Security and Economy in the Third World / / Nicole Ball.

Nicole Ball brings the effects of security expenditure to the center of that debate, examining in detail how the potential negative consequences on development outweigh the potential positive effects.Originally published in 1988.The Princeton Legacy Library uses the latest print-on-demand technology...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package 1980-1999
VerfasserIn:
Place / Publishing House:Princeton, NJ : : Princeton University Press, , [2014]
©1988
Year of Publication:2014
Edition:Course Book
Language:English
Series:Princeton Legacy Library ; 937
Online Access:
Physical Description:1 online resource (462 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781400859719
ctrlnum (DE-B1597)447942
(OCoLC)922699727
collection bib_alma
record_format marc
spelling Ball, Nicole, author. aut http://id.loc.gov/vocabulary/relators/aut
Security and Economy in the Third World / Nicole Ball.
Course Book
Princeton, NJ : Princeton University Press, [2014]
©1988
1 online resource (462 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Princeton Legacy Library ; 937
Frontmatter -- CONTENTS -- LIST OF FIGURES -- LIST OF TABLES -- PREFACE -- INTRODUCTION -- PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues -- 1. The Military m Development: The Clash between Theory and Fact -- 2. The Determinants of Security Expenditure -- 3. The Measurement of Security Expenditure -- 4. Substituting the Computer for Analysis -- PART II. Security Expenditure and Development -- 5. Security Spending and the Availability of Resources -- 6. The Security Sector and the Effective Use of Resources -- 7. Capital, Growth, and Security Assistance -- 8. Military Manpower and Human Capital Formation -- 9. Military-Led Industrialization -- 10. The Developmental Role of Security Expenditure -- APPENDIXES -- INDEX
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Nicole Ball brings the effects of security expenditure to the center of that debate, examining in detail how the potential negative consequences on development outweigh the potential positive effects.Originally published in 1988.The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)
POLITICAL SCIENCE / General. bisacsh
Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package 1980-1999 9783110413441
Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package Law & Political Science 9783110413519
Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Archive 1927-1999 9783110442496
print 9780691606767
https://doi.org/10.1515/9781400859719
https://www.degruyter.com/isbn/9781400859719
Cover https://www.degruyter.com/cover/covers/9781400859719.jpg
language English
format eBook
author Ball, Nicole,
Ball, Nicole,
spellingShingle Ball, Nicole,
Ball, Nicole,
Security and Economy in the Third World /
Princeton Legacy Library ;
Frontmatter --
CONTENTS --
LIST OF FIGURES --
LIST OF TABLES --
PREFACE --
INTRODUCTION --
PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues --
1. The Military m Development: The Clash between Theory and Fact --
2. The Determinants of Security Expenditure --
3. The Measurement of Security Expenditure --
4. Substituting the Computer for Analysis --
PART II. Security Expenditure and Development --
5. Security Spending and the Availability of Resources --
6. The Security Sector and the Effective Use of Resources --
7. Capital, Growth, and Security Assistance --
8. Military Manpower and Human Capital Formation --
9. Military-Led Industrialization --
10. The Developmental Role of Security Expenditure --
APPENDIXES --
INDEX
author_facet Ball, Nicole,
Ball, Nicole,
author_variant n b nb
n b nb
author_role VerfasserIn
VerfasserIn
author_sort Ball, Nicole,
title Security and Economy in the Third World /
title_full Security and Economy in the Third World / Nicole Ball.
title_fullStr Security and Economy in the Third World / Nicole Ball.
title_full_unstemmed Security and Economy in the Third World / Nicole Ball.
title_auth Security and Economy in the Third World /
title_alt Frontmatter --
CONTENTS --
LIST OF FIGURES --
LIST OF TABLES --
PREFACE --
INTRODUCTION --
PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues --
1. The Military m Development: The Clash between Theory and Fact --
2. The Determinants of Security Expenditure --
3. The Measurement of Security Expenditure --
4. Substituting the Computer for Analysis --
PART II. Security Expenditure and Development --
5. Security Spending and the Availability of Resources --
6. The Security Sector and the Effective Use of Resources --
7. Capital, Growth, and Security Assistance --
8. Military Manpower and Human Capital Formation --
9. Military-Led Industrialization --
10. The Developmental Role of Security Expenditure --
APPENDIXES --
INDEX
title_new Security and Economy in the Third World /
title_sort security and economy in the third world /
series Princeton Legacy Library ;
series2 Princeton Legacy Library ;
publisher Princeton University Press,
publishDate 2014
physical 1 online resource (462 p.)
