J. and Lewis, C. (eds) Counter-Terrorism and the Post-democratic State, Cheltenham: Edward Elgar, 2847.Google Scholar
Middleton, N. (2008) Global Casino (4th edn). London: Hodder Education.Google Scholar
Mill, J.S. (1985) On Liberty, London: Penguin Classics.Google Scholar
Millennium Ecosystem Assessment (MEA) (2003) Ecosystems and Human Well-being: A Framework for Assessment. Washington, DC: Island Press.Google Scholar
Miller, , David, (2007) National Responsibility and Global Justice. Oxford: Oxford University Press.Google Scholar
David, (2008) ‘Global Justice and Climate Change: How should responsibilities be distributed?’ Tanner Lectures on Human Values, delivered at Tsinghua University, Beijing, 2425 March.Google Scholar
David, (2016) Strangers in Our Midst. Cambridge, MA: Harvard University Press.Google Scholar
Miller, S. (2009) Terrorism and Counter-Terrorism. Oxford: Blackwell Publishing.Google Scholar
Moaz, Z. (2009) ‘Threat Perception and Threat Manipulation: The Uses and Misuses of Threats in Israel’s National Security, 1949–2008’. In Barak, Oren and Sheffer, Gabriel (eds) Existential Threats and Civil-Security Relations. Lanham, Lexington Books, 179217.Google Scholar
Moellendorf, D. (2008) ‘Jus ex Bello’, Journal of Political Philosophy, 16(2), 123136.Google Scholar
Moellendorf, D. (2015) ‘Two Doctrines of Jus ex Bello’, Ethics, 125, 53673.Google Scholar
Moellendorf, D. (2018) ‘Ending Wars’. In Lazar, Seth and Frowe, Helen (eds) The Oxford Handbook of the Ethics of War. Oxford: Oxford University Press, ch. 25.Google Scholar
Morris, N. (2014) ‘People living in fracking areas set to get more compensation’, The Independent, 8 January, www.independent.co.uk/news/uk/politics/people-living-in-fracking-areas-set-to-get-more-compensation-9047653.html.Google Scholar
Moseley, , (2008) ‘Just War Theory’, Internet Encyclopedia of Philosophy, www.iep.utm.edu/justwar/.Google Scholar
Mueller, J. E. (2006) Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them (New York: Simon and Schuster).Google Scholar
Mulgan, T. (2001) The Demands of Consequentialism. Oxford: Clarendon Press.Google Scholar
Muslim Issue Worldwide, The (2013) ‘Woolwich terrorist: transcript of the complete rant’, http://themuslimissue.wordpress.com/2013/05/23/uk-muslim-murderer-in-woolwich-the-complete-rant/Google Scholar
Nagel, T. (1986) The View from Nowhere, Oxford: Oxford University Press.Google Scholar
Nagel, T. (1997) The Last Word. Oxford: Oxford University Press.Google Scholar
Nasr, J. (2015) Germany needs migrants as workforce dwindles, but must pay for them' Reuters News https://www.reuters.com/article/us-europe-migrants-germany-economy-idUSKBN0TT24Z20151210?feedType=RSS&feedName=worldNewsGoogle Scholar
Neal, And rew (2010) Exceptionalism and the Politics of Counter-terrorism. Abingdon: Routledge.Google Scholar
Neal, And rew (2012a) ‘Normalization and Legislative Exceptionalism: Counterterrorist Lawmaking and the Changing Times of Security Emergencies’, International Political Sociology, 6, 260276.Google Scholar
Neal, And rew (2012b) ‘Terrorism, Lawmaking and Democratic Politics: Legislators as Security Actors’, Terrorism and Political Violence, 24(3).Google Scholar
Neal, And rew (2013) ‘Legislative Practices’. In Salter, Mark B. and Mutlu, Can E. (eds) Research Methods in Critical Security Studies. Abingdon: Routledge, 125128.Google Scholar
Neocleous, M. (2008) Critique of Security. Edinburgh: Edinburgh University Press.Google Scholar
Neocleous, M. and Rigakos, G. S. (eds) (2011) Anti-Security. Ottawa: Red Quill Books.Google Scholar
Newman, E. (2014) ‘Human Security at 20: Reconciling Critical Aspirations with Political Realities’, unpublished paper presented at ‘The Laws of security: Reconceptualising Security at the Intersections of Law, Criminology & International Relations’ 12 and 13 June, Law School, University of Leeds.Google Scholar
