Skip to content

Due to scheduled maintenance, online ordering, in regions where offered, will not be available on this site from 8:00 until 10:00 GMT on Sunday 24th March. We apologise for the inconvenience.

Cart

Your Cart

×

You have 0 items in your cart.

Register Sign in Wishlist
Look Inside The Morality of Security

The Morality of Security
A Theory of Just Securitization

$99.99 (C)

  • Publication planned for: June 2019
  • availability: Not yet published - available from June 2019
  • format: Hardback
  • isbn: 9781108493895

$ 99.99 (C)
Hardback

Pre-order Add to wishlist

Looking for an examination copy?

If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact collegesales@cambridge.org providing details of the course you are teaching.

Description
Product filter button
Description
Contents
Resources
Courses
About the Authors
  • When is it permissible to move an issue out of normal politics and treat it as a security issue? How should the security measures be conducted? When and how should the securitization be reversed? Floyd offers answers to these questions by combining security studies' influential securitization theory with philosophy's long-standing just war tradition, creating a major new approach to the ethics of security: 'Just Securitization Theory'. Of interest to anyone concerned with ethics and security, Floyd's innovative approach enables scholars to normatively evaluate past and present securitizations, equips practitioners to make informed judgements on what they ought to do in relevant situations, and empowers the public to hold relevant actors accountable for how they view security.

    • Offers a comprehensive systematic normative theory of securitization
    • Discusses and sets out principles for the just desecuritization
    • Utilizes a number of real-life and hypothetical examples, including jihadi terrorism and global climate change
    Read more

    Reviews & endorsements

    ‘As security increasingly pervades contemporary societies, so the ethics of securitization have become pressing questions. Rita Floyd's finely crafted study provides a wide-ranging appraisal of the issues at stake and a challenging framework for addressing them. Taking on some of the most important issues in contemporary political life, The Morality of Security is sure to inform and provoke debate for years to come.' Michael C. Williams, University of Ottawa

    Customer reviews

    Not yet reviewed

    Be the first to review

    Review was not posted due to profanity

    ×

    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?

    ×

    Product details

    • Publication planned for: June 2019
    • format: Hardback
    • isbn: 9781108493895
    • dimensions: 228 x 152 mm
    • availability: Not yet published - available from June 2019
  • Table of Contents

    Introduction
    Just securitization: raison d'être and feasibility
    Just securitization theory: basic ideas
    Research questions and suggested criteria of just securitization and just desecuritization
    Overview of all chapters
    1. Ethics and the study of security
    1.1. Introduction
    1.2. Security: a two-fold distinction
    1.3. The ethics of security as a state of being
    1.4. The ethics of security as a set of social and political practices
    1.5. Conclusion
    2. Framework: the meaning of securitization and the method of JST
    2.1. Introduction
    2.2. The meaning of securitization in Just Securitization Theory
    2.3. Method
    2.4 Conclusion
    3. Just initiation of securitization: just reason
    3.1. Introduction
    3.2. The just reason
    3.3. Threat categories
    3.4. Agent-intended threats
    3.5. Agent-lacking threats
    3.6. Agent-caused threats
    3.7. Future objective existential threats
    3.8. Conclusion
    4. Just initiation of securitization: just referent object
    4.1. Introduction
    4.2. The just referent object
    4.3. Human needs as a measure of human well-being
    4.4. Needs satisfaction, scale and moral justification
    4.5. Political and social orders
    4.6. Ecosystems and non-human species
    4.7. Human beings
    4.8. Conclusion
    5. Just initiation of securitization: right intention, macro-proportionality and reasonable chance of success
    5.1. Introduction
    5.2. Sincerity of intention
    5.3. Macro-proportionality
    5.4. Reasonable chance of success
    5.5. Omissions: Legitimate authority and last resort
    5.6. Conclusion
    6. Just conduct in securitization
    6.1. Introduction
    6.2. Targeted security measures
    6.3. Least harmful option
    6.4. Just conduct of executors of securitization
    6.5. Moral exemptions to just conduct in securitization
    6.6. Moral culpability and individual agents in unjust securitization
    6.7. Conclusion
    7. Just termination of securitization
    7.1. Introduction
    7.2. What is the meaning of desecuritization in Just Securitization Theory?
    7.3. Does just desecuritization need to follow from just securitization?
    7.4. Who can desecuritize?
    7.5. Who is required to desecuritize?
    7.6. Timing
    7.7. Action
    7.8. Long-term aim
    7.9. Conclusion.

  • Author

    Rita Floyd, University of Birmingham
    Rita Floyd is Lecturer in Conflict and Security at the Department of Political Science and International Studies, University of Birmingham. Her books include Security and the Environment: Securitisation Theory and US Environmental Security Policy (Cambridge, 2010) and her articles have appeared in journals including the Review of International Studies, Security Dialogue, and the Journal of International Relations and Development, amongst others.

Sign In

Please sign in to access your account

Cancel

Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email lecturers@cambridge.org

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×

Find content that relates to you

Join us online

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.

Cancel

Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

×
Please fill in the required fields in your feedback submission.
×