Jump to ContentJump to Main Navigation
Against SecurityHow We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger$
Users without a subscription are not able to see the full content.

Harvey Molotch

Print publication date: 2014

Print ISBN-13: 9780691163581

Published to Princeton Scholarship Online: October 2017

DOI: 10.23943/princeton/9780691163581.001.0001

Show Summary Details
Page of

PRINTED FROM PRINCETON SCHOLARSHIP ONLINE (www.princeton.universitypressscholarship.com). (c) Copyright Princeton University Press, 2022. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in PRSO for personal use.date: 30 June 2022

Introduction: Colors of Security

Introduction: Colors of Security

(p.1) Chapter 1 Introduction: Colors of Security
Against Security

Harvey Molotch

Princeton University Press

This introductory chapter provides an overview of the book's main themes. This book examines strategies for security against nature as well as against the machinations of human beings and their organizations. The analytic strategy is threefold. First is the effort to understand this massive social, moral, and political thing called “security,” and what goes on in its name. A second goal emerges from the idea that, in the specific and sometimes hell-bent responses to threats, we can see how a particular world works. So studying security is a method, a way to learn how—through people's scramble for survival, capacity, and position—“normal” life operates. A third focus is practical: it assumes the role of consultant, the kind who is seldom if ever brought in because he looks for the benign in a situation that is more often in hunt for the demonic.

Keywords:   security, security policy, public policy, command and control

Princeton Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us.