842
Views
22
CrossRef citations to date
0
Altmetric
Original Articles

Making Turkey’s Transformation Possible: Claiming ‘Security‐ speak’—not Desecuritization!

Pages 555-571 | Published online: 04 Dec 2007

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (5)

Cenap Çakmak. (2016) Turkish–Syrian relations in the wake of the Syrian conflict: back to securitization?. Cambridge Review of International Affairs 29:2, pages 695-717.
Read now
Funda Gençoğlu Onbaşi. (2015) Social Media and the Kurdish Issue in Turkey: Hate Speech, Free Speech and Human Security. Turkish Studies 16:1, pages 115-130.
Read now
Scott Watson. (2013) Macrosecuritization and the securitization dilemma in the Canadian Arctic. Critical Studies on Security 1:3, pages 265-279.
Read now
Sinem Akgul Acikmese. (2013) EU conditionality and desecuritization nexus in Turkey. Southeast European and Black Sea Studies 13:3, pages 303-323.
Read now
André Barrinha. (2011) The political importance of labelling: terrorism and Turkey's discourse on the PKK. Critical Studies on Terrorism 4:2, pages 163-180.
Read now

Articles from other publishers (17)

Zehra DOĞAN. (2022) Siyasetin Güvenlikleştirilmesine Bir Örnek: 27 Mayıs 1960 Askeri DarbesiAn Case of the Securitization of Politics: The Military Coup of May 27, 1960. Kahramanmaraş Sütçü İmam Üniversitesi Sosyal Bilimler Dergisi 19:3, pages 1513-1522.
Crossref
Birsen Erdoğan & Fulya Hisarlıoğlu. 2022. Critical Readings of Turkey’s Foreign Policy. Critical Readings of Turkey’s Foreign Policy 1 25 .
Hasan YükselenHasan Yükselen. 2020. Strategy and Strategic Discourse in Turkish Foreign Policy. Strategy and Strategic Discourse in Turkish Foreign Policy 169 196 .
Hasan YükselenHasan Yükselen. 2020. Strategy and Strategic Discourse in Turkish Foreign Policy. Strategy and Strategic Discourse in Turkish Foreign Policy 1 19 .
Pinar Bilgin. (2018) Sacralisation: Defying the Politicisation of Security in Turkey. European Review of International Studies 5:3, pages 94-114.
Crossref
Catherine Yuk-ping Lo. (2018) Securitizing HIV/AIDS: a game changer in state-societal relations in China?. Globalization and Health 14:1.
Crossref
Xymena Kurowska & Anatoly Reshetnikov. (2018) Neutrollization: Industrialized trolling as a pro-Kremlin strategy of desecuritization. Security Dialogue 49:5, pages 345-363.
Crossref
Aglaya Snetkov. (2017) Theories, methods and practices – a longitudinal spatial analysis of the (de)securitization of the insurgency threat in Russia. Security Dialogue 48:3, pages 259-275.
Crossref
Faye Donnelly. (2015) The Queen’s speech: Desecuritizing the past, present and future of Anglo-Irish relations. European Journal of International Relations 21:4, pages 911-934.
Crossref
Catherine Yuk-ping LoCatherine Yuk-ping Lo. 2015. HIV/AIDS in China and India. HIV/AIDS in China and India 161 175 .
Catherine Yuk-ping LoCatherine Yuk-ping Lo. 2015. HIV/AIDS in China and India. HIV/AIDS in China and India 97 121 .
Catherine Yuk-ping LoCatherine Yuk-ping Lo. 2015. HIV/AIDS in China and India. HIV/AIDS in China and India 15 43 .
Amir Lupovici. (2014) The Limits of Securitization Theory: Observational Criticism and the Curious Absence of Israel. International Studies Review 16:3, pages 390-410.
Crossref
Aslı Çalkıvik. 2014. The Handbook of Global Security Policy. The Handbook of Global Security Policy 426 445 .
LENE HANSEN. (2011) Reconstructing desecuritisation: the normative-political in the Copenhagen School and directions for how to apply it. Review of International Studies 38:3, pages 525-546.
Crossref
Pinar Bilgin. (2011) The politics of studying securitization? The Copenhagen School in Turkey. Security Dialogue 42:4-5, pages 399-412.
Crossref
Alper Kaliber & Nathalie Tocci. (2010) Civil Society and the Transformation of Turkey’s Kurdish Question. Security Dialogue 41:2, pages 191-215.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.