Security and Economy in the Third World / / Nicole Ball.
Nicole Ball brings the effects of security expenditure to the center of that debate, examining in detail how the potential negative consequences on development outweigh the potential positive effects.Originally published in 1988.The Princeton Legacy Library uses the latest print-on-demand technology...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package 1980-1999 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Princeton, NJ : : Princeton University Press, , [2014] ©1988 |
Year of Publication: | 2014 |
Edition: | Course Book |
Language: | English |
Series: | Princeton Legacy Library ;
937 |
Online Access: | |
Physical Description: | 1 online resource (462 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781400859719 |
---|---|
ctrlnum |
(DE-B1597)447942 (OCoLC)922699727 |
collection |
bib_alma |
record_format |
marc |
spelling |
Ball, Nicole, author. aut http://id.loc.gov/vocabulary/relators/aut Security and Economy in the Third World / Nicole Ball. Course Book Princeton, NJ : Princeton University Press, [2014] ©1988 1 online resource (462 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Princeton Legacy Library ; 937 Frontmatter -- CONTENTS -- LIST OF FIGURES -- LIST OF TABLES -- PREFACE -- INTRODUCTION -- PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues -- 1. The Military m Development: The Clash between Theory and Fact -- 2. The Determinants of Security Expenditure -- 3. The Measurement of Security Expenditure -- 4. Substituting the Computer for Analysis -- PART II. Security Expenditure and Development -- 5. Security Spending and the Availability of Resources -- 6. The Security Sector and the Effective Use of Resources -- 7. Capital, Growth, and Security Assistance -- 8. Military Manpower and Human Capital Formation -- 9. Military-Led Industrialization -- 10. The Developmental Role of Security Expenditure -- APPENDIXES -- INDEX restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Nicole Ball brings the effects of security expenditure to the center of that debate, examining in detail how the potential negative consequences on development outweigh the potential positive effects.Originally published in 1988.The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) POLITICAL SCIENCE / General. bisacsh Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package 1980-1999 9783110413441 Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package Law & Political Science 9783110413519 Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Archive 1927-1999 9783110442496 print 9780691606767 https://doi.org/10.1515/9781400859719 https://www.degruyter.com/isbn/9781400859719 Cover https://www.degruyter.com/cover/covers/9781400859719.jpg |
language |
English |
format |
eBook |
author |
Ball, Nicole, Ball, Nicole, |
spellingShingle |
Ball, Nicole, Ball, Nicole, Security and Economy in the Third World / Princeton Legacy Library ; Frontmatter -- CONTENTS -- LIST OF FIGURES -- LIST OF TABLES -- PREFACE -- INTRODUCTION -- PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues -- 1. The Military m Development: The Clash between Theory and Fact -- 2. The Determinants of Security Expenditure -- 3. The Measurement of Security Expenditure -- 4. Substituting the Computer for Analysis -- PART II. Security Expenditure and Development -- 5. Security Spending and the Availability of Resources -- 6. The Security Sector and the Effective Use of Resources -- 7. Capital, Growth, and Security Assistance -- 8. Military Manpower and Human Capital Formation -- 9. Military-Led Industrialization -- 10. The Developmental Role of Security Expenditure -- APPENDIXES -- INDEX |
author_facet |
Ball, Nicole, Ball, Nicole, |
author_variant |
n b nb n b nb |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Ball, Nicole, |
title |
Security and Economy in the Third World / |
title_full |
Security and Economy in the Third World / Nicole Ball. |
title_fullStr |
Security and Economy in the Third World / Nicole Ball. |
title_full_unstemmed |
Security and Economy in the Third World / Nicole Ball. |
title_auth |
Security and Economy in the Third World / |
title_alt |
Frontmatter -- CONTENTS -- LIST OF FIGURES -- LIST OF TABLES -- PREFACE -- INTRODUCTION -- PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues -- 1. The Military m Development: The Clash between Theory and Fact -- 2. The Determinants of Security Expenditure -- 3. The Measurement of Security Expenditure -- 4. Substituting the Computer for Analysis -- PART II. Security Expenditure and Development -- 5. Security Spending and the Availability of Resources -- 6. The Security Sector and the Effective Use of Resources -- 7. Capital, Growth, and Security Assistance -- 8. Military Manpower and Human Capital Formation -- 9. Military-Led Industrialization -- 10. The Developmental Role of Security Expenditure -- APPENDIXES -- INDEX |
title_new |
Security and Economy in the Third World / |
title_sort |
security and economy in the third world / |
series |
Princeton Legacy Library ; |
series2 |
Princeton Legacy Library ; |
publisher |
Princeton University Press, |
publishDate |
2014 |
physical |
1 online resource (462 p.) Issued also in print. |
edition |
Course Book |
contents |
