StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The U.S. Security and identity during the Cold War - Research Paper Example

Cite this document
Summary
Jean Venette Professor Research Methods Topic of Research: The U.S. Security and Identity during the Cold War Abstract In this study, the researcher tries to identify and examine the ‘identity’ and ‘security’ of the United States during the Cold War era…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
The U.S. Security and identity during the Cold War
Read Text Preview

Extract of sample "The U.S. Security and identity during the Cold War"

Download file to see previous pages

This is the reason why U.S. presidents at the time of the Cold War era implemented a number of foreign policies in order to maintain that kind of reputation using mainly capitalism as a powerful tool. The United States, furthermore, viewed the Cold War era in a different perspective according to David Campbell. The Cold War era was not in any way a race towards economic supremacy masquerading in the form of capitalism evangelization but an assertion of their identity as American citizens. It is, moreover, an issue of security, not just about physical security but a security of their sacredly-held identities as a nation.

Furthermore, this research also solidifies its claims using various literatures that provide a historical representation of the Cold War era. Its origin also has been debated by historians and social scientists, that is why, the researcher tries to present some of the theorized origins of the war in a brief and concise portion of this paperThe U.S. Foreign Policy during the Cold War Period Outline of the Study This study is all about the identity and security status of the United States during the Cold War period.

The first chapter is an introduction of the topic, its objectives, and the research question. The second chapter is a review of literature associated with U.S. foreign policy, issues of identity and security, and Campbell’s reading during the said era. The third chapter presents how the study was done. Lastly, the fourth chapter gives the conclusion, implications and recommendations for future studies. Introduction The United States foreign policy during the early Cold War era was not in any way about forwarding the national interest of the country, but on asserting its identity and secu

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The U.S. Security and identity during the Cold War Research Paper”, n.d.)
Retrieved from https://studentshare.org/history/1403426-security-and-identity
(The U.S. Security and Identity During the Cold War Research Paper)
https://studentshare.org/history/1403426-security-and-identity.
“The U.S. Security and Identity During the Cold War Research Paper”, n.d. https://studentshare.org/history/1403426-security-and-identity.
  • Cited: 0 times

CHECK THESE SAMPLES OF The U.S. Security and identity during the Cold War

The Post Cold War Period and The Attack on Pentagon

The intelligence in the World has undergone a lot of transformation from the cold war period and the post-Cold War period being streamlined by the challenges being faced by intelligence collectors.... The end of the cold war has not ushered in a period of peace and security in the world and thus the need for a reliable and effective intelligence remains paramount despite the existence of new open sources of information.... The paper "The Post cold war Period and The Attack on Pentagon" states that the capability of the intelligence community to deal with potential enemies such as the Al- Qaeda which was exemplified by the killing of the famous Al-Qaeda leader Osama bin Laden....
4 Pages (1000 words) Assignment

Critical Approaches to Security: Turkish Case Study

In the paper “Critical Approaches to Security: Turkish Case Study” the author analyzes critical approaches to international security which were adopted after the end of the cold war and seek to create integration of security systems and apparatus within different state organs.... Realist perspectives in security are considered as one of the pioneer approaches of both national security and international relations and security.... Realist and critical security perspective Realist perspectives in security are considered as one of the pioneer approaches of both national security and international relations and security....
14 Pages (3500 words) Essay

The security technology of e-commerce

Many financial crimes are being carried out on the internet such as frauds, identity thefts, cyber attacks, cyber Terrorism, cyber attacks during the war on terrorism, viruses and worms, hacking and malware techniques.... The various threats include cyber terrorism, credit card number may be intercepted, cyber attacks during the war on terrorism, viruses and worms, hacking and malware techniques, one of the service providers may deny that the deals ever took place, hackers may exploit data from web page due to some improper security measures, hackers may gain access to the system....
8 Pages (2000 words) Essay

The Cold War and Realism in International Relations

The paper "the cold war and Realism in International Relations" discusses the cold war era and theories of international relations.... nternational relations theories help a great deal in understanding the historical events and when we talk about the cold war, the theory of realism dominates the other theories towards a better understanding of the facts.... The theory has its pros and cons but it holds itself true in many cases while trying to understand the cold war phenomenon....
8 Pages (2000 words) Essay

The Gulf Cooperation Council: the Cooperation Council

However, efforts are being carried out in order to eventually lay down the foundations for an effective and powerful security and economic cooperation within the Gulf region.... This cooperation has mostly been established for security, political, and economic goals.... As a result, the security of the region has not been established to a Instead, more conflicts have been observed with a strong reliance on US troops on managing security issues and in ensuring stability to the region....
61 Pages (15250 words) Essay

Information Security Program Survey of the Department of Veteran Affairs

The VA does care for widows and orphans of war other than veterans themselves.... The paper "Information security Program Survey of the Department of Veteran Affairs" seeks to critically analyze the information security of the Veteran Affairs sector in the US.... The Information security program as envisaged by the United States Government Accountability Office (GAO) for the department of veterans affairs is to exert a pull and maintain individuals with skills in the field of information technology....
6 Pages (1500 words) Term Paper

The Failure of the UN in Providing International Peace and Security after the Cold-War Period

Member states of the United Nations redefined the organs' agenda to create a relation between the sovereignty of the state and legitimate international intervention at the close of the cold war.... Wars have erupted within the borders of armed sovereign states since the cold war era.... The UN later became more active in peacekeeping keeping missions during the post-cold war period.... This work called "The Failure of the UN in Providing International Peace and Security after the cold-War Period" describes many questions concerning the genocide in Rwanda....
14 Pages (3500 words) Essay

Approach towards International Security during the Cold War Period

This work called "Approach towards International Security during the cold war Period" focuses on the idea of military strategy as the efficient employment of force to achieve a state's objectives.... Collective security a major security approach used during the cold war refers to a plan that sought to maintain peace on the platform of an organization of sovereign states.... Collective security idea emerged in 1914 and was extensively reviewed during the First World War only to later take shape, though imperfectly, in the 1940s during the cold war....
16 Pages (4000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us