Difference between revisions of "Securitisation"
Line 2: | Line 2: | ||
"[http://en.wikipedia.org/wiki/Securitization_%28international_relations%29 Securitization] |
"[http://en.wikipedia.org/wiki/Securitization_%28international_relations%29 Securitization]", is a process-oriented conception of security, embedded in the constructivism: Security is not an objective state, but results from social processes; security is socially (and/or politically) constructed. |
||
Securitization, or "de-securitization", expresses which aspects of life are going to be – or not to be – transformed into and perceived as security-related matters in the future. For example corruption could be perceived as a prior economic issue, as a prior criminal justice issue, or as a prior security issue. |
|||
"Securitized" agenda examples are: |
"Securitized" agenda examples are: |
||
Line 9: | Line 10: | ||
* Cyber security; |
* Cyber security; |
||
* Societal security; |
* Societal security; |
||
* Climate change; |
|||
* etc. |
* etc. |
||
==Further reading== |
==Further reading== |
||
Balzacq Thierry(2011): Securitization theory: how security problems emerge and dissolve. London: Routledge. |
* Balzacq Thierry(2011): Securitization theory: how security problems emerge and dissolve. London: Routledge. |
||
Benam ÇiĞdem H. (2011): Emergence of a “Big Brother”in Europe: Border Control and Securitization of Migration. Insight Turkey Vol. 13, No. 3: pp. 191-207. Retrieved from: http://harvard.academia.edu/cigdembenam/Papers/776229/Emergence_of_a_Big_Brother_in_Europe_Border_Control_and_Securitization_of_Migration [last access: 2012-08-02]. |
* Benam ÇiĞdem H. (2011): Emergence of a “Big Brother”in Europe: Border Control and Securitization of Migration. Insight Turkey Vol. 13, No. 3: pp. 191-207. Retrieved from: http://harvard.academia.edu/cigdembenam/Papers/776229/Emergence_of_a_Big_Brother_in_Europe_Border_Control_and_Securitization_of_Migration [last access: 2012-08-02]. |
||
* Stone Marianne (2009): Security According to Buzan: A Comprehensive Security Analysis. Sciences Po – Paris, France. Groupe d’Etudes et d’Expertise “Sécurité et Technologies” GEEST-2009. New York: Columbia University, School of International and Public Affairs. SECURITY DISCUSSION PAPERS SERIES 1 Spring|09. Retrieved from: http://geest.msh-paris.fr/IMG/pdf/Security_for_Buzan.mp3.pdf [last access: 2012-08-02]. |
|||
* Waever Ole (1998): Securitization and Desecuritization. In: Lipschutz Ronnie (ed.)(1998): On Security. New York: Columbia University Press, |
|||
Waever Ole (2000): |
|||
Ole Waever, “Securitization and Desecuritization,” in Ronnie Lipschutz (ed.), |
|||
On Security |
|||
(New York: Columbia University Press, 1995), p.55.6) Lene Hansen, “Te Little Mermaid’s Silent Security Dilemma: Te Absence o Gender in theCopenhagen School”, |
|||
Millennium |
|||
, Vol. 29, No. 2 (2000), p. 288. |
|||
Revision as of 11:56, 2 August 2012
Securitization
"Securitization", is a process-oriented conception of security, embedded in the constructivism: Security is not an objective state, but results from social processes; security is socially (and/or politically) constructed. Securitization, or "de-securitization", expresses which aspects of life are going to be – or not to be – transformed into and perceived as security-related matters in the future. For example corruption could be perceived as a prior economic issue, as a prior criminal justice issue, or as a prior security issue. "Securitized" agenda examples are:
- Environmental security;
- Data protection and data security;
- Cyber security;
- Societal security;
- Climate change;
- etc.
Further reading
- Balzacq Thierry(2011): Securitization theory: how security problems emerge and dissolve. London: Routledge.
- Benam ÇiĞdem H. (2011): Emergence of a “Big Brother”in Europe: Border Control and Securitization of Migration. Insight Turkey Vol. 13, No. 3: pp. 191-207. Retrieved from: http://harvard.academia.edu/cigdembenam/Papers/776229/Emergence_of_a_Big_Brother_in_Europe_Border_Control_and_Securitization_of_Migration [last access: 2012-08-02].
- Stone Marianne (2009): Security According to Buzan: A Comprehensive Security Analysis. Sciences Po – Paris, France. Groupe d’Etudes et d’Expertise “Sécurité et Technologies” GEEST-2009. New York: Columbia University, School of International and Public Affairs. SECURITY DISCUSSION PAPERS SERIES 1 Spring|09. Retrieved from: http://geest.msh-paris.fr/IMG/pdf/Security_for_Buzan.mp3.pdf [last access: 2012-08-02].
- Waever Ole (1998): Securitization and Desecuritization. In: Lipschutz Ronnie (ed.)(1998): On Security. New York: Columbia University Press,
Footnotes and references
MAP
<websiteFrame>
website=http://securipedia.eu/cool/index.php?wiki=securipedia.eu&concept=Insert your pagename here
height=1023
width=100%
border=0
scroll=auto
align=middle
</websiteFrame>
<headertabs/>