Publication Cover
Politikon
South African Journal of Political Studies
Volume 47, 2020 - Issue 1: Security Infrastructures
375
Views
5
CrossRef citations to date
0
Altmetric
Articles

Articulating Sovereignty within the Infrastructural Imagination: The Case of the Securitisation of Finance as ‘Critical Infrastructure’

References

  • Abulof, Uriel. 2014. “Deep Securitization and Israel’s ‘Demographic Demon’.” International Political Sociology 8 (4): 396–415. doi: 10.1111/ips.12070
  • Amicelle, Anthony. 2011. “Towards a ‘New’ Political Anatomy of Financial Surveillance.” Security Dialogue 42 (2): 143–160. doi: 10.1177/0967010611401472
  • Amicelle, Anthony. 2017. “When Finance Met Security: Back to the War on Drugs and the Problem of Dirty Money.” Finance & Society 3 (2): 106–123. doi: 10.2218/finsoc.v3i2.2572
  • Amoore, Louise. 2013. The Politics of Possibility: Risk and Security Beyond Probability. Durham/London: Duke University Press.
  • Angelo, Hillary, and Christine Hentschel. 2015. “Interactions with Infrastructure as Windows Into Social Worlds: A Method for Critical Urban Studies. Introduction.” City: Analysis of Urban Trends, Culture, Theory, Policy, Action 19 (2–3): 306–312. doi: 10.1080/13604813.2015.1015275
  • Aradau, Claudia. 2010. “Security That Matters: Critical Infrastructure and Objects of Protection.” Security Dialogue 41 (5): 491–514. doi: 10.1177/0967010610382687
  • Balzacq, Thierry. 2005. “The Three Faces of Securitization: Political Agency, Audience and Context.” European Journal of International Relations 11 (2): 171–201. doi: 10.1177/1354066105052960
  • Balzacq, Thierry. 2011. “A Theory of Securitization: Origins, Core Assumptions, and Variants.” In Securitization Theory: How Security Problems Emerge and Dissolve, edited by Thiery Balzacq, 1–30. London/New York: Routledge.
  • Balzacq, Thierry, Sarah Léonard, and Jan Ruzicka. 2016. “‘Securitization’ Revisited: Theory and Cases.” International Relations 30 (4): 494–531. doi: 10.1177/0047117815596590
  • Barnard-Wills, David, and Debi Ashenden. 2012. “Securing Virtual Space: Cyber war, Cyber Terror, and Risk.” Space and Culture 20 (10): 1–14.
  • Bieling, Hans-Jürgen. 2014. “Europäische Finanzmarktpolitik in der Krise.” Zeitschrift für Vergleichende Politische Wissenschaft 8 (Suppl): 91–113. doi: 10.1007/s12286-014-0181-1
  • BoE. 2018. Building the UK Financial Sector’s Operational Resilience. Bank of England DP01/18; Prudential Regulation Authority (PRA) DP01/18; Financial Conduct Authority (FCA) DP18/04.
  • Boy, Nina. 2014. “Öffentlichkeit als public credit.” In Finanzmarktpublika. Moralität, Krisen und Teilhabe in der ökonomischen Moderne, edited by Andreas Langenohl and Dietmar J. Wetzel, 301–317. Wiesbaden: Springer VS.
  • Boy, Nina. 2015. “Sovereign Safety.” Security Dialogue 46 (6): 530–547. doi: 10.1177/0967010615593038
  • Boy, Nina, Peter J. Burgess, and Anna Leander. 2011. “The Global Governance of Security and Finance: Introduction to the Special Issue.” Security Dialogue 42 (2): 115–122. doi: 10.1177/0967010611400776
  • Boy, Nina, John Morris, and Mariana Santos. 2017. “Introduction: Taking Stock of Security and Finance.” Finance and Society 3 (2): 102–105. doi: 10.2218/finsoc.v3i2.2570
  • Brazier, Alex. 2019. Financial Resilience and Economic Earthquakes. Warwick: Speech at the University of Warwick. 13 June.