Herald, New Zealand (2010) ‘Hard line Warrior in war to save the Whale’, www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10619393.Google Scholar
North, Richard (2016) ‘Principles as Guides: The Action-Guiding Role of Justice in Politics’, The Journal of Politics, 79(1), 7588.Google Scholar
Norton-Taylor, R. (2015) ‘Up to 30,000 Foreign Fighters Have Gone to Syria and Iraq since 2011– report’, The Guardian, 17 November.Google Scholar
Nunes, J. (2016) ‘Security, emancipation and the ethics of vulnerability’. In Nyman, Jonna and Burke, Anthony (eds) Ethical Security Studies: A New Research Agenda. Abingdon: Routledge, 89101.Google Scholar
Nussbaum, M. (2011) Creating Capabilities. Cambridge, MA: Harvard University Press.Google Scholar
Nyman, J. (2016a) ‘Pragmatism, Practice and the Value of Security’. In Nyman, Jonna and Burke, Anthony (eds) Ethical Security Studies: A New Research Agenda. Abingdon: Routledge, 131144.Google Scholar
Nyman, J. (2016b) ‘What is the Value of Security? Contextualising the Negative/Positive Debate’, Review of International Studies, 42(5), 821839.Google Scholar
Nyman, J. and Burke, Anthony (eds) (2016) Ethical Security Studies: A New Research Agenda, Abingdon: Routledge.Google Scholar
Oberman, K. (2015) ‘The Myth of the Option War: Why States Are Required to Wage the Wars They Are Permitted to Wage’, Philosophy & Public Affairs, 43(4), 255286.Google Scholar
O’Brien, K., St Clair, A. L. and Kristoffersen, B. (2010) ‘Towards a New Climate Science’. In O’Brien, Karen, St Clair, Asuncion Lera and Kristofferson, Berit (eds) Climate Change, Ethics and Human security. Cambridge: Cambridge University Press, 215–227.Google Scholar
O’Donovan, O. (2003) The Just War Revisited. Cambridge: Cambridge University Press.Google Scholar
O’Driscoll, Cian (2008a) Renegotiation of the Just War Tradition and the Right to War in the Twenty-First Century. Basingstoke: Palgrave Macmillan.Google Scholar
O’Driscoll, Cian (2008b) ‘Fear and Trust: The Shooting of Jean Charles de Menezes and the War on Terror’, Millennium, 36(2), 339360.Google Scholar
O’Driscoll, Cian and Lang, A. F. J. (2013) The Just War Tradition and the Practice of Political Authority. In O’Driscoll, C., Lang, A. F. J. and Williams, J. (eds) Just War: Authority, Tradition, and Practice. Washington, DC: Georgetown University Press, 116.Google Scholar
Office of the High Commissioner for Human Rights (1992) General Comment No. 21: Replaces general comment 9 concerning humane treatment of persons deprived of liberty (Art. 10), www.unhchr.ch/tbs/doc.nsf/(Symbol)/3327552b9511fb98c12563ed004cbe59?O pendocument.Google Scholar
Office of the President of the Republic of Kiribati (2011) ‘Kiribati Climate Change’, www.climate.gov.ki/changing-climate/.Google Scholar
Olesker, R. (2018) ‘The Securitisation Dilemma: Legitimacy in Securitisation Studies’, Critical Studies on Security, 1–18.Google Scholar
Oppenheimer, C. (2003) ‘Climatic, Environmental and Human Consequences of the Largest Known Historic Eruption: Tambora Volcano (Indonesia) 1815’, Progress in Physical Geography, 27(2), 230259.Google Scholar
Oppenheimer, C. (2016) ‘The Year Without Summer’, In Our Time, Radio 4, 21 August.Google Scholar
Orend, Brian (2002) ‘Justice after War’, Ethics and International Affairs, 16(1), 4356.Google Scholar
Orend, Brian (2006) The Morality of War. Peterborough, ON: Broadview Press.Google Scholar
Orend, Brian (2007) ‘Jus post bellum: The Perspective of a Just-War Theorist’, Leiden Journal of International Law, 20, 571591.Google Scholar
Owens, P. (2010) ‘The Ethics of War: Critical Alternatives’. In Bell, Duncan (ed.) Ethics and World Politics. Oxford: Oxford University Press, 309323.Google Scholar
Owens, P. (2012) ‘Human Security and the Rise of the Social’, Review of International Studies, 38(3), 547567.Google Scholar
