1,637
Views
14
CrossRef citations to date
0
Altmetric
'INSIDE-OUT/OUTSIDE-IN': Constructions and Practices of Security in Regional Organizations

Regional security arrangements as a filter for norm diffusion: the African Union, the European Union and the responsibility to protect

Pages 362-380 | Received 05 Nov 2012, Accepted 11 Nov 2013, Published online: 28 Mar 2014
 

Abstract

Regional security arrangements play a central role in modifying emerging norms as they travel from the global to the local level. This process of norm localization is shaped by various factors such as the characteristics of regional security cultures, corresponding resonance with the emerging norm, institutional voice opportunities, and mechanisms of framing and pruning as they are utilized by norm entrepreneurs. The article applies this analytical framework to the localization of the responsibility to protect (R2P) norm by the African Union and the European Union. Subsequently, the paper examines how localization of the R2P norm in both regions affected their reactions to the Libyan crisis in 2011. It also examines the likely ramifications that the intervention may have on the future reception of the R2P by African and European actors.

Notes

 1 A/RES/60/1, 24 October 2005, 138–139; A/63/677, 12 January 2009, 11.

 2 A/RES/60/1, 24 October 2005, 139.

 3 A/63/677, 12 January 2009, 62.

 4 A/66/874, 25 July 2012, 2, 20.

 5 A/63/677, 12 January 2009, 64.

 6 A/66/551, 11 November 2011, 6; GA/11270, 5 September 2012.

 7 GA/11270, 5 September 2012.

 8 GA/11270, 5 September 2012.

 9 See the special issue on ‘European security policy: strategic culture in operation’, Contemporary Security Policy, 32:4 (2011). For the effects of the EU's strategic culture on the security policy of its member states see Meyer (Citation2006) and Giegerich (Citation2006).

10Official Journal C46/01, 24 February 2006, Article 37.

11 S407/08, 11 December 2008, 2.

12 Council of the EU, 10809/09, 9 June 2009, 3.

13 EU Presidency Statement, 23 July 2009, < http://www.eu-un.europa.eu/articles/en/article_8901_en.htm>, accessed 15 November 2013.

14 See the compilation by the International Coalition for the Responsibility to Protect: < www.responsibilitytoprotect.org>, accessed 2 April 2012.

15The Economist, 15 May 2008, < www.economist.com/world/international/displaystory.cfm?story_id = 11376531>, accessed 2 April 2012.

16  < http://www.europa-eu-un.org/articles/es/article_5026_es.htm>, accessed 2 April 2012.

17 COM (2001) 211 final, 11 April 2001, 26.

18 ‘A human security doctrine for Europe 2004. The Barcelona report of the Study Group on Europe's Security Capabilities’, < http://www.lse.ac.uk/Depts/global/Publications/HumanSecurityDoctrine.pdf>, accessed 2 April 2012.

19 See the 20 February statement by HR Catherine Ashton: < http://europa.eu/rapid/press-release_PESC-11-33_en.htm?locale = en>, accessed 2 April 2012.

20 Constitutive Act of the African Union (2002), Article 4(h) and Article 4(g).

21 Ext/EX.CL/2 (VII) (2005), B, i.

22 Ext/EX.CL/2 (VII) (2005), B, i.

23 PSC/PR/COMM (CCCVII), 9 January 2012, 11(ii).

24 PSC/PR/COMM(CCLXI), 23 February 2011, 2, 5.

25 PSC/PR/COMM.2(CCLXV), 26 April 2011, 3, 6, 8.

26 Communiqué, Ad Hoc Committee on Libya, 19 March 2011.

27 S/RES/1973 (2011), 2.

28 PSC/PR/COMM/2 (CCXCVII), 20 October 2011, 4.

Additional information

Notes on contributors

Matthias Dembinski

Matthias Dembinski is a member of the Executive Board of the Peace Research Institute Frankfurt. Email: [email protected]

Berenike Schott

Berenike Schott is a graduate student at Georgetown University. Email: [email protected]

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.