000 03272namaa2200409uu 4500
001 oapen40150
003 oapen
005 20240507100046.0
006 m o d
007 cr|mn|---annan
008 200729s2019 xx |||||o ||| 0|eng d
040 _aoapen
_coapen
041 0 _aeng
042 _adc
072 7 _aHBW
_2bicssc
072 7 _aJPS
_2bicssc
072 7 _aJPV
_2bicssc
072 7 _aJW
_2bicssc
100 1 _aButler, Michael J.
_4auth
245 1 0 _aSecuritization Revisited
_bContemporary Applications and Insights
260 _bTaylor & Francis
_c2019
300 _a1 online resource (232 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
506 0 _aFree-to-read
_fUnrestricted online access
_2star
520 _aThis book seeks to interrogate how contemporary policy issues become 'securitized' and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization 'works' within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume - drawn from different disciplinary, ontological, and geographic 'spaces' - orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms.  This volume will be of great interest to scholars of critical security studies, international security, and International Relations. Chapter 6 of this book is freely available as a downloadable Open Access PDF under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license https://www.routledge.com/Securitization-Revisited-Contemporary-Applications-and-Insights/Butler/p/book/9780367150372
540 _aAll rights reserved
_uhttp://oapen.org/content/about-rights
546 _aEnglish
650 7 _aInternational relations
_2bicssc
650 7 _aMilitary history
_2bicssc
650 7 _aPolitical control & freedoms
_2bicssc
650 7 _aWarfare & defence
_2bicssc
653 _aempirical applications; Climate Change; Conflict Management; Copenhagen School; constructivism; desecuritization; gender-based violence; inter-state conflict; processes; securitization; securitization applications; terrorism
793 0 _aOAPEN Library.
856 4 0 _uhttps://library.oapen.org/handle/20.500.12657/40150
_70
_zFree-to-read: OAPEN Library: description of the publication
999 _c36175
_d36175