Pala, C. (2014) ‘Kiribati President Purchases “Worthless” Resettlement Land as Precaution Against Rising Sea’, Inter Press Service News Agency, www.ipsnews.net/2014/06/kiribati-president-purchases-worthless-resettlement-land-as-precaution-against-rising-sea/.Google Scholar
Pantazis, C. and Pemberton, S. (2009) ‘Reconfiguring Security and Liberty: Political Discourses and Public Opinion in the New Century’, British Journal of Criminology, 52, 651667.Google Scholar
Parfit, Derek (1984) Reasons and Persons, Oxford: Oxford University Press.Google Scholar
Parfit, Derek (2011) On What Matters, Vol. 1. Oxford: Oxford University Press.Google Scholar
Paris, R. (2001) ‘Human Security: Paradigm Shift or Hot Air?’, International Security, 26(2), 87102.Google Scholar
Parish Flannery, N. (2017) ‘Mexico’s Avocado Army: How One City Stood Up to the Drug Cartels’, The Guardian, www.theguardian.com/cities/2017/may/18/avocado-police-tancitaro-mexico-law-drug-cartels.Google Scholar
Parker, A. (2013) Address by the Director General of the Security Service, Andrew Parker, to the Royal United Services Institute (RUSI), Whitehall, 8 October.Google Scholar
Parry, Jonathan (2017) ‘Legitimate Authority and the Ethics of War: A Map of Terrain’, Ethics & International Affairs, 31(2), 169189.Google Scholar
Paskal, C. (2010) Global Warring: How Environmental, Economic and Political Crises Will Redraw the World Map. London: Routledge.Google Scholar
Pattison, James (2010) Humanitarian Intervention & The Responsibility to Protect. Oxford: Oxford University Press.Google Scholar
Peoples, Columba (2011) ‘Security after Emancipation? Critical Theory, Violence and Resistance’, Review of International Studies, 37(3), 11131135.Google Scholar
Peoples, Columba and Vaughan-Williams, Nick (2010 and 2015) Critical Security Studies: An Introduction. London: Routledge.Google Scholar
Philip, P. (1993) ‘Introduction’ in Pettit, Philip (ed.) Consequentialism. Aldershot, Dartmouth Press.Google Scholar
Pirages, D. (2013) ‘Ecological Security: A Conceptual Framework’. In Floyd, Rita and Matthew, Richard A. (eds) Environmental Security: Approaches and Issues. Abingdon: Routledge, 139153.Google Scholar
Pirages, D. and DeGeest, T. (2004) Ecological Security: An Evolutionary Perspective on Globalization, Lanham: Rowman and Littlefield Publishers.Google Scholar
Pogge, Thomas. W. (2008). World Poverty and Human Rights. Cambridge: Polity Press.Google Scholar
Poland, T. M., and McCullough, D. G. (2006) ‘Emerald Ash Borer: Invasion of the Urban Forest and the Threat to North America’s Ash Resource’, Journal of Forestry, 104(3), 118124.Google Scholar
Posner, E. (2003) ‘Do States Have a Moral Obligation to Obey International Law?’ Stanford Law Review, 55, 19011919.Google Scholar
Price-Smith, A. T. (2002) The Health of Nations: Infectious Disease, Environmental Change, and their effects on National Security and Development. Cambridge, MA: MIT Press.Google Scholar
Rachels, James (1986) The Elements of Moral Philosophy. New York: McGraw-Hill/Random.Google Scholar
Rasmussen, M. V. (2006) The Risk Society at War. Terror, Technology and Strategy in the Twenty-First Century, 166168.Google Scholar
Rawls, John (1971) A Theory of Justice. Cambridge, MA: Harvard University Press.Google Scholar
Raz, J. (1986) The Morality of Freedom. Oxford: Clarendon Press.Google Scholar
Reichberg, G. M. (2008) ‘Just War and Regular War: Competing Paradigms’. In Rodin, David and Shue, Henry (eds) Just and Unjust Warriors: The Moral and Legal Status of Soldiers. Oxford: Oxford University Press, 193213.Google Scholar
Rengger, N. (2013) Just War and International Order: The Uncivil Condition in World Politics. Cambridge: Cambridge University Press.Google Scholar
Reus-Smit, Christian and Snidal, Duncan (2008) The Oxford Handbook of International Relations, Oxford: Oxford University Press.Google Scholar