Issued also in print.
edition Course Book
contents Frontmatter --
CONTENTS --
LIST OF FIGURES --
LIST OF TABLES --
PREFACE --
INTRODUCTION --
PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues --
1. The Military m Development: The Clash between Theory and Fact --
2. The Determinants of Security Expenditure --
3. The Measurement of Security Expenditure --
4. Substituting the Computer for Analysis --
PART II. Security Expenditure and Development --
5. Security Spending and the Availability of Resources --
6. The Security Sector and the Effective Use of Resources --
7. Capital, Growth, and Security Assistance --
8. Military Manpower and Human Capital Formation --
9. Military-Led Industrialization --
10. The Developmental Role of Security Expenditure --
APPENDIXES --
INDEX
isbn 9781400859719
9783110413441
9783110413519
9783110442496
9780691606767
callnumber-first H - Social Science
callnumber-subject HC - Economic History and Conditions
callnumber-label HC59
callnumber-sort HC 259.72 D4 B35 41988EB
url https://doi.org/10.1515/9781400859719
https://www.degruyter.com/isbn/9781400859719
https://www.degruyter.com/cover/covers/9781400859719.jpg
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 330 - Economics
dewey-ones 338 - Production
dewey-full 338.476234091724
dewey-sort 3338.476234091724
dewey-raw 338.476234091724
dewey-search 338.476234091724
doi_str_mv 10.1515/9781400859719
oclc_num 922699727
work_keys_str_mv AT ballnicole securityandeconomyinthethirdworld
status_str n
ids_txt_mv (DE-B1597)447942
(OCoLC)922699727
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package 1980-1999
Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package Law & Political Science
Title is part of eBook package: De Gruyter Princeton University Press eBook-Package Archive 1927-1999
is_hierarchy_title Security and Economy in the Third World /
container_title Title is part of eBook package: De Gruyter Princeton Legacy Lib. eBook Package 1980-1999
_version_ 1770176692441055232
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04480nam a22007695i 4500</leader><controlfield tag="001">9781400859719</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20141988nju fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013938981</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400859719</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400859719</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)447942</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)922699727</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HC59.72.D4 -- B35 1988eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">338.476234091724</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ball, Nicole, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and Economy in the Third World /</subfield><subfield code="c">Nicole Ball.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Course Book</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©1988</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (462 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Princeton Legacy Library ;</subfield><subfield code="v">937</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">CONTENTS -- </subfield><subfield code="t">LIST OF FIGURES -- </subfield><subfield code="t">LIST OF TABLES -- </subfield><subfield code="t">PREFACE -- </subfield><subfield code="t">INTRODUCTION -- </subfield><subfield code="t">PART I. Security Expenditure: Theoretical, Empirical, and Methodological Issues -- </subfield><subfield code="t">1. The Military m Development: The Clash between Theory and Fact -- </subfield><subfield code="t">2. The Determinants of Security Expenditure -- </subfield><subfield code="t">3. The Measurement of Security Expenditure -- </subfield><subfield code="t">4. Substituting the Computer for Analysis -- </subfield><subfield code="t">PART II. Security Expenditure and Development -- </subfield><subfield code="t">5. Security Spending and the Availability of Resources -- </subfield><subfield code="t">6. The Security Sector and the Effective Use of Resources -- </subfield><subfield code="t">7. Capital, Growth, and Security Assistance -- </subfield><subfield code="t">8. Military Manpower and Human Capital Formation -- </subfield><subfield code="t">9. Military-Led Industrialization -- </subfield><subfield code="t">10. The Developmental Role of Security Expenditure -- </subfield><subfield code="t">APPENDIXES -- </subfield><subfield code="t">INDEX</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Nicole Ball brings the effects of security expenditure to the center of that debate, examining in detail how the potential negative consequences on development outweigh the potential positive effects.Originally published in 1988.The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton Legacy Lib. eBook Package 1980-1999</subfield><subfield code="z">9783110413441</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton Legacy Lib. eBook Package Law &amp; Political Science</subfield><subfield code="z">9783110413519</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press eBook-Package Archive 1927-1999</subfield><subfield code="z">9783110442496</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780691606767</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400859719</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781400859719</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781400859719.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-041344-1 Princeton Legacy Lib. eBook Package 1980-1999</subfield><subfield code="c">1980</subfield><subfield code="d">1999</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-041351-9 Princeton Legacy Lib. eBook Package Law &amp; Political Science</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-044249-6 Princeton University Press eBook-Package Archive 1927-1999</subfield><subfield code="c">1927</subfield><subfield code="d">1999</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>