Whose ‘Middle East’? Geopolitical inventions and practices of security
Sage Publications Ltd.
25 - 41
Item Usage Stats
Contesting those approaches that present the ‘Middle East’ as a region that ‘best fits the realist view of international politics’, this article submits that critical approaches are relevant to this part of the world as well. It is argued that instead of taking the relatively little evidence of enthusiasm for addressing the problem of regional insecurity in the Middle East for granted, a critical place for such approaches to begin is a recognition of the presence of a multitude of contending perspectives on regional security each one of which derives from different conceptions of security that have their roots in alternative worldviews. When rethinking regional security from a Critical Security Studies perspective, both the concepts ‘region’ and ‘security’ need to be opened up to reveal the mutually constitutive relationship between (inventing) regions and (conceptions and practices of) security.
KeywordsArab national security
Critical security studies
Muslim Middle East
Published Version (Please cite this version)https://doi.org/10.1177/0047117804041739
Showing items related by title, author, creator and subject.
A survey on information security threats and solutions for Machine to Machine (M2M) communications Tuna, G.; Kogias, D. G.; Gungor, V. C.; Gezer, C.; Taşkın, E.; Ayday, E. (Academic Press Inc., 2017)Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, ...
Onarlıoğu, K.; Battal, Mustafa; Robertson, W.; Kırda, E. (Springer, 2013-07)A poorly designed web browser extension with a security vulnerability may expose the whole system to an attacker. Therefore, attacks directed at "benign-but-buggy" extensions, as well as extensions that have been written ...
Bakır, N. O. (Springer, 2011)This paper presents a game theoretic model that analyzes resource allocation strategies against an adaptive adversary to secure cargo container transportation. The defender allocates security resources that could interdict ...