Rigby, A. (2005) ‘Forgiveness and Reconciliation in Jus Post Bellum’. In Evans, M. (ed.) Just War Theory: A Reappraisal. Edinburgh: Edinburgh University Press, 177–202.Google Scholar
Roberge, J. M. and Angelstam, Per (2004) ‘Usefulness of the Umbrella Species Concept as a Conservation Tool’, Conservation Biology 18(1), 7685.Google Scholar
Robinson, Paul (2008) Dictionary of International Security, Cambridge: Polity Press.Google Scholar
Rodin, David (2002) War & Self-Defense. Oxford: Oxford University Press.Google Scholar
Rodin, David (2007a) ‘The Liability of Ordinary Soldiers for Crimes of Aggression’, Washington University Global Studies Law Review, 6, 591.Google Scholar
Rodin, David (2007b) ‘The Problem with Prevention’. In Shue, Henry and Rodin, David (eds) Preemption: Military Action and Moral Justification. The Hague: TMC Asser Press, 143170.Google Scholar
Rodin, David (2008a) ‘The Moral Inequality of Soldiers: Why jus in bello Asymmetry is Half Right’. In Rodin, David and Shue, Henry (eds) Just and Unjust Warriors: The Moral and Legal Status of Soldiers. Oxford: Oxford University Press, 4468.Google Scholar
Rodin, David (2008b) ‘Two emerging issues of jus post bellum: War termination and the liability of soldiers for crimes of aggression’. In Stahn, Carsten and Kleffer, Jann K. (eds) Jus Post Bellum: Towards a Law of Transition from Conflict to Peace. The Hague: TMC Asser Press, 5375.Google Scholar
Rodin, David and Shue, Henry (eds.) (2008) Just and Unjust Warriors: The Moral and Legal Status of Soldiers. Oxford: Oxford University Press.Google Scholar
Roe, Paul (2004) ‘Securitization and Minority Rights: Conditions of Desecuritization’, Security Dialogue, 35(3), 279294.Google Scholar
Roe, Paul (2008a) ‘The “Value” of Positive Security’, Review of International Studies, 34, 777794.Google Scholar
Roe, Paul (2008b) ‘Actor, Audience(s) and Emergency Measures: Securitization and the UK’s Decision to Invade Iraq’, Security Dialogue, 39(6), 615635.Google Scholar
Roe, Paul (2012) ‘Is Securitization a “Negative” Concept? Revisiting the Normative Debate over Normal versus Extraordinary Politics’, Security Dialogue, 43(3), 249266.Google Scholar
Roos, R. (2012) ‘CDC estimate of global H1N1 pandemic deaths: 284,000’, www.cidrap.umn.edu/news-perspective/2012/06/cdc-estimate-global-h1n1-pandemic-deaths-284000.Google Scholar
Rothschild, Emma (1995) ‘What is Security?’, Daedalus, 124(3), 5398.Google Scholar
Royal Society, The (2009) ‘Geo-engineering the Climate: Science, governance and uncertainty’, http://royalsociety.org/uploadedFiles/Royal_Society_Content/policy/publications/2009/8693.pdf.Google Scholar
Rubenstein, Jennifer. (2007) ‘Distribution and Emergency’, Journal of Political Philosophy, 15, 296320.Google Scholar
Ryan, Cheyney (2008) ‘Moral Equality, Victimhood, and the Sovereignty Symmetry Problem’. In Rodin, David and Shue, Henry (eds) Just and Unjust Warriors: The Moral and Legal Status of Soldiers. Oxford: Oxford University Press, 131152.Google Scholar
Salter, Mark B. (2008). ‘Securitization and Desecuritization: A Dramaturgical Analysis of the Canadian Air Transport Security Authority’, Journal of International Relations and Development, 11(4), 321349.Google Scholar
Salter, Mark B (2011) ‘When Securitization Fails: The Hard Case of Counter-Terrorism Programs’. In Balzacq, T. (ed.) Securitization Theory: How Security Problems Emerge and Dissolve. Abingdon: Routledge, 116132.Google Scholar
Salter, Mark B and Mutlu, Can E. (eds) (2013) Research Methods in Critical Security Studies: An Introduction. London: Routledge.Google Scholar
Sandin, Per (2009) ‘Supreme Emergencies Without Bad Guys’, Philosophia, 37(1), 153167.Google Scholar
Sarat, Austin (2009) Mercy on Trial: What It Means to Stop an Execution, Princeton University Press.Google Scholar
Sarat, Austin (2010) ‘Introduction: Towards New Conceptions of the Relationship of Law and Sovereignty under Conditions of Emergency’. In Sarat, Austin (ed.) Sovereignty, Emergency, Legality. Cambridge: Cambridge University Press, 1–15.Google Scholar
