484
Views
2
CrossRef citations to date
0
Altmetric
Articles

Between emergency and routine – securitisation of military security in Iran and Indonesia

&
Pages 1670-1688 | Received 16 Apr 2018, Accepted 30 Jan 2019, Published online: 19 Mar 2019

Bibliography

  • Abdolmohammadi, P., and G. Cama. “Iran as a Peculiar Hybrid Regime: Structure and Dynamics of the Islamic Republic.“ British Journal of Middle Eastern Studies 42, no. 4 (2015): 558–578. doi: 10.1080/13530194.2015.1037246.
  • Acharya, A., and B. Buzan. Non-Western International Relations Theory: Perspectives on and beyond Asia. Abingdon: Routledge, 2010.
  • Alagappa, M., ed. Asian Security Practice: Material and Ideational Influences. Stanford, CA: Stanford University Press, 2006.
  • Alfoneh, A. Iran Unveiled. How the Revolutionary Guards is Turning Theocracy into Military Dictatorship. Washington, DC: AEI Press, 2013.
  • Alsaif, T. Islamic Democracy and its Limits. The Iranian Experience Since 1979. London: Saqi Books, 2007.
  • Aspinall, E., and R. Chauvel. “Constructing Separatist Threats: Security and Insecurity in Indonesian Aceh and Papua.“ In Critical Security in the Asia-Pacific, edited by A. Burke and M. McDonald, 89–104. Manchester: Manchester University Press, 2007.
  • Ayoob, M. The Third World Security Predicament. State Making, Regional Conflict, and the International System. London: Lynne Rienner, 1995.
  • Baker, J. “The Parman Economy: Post-Authoritarian Shifts in the Off-Budget Economy of Indonesia’s Security Institutions.“ Indonesia 96 (2013): 123–150.
  • Balzacq, T., ed. Securitization Theory. How Security Problems Emerge and Dissolve. London: Routledge, 2011.
  • Barthwal-Datta, M. “Securitising Threats without the State. A Case Study of Misgovernance as a Security Threat in Bangladesh.“ Review of International Studies 35, no. 2 (2009): 277–300. doi: 10.1017/S0260210509008523.
  • Barthwal-Datta, M. Understanding Security Practices in South Asia: Securitisation Theory and the Role of Non-State Actors. Abingdon: Routledge, 2012.
  • Bertrand, S. “Can the Subaltern Securitize? Postcolonial Perspectives on Securitization Theory and its Critics.“ European Journal of International Security 3, no. 3 (2018): 281–299. doi: 10.1017/eis.2018.3.
  • Buzan, B., and R. Little. “Why International Relations Have Failed as an Intellectual Project and What to Do about It.“ Millennium 30 (2001): 19–39. doi: 10.1177/03058298010300010401.
  • Buzan, B. and O. Wæver. Regions and Powers: The Structure of International Security. Cambridge: Cambridge University Press, 2003.
  • Buzan, B., O. Wæver, and J. de Wilde. Security: A New Framework for Analysis. London: Lynne Rienner, 1998.
  • Caballero-Anthony, M. “Combating Infectious Diseases in East Asia: Securitization and Global Public Goods for Health and Human Security.“ Journal of International Affairs 59, no. 2 (2006): 105–127.
  • Caballero-Anthony, M., R. Emmers, and A. Acharya, eds. Non-Traditional Security in Asia. Dilemmas in Securitisation. Aldershot: Ashgate, 2006.
  • Chastain, M. “Iran’s Revolutionary Guard to Build Statue of Abducted American Sailors.“ Braitbart, March 19, 2016. http://www.breitbart.com/national-security/2016/03/19/rans-revolutionary-guard-to-build-statue-of-abducted-american-sailors/
  • Collins, A. Securitization, Frankenstein’s Monster and Malaysian Education. The Pacific Review 18, no. 4 (2015): 567–588. doi: 10.1080/09512740500339034.
