Limiting institutions? : the challenge of Eurasian security governance /
Limiting Institutions examines the security threats in Eurasia and the role of institutions in the post-Cold War international environment. It looks at both the crucial aspect of foreign policy as well as a theoretical area of security studies and its imp.
Други автори: | Sperling, James., Kay, Sean, 1967-, Papacosma, S. Victor, 1942- |
---|---|
Формат: | Електронна книга |
Език: | English |
Публикувано: |
Manchester, UK ; New York : New York :
Manchester University Press ; Distributed exclusively in the USA by Palgrave,
℗♭2003.
|
Предмети: | |
Онлайн достъп: |
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=133657 |
Подобни документи: |
Print version::
Limiting institutions?. |
Съдържание:
- I.
- Introduction.
- 1.
- Eurasian security governance: new threats, institutional adaptations /
- James Sperling
- II.
- Security threats.
- 2.
- Contested national identities and weak state structures in Eurasia /
- Douglas Blum
- 3.
- Ethnic conflict and Eurasian security /
- Stuart Kaufman
- 4.
- Eurasia and the transnational terrorist threats to Atlantic security /
- Phil Williams
- 5.
- Transboundary water management and security in Central Asia /
- Stuart Horsman
- 6.
- The geopolitics of Central Asian energy /
- Jaewoo Choo
- III.
- Institutions of security governance.
- 7.
- Geopolitical constraints and institutional innovation: the dynamics of multilateralism in Eurasia /
- Sean Kay
- 8.
- The OSCE role in Eurasian security /
- P. Terrence Hopmann
- 9.
- Paths to peace for NATO's partnerships in Eurasia/
- Joshua B. Spero
- 10.
- Russia, the CIS and Eurasian interconnections/
- John P. Willerton and Geoffrey Cockerham
- 11.
- The Black Sea Economic Cooperation: what contribution to regional security? /
- Panagiota Manoli
- 12.
- The EU and Eurasia: a bounded security role in a greater Europe /
- Simon Serfaty
- IV.
- Conclusion.
- 13.
- Reflections on Eurasian security /
- David P. Calleo.
- Contributors; Preface and acknowledgements; Abbreviations and acronyms; I Introduction; II Security threats; III Institutions of security governance; IV Conclusion; Select bibliography; Index.