Schimmelfennig, Frank (2005) ‘The Community Trap: Liberal Norms, Rhetorical Action and the Eastern Enlargement of the European Union’. In Schimmelfennig, Frank and Sedelmeier, Ulrich (eds), The Politics of European Union Enlargement: Theoretical Approaches. London: Routledge, 142171.Google Scholar
Scruton, Roger (2007) ‘Can Terrorism Destroy Democracy?’ The Observer, 30 September, www.guardian.co.uk/theobserver/2007/sep/30/featuresreview.review10.Google Scholar
Shepherd, Sea (2018) Mission Statement, https://seashepherd.org/mission-statement/.Google Scholar
Searle, John R. and Vanderveken, D. (1985) Foundations of Illocutionary Logic. Cambridge: Cambridge University Press.Google Scholar
Searle, John R. and Vanderveken, D.Security Dialogue (2004) Special section, ‘What Is Human Security?’, 35.Google Scholar
Sen, Amartya (1999) Development as Freedom. New York: Knopf Press.Google Scholar
Serwer, D. (2013) ‘Acknowledging WrongdoingSecurity Community: The OSCE Magazine 2, 2627.Google Scholar
William H, Shaw. (1999) Contemporary Ethics: Taking Account of Utilitarianism. Oxford: Blackwell Publishers.Google Scholar
Shepherd, Laura J. (ed.) (2013) Critical Approaches to Security: An Introduction to Theories and Methods. London: Routledge.Google Scholar
Shue, Henry (1980) Basic Rights: Subsistence, Affluence and US Foreign Policy. Princeton, NJ: Princeton University Press.Google Scholar
Shue, Henry (1988) ‘Mediating Duties’, Ethics 98(4), 687704.Google Scholar
Shue, Henry (2008) ‘Do We Need a “Morality of War”?’. In Rodin, David and Shue, Henry (eds) Just and Unjust Warriors: The Moral and Legal Status of Soldiers. Oxford: Oxford University Press, 87111.Google Scholar
Shue, Henry and Rodin, D. (eds) (2007Preemption: Military Action and Moral Justification. Oxford: Oxford University Press.Simmons, A. John (1999) ‘Justification and Legitimacy’, Ethics, 109(4), 739771.Google Scholar
Singer, J. David (1958) ‘Threat-perception and the armament-tension dilemma’, Journal of Conflict Resolution, 2, 90.Google Scholar
Singer, Marcus G. (1977) ‘Actual Consequence Utilitarianism’, Mind, 86(341), 7273.Google Scholar
Skleparis, Dimitris (2016) ‘(In)securitization and Illiberal Practices on the Fringe of the EU’, European Security, 25(1), 92111.Google Scholar
Smilansky, Saul (2004) ‘Terrorism, Justification and Illusion’, Ethics, 114, 790805.Google Scholar
Soanes, Catherine (ed.) (2000) The Oxford Compact English Dictionary. Oxford: Oxford University Press.Google Scholar
Solomon, S., Qin, D., Manning, Z., Chen, M et al. (2007) ‘Summary for Policymakers’. In Climate Change 2007: The Physical Science Basis. Contribution of Working Group I to the Fourth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge: Cambridge University Press.Google Scholar
Sorell, Tom (2003) ‘Morality and EmergencyProceedings of the Aristotelian Society New Series, Vol. 103, 2137 .Google Scholar
Sorell, Tom (2013) Emergencies and Politics: A Sober Hobbesian Approach. Cambridge: Cambridge University Press.Google Scholar
Sperling, James and Webber, Mark (2017) ‘NATO and the Ukraine Crisis: Collective Securitisation’, European Journal of International Security, 2(1), 1946.Google Scholar
SpielOnline (2016) ‘Abstimmungen in drei Ländern: Die Ergebnisse der Landtagswahlen im Überblick’ 14 March, www.spiegel.de/politik/deutschland/wahlen-2016-die-ergebnisse-der-landtagswahlen-im-ueberblick-a-1082093.html.Google Scholar
Steinberger, Peter J. (2002) ‘Hobbesian Resistance’, American Journal of Political Science, 46(4), 856865.Google Scholar
Steinhoff, Uwe (2007a) On the Ethics of War and Terrorism. Oxford: Oxford University Press.Google Scholar
Steinhoff, Uwe (2007b) ‘Torture – The case for dirty Harry and against Alan Dershowitz’. In Rodin, David (ed.) War, Torture and Terrorism. Oxford: Blackwell Publishers, 97114.Google Scholar
