1,299
Views
3
CrossRef citations to date
0
Altmetric
Article

Why is there no securitisation theory in the Korean nuclear crisis?

ORCID Icon

References

  • Austin, J. L., & Beaulieu-Brossard, P. (2018). (De)securitistion dilemmas: Theorising the simultaneous enaction of securitisation and desecuritisation. Review of International Studies, 44(2), 301–323.
  • Balzacq, T. (2005). The three faces of securitization: Political agency, audience and context. European Journal of International Relations, 11(2), 171–201.
  • Balzacq, T. (Ed.). (2011). Understanding securitization theory: How security problems emerge and dissolve. Oxon: Routledge.
  • Balzacq, T, Léonard, S., & Ruzicka, J. (2016). “Securitization” revisited: Theory and cases. International Relations, 30(4), 494–531.
  • Bleiker, R. (2005). Divided Korea: Toward a culture of reconciliation. Minneapolis, MN: University of Minnesota Press.
  • Booth, K. (1991). Security and emancipation. Review of International Studies, 17(4), 313–326.
  • Booth, K. (Ed.). (2005). Critical security studies and world politics. Boulder, CO: Lynne Rienner Publishers.
  • Bourne, M. (2014). Understanding security. Basingstoke: Palgrave Macmillan.
  • Browning, C. S., & McDonald, M. (2011). The future of critical security studies: Ethics and the politics of security. European Journal of International Relations, 19(2), 235–255.
  • Buzan, B., & Hansen, L. (2009). The evolution of international security studies. Cambridge, UK: Cambridge University Press.
  • Buzan, B., Waever, O., & De Wilde, J. (1998). Security: A new framework for analysis. Boulder, CO: Lynne Rienner Publishers.
  • Cha, V. (2013). The impossible state: North Korea, past and future. London: Vintage.
  • Clinton, B. (2005). My life. London: Arrow Books.
  • Cohen, Z. (2017, August 11). The last resort: How a US strike on North Korea could play out. CNN. Retrieved from http://edition.cnn.com/
  • Corry, O. (2012). Securitisation and “riskification”: Second-order security and the politics of climate change. Millennium, 40(2), 235–258.
  • Côté, A. (2016). Agents without agency: Assessing the role of the audience in securitization theory. Security Dialogue, 47(6), 541–558.
  • Donnelly, F. (2013). Securitization and the Iraq War: The rules of engagement in world politics. Oxon: Routledge.
  • Ejdus, F. (2009). Dangerous liaisons: Securitization theory and Schmittian legacy. Western Balkans Security Observer, 4(13), 9–16.
  • Emmers, R. (2016). Securitization. In A. Collins (Ed.), Contemporary security studies (pp. 168–181). Oxford: Oxford University Press.
  • Eun, Y.-S. (2018). What is at stake in building “non-Western” international relations theory? Oxon: Routledge.
  • Floyd, R. (2011). Can securitization theory be used in normative analysis? Towards a just securitization theory. Security Dialogue, 42(4–5), 427–439.
  • Guzzini, S. (2013). The ends of international relations theory: stages of reflexivity and modes of theorizing. European Journal of International Relations, 19(3), 521–541.
  • Ha, K.-Y. (Ed.). (2013). 이명박정부 국정백서 통일·안보 [The Lee Myung-bak administration's White Paper on North Korea and unification policy]. Seoul: Office of the President.
  • Han, W.-S. (2013). 한반도는 아프다 [The Korean peninsula hurts: A tragedy of antagonistic symbiosis]. Paju: Hanul.
  • Heywood, A. (2012). Political ideologies: An introduction. New York, NY: Palgrave Macmillan.
  • Hoare, J. (2008). Does the sun still shine? The Republic of Korea’s policy of engagement with the Democratic People’s Republic of Korea. Asian Affairs, 39(1), 69–82.
  • Howarth, D. R., Norval, A. J., & Stavrakakis, Y. (2000). Discourse theory and political analysis: Identities, hegemonies and social change. Manchester: Manchester University Press.
  • Hudson, N. F., Kreidenweis, A., & Carpenter, C. (2013). Human security. In L. J. Shepherd (Ed.), Critical approaches to security: An introduction to theories and methods (pp. 24–36). Oxon: Routledge.
  • Huysmans, J. (2011). What’s in an act? On security speech acts and little security nothings. Security Dialogue, 42(4–5), 371–383.
