118
Views
3
CrossRef citations to date
0
Altmetric
Forum

The question of value-added: a response to Burke

References

  • Aradau, C. 2004. “Security and the Democratic Scene: Desecuritization and Emancipation.” Journal of International Relations and Development 7: 388–413. doi:10.1057/palgrave.jird.1800030.
  • Beitz, C. 2009. The Idea of Human Rights. Oxford: Oxford University Press.
  • Bigo, D. 2002. “When Two Become One: Internal and External Securitisations in Europe.” In International Relations Theory and the Politics of European Integration, edited by M. Kelstrup and M. C. Williams. London: Routledge.
  • Brock, G. 2009. Global Justice: A Cosmopolitan Account. Oxford: Oxford University Press.
  • Burke, A. 2013. “Security Cosmopolitanism.” Critical Studies on Security 1 (1): 13–28. doi:10.1080/21624887.2013.790194.
  • Burke, A., K. Lee-Koo, and M. McDonald. 2014. Ethics and Global Security: A Cosmopolitan Approach. Abingdon: Routledge.
  • Buzan, B. 2004. From International to World Society? English School Theory and the Social Structure of Globalisation. Cambridge: Cambridge University Press.
  • Buzan, B., O. Wæver, and J. de Wilde. 1998. Security: A New Framework for Analysis. Boulder: Lynne Rienner.
  • Caney, S. 2005. Justice beyond Borders. Oxford: Oxford University Press.
  • Caney, S. 2006. “Environmental Degradation, Reparations, and the Moral Significance of History.” Journal of Social Science 37 (3): 464–482.
  • Caney, S. 2010. “Climate Change and the Duties of the Advantaged.” Critical Review of International Social and Political Philosophy 13 (1): 203–228. doi:10.1080/13698230903326331.
  • Ciută, F. 2009. “Security and the Problem of Context: A Hermeneutical Critique of Securitization Theory.” Review of International Studies 35: 301–326.
  • Cooper, N., and M. Turner. 2013. “The Iron Fist of Liberal Intervention Inside the Velvet Glove of Kantian Idealism: A Response to Burke.” Critical Studies on Security 1 (1): 35–41. doi:10.1080/21624887.2013.801134.
  • Fabre, C. 2012. Cosmopolitan War. Oxford: Oxford University Press.
  • Floyd, R. 2015. “Just and Unjust Desecuritization.” In Contesting Security: Strategies and Logics, edited by T. Balzacq. Abingdon: Routledge.
  • Floyd, R. Forthcoming. “Extraordinary or Ordinary Emergency Measures: What, and Who, Defines the “Success” of Securitisation?” Cambridge Review of International Affairs 28.
  • Herington, J. 2012. “The Concept of Security.” In Ethical and Security Aspects of Infectious Disease Control: Interdisciplinary Perspectives, edited by M. Selgelid and C. Enemark, 7–25. Farnham: Ashgate Publishing.
  • Hynek, N., and D. Chandler. 2013. “No Emancipatory Alternative, No Critical Security Studies.” Critical Studies on Security 1 (1): 46–63. doi:10.1080/21624887.2013.790202.
  • Kaldor, M. 2013. “Comment on Security Cosmopolitanism.” Critical Studies on Security 1 (1): 42–45. doi:10.1080/21624887.2013.801135.
  • Paris, R. 2001. “Human Security: Paradigm Shift or Hot Air?” International Security 26 (2): 87–102.
  • Pogge, T. 2008. World Poverty and Human Rights. 2nd ed. Cambridge: Polity Press.
  • Sjoberg, L. 2013. “The Paradox of Security Cosmopolitanism?” Critical Studies on Security 1 (1): 29–34. doi:10.1080/21624887.2013.801132.
  • Trombetta, M. J. 2011. “Rethinking the Securitization of the Environment: Old Beliefs, New Insights.” In Securitization Theory: How Security Problems Emerge and Dissolve, edited by T. Balzacq, 135–149. London: Routledge.
  • Vuori, J. A. 2014. Critical Security and Chinese Politics. Abingdon: Routledge.
  • Wæver, O. 1995. “Securitization and Desecuritization.” In On Security, edited by R. D. Lipschutz, 46–86. New York: Columbia University Press.
  • Wæver, O. 2011. “Politics, Security, Theory.” Security Dialogue 42 (4–5): 465–480. doi:10.1177/0967010611418718.
  • Walker, R. B. 1997. “The Subject of Security.” In Critical Security Studies: Concepts and Cases, edited by K. Krause and M. C. Williams, 61–82. London: Routledge.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.