Rodin, David (2009) ‘What Is War – And Can a Lone Individual Wage One?’, International Journal of Applied Philosophy, 23(1), 133150.Google Scholar
Stritzel, Holger (2007) ‘Towards a Theory of Securitization: Copenhagen and Beyond’, European Journal of International Relations, 13, 357383.Google Scholar
Stritzel, Holger (2014) Security in Translation: Securitization and the Localization of Threat. Basingstoke: Palgrave Macmillan.Google Scholar
Stritzel, Holger and Chang, Sean C. (2015) ‘Securitization and Counter-Securitization in Afghanistan’, Security Dialogue, 46(6), 548567.Google Scholar
Taureck, Rita (2006) ‘Securitisation Theory and Securitisation Studies’, Journal of International Relations and Development, 2006, 9(1), 5361.Google Scholar
Terriff, Terry, Croft, Stuart, James, Lucy and Morgan, Patrick M. (1999) Security Studies Today. Oxford: Blackwell Publishers.Google Scholar
Tesón, Fernando R. (2005) Humanitarian Intervention: An Inquiry into Law and Morality, 3rd edn, New York: Transnational Publishers.Google Scholar
Tesón, Fernando R and Van der Vossen, Bas (2017) Debating Humanitarian Intervention: Should We Try to Save Strangers? Oxford: Oxford University Press.Google Scholar
Thomas, P. A. (2016) ‘Biological Flora of the British Isles: Fraxinus excelsior’, Journal of Ecology 2016, 104, 11581209.Google Scholar
Thorme, M. (1990) ‘Establishing Environment as a Human Right’, Denv. J. Int’l L. & Pol’y, 19, 301.Google Scholar
Timmermann, V., Børja, I., Hietala, A. M. et al. (2011) ‘Ash Dieback: Pathogen Spread and Diurnal Patterns of Ascospore Dispersal, with Special Emphasis on Norway’, EPPO Bulletin, 41: 1420. doi: 10.1111/j.1365-2338.2010.02429.x.Google Scholar
Trombetta, Maria J. (2011) ‘Rethinking the Securitization of the Environment: Old Beliefs, New Insights’. In Balzacq, T. (ed.) Securitization Theory: How Security Problems Emerge and Dissolve. London: Routledge, 135149.Google Scholar
UNDP (1994) Human Development Report, Oxford: Oxford University Press.Google Scholar
UNDP (2013) Human Development Report 2013 Kiribati, http://hdrstats.undp.org/images/explanations/KIR.pdf.Google Scholar
UNESCO Institute for Statistics (2013). Data Centre, http://stats.uis.unesco.org.Google Scholar
Uniacke, Suzanne (2007) ‘On Getting One’s Retaliation in First’. In Shue, Henry and Rodin, David (eds) Preemption: Military Action and Moral justification, Oxford: Oxford University Press, 6988.Google Scholar
Uniacke, Suzanne (2014) ‘Self-Defence, Just War, and a Reasonable Prospect of Success’. In Frowe, Helen and Lang, Gerald (eds) How we fight: Ethics in War. Oxford: Oxford University Press, 6274.Google Scholar
Uniacke, Suzanne (2018) ‘The Condition of Last Resort’. In May, Larry (ed.) The Cambridge Handbook of the Just War. Cambridge: Cambridge University Press, 98113.Google Scholar
United States Government (2018) Executive Order 13780: Protecting the Nation From Foreign Terrorist Entry Into the United States Initial Section 11 Report, www.dhs.gov/sites/default/files/publications/Executive Order 13780 Section 11 Report - Final.pdfGoogle Scholar
Valls, M. (2016) ‘Migrant Crisis: EU at Great Risk, Warns France PM Valls’, www.bbc.co.uk/news/world-europe-35375303.Google Scholar
Van Evera, S. (1997) ‘The “Spiral Model” v. “The Deterrence Model”’. Unpublished document, http://web.mit.edu/17.423/www/Archive98/handouts/spiral.html.Google Scholar
Vidal, J. (2015) ‘With 90% of the UK’s ash trees about to be wiped out, could GM be the answer?’ The Guardian, 31 October.Google Scholar
Vié, J. C., Hilton-Taylor, C. and Stuart, S. N. (2008) ‘Wildlife in a Changing World: An Analysis of the 2008 ICUN Red List of Threatened Species’. Gland, Switzerland: ICUN.Google Scholar
Villumsen Berling, Trine (2011) ‘Science and Securitization’, Security Dialogue, 42(4), 385397.Google Scholar
