Normal view MARC view ISBD view

The security dilemmas of Southeast Asia / Alan Collins

By: Collins, Alan, 1967-.
Contributor(s): Institute of Southeast Asian Studies.
Publisher: Houndmills, Hampshire : Macmillan Press in association with Institute of Southeast Asian Studies, Singapore, 2000Description: xi, 237 p. ; 22 cm.ISBN: 0333918908.Subject(s): ASEAN | National security -- Asia, Southeastern | Security, International | Asia, Southeastern -- Ethnic relations | Asia, Southeastern -- Foreign relations | Asia, Southeastern -- Military policy | Southeast Asia -- Politics and government -- 1945-DDC classification: 327.160959
Contents:
List of Tables. - List of Abbreviations. - Preface. - 1. Introduction : Evolution of the Security Dilemma. - Pt. I. Intra-state Security Dilemma. 2. Third World Security : Security and Insecurity Dilemma. 3. Ethnic Tensions and the Security Dilemma in Southeast Asia. - Pt. II. Intra-state Security Dilemma. 4. ASEAN's Security Dilemma. - Pt. III. State-induced Security Dilemma. 5. ASEAN, the China Threat and the South China Sea Dispute. 6. Conclusion: Application and Mitigation. - Notes. - Index
Item type Current location Shelf location Call number Copy number Status Notes Date due Barcode
Main Collection Taylor's Library-TU

Floor 3, Shelf 5 , Side 1, TierNo 5, BayNo 4

327.160959 COL (Browse shelf) 1 Available SOMAC,09030,02,GR 5000046413

First published in Great Britain 2000 by Macmillan Press Ltd

First published in Singapore by the Institute of Southeast Asian Studies

First published in the United States of America 2000 by St. Martin's Press

List of Tables. - List of Abbreviations. - Preface. - 1. Introduction : Evolution of the Security Dilemma. - Pt. I. Intra-state Security Dilemma. 2. Third World Security : Security and Insecurity Dilemma. 3. Ethnic Tensions and the Security Dilemma in Southeast Asia. - Pt. II. Intra-state Security Dilemma. 4. ASEAN's Security Dilemma. - Pt. III. State-induced Security Dilemma. 5. ASEAN, the China Threat and the South China Sea Dispute. 6. Conclusion: Application and Mitigation. - Notes. - Index