Home Security and Economy in the Third World
book: Security and Economy in the Third World
Book
Licensed
Unlicensed Requires Authentication

Security and Economy in the Third World

  • Nicole Ball
Language: English
Published/Copyright: 1988
View more publications by Princeton University Press
Princeton Legacy Library
This book is in the series

About this book

Nicole Ball brings the effects of security expenditure to the center of that debate, examining in detail how the potential negative consequences on development outweigh the potential positive effects.

Originally published in 1988.

The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.

Reviews

"[A] concentrated investigation of the all-too-often presumed advantages of security spending [for Third World countries]. . . . [The book] challenges conventional theories, and rightly so."---Richard J. Latham, The Journal of Asian Studies

"[A] major contribution to the widening academic and international debate over the complex relationship between defense and development in the Third World."---Joseph P. Smaldone, Perspective


Publicly Available Download PDF
i

Publicly Available Download PDF
vii

Requires Authentication Unlicensed

Licensed
Download PDF
ix

Requires Authentication Unlicensed

Licensed
Download PDF
xi

Requires Authentication Unlicensed

Licensed
Download PDF
xiii

Requires Authentication Unlicensed

Licensed
Download PDF
xv
PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues

Requires Authentication Unlicensed

Licensed
Download PDF
3

Requires Authentication Unlicensed

Licensed
Download PDF
32

Requires Authentication Unlicensed

Licensed
Download PDF
84

Requires Authentication Unlicensed

Licensed
Download PDF
123
PART II. Security Expenditure and Development

Requires Authentication Unlicensed

Licensed
Download PDF
161

Requires Authentication Unlicensed

Licensed
Download PDF
212

Requires Authentication Unlicensed

Licensed
Download PDF
237

Requires Authentication Unlicensed

Licensed
Download PDF
295

Requires Authentication Unlicensed

Licensed
Download PDF
335

Requires Authentication Unlicensed

Licensed
Download PDF
386

Requires Authentication Unlicensed

Licensed
Download PDF
395

Requires Authentication Unlicensed

Licensed
Download PDF
421

Publishing information
Pages and Images/Illustrations in book
eBook published on:
July 14, 2014
eBook ISBN:
9781400859719
Edition:
Course Book
Pages and Images/Illustrations in book
Main content:
462
Downloaded on 8.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/9781400859719/html
Scroll to top button