Vuori, Juha A. (2008) ‘Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the study of Non-Democratic Political Orders’, European Journal of International Relations, 14, 6599.Google Scholar
Vuori, Juha A (2011a) ‘Religion Bites: Falungong, Securitization/Desecuritization in the People’s Republic of China’. In Balzacq, Thierry (ed.) Securitization Theory: How Security Problems Emerge and Dissolve. Abingdon: Routledge, 186211.Google Scholar
Vuori, Juha A (2011b) ‘How to do Security with Words: A Grammar of Securitization in the People’s Republic of China’, unpublished manuscript, University of Turku, Finland.Google Scholar
Vuori, Juha A (2014) Critical Security and Chinese Politics. Abingdon: Routledge.Google Scholar
Vyas, K. and Forero, J. (2016) ‘FARC Rebels to Disarm in Deal With Colombia’, The Wall Street Journal, 23 June.Google Scholar
Wæver, Ole (1989) ‘Security, The Speech Act: Analysing the Politics of a Word’, unpublished paper, presented at the Research Training Seminar, Sostrup Manor, revised Jerusalem/Tel Aviv 25–26 June 1989.Google Scholar
Wæver, Ole (1995) ‘Securitization and Desecuritization’. In Lipschutz, Ronnie D. (ed.) On Security, New York: Columbia University Press.Google Scholar
Wæver, Ole (1997) Concepts of Security. Copenhagen: Institute of Political Science, University of Copenhagen.Google Scholar
Wæver, Ole (1999) ’Securitizing sectors? Reply to Eriksson’, Cooperation and Conflict, 34(3), 334340.Google Scholar
Wæver, Ole (2003) ’Securitisation: Taking Stock of a Research Programme in Security Studies’, unpublished manuscript.Google Scholar
Wæver, Ole (2004) ‘Peace and Security: Two Concepts and Their relationship’. In Guzzini, Stefano, and Jung, Dietrich (eds) Contemporary security Analysis and Copenhagen Peace Research. Abingdon: Routledge, ch. 5.Google Scholar
Wæver, Ole (2009) ‘What exactly makes a continuous existential threat existential?’ In Barak, Oren and Sheffer, Gabriel (eds) Existential Threats and Civil-Security Relations. Lanham, Lexington Books.Google Scholar
Wæver, Ole (2011) ‘Politics, Security, Theory’, Security Dialogue, 42(4–5), 465480.Google Scholar
Wæver, Ole (2015) ‘The Theory Act: Responsibility and exactitude as seen from securitization’, International Relations, 29(1), 121127.Google Scholar
Wæver, Ole and Buzan, B. (2007), ‘After the Return to Theory: The Past, Present, and Future of Security Studies’. In Collins, Alan (ed.), Contemporary Security Studies Today. Oxford: Oxford University Press, 381402.Google Scholar
Wæver, Ole and Buzan, B and Buzan, B., Kelstrup, M. and Lemaitre, P. (1993) Identity, Migration and the New Security Agenda in Europe. London: Pinter.Google Scholar
Wæver, Ole and Buzan, B and de Wilde, Jaap (1998) Security: A New Framework for Analysis. Boulder CO: Lynne Rienner.Google Scholar
Waldron, Jeremy (1999) Law and Disagreement, Oxford: Oxford University Press.Google Scholar
Waldron, Jeremy (2002) ‘The Constitutional Conception of Democracy’. In Estlund, David (ed.) Democracy. Oxford: Blackwell, 5183.Google Scholar
Waldron, Jeremy (2010) Torture, Terror and Trade-Offs: Philosophy for the White House. Oxford: Oxford University Press.Google Scholar
Walt, Stephen M. (1991) ‘The Renaissance of Security Studies’, International Studies Quarterly, 35(2), 211–239.Google Scholar
Walt, Stephen M. (2018) ‘US Grand Strategy after the Cold War: Can Realism Explain it? Should Realism Guide it?’, International Relations, online first.Google Scholar
Walzer, Michael (1977) Just and Unjust Wars: A moral Argument with Historical Illustrations, Fourth edition, New York: Basic Books.Google Scholar
Walzer, Michael (1992) Just and Unjust Wars: A Moral Argument with Historical Illustrations, 2nd edn. New York: Basic Books.Google Scholar
Walzer, Michael (2002) ‘The Triumph of the Just War Theory (and the dangers of success)’, Social Research, 69(4), 925942.Google Scholar
