The security imaginary: Explaining military isomorphism

dc.contributor.authorPretorius, Joelien
dc.date.accessioned2021-02-02T07:30:19Z
dc.date.available2021-02-02T07:30:19Z
dc.date.issued2008
dc.description.abstractThis article proposes the notion of a security imaginary as a heuristic tool for exploring military isomorphism (the phenomenon that weapons and military strategies begin to look the same across the world) at a time when the US model of defence transformation is being adopted by an increasing number of countries. Built on a critical constructivist foundation, the security-imaginary approach is contrasted with rationalist and neo-institutionalist ways of explaining military diffusion and emulation. Merging cultural and constructivist themes, the article offers a 'strong cultural' argument to explain why a country would emulate a foreign military model and how this model is constituted in and comes to constitute a society's security imaginary.en_US
dc.identifier.citationPretorius, J. (2008). The security imaginary: Explaining military isomorphism. Security Dialogue ,39(1) ,99-120en_US
dc.identifier.urihttps://www.jstor.org/stable/26299665
dc.identifier.urihttp://hdl.handle.net/10566/5808
dc.language.isoenen_US
dc.publisherSAGEen_US
dc.subjectMilitary isomorphismen_US
dc.subjectRMAen_US
dc.subjectSecurity imaginaryen_US
dc.subjectCritical constructivismen_US
dc.subjectCultural imperialismen_US
dc.titleThe security imaginary: Explaining military isomorphismen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
SecurityImaginary.pdf
Size:
110.97 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: