000 | 03272namaa2200409uu 4500 | ||
---|---|---|---|
001 | oapen40150 | ||
003 | oapen | ||
005 | 20240507100046.0 | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 200729s2019 xx |||||o ||| 0|eng d | ||
040 |
_aoapen _coapen |
||
041 | 0 | _aeng | |
042 | _adc | ||
072 | 7 |
_aHBW _2bicssc |
|
072 | 7 |
_aJPS _2bicssc |
|
072 | 7 |
_aJPV _2bicssc |
|
072 | 7 |
_aJW _2bicssc |
|
100 | 1 |
_aButler, Michael J. _4auth |
|
245 | 1 | 0 |
_aSecuritization Revisited _bContemporary Applications and Insights |
260 |
_bTaylor & Francis _c2019 |
||
300 | _a1 online resource (232 p.) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
506 | 0 |
_aFree-to-read _fUnrestricted online access _2star |
|
520 | _aThis book seeks to interrogate how contemporary policy issues become 'securitized' and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization 'works' within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume - drawn from different disciplinary, ontological, and geographic 'spaces' - orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms. This volume will be of great interest to scholars of critical security studies, international security, and International Relations. Chapter 6 of this book is freely available as a downloadable Open Access PDF under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license https://www.routledge.com/Securitization-Revisited-Contemporary-Applications-and-Insights/Butler/p/book/9780367150372 | ||
540 |
_aAll rights reserved _uhttp://oapen.org/content/about-rights |
||
546 | _aEnglish | ||
650 | 7 |
_aInternational relations _2bicssc |
|
650 | 7 |
_aMilitary history _2bicssc |
|
650 | 7 |
_aPolitical control & freedoms _2bicssc |
|
650 | 7 |
_aWarfare & defence _2bicssc |
|
653 | _aempirical applications; Climate Change; Conflict Management; Copenhagen School; constructivism; desecuritization; gender-based violence; inter-state conflict; processes; securitization; securitization applications; terrorism | ||
793 | 0 | _aOAPEN Library. | |
856 | 4 | 0 |
_uhttps://library.oapen.org/handle/20.500.12657/40150 _70 _zFree-to-read: OAPEN Library: description of the publication |
999 |
_c36175 _d36175 |