  • Hwang, B.-D., Kim, K.-R., Lee, K.-D., Cho, H.-B., Koh, J.-H., Kim, K.-S., Park, J.-R., … Choi, Y.-H. (2011). 북한정보관리체계 개선방안 [Improvement plans for North Korean information management system]. Seoul: Korea Institute for National Unification.
  • Jeon, B. (2016, June). 북한 핵전략의 유형과 특징 평가: 선언적 핵전략을 중심으로 [Evaluation of types and characteristics in North Korea’s nuclear strategy]. Paper presented at the Conference on the 60th anniversary of the Korean Association of International Studies, Jeongseon, South Korea.
  • Judge, A., & Maltby, T. (2017). European Energy Union? Caught between securitisation and “riskification”. European Journal of International Security, 2(2), 179–202.
  • Kang, S.-H. (2011). Korea’s foreign policy dilemmas: Defining state security and the goal of national unification. Kent: Global Oriental.
  • Kim, D.-J. (2002). Remarks at the 10th APEC Summit. Seoul: Office of the President.
  • Kim, H. K., & Cho, Y. Y. (2009). International relations studies in Korea: Retrospects and prospects. Pacific Focus, 24(3), 402–421.
  • Kim, S.-B. (2012). The North Korean nuclear threat and South Korea’s identity politics in 2006. Korean Journal of Defense Analysis, 24(3), 335–353.
  • Kim, S.-H., & Lee, G. (2011). When security met politics: Desecuritization of North Korean threats by South Korea's Kim Dae-jung government. International Relations of the Asia-Pacific, 11(1), 25–55.
  • Kim, Y.-S. (1993). Press conference on 100th day in office. Seoul: Office of the President.
  • Knudsen, O. F. (2001). Post-copenhagen security studies: Desecuritizing securitization. Security Dialogue, 32(3), 355–368.
  • Lee, G. (2017, July 12). What happens when North Korea goes inter-continental. World Economic Forum. Retrieved from https://www.weforum.org.
  • Lee, K.-D. (2012). 북한 핵보유국의 진실 [The truth of nuclear armed North Korea]. Seoul: Happistory.
  • Lee, M.-B. (2008). Address by President Lee Myung-bak on the opening of the 18th National Assembly. Seoul: Office of the President.
  • Lee, M.-B. (2015). 대통령의 시간 [The President's time: 2008–2013]. Seoul: RH Korea.
  • Lee, Y.-J. (2004). 북한핵, 새로운 게임의 법칙 [North Korea's nuclear programme: A rule for the new game]. Seoul: Chosunilbosa.
  • Léonard, S., & Kaunert, C. (2011). Reconceptualizing the audience in securitization theory. In T. Balzacq (Ed.), Securitization theory: How security problems emerge and dissolve (pp. 57–76). Oxon: Routledge.
  • Lupovici, A. (2016). Securitization climax: Putting the Iranian nuclear project at the top of the Israeli public agenda (2009–2012). Foreign Policy Analysis, 12(3), 413–432.
  • McDonald, M. (2008). Securitization and the construction of security. European Journal of International Relations, 14(4), 563–587.
  • McDonald, M. (2013). Constructivisms. In P. D. Williams (Ed.), Security studies: An introduction (pp. 63–76). Oxon: Routledge.
  • Mercer, J. (2010). Emotional beliefs. International Organization 64(0), 1–31.
  • Moon, C.-I. (2012). The Sunshine Policy: In defense of engagement as a path to peace in Korea. Seoul: Yonsei University Press.
  • Moon, J.-I. (2017). Remarks by President Moon Jae-in at the retreat session of the 12th G20 Summit in Hamburg, Germany. Seoul: Office of the President.
  • Newman, E. (2010). Critical human security studies. Review of International Studies, 36(1), 77–94.
  • Oberdorfer, D., & Carlin, R. (2014). The two Koreas: A contemporary history. New York, NY: Basic Books.
  • Oren, I., & Solomon, T. (2015). WMD, WMD, WMD: Securitisation through ritualised incantation of ambiguous phrases. Review of International Studies, 41(2), 313–336.
  • Park, G.-H. (2011). A new kind of Korea. Foreign Affairs, 90(5), 13–18.
  • Park, G.-H. (2016a). Remarks at the 11th East Asia summit. Seoul: Office of the President.
  • Park, G.-H. (2016b). Remarks at the 68th Armed Forces Day. Seoul: Office of the President.
  • Peoples, C., & Vaughan-Williams, N. (2015). Critical security studies: An introduction. Oxon: Routledge.
  • Pompeo, M. (2018, May 2). Remarks at swearing-in ceremony. US Department of State. Retrieved from https://www.state.gov.