Walzer, Michael (2004) ‘Just and Unjust Occupations’, Dissent, www.dissentmagazine.org/article/?article=400.Google Scholar
Watson, Scott (2013) ‘Macrosecuritization and the Securitization Dilemma in the Canadian Arctic’, Critical Studies on Security, 1(3), 265279.Google Scholar
Wendt, Alexander (1999) Social Theory of International Politics. Cambridge: Cambridge University Press.Google Scholar
West, Niels (2004) Marine Affairs Dictionary: Terms, Concepts, Laws, Court Cases, and International Conventions and Agreements. Westport, CT: Greenwood Publishing Group.Google Scholar
Weston Pipper, J. (2016) ‘An End to FARC’s “Revolutionary Tax”’, The Atlantic, 5 July.Google Scholar
Wheeler, Nicholas J. (2000) Saving Strangers: Humanitarian Intervention in International Society. Oxford: Oxford University Press.Google Scholar
White, Randall and Heerwagen, Judith (1998) ‘Nature and Mental Health: Biophilia and Biophobia’. In Lundberg, Ante (ed.) The Environment and Mental Health: A Guide for Clinicians. Mahwah, NJ: Lawrence Erlbaum Associates, 175191.Google Scholar
WHO (2016a) Western Pacific Region Kiribati statistics summary (2000–present), www.who.int/countries/kir/en/.Google Scholar
Wight, Colin (2006) Agents, Structures, and International Relations: Politics as Ontology, Cambridge: Cambridge University Press.Google Scholar
Wilhelmsen, Julie. (2016) ‘How Does War Become a Legitimate Undertaking? Re-engaging the Post-structuralist Foundation of Securitization Theory’, Cooperation and Conflict, p.0010836716648725.Google Scholar
Wilkinson, Paul (2010) ‘Terrorism’. In Cavelty, Myriam Dunn and Mauer, Victor (eds) The Routledge Handbook of Security Studies. Abingdon: Routledge, 129138.Google Scholar
Wilkinson, T. M. (2007) ‘Contagious Disease and Self-defence’, Res Publica, 13, 339359.Google Scholar
Williams, B (1988) ‘Consequentialism and Integrity’. In Scheffler, Samuel (ed.) Consequentialism and Its Critics. Oxford: Oxford University Press.Google Scholar
Williams, M C. (2003) ‘Words, Images, Enemies: Securitization and International Politics’, International Studies Quarterly, 47, 511531.Google Scholar
Williams, P D. (2013 and 2008) Security Studies: An Introduction. London: Routledge.Google Scholar
Wolfendale, J (2017) ‘Defining War’. In Gross, Michael L. and Meisels, Tamar (eds) Soft War: The Ethics of Unarmed Conflict, Cambridge: Cambridge University Press, 1632.Google Scholar
Wolfers, A. (1952) ‘National Security’ as an Ambiguous Symbol. Political Science Quarterly, 67(4), 481502.Google Scholar
Wood, G D. A. (2014) Tambora: The Eruption That Changed the World. Princeton, NJ: Princeton, University Press.Google Scholar
Wolff, S. (2011) ‘The Regional Dimensions of State Failure’, Review of International Studies37(3), 951972.Google Scholar
York, C. (2013) ‘Barack Obama justifies Prism NSA surveillance programme, saying it saved lives’, The Huffington Post UK, 19 June, www.huffingtonpost.co.uk/2013/06/19/prism-obama-germany-merkel_n_3464613.html.Google Scholar
Zedner, L (2009) Security. Abingdon: Routledge.Google Scholar
Zupan, D (2008) ‘A Presumption of the Moral Equality of Combatants: A Citizen- Soldier’s Perspective’. In Rodin, David and Shue, Henry (eds.) Just and Unjust Warriors: The Moral and Legal Status of Soldiers. Oxford: Oxford University Press, 214–225.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • References
  • Rita Floyd, University of Birmingham
  • Book: The Morality of Security
  • Online publication: 19 April 2019
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • References
  • Rita Floyd, University of Birmingham
  • Book: The Morality of Security
  • Online publication: 19 April 2019
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • References
  • Rita Floyd, University of Birmingham
  • Book: The Morality of Security
  • Online publication: 19 April 2019
Available formats
×