We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
As I indicated in the Introduction, I will begin my tour of four select security referents at the macro level and work my way down. I will do so for four reasons. The first is to help shake off any lingering anthropocentric biases that might skew the analysis were we to work in the opposite direction. Human security, of course, naturally invites an anthropocentric treatment; culture as I shall be discussing it is also largely a human concern; and the state is a human creation. Were we to get into the habit of putting people at the centre of our analysis, we might do so too readily precisely where it would be least appropriate. The second is that ecospheric security will be the least familiar concept of the four and for that reason might risk coming across as an afterthought if I were to treat it last. Third, and relatedly, given the unfamiliar style of analysis to which I aim to subject these referents, I see advantages in giving it its first rigorous test in a context in which it is least likely to grate, hoping thereby to cultivate a degree of comfort with it once I turn to referents that we are used to analyzing in less unconventional ways. Fourth, and most importantly, I will argue that the ecosphere must take priority as a security referent, and accordingly must condition our understanding of the others. This argument would be more difficult to make were I to put various carts before the horse.
As a species, we spend a great deal of time, energy, and money on security. The world’s military budgets alone totalled more than $1.9 trillion U.S. dollars in 2020, an average of 6.0 percent of government spending and 2.0 percent of Gross Domestic Product.1 The United States accounts for more than a third of the total all by itself and spends upward of $70 billion on foreign and military intelligence (a figure that excludes black budget expenditures).2 Add in spending on border controls, coast guards, and funding for national security–related research and development across a variety of fields, and it is clear that many countries invest very heavily indeed in protecting against foreign threats.
How do we know when we are investing wisely in security? Answering this question requires investigating what things are worth securing (and why); what threatens them; how best to protect them; and how to think about it. Is it possible to protect them? How best go about protecting them? What trade-offs are involved in allocating resources to security problems? This book responds to these questions by stripping down our preconceptions and rebuilding an understanding of security from the ground up on the basis of a common-sense ontology and an explicit theory of value. It argues for a clear distinction between objective and subjective security threats, a non-anthropocentric understanding of security, and a particular hierarchy of security referents, looking closely at four in particular-the ecosphere, the state, culture, and individual human beings. The analysis will be of interest not only to students and scholars of International Relations, but also to practitioners.
Recommend this
Email your librarian or administrator to recommend adding this to your organisation's collection.