  • Crouch, H. The Army and Politics in Indonesia. Singapore: Equinox Publishing, 2007.
  • Crouch, H. Political Reform in Indonesia after Soeharto. Singapore: Institute of Southeast Asian Studies, 2010.
  • Dannreuther, R. “War and Insecurity: Legacies of Northern and Southern State Formation.“ Review of International Studies 33, no. 2 (2007): 307–326. doi: 10.1017/S0260210507007528.
  • Daves, J. The Indonesian Army from Revolusi to Reformasi. Vol. 1 and 2. CreateSpace Independent Publishing Platform, 2013, 2014.
  • Editors, The. “Current Data on the Indonesian Military Elite, April 2008–September 2013.“ Indonesia 98 (2014): 91–139.
  • Emmers, R. “ASEAN and the Securitization of Transnational Crime in Southeast Asia.“ The Pacific Review 16, no. 3 (2003): 419–438. doi: 10.1080/0951274032000085653.
  • Emmers, R. “Securitization.“ In Contemporary Security Studies edited by A. Collins, 136–151. Oxford: Oxford University Press, 2010.
  • Floyd, R. Security and the Environment: Securitization Theory and US Environmental Security Policy. Cambridge: Cambridge University Press, 2010.
  • Grayson, K. “Securitization and the Boomerang Debate: A Rejoinder to Liotta and Smith-Windsor.“ Security Dialogue 34 (2003): 337–343. doi: 10.1177/09670106030343009.
  • Hansen, L. “The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the Copenhagen School.“ Millennium 29, no. 2 (2000): 285–306. doi: 10.1177/03058298000290020501.
  • Heryanto, A. State Terrorism and Political Identity in Indonesia. Fatally Belonging. London: Routledge, 2005.
  • Holm, U. “Algeria: Securitization of State/Regime, Nation and Islam.“ In Contemporary Security Analysis and Copenhagen Peace Research, edited by Guzzini S. and D. Jung, 217–228. London: Routledge, 2004.
  • Honna, J. “Military Ideology in Response to Democratic Pressure During the Late Suharto Era: Political and Institutional Contexts.“ Indonesia 67 (1999): 77–126. doi: 10.2307/3351378.
  • Honna, J. Military Politics and Democratization in Indonesia. London: Routledge, 2003.
  • Islamic Republic of Iran Constitution. n.d. Accessed July 27, 2016. http://www.iranonline.com/iran/iran-info/government/constitution.html
  • Jackson, N. J. “International Organizations, Security Dichotomies and the Trafficking of Persons and Narcotics in Post-Soviet Central Asia: A Critique of the Securitization Framework.“ Security Dialogue 37 (2006): 299–317. doi: 10.1177/0967010606069062.
  • Jones, L. “Beyond Securitization: Explaining the Scope of Security Policy in Southeast Asia.“ International Relations of the Asia-Pacific 11 (2011): 403–432. doi: 10.1093/irap/lcr002.
  • Kingsbury, D. Power Politics and the Indonesian Military. New York: Routledge Curzon, 2003.
  • Krause, K. “Insecurity and State Formation in the Global Military Order: The Middle Eastern Case.“ European Journal of International Relations 2, no. 3 (1996): 319–354. doi: 10.1177/1354066196002003002.
  • Laustsen, C.B., and O. Wæver. “In Defence of Religion: Sacred Referent Objects for Securitization.“ Millennium 29:3 (2000): 705–739. doi: 10.1177/03058298000290031601.
  • Lipschutz, R. D. “On Security.“ In Security, edited by R. D. Lipschutz, 1–23. New York, NY: Columbia University Press, 1995.
  • Majidyar, A. and P. Salem. “Iran Observed: Presidential Election and Foreign Policy.“ MEI, May 25, 2017. http://www.mei.edu/content/io/iranobserved-presidential-election-and-foreign-policy
  • McDonald, M. “Securitization and the Construction of Security.“ European Journal of International Affairs 14 (2008): 563–587. doi: 10.1177/1354066108097553.