  • Brunner, Elgin M., and Manuel Suter, eds. 2009. International Critical Information Infrastructure Protection Handbook. An Inventory of 25 National and 7 International Critical Information Infrastructure Protection Policies. Zurich: Center for Security Studies, ETH Zurich.
  • Buzan, Barry, and Ole Wæver. 2009. “Macrosecuritisation and Security Constellations: Reconsidering Scale in Securitisation Theory.” Review of International Studies 35: 253–276. doi: 10.1017/S0260210509008511
  • Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder, Colo: Lynne Rienner Publishers.
  • Castells, Manuel. 1996. The Information Age: Economy, Society and Culture. Vol. 1.: The Rise of the Network Society. Malden/Oxford: Blackwell.
  • Christophers, Brett. 2015. “The Limits to Financialization.” Dialogues in Human Geography 5 (2): 183–200. doi: 10.1177/2043820615588153
  • Collier, Stephen, and Andrew Lakoff. 2008. “The Vulnerability of Vital Systems: How ‘Critical Infrastructure’ Became a Security Problem.” In The Politics of Securing the Homeland: Critical Infrastructure, Risk and Securitisation, edited by Myriam Dunn and Kristian Soby Kristensen, 17–39. London/New York: Routledge.
  • Collier, Stephen J., and Andrew Lakoff. 2015. “Vital Systems Security: Reflexive Biopolitics and the Government of Emergency.” Theory, Culture & Society 32 (2): 19–51. doi: 10.1177/0263276413510050
  • Communication. 2006. Communication from the Commission on a European Programme for Critical Infrastructure Protection. Brussels: Commission of the European Communities. Accessed February 23, 2019. https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2006:0786:FIN:EN:PDF.
  • Davis, Gerald F. 2009. Managed by the Markets: How Finance Re-Shaped America. Oxford/New York: Oxford University Press.
  • De Goede, Marieke. 2005. Virtue, Fortune and Faith: A Genealogy of Finance. Minneapolis/London: University of Minnesota Press.
  • Diaz-Bone, Rainer, Andrea D. Bührmann, Rodríguez Encarnación Gutiérrez, Werner Schneider, Gavin Kendall, and Francisco Tirado. 2007. “The Field of Foucaultian Discourse Analysis: Structures, Developments and Perspectives.” Forum Qualitative Sozialforschung/Forum Qualitative Social Sciences 8 (2): Art. 30.
  • Edwards, Paul N. 2003. “Infrastructure and Modernity: Force, Time, and Social Organization in the History of Sociotechnical Systems.” In Modernity and Technology, edited by Philip Brey, Arie Rip, and Andrew Feenberg, 185–225. Cambridge, MA: MIT Press.
  • Financial Services. 2015. Financial Services Sector-Specific Plan 2015. Financial Services Sector Coordinating Council for Critical Infrastructure Protection and Homeland Security/Financial and Banking Information Infrastructure Committee. Accessed February 23, 2019. https://www.dhs.gov/sites/default/files/publications/nipp-ssp-financial-services-2015-508.pdf.
  • Folkers, Andreas. 2012. “Kritische Infrastruktur.” In Ortsregister. Ein Glossar zu Räumen der Gegenwart, edited by Nadine Marquardt and Verena Schreiber, 154–159. Bielefeld: Transcript.
  • Folkers, Andreas. 2017. “Existential Provisions: The Technopolitics of Public Infrastructure.” Environment and Planning D: Society and Space 35 (5): 855–874. doi: 10.1177/0263775817698699
  • Giannopoulos, Georgios, Filippini, Roberto, and Muriel Schimmer. 2012. Risk Assessment Methodologies for Critical Infrastructure Protection. Part I: A State of the Art. European Commission Joint Research Centre. Luxembourg: Publications Office of the European Union. Accessed February 23, 2019. https://ec.europa.eu/home-affairs/sites/homeaffairs/files/e-library/docs/pdf/ra_ver2_en.pdf.
