Handbook of Governance and Security
Show Less

Handbook of Governance and Security

Edited by James Sperling

The Handbook of Governance and Security examines the conceptual evolution of security governance and the different manifestations of regional security governance. In particular, James Sperling brings together unique contributions from leading scholars to explore the role of institutions that have emerged as critical suppliers of security governance and the ever-widening set of security issues that can be viewed profitably through a governance lens.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 6: Regional security governance

James Sperling


Any number of scholars have considered the domestic and systemic requirements for effective global security governance (notably, Holsti 1991; Adler and Barnett 1998; Keohane 2001; Jervis 2002). With the exception of Holsti, who addressed the necessary and sufficient conditions for system stability (defined as the absence of war), these scholars have been preoccupied with the preconditions for the emergence and persistence of a democratic security community in the transatlantic area and the barriers to its expansion on a global scale. The international system neither constitutes a democratic security community nor comes close to meeting the conditions necessary for one. Moreover, the international system can be decomposed into any number of discrete systems of regional security ranging from those that are relative autonomous (for example, the Southern Cone) from great power interference to those that are dominated by it (for example, Central Asia). Regional security has a long pedigree in the international relations literature (for an overview, see Fawcett 1995; Hurrell 1995; Fawn 2009), although much of the early literature reflected the bipolar distribution of power in the post-war period that gave rise to a preoccupation with formal treaty commitments and mutual defense (for example, Osgood 1960; Dinerstein 1965). The most significant step towards understanding the origin and dynamic of autonomous regional security orders is found in Buzan and Wæver’s ‘regional security complex theory’.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.