Show simple item record

dc.contributor.authorButler, Michael J.
dc.date.accessioned2020-07-29T09:46:26Z
dc.date.available2020-07-29T09:46:26Z
dc.date.issued2019
dc.identifier.isbn9780367150372en_US
dc.identifier.isbn9780429054648en_US
dc.identifier.urihttps://library.oapen.org/handle/20.500.12657/40150
dc.description.abstractThis book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization ‘works’ within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume – drawn from different disciplinary, ontological, and geographic ‘spaces’ – orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms.  This volume will be of great interest to scholars of critical security studies, international security, and International Relations. Chapter 6 of this book is freely available as a downloadable Open Access PDF under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license https://www.routledge.com/Securitization-Revisited-Contemporary-Applications-and-Insights/Butler/p/book/9780367150372en_US
dc.languageEnglishen_US
dc.subject.classificationthema EDItEUR::N History and Archaeology::NH History::NHW Military historyen_US
dc.subject.classificationthema EDItEUR::J Society and Social Sciences::JP Politics and government::JPS International relationsen_US
dc.subject.classificationthema EDItEUR::J Society and Social Sciences::JP Politics and government::JPV Political control and freedomsen_US
dc.subject.classificationthema EDItEUR::J Society and Social Sciences::JW Warfare and defenceen_US
dc.subject.otherempirical applications; Climate Change; Conflict Management; Copenhagen School; constructivism; desecuritization; gender-based violence; inter-state conflict; processes; securitization; securitization applications; terrorismen_US
dc.titleSecuritization Revisiteden_US
dc.title.alternativeContemporary Applications and Insightsen_US
dc.typebook
oapen.relation.isPublishedBy7b3c7b10-5b1e-40b3-860e-c6dd5197f0bben_US
oapen.relation.hasChapter14824304-03b8-4948-ae8e-395c67b8dd21
oapen.pages232en_US
peerreview.anonymitySingle-anonymised
peerreview.idbc80075c-96cc-4740-a9f3-a234bc2598f1
peerreview.open.reviewNo
peerreview.publish.responsibilityPublisher
peerreview.review.stagePre-publication
peerreview.review.typeProposal
peerreview.reviewer.typeInternal editor
peerreview.reviewer.typeExternal peer reviewer
peerreview.titleProposal review
oapen.review.commentsTaylor & Francis open access titles are reviewed as a minimum at proposal stage by at least two external peer reviewers and an internal editor (additional reviews may be sought and additional content reviewed as required).


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record