Frontmatter -- CONTENTS -- LIST OF FIGURES -- LIST OF TABLES -- PREFACE -- INTRODUCTION -- PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues -- 1. The Military m Development: The Clash between Theory and Fact -- 2. The Determinants of Security Expenditure -- 3. The Measurement of Security Expenditure -- 4. Substituting the Computer for Analysis -- PART II. Security Expenditure and Development -- 5. Security Spending and the Availability of Resources -- 6. The Security Sector and the Effective Use of Resources -- 7. Capital, Growth, and Security Assistance -- 8. Military Manpower and Human Capital Formation -- 9. Military-Led Industrialization -- 10. The Developmental Role of Security Expenditure -- APPENDIXES -- INDEX |
isbn |
9781400859719 9783110413441 9783110413519 9783110442496 9780691606767 |
callnumber-first |
H - Social Science |
callnumber-subject |
HC - Economic History and Conditions |
callnumber-label |
HC59 |
callnumber-sort |
HC 259.72 D4 B35 41988EB |
url |
https://doi.org/10.1515/9781400859719 https://www.degruyter.com/isbn/9781400859719 https://www.degruyter.com/cover/covers/9781400859719.jpg |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
330 - Economics |
dewey-ones |
338 - Production |
dewey-full |
338.476234091724 |
dewey-sort |
3338.476234091724 |
dewey-raw |
338.476234091724 |
dewey-search |
338.476234091724 |
doi_str_mv |
10.1515/9781400859719 |
oclc_num |
922699727 |
work_keys_str_mv |
AT ballnicole securityandeconomyinthethirdworld |
status_str |
n |
ids_txt_mv |
(DE-B1597)447942 (OCoLC)922699727 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package 1980-1999 Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package Law & Political Science Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Archive 1927-1999 |
is_hierarchy_title |
Security and Economy in the Third World / |
container_title |
Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package 1980-1999 |
_version_ |
1770176692441055232 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04480nam a22007695i 4500</leader><controlfield tag="001">9781400859719</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20141988nju fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013938981</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400859719</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400859719</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)447942</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)922699727</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HC59.72.D4 -- B35 1988eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">338.476234091724</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ball, Nicole, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and Economy in the Third World /</subfield><subfield code="c">Nicole Ball.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Course Book</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©1988</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (462 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Princeton Legacy Library ;</subfield><subfield code="v">937</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">CONTENTS -- </subfield><subfield code="t">LIST OF FIGURES -- </subfield><subfield code="t">LIST OF TABLES -- </subfield><subfield code="t">PREFACE -- </subfield><subfield code="t">INTRODUCTION -- </subfield><subfield code="t">PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues -- </subfield><subfield code="t">1. The Military m Development: The Clash between Theory and Fact -- </subfield><subfield code="t">2. The Determinants of Security Expenditure -- </subfield><subfield code="t">3. The Measurement of Security Expenditure -- </subfield><subfield code="t">4. Substituting the Computer for Analysis -- </subfield><subfield code="t">PART II. Security Expenditure and Development -- </subfield><subfield code="t">5. Security Spending and the Availability of Resources -- </subfield><subfield code="t">6. The Security Sector and the Effective Use of Resources -- </subfield><subfield code="t">7. Capital, Growth, and Security Assistance -- </subfield><subfield code="t">8. Military Manpower and Human Capital Formation -- </subfield><subfield code="t">9. Military-Led Industrialization -- </subfield><subfield code="t">10. The Developmental Role of Security Expenditure -- </subfield><subfield code="t">APPENDIXES -- </subfield><subfield code="t">INDEX</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Nicole Ball brings the effects of security expenditure to the center of that debate, examining in detail how the potential negative consequences on development outweigh the potential positive effects.Originally published in 1988.The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton Legacy Lib. eBook Package 1980-1999</subfield><subfield code="z">9783110413441</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton Legacy Lib. eBook Package Law & Political Science</subfield><subfield code="z">9783110413519</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press eBook-Package Archive 1927-1999</subfield><subfield code="z">9783110442496</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780691606767</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400859719</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781400859719</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781400859719.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-041344-1 Princeton Legacy Lib. eBook Package 1980-1999</subfield><subfield code="c">1980</subfield><subfield code="d">1999</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-041351-9 Princeton Legacy Lib. eBook Package Law & Political Science</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-044249-6 Princeton University Press eBook-Package Archive 1927-1999</subfield><subfield code="c">1927</subfield><subfield code="d">1999</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |