1,537
Views
27
CrossRef citations to date
0
Altmetric
ARTICLES

Taking stock of networks across the security field: a review, typology and research agenda

&
Pages 671-687 | Received 08 Feb 2017, Accepted 12 Jul 2017, Published online: 26 Jul 2017
 

ABSTRACT

Security network research has grown considerably in the last decade as it has been increasingly recognised that security is pursued through networks of public, private and hybrid actors or nodes. This research deals with local, institutional, international and virtual security networks and includes techniques such as social network analysis and approaches more familiar to organisational theory and management. However, much of the security network research employs the network concept as a metaphor to suggest a relationship between a set of security nodes, without examining the structural pattern of these relationships or the underlying properties of security networks. Different uses of the network concept have led to confusion about the application of network theory across the security field. This article attempts to address these issues by clarifying the fundamental concepts of a network perspective and revisiting existing typologies of security networks. We review research on the use of network perspectives across the security field, evaluate theoretical and empirical trends, and give directions for future research. We examine the geographical properties of security networks operating at the subnational, national and transnational levels and put forward four types of networks that have the potential to improve security network research: information exchange networks, knowledge generating networks, problem-solving networks and coordination networks. The article concludes by highlighting the importance of networks for understanding and promoting the governance of security.

Acknowledgements

The authors would like to thank Emily Maddocks for her outstanding research assistance, as well as the participants to the Seventh Annual Illicit Networks Workshop, Peter Manning, James Sheptycki and Jennifer Wood, and the anonymous reviewers, for their helpful feedback on an earlier version of this article.

Disclosure statement

No potential conflict of interest was reported by the authors.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.