You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The contemporary organization of global violence is neither timeless nor natural, argues Janice Thomson. It is distinctively modern. In this book she examines how the present arrangement of the world into violence-monopolizing sovereign states evolved over the six preceding centuries. Tracing the activities of mercenaries, pirates, mercantile companies, and sovereigns from the Mediterranean to the Northwest Territories, the author addresses compelling questions: Why do we have centralized bureaucracies - states - which claim a monopoly on violence? Why is this monopoly based on territorial boundaries? Why is coercion not an international market commodity? Thomson maintains that the contempor...
The contemporary organization of global violence is neither timeless nor natural, argues Janice Thomson. It is distinctively modern. In this book she examines how the present arrangement of the world into violence-monopolizing sovereign states evolved over the six preceding centuries.
British Captives from the Mediterranean to the Atlantic, 1563-1760 provides the first study of British captives in the North African Atlantic and Mediterranean, from the reign of Elizabeth I to George II. Based on extensive archival research in the United Kingdom, Nabil Matar furnishes the names of all captives while examining the problems that historians face in determining the numbers of early modern Britons in captivity. Matar also describes the roles which the monarchy, parliament, trading companies, and churches played (or did not play) in ransoming captives. He questions the emphasis on religious polarization in piracy and shows how much financial constraints, royal indifference, and corruption delayed the return of captives. As rivarly between Britain and France from 1688 on dominated the western Mediterranean and Atlantic, Matar concludes by showing how captives became the casus belli that justified European expansion.
Fully revised and updated, the second edition of Introduction to Global Politics places an increased emphasis on the themes of continuity and change. It continues to explain global politics using an historical approach, firmly linking history with the events of today. By integrating theory and political practice at individual, state, and global levels, students are introduced to key developments in global politics, helping them make sense of major trends that are shaping our world. This is a highly illustrated textbook with informative and interactive boxed material throughout. Chapter opening timelines contextualise the material that follows, and definitions of key terms are provided in a g...
A Search for Sovereignty approaches world history by examining the relation of law and geography in European empires between 1400 and 1900. Lauren Benton argues that Europeans imagined imperial space as networks of corridors and enclaves, and that they constructed sovereignty in ways that merged ideas about geography and law. Conflicts over treason, piracy, convict transportation, martial law, and crime created irregular spaces of law, while also attaching legal meanings to familiar geographic categories such as rivers, oceans, islands, and mountains. The resulting legal and spatial anomalies influenced debates about imperial constitutions and international law both in the colonies and at home. This study changes our understanding of empire and its legacies and opens new perspectives on the global history of law.
Louis Mandrin led a gang of bandits who brazenly smuggled contraband into eighteenth-century France. Michael Kwass brings new life to the legend of this Gallic Robin Hood, exposing the dark side of early modern globalization. Decades later, the memory of Mandrin inspired ordinary subjects and Enlightened philosophers alike to challenge royal power.
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such examp...
This volume was first published by Inter-Disciplinary Press in 2014. Using contexts ranging from personal interactions to topical international events, this eBook provides a snapshot of the myriad of challenges that conflict and communication present us with.
This book provides a new analysis of why relations between the United States and the Chinese Communists were so hostile in the first decade of the Cold War. Employing extensive documentation, it offers a fresh approach to long-debated questions such as why Truman refused to recognize the Chinese Communists, why the United States aided Chiang Kai-shek's KMT on Taiwan, why the Korean War escalated into a Sino-American conflict, and why Mao shelled islands in the Taiwan Straits in 1958, thus sparking a major crisis with the United States. Christensen first develops a novel two-level approach that explains why leaders manipulate low-level conflicts to mobilize popular support for expensive, long...
Environmental tragedies such as Chernobyl and the Exxon Valdez remind us that catastrophic accidents are always possible in a world full of hazardous technologies. Yet, the apparently excellent safety record with nuclear weapons has led scholars, policy-makers, and the public alike to believe that nuclear arsenals can serve as a secure deterrent for the foreseeable future. In this provocative book, Scott Sagan challenges such optimism. Sagan's research into formerly classified archives penetrates the veil of safety that has surrounded U.S. nuclear weapons and reveals a hidden history of frightening "close calls" to disaster.