-
eBook
-
empirical applications
Climate Change
Conflict Management
Copenhagen School
constructivism
desecuritization
gender-based violence
inter-state conflict
processes
securitization
securitization applications
terrorism
bic Book Industry Communication::H Humanities::HB History::HBW Military history
bic Book Industry Communication::J Society & social sciences::JP Politics & government::JPS International relations
bic Book Industry Communication::J Society & social sciences::JP Politics & government::JPV Political control & freedoms
bic Book Industry Communication::J Society & social sciences::JW Warfare & defence -
chapter
-
English
Additional Information
Taylor & Francis; Securitization Revisited; Routledge, 2019.
2019
Book chapters
Imported or submitted locally
Imported or submitted locally
a29f344d-fdf9-4a59-b5db-d4b5256ce074
7b3c7b10-5b1e-40b3-860e-c6dd5197f0bb
7b3c7b10-5b1e-40b3-860e-c6dd5197f0bb
This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization ‘works’ within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume – drawn from different disciplinary, ontological, and geographic ‘spaces’ – orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms. This volume will be of great interest to scholars of critical security studies, international security, and International Relations.
application/pdf
Attribution-NonCommercial-NoDerivatives 4.0 International
URL: https://creativecommons.org/licenses/by-nc-nd/4.0/
URL: https://creativecommons.org/licenses/by-nc-nd/4.0/
edsoap.20.500.12657.40151