- Elgar original reference
Edited by James Sperling
Chapter 6: Regional security governance
Any number of scholars have considered the domestic and systemic requirements for effective global security governance (notably, Holsti 1991; Adler and Barnett 1998; Keohane 2001; Jervis 2002). With the exception of Holsti, who addressed the necessary and sufficient conditions for system stability (defined as the absence of war), these scholars have been preoccupied with the preconditions for the emergence and persistence of a democratic security community in the transatlantic area and the barriers to its expansion on a global scale. The international system neither constitutes a democratic security community nor comes close to meeting the conditions necessary for one. Moreover, the international system can be decomposed into any number of discrete systems of regional security ranging from those that are relative autonomous (for example, the Southern Cone) from great power interference to those that are dominated by it (for example, Central Asia). Regional security has a long pedigree in the international relations literature (for an overview, see Fawcett 1995; Hurrell 1995; Fawn 2009), although much of the early literature reflected the bipolar distribution of power in the post-war period that gave rise to a preoccupation with formal treaty commitments and mutual defense (for example, Osgood 1960; Dinerstein 1965). The most significant step towards understanding the origin and dynamic of autonomous regional security orders is found in Buzan and Wæver’s ‘regional security complex theory’.
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.