  • Mietzner, M. Military Politics, Islam, and the State in Indonesia. From Turbulent Transition to Democratic Consolidation. Singapore: Institute of Southeast Asian Studies, 2009.
  • Mietzner, M., ed. The Political Resurgence of the Military in Southeast Asia. Conflict and Leadership. London: Routledge, 2011.
  • Muna, R. “Securitizing Small Arms and Drug Trafficking in Indonesia.“ In Non-Traditional Security in Asia. Dilemmas in Securitisation, edited by M. Caballero-Anthony, R. Emmers, and A. Acharya, 93–111. Aldershot: Ashgate, 2006.
  • Oren, I., and T. Solomon. “WMD, WMD, WMD: Securitisation through Ritualised Incantation of Ambiguous Phrases.“ Review of International Studies 41 (2015): 313–336. doi: 10.1017/S0260210514000205.
  • Ottolenghi, E. The Pasdaran. Inside Iran’s Islamic Revolutionary Guard Corps. Washington, DC: FDD Press, 2011.
  • Riddell, K. Islam and the Securitisation of Population Policies. Muslim States and Sustainability. Farnham: Ashgate Publishing Company, 2009.
  • Sadri, H. A. “Surrounded: Seeing the World from Iran’s Point of View.“ Military Review 87 (2007): 12–31.
  • Sebastian, L. C. Realpolitik Ideology. Indonesia’s Use of Military Force. Singapore: Institute of Southeast Asian Studies, 2006.
  • Sheikh, M. K. “The Religious Challenge to Securitization Theory.“ Millennium 43 (2014): 252–272. doi: 10.1177/0305829814540853.
  • Stritzel, H. Security in Translation. Securitization Theory and the Localization of Threat. New York, NY: Palgrave McMillan, 2014.
  • Sukarieh, M., and S. Tannock. “The Global Securitisation of Youth.“ Third World Quarterly 39, no. 5 (2018): 854–870. doi: 10.1080/01436597.2017.1369038.
  • Supriatma, A. T. M. “TNI/Polri in West Papua: How Security Reforms Work in the Conflict Region.“ Indonesia 95 (2013): 93–119.
  • Syailendra, E. A. “Inside Papua: The Police Force as Counterinsurgents in Post-Reformasi Indonesia.“ Indonesia 102 (2016): 57–83.
  • Varasteh, M. Understanding Iran’s National Security Doctrine. The New Millennium. Leicester: Troubador Publishing, 2013.
  • Vuori, J. A. “Illocutionary Logic and Strands of Securitization – Applying the Theory of Securitization to the Study of Non-Democratic Political Orders.“ European Journal of International Relations 13 (2008): 65–99. doi: 10.1177/1354066107087767.
  • Ward, S. Immortal. A Military History of Iran and its Armed Forces. Washington. DC: Georgetown University Press, 2014.
  • Watson, S.D. The Securitization of Humanitarian Migration. Digging Moats and Sinking Boats. London and New York: Routledge, 2009.
  • Weherey, F., J. D. Green, P. Nichiporuk, A. Nader, L. Hansell, R. Nafisi, and S. R. Bohandy. The Rise of Pasdaran. Assessing the Domestic Roles of Iran’s Islamic Revolutionary Guards Corps. Santa Monica, CA: RAND Corporation, 2009.
  • Wendt, A. “Anarchy Is what States Make of It: The Social Construction of Power Politics.“ International Organization 46 (1992): 391–425. doi: 10.1017/S0020818300027764.
  • Wilkinson, C. “Is Securitization Theory Useable Outside Europe – The Copenhagen School on Tour in Kyrgyzstan.“ Security Dialogue 38 (2007): 5–25. doi: 10.1177/0967010607075964.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.