  • de Goede, Marieke. 2010. “Financial Security.” In The Routledge Handbook of New Security Studies, edited by Peter J. Burgess, 100–109. London/New York: Routledge.
  • de Goede, Marieke. 2017. “Chains of Securitization.” Finance and Society 3 (2): 197–207. doi: 10.2218/finsoc.v3i2.2579
  • Gilbert, Emily. 2017. “Militaries, Finance, and (in)Security.” Finance and Society 3 (2): 180–187. doi: 10.2218/finsoc.v3i2.2577
  • Gupta, Akhil. 2015. “An Anthropology of Electricity From the Global South.” Cultural Anthropology 30 (4): 555–568. doi: 10.14506/ca30.4.04
  • Guzzini, Stefano. 2015. A Dual History of “Securitisation”. DIIS Working Paper 2015: 02. Copenhagen: Danish Institute for International Studies.
  • Hansen, Lene. 2012. “Reconstructing Desecuritisation: the Normative-Political in the Copenhagen School and Directions for how to Apply it.” Review of International Studies 38: 525–546. doi: 10.1017/S0260210511000581
  • von Hayek, Friedrich A. [1948] 1984. “The Use of Knowledge in Society.” In The Essence of Hayek, edited by Chiaki Nishiyama and Kurt R. Leube, 211–224. Stanford, Cal.: Hoover Institution Press.
  • Huysmans, Jef. 1998. “Security! What Do You Mean? From Concept to Thick Signifier.” European Journal of International Relations 4 (2): 226–255. doi: 10.1177/1354066198004002004
  • van Laak, Dirk. 2001. “Infra-Strukturgeschichte.” Geschichte und Gesellschaft 27 (3): 367–393.
  • Laclau, Ernesto, and Chantel Mouffe. 2001. Hegemony and Socialist Strategy: Towards a Radical Democratic Politics. 2nd ed. London/New York: Verso.
  • Langenohl, Andreas. 2017a. “Securities Markets and Political Securitization: The Case of the Sovereign Debt Crisis in the Eurozone.” Security Dialogue 48 (2): 131–148. doi: 10.1177/0967010616683312
  • Langenohl, Andreas. 2017b. “Modular Sovereignty, Security, and Debt: The Excessive Deficit Procedure of the European Union.” Finance and Society 3 (2): 124–142. doi: 10.2218/finsoc.v3i2.2573
  • Langenohl, Andreas. 2018. “Sources of Financial Synchronism: Arbitrage Theory and the Promise of Risk-Free Profit.” Finance and Society 4 (1): 26–40. doi: 10.2218/finsoc.v4i1.2737
  • Langenohl, Andreas. 2019. “Dynamics of Power in Securitization: Towards a Relational Understanding.” In Conceptualizing Power in Dynamics of Securitization: Beyond State and International System, edited by Regina Kreide, and Andreas Langenohl, 25–66. Baden-Baden: Nomos.
  • Langley, Paul. 2008. The Everyday Life of Global Finance: Saving and Borrowing in Anglo-America. Oxford: Oxford University Press.
  • Langley, Paul. 2015. Liquidity Lost: The Governance of the Global Financial Crisis. Oxford/New York: Oxford University Press.
  • Langley, Paul. 2017. “Finance/Security/Life.” Finance and Society 3 (2): 173–179. doi: 10.2218/finsoc.v3i2.2576
  • Larkin, Brian. 2013. “The Politics and Poetics of Infrastructure.” Annual Review of Anthropology 42: 327–343. doi: 10.1146/annurev-anthro-092412-155522
  • Lépinay, Vincent-Antonin. 2007. “Parasitic Formulae: The Case of Capital Guarantee Products.” In Market Devices, edited by Michel Callon and Yuval Millo, 261–283. Oxford: Blackwell.
