StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

To what extent has realism dominated the study of security - Essay Example

Cite this document
Summary
According to Haslam and McGarty (2003), Realism is a spectrum of ideas which spin around the four core propositions of Political Groupism, International Anarchy, Power politics and Egoism. Realists think that humankind is self-centered and competitive but rather not inherently…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
To what extent has realism dominated the study of security
Read Text Preview

Extract of sample "To what extent has realism dominated the study of security"

Download file to see previous pages

Power is a notion primarily thought of in the perspectives of material resources necessary to coerce or induce other states. The most important actor when it comes to realism is the state. It is autonomous and unitary because it speaks and acts with a single voice (Glassgold, 2012, p. 89). It is noted that the power of the state is understood in respect to its military capabilities, and thus security concerns. Although all nations seek hegemony under realism as the only path to ensure their own security, other states are incentivized to prevent through balancing the emergence of a hegemon.

There is application of rational model of decision making the states through obtaining and acting upon accurate and complete information. National interest guides the sovereign states as explained in the terms of power. Since the single constraint of international system is the anarchy, none of the international authorities and the states are actually left to their devises to provide their own security. The perception of realists that Sovereign states are the key actors in the international system, leads to a special attention to large powers as they are viewed the most influential on the international stage.

States are intrinsically obsessed with security (defensive realism) or are aggressive (offensive realism), and that territorial spreading out is only constrained by opposing powers. Security dilemma result due to this aggressive build-up, such that increasing ones security may convey along even increased instability as an opposing power puts up its own arms in response (Vu & Wongsurawat, 2009, p. 89). The dilemma is such that there is competition among the states to up their security as a result of feeling insecure yet at the end none of the state feels secure.

There is a spiral of insecurity all along. Hence, security turns into a zero-sum game in that only relative gains can be made. Realists accept as true the fact that there are

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“To what extent has realism dominated the study of security Essay”, n.d.)
To what extent has realism dominated the study of security Essay. Retrieved from https://studentshare.org/history/1638022-to-what-extent-has-realism-dominated-the-study-of-security
(To What Extent Has Realism Dominated the Study of Security Essay)
To What Extent Has Realism Dominated the Study of Security Essay. https://studentshare.org/history/1638022-to-what-extent-has-realism-dominated-the-study-of-security.
“To What Extent Has Realism Dominated the Study of Security Essay”, n.d. https://studentshare.org/history/1638022-to-what-extent-has-realism-dominated-the-study-of-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF To what extent has realism dominated the study of security

Security Program

Many aspects of security planning will be taken care of by, for example, the IT department or its equivalent.... security planning is one of most important risk management initiatives in modern organizations.... security planning must be seen in the context of wider organizational policies.... hellip; However, high level security provision on its own is not enough; the systems have to work in practice.... The Data Protection Principle makes this clear, by requiring that security measures be 'technical and organizational'....
7 Pages (1750 words) Case Study

Data Security Solution for the Design Studio One Company

The aim of this paper is to research a Data security Solution requested by the executive management team of the “Design Studio One” company.... The data security technology solution will give strategic implications of the information technology solution on the business for the next three years.... hellip; The company is a need for establishing security procedures including data monitoring periodically.... lthough the current service is robust and customers have full control over their project, the management team noticed that some of the customers complained about the security problem of both servers and the control panel of the company's website....
7 Pages (1750 words) Case Study

Analysis and Enhancements of Touch Screen Registers for Fast Foods

The paper will also contain the steps As technology grows, it has become much easier to work.... Well, this has brought to end the carrying of books and pens to meetings.... This trend has also been picked up by hotels.... But this idea is hit by several problems in the practical implementation of the idea....
5 Pages (1250 words) Case Study

Microsoft's Security Measures

This is why most companies are afraid of security threats brought about by change while at the same time; they have to embrace technology as a means of improving their sales.... The paper "Microsoft's security Measures" states setting a firm's agenda without proper security settings in place is inappropriate for most firms.... A comprehensible security management system that manages numerous security components across multiple devices is extremely crucial to the company....
7 Pages (1750 words) Case Study

Why Software as a Service Is Going to Dominate the Next Several Years

However, what is new in cloud computing is the illusion of infinite resources on demand, fine-grained billing, and the concept of public and private clouds.... Also, the pay-as-you-go paradigm is what makes cloud different from the former ideas similar to cloud.... In this paper, “Why Software as a Service Is Going to Dominate the Next Several Years” the author is going to discuss how SaaS is going to dominate the next several years....
5 Pages (1250 words) Case Study

Attitudes towards the employment of women in security organisation: case study a UK security company

Women in Security OrganisationGuards LLC, is a chief supplier of security amenities in the United Kingdom and the United States, which was engaged in gender-based discrimination, and as a result, had to pay $52, 500 to settle the accusation (Rawlings, 3, 2002).... Gender centred discrimination faced by female security guards has documented by various authors and scholars, argues that it manifests itself as a result of employers… itting to customer liking for male security personnel, thus reallocating women security personnel to inopportune, reduced remunerating posts (Louise, 15, 2001)....
2 Pages (500 words) Case Study

Private Security in Maryland

However, the development of the private security sector is equally important in the promotion of security.... The Act plays a significant role in influencing the process of recruitment and hiring of security personnel.... This paper "Private security in Maryland" focuses on the development of the security sector, the protection of the well-being of the citizenry, and the promotion of humanity.... The private security sector in Maryland faces different effects due to the existing employee hiring policies in the State....
6 Pages (1500 words) Case Study

National Security Agency

This work called "National security Agency" focuses on a cryptanalysis agency NSA used by the US government for protection towards the state's security information.... hellip; The mission of the agency is to take the challenge of preventing access to sensitive information concerning the security of the nation by foreigners....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us