  • Purvis, T., & Hunt, A. (1993) Discourse, ideology, discourse, ideology, discourse, ideology…. The British Journal of Sociology, 44(3), 473–499.
  • Roe, P. (2012). Is securitization a “negative” concept? Revisiting the normative debate over normal versus extraordinary politics. Security Dialogue, 43(3), 249–266.
  • Roe, P. (2016). Societal security. In A. Collins (Ed.), Contemporary security studies (pp. 215–228). Oxford: Oxford University Press.
  • Roh, M.-H. (2003). Address by President Roh Moo-hyun at the 16th inaugural ceremony. Seoul: Office of the President.
  • Roh, M.-H. (2010). 운명이다 [It’s destiny: Roh Moo-hyun’s autobiography]. Paju: Dolbegae.
  • Salter, M. B., & Mutlu, C. E. (2013). Securitisation and Diego Garcia. Review of International Studies, 39(4), 815–834.
  • Sanger, D. E., & Broad, W. J. (2018, January 6). How US intelligence agencies underestimated North Korea. The New York Times. Retrieved from http://www.nytimes.com
  • Schaul, K. (2016, September 9). Eight countries. 2056 nuclear tests. 71 years. The Washington Post. Retrieved from https://www.washingtonpost.com/
  • Shin, G.-W. (2006). Ethnic nationalism in Korea: Genealogy, politics, and legacy. Stanford, CA: Stanford University Press.
  • Sigal, L. V. (1999). Disarming strangers: Nuclear diplomacy with North Korea. Princeton: Princeton University Press.
  • Smith, H. (2000). Bad, mad, sad or rational actor? Why the “securitization” paradigm makes for poor policy analysis of North Korea. International Affairs, 76(3), 593–617.
  • Smith, S. (2005). The contested concept of security. In K. Booth (Ed.), Critical security studies and world politics (pp. 27–62). Boulder, CO: Lynne Rienner Publishers.
  • Son, K.-Y. (2006) South Korean engagement policies and North Korea: Identities, norms and the Sunshine Policy. Oxon: Routledge.
  • Stritzel, H. (2007). Towards a theory of securitization: Copenhagen and beyond. European Journal of International Relations, 13(3), 357–383.
  • Stritzel, H. (2011). Security, the translation. Security Dialogue, 42(4–5), 343–355.
  • Stritzel, H. (2012). Securitization, power, intertextuality: Discourse theory and the translations of organized crime. Security Dialogue, 43(6), 549–567.
  • Stritzel, H. (2014). Security in translation: Securitization theory and the localization of threat. Basingstoke: Palgrave Macmillan.
  • Swenson-Wright, J. (2011). Korea: A glimmer of hope. The World Today, 67(2), 19–21.
  • Van Munster, R., & Sylvest, C. (2014). Reclaiming nuclear politics? Nuclear realism, the H-bomb and globality. Security Dialogue, 45(6), 530–547.
  • Van Rythoven, E. (2015). Learning to feel, learning to fear? Emotions, imaginaries, and limits in the politics of securitization. Security Dialogue, 46(5), 458–475.
  • Vuori, J. A. (2008). Illocutionary logic and strands of securitization: Applying the theory of securitization to the study of non-democratic political orders. European Journal of International Relations, 14(1), 65–99.
  • Waever, O. (1995). Securitization and desecuritization. In R. D. Lipschutz (Ed.), On security (pp. 46–86). New York, NY: Columbia University Press.
  • Walton, C. D., & Gray, C. S. (2013). The second nuclear age: Weapons in the twenty-first century. In J. Baylis, J. J. Wirtz & C. S. Gray (Eds.), Strategy in the contemporary world (pp. 195–212). Oxford: Oxford University Press.
  • Watson, S. D. (2012). “Framing” the Copenhagen School: Integrating the literature on threat construction. Millennium—Journal of International Studies, 40(2), 279–301.
  • Wilkinson, C. (2007). The Copenhagen School on tour in Kyrgyzstan: Is securitization theory useable outside Europe? Security Dialogue, 38(1), 5–25.
  • Williams, M. C. (2003). Words, images, enemies: Securitization and international politics. International Studies Quarterly, 47(4), 511–531.
  • Williams, M. C. (2005). The realist tradition and the limits of international relations. Cambridge, UK: Cambridge University Press.
  • Zehfuss, M. (2013). Critical theory, poststructuralism, and postcolonialism. In W. Carlsnaes, T. Risse, & B. A. Simmons (Eds.), Handbook of international relations (pp. 145–169). London: Sage.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.