  • Mitchell, Timothy. 2014. “Introduction: Life of Infrastructure.” Comparative Studies of South Asia, Africa and the Middle East 34 (3): 437–439. doi: 10.1215/1089201X-2826013
  • Muellerleile, Chris. 2017. “Calming Speculative Traffic: An Infrastructural Theory of Financial Markets.” Economic Geography 93 (3): 279–298. doi: 10.1080/00130095.2017.1307100
  • van Munster, Rens. 2005. Logics of Security: The Copenhagen School, Risk Management and the War on Terror. Odense: Syddansk Universitet: Political Science Publications.
  • Nolte, Amina. 2016. “Political Infrastructure and the Politics of Infrastructure.” City: Analysis of Urban Trends, Culture, Theory, Policy, Action 20 (3): 441–454. doi: 10.1080/13604813.2016.1169778
  • Nolte, Amina, and Haim Yacobi. 2015. “Politics, Infrastructure and Representation: the Case of Jerusalem’s Light Rail.” Cities 43: 28–36. doi: 10.1016/j.cities.2014.10.011
  • Schmitt, Carl. 1934. Politische Theologie: Vier Kapitel zur Lehre von der Souveränität. Berlin: Duncker & Humblot.
  • Simone, A. 2004. “People as Infrastructure: Intersecting Fragments in Johannesburg.” Public Culture 16 (3): 407–429. doi: 10.1215/08992363-16-3-407
  • Spivak, Gayatri Chakravorty. 1997 [1986]. “Three Women’s Texts and a Critique of Imperialism.” In Postcolonial Criticism, edited by Bart Moore-Gilbert, Gareth Stanton, and Willy Maley, 145–165. London/New York: Longman.
  • Star, Susan Leigh. 1999. “The Ethnography of Infrastructure.” American Behavioral Scientist 43 (3): 377–391. doi: 10.1177/00027649921955326
  • Stritzel, Holger, and Sean C. Chang. 2015. “Securitization and Counter-Securitization in Afghanistan.” Security Dialogue 46 (6): 548–567. doi: 10.1177/0967010615588725
  • Tomko, John S. 2002. Critical Infrastructure Protection. UWARC Research Project. U.S. Army War College. Carlisle Barracks. Accessed November 2, 2019. http://iwar.org.uk/cip/resources/army-cip/Tomko_J_S_02.pdf.
  • Tonkiss, Fran. 2015. “Afterword: Economies of Infrastructure.” City: Analysis of Urban Trends, Culture, Theory, Policy, Action 19 (2–3): 384–391. doi: 10.1080/13604813.2015.1019232
  • Vuori, Juha A. 2011. How to Do Security with Words: A Grammar of Securitization in the People’s Republic of China. Turku: University of Turku.
  • Wæver, Ole. 1995. “Securitization and Desecuritization.” In On Security, edited by Ronnie D Lipschutz, 46–86. New York: Columbia University Press.
  • Wæver, Ole. 1996. “European Security Identities.” JCMS: Journal of Common Market Studies 34 (1): 103–132.
  • Wæver, Ole. 2004. “Aberystwyth, Paris, Copenhagen: New ‘Schools’ in Security Theory and Their Origins between Core and Periphery.” Paper presented at the annual meeting of the International Studies Association, Montreal, March 17–20.
  • Wæver, Ole. 2015. “The History and Social Structure of Security Studies as a Practico-Academic Field.” In Security Expertise: Practice, Power, Responsibility, edited by Trine Villumsen Berling and Christian Bueger, 76–106. London/New York: Routledge.
  • Weber, Max. [1894/95] 1988. “Die Börse.” In Gesammelte Aufsätze zur Soziologie und Sozialpolitik, edited by Johannes Winckelmann, 256–322. Tübingen: J.C.B Mohr.
  • Westermeier, Carola. 2018. “Political Security and Financial Stability Following the Crisis: Actors and Epistemologies of Financial Governance.” Unpublished Dissertation. Philipps-Universität Marburg.
  • Williams, Michael C. 2003. “Words, Images, Enemies: Securitization and International Politics.” International Studies Quarterly 47: 511–531. doi: 10.1046/j.0020-8833.2003.00277.x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.