Whose ‘Middle East’? Geopolitical inventions and practices of security
Author(s)
Date
2004Source Title
International Relations
Print ISSN
0047-1178
Publisher
Sage Publications Ltd.
Volume
18
Issue
1
Pages
25 - 41
Language
English
Type
ArticleItem Usage Stats
168
views
views
298
downloads
downloads
Abstract
Contesting those approaches that present the ‘Middle East’ as a region that ‘best fits the realist view of international politics’, this article submits that critical approaches are relevant to this part of the world as well. It is argued that instead of taking the relatively little evidence of enthusiasm for addressing the problem of regional insecurity in the Middle East for granted, a critical place for such approaches to begin is a recognition of the presence of a multitude of contending perspectives on regional security each one of which derives from different conceptions of security that have their roots in alternative worldviews. When rethinking regional security from a Critical Security Studies perspective, both the concepts ‘region’ and ‘security’ need to be opened up to reveal the mutually constitutive relationship between (inventing) regions and (conceptions and practices of) security.
Keywords
Arab national securityCritical security studies
Mediterranean security
Middle East
Muslim Middle East
Regional security
Security community
Permalink
http://hdl.handle.net/11693/49049Published Version (Please cite this version)
https://doi.org/10.1177/0047117804041739Collections
Related items
Showing items related by title, author, creator and subject.
-
A survey on information security threats and solutions for Machine to Machine (M2M) communications
Tuna, G.; Kogias, D. G.; Gungor, V. C.; Gezer, C.; Taşkın, E.; Ayday, E. (Academic Press Inc., 2017)Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, ... -
Securing legacy firefox extensions with SENTINEL
Onarlıoğu, K.; Battal, Mustafa; Robertson, W.; Kırda, E. (Springer, 2013-07)A poorly designed web browser extension with a security vulnerability may expose the whole system to an attacker. Therefore, attacks directed at "benign-but-buggy" extensions, as well as extensions that have been written ... -
A Stackelberg game model for resource allocation in cargo container security
Bakır, N. O. (Springer, 2011)This paper presents a game theoretic model that analyzes resource allocation strategies against an adaptive adversary to secure cargo container transportation. The defender allocates security resources that could interdict ...