5,470
Views
66
CrossRef citations to date
0
Altmetric
Articles

Extraordinary or ordinary emergency measures: what, and who, defines the ‘success’ of securitization?

References

  • Adler, E and Vincent Pouliot (2011) ‘International practices: introduction and framework’ in E Adler and V Pouliot (eds) International practices (Cambridge: Cambridge University Press), 3–3510.1017/CBO9780511862373
  • Aradau, C and R Van Munster (2007) ‘Governing terrorism through risk: taking precautions, (un)knowing the future’, European Journal of International Relations, 13:1, 89–115
  • Balzacq, T (2011) ‘Enquiries into methods: a new framework for securitization analysis’ in Thierry Balzacq (ed) Securitization theory: how security problems emerge and dissolve (Abingdon: Routledge), 31–54
  • Balzacq, T (2010) ‘Constructivism and securitization studies’ in Myriam Dunn Cavelty and Victor Mauer (eds) The routledge handbook of security studies (Abingdon: Routledge), 56–72
  • Balzacq, T (2005) 'Three faces of securitization: Political agency, audience, and context', European Journal of International Relations, 11.2, 171–201
  • Bigo, B (2000) ‘When two become one: internal and external securitisations in Europe’ in Morton Kelstrup and Michael C Williams (eds) International relations theory and the politics of European integration (London: Routledge), 171–204
  • Bright, J (2012) ‘Securitisation, terror, and control: towards a theory of the breaking point’, Review of International Studies, 38: 861–879
  • Buzan, B, and O Waever (2003) Regions and Powers: The structure of International Security (Cambridge: Cambridge University Press)
  • Buzan, B, O Wæver and J de Wilde (1998) Security: a new framework for analysis (Boulder: Lynne Rienner Publishers)
  • Buzan, B (1991) People, states and fear (London: Harvester Wheatsheaf)
  • Campbell, D (1992) Writing security: United States foreign policy and the politics of identity (University of Minnesota Press)
  • Ciută, F (2009) ‘Security and the problem of context: a hermeneutical critique of securitization theory’, Review of International Studies, 35: 301–326
  • Collins, A (2005) ‘Securitization, Frankenstein's Monster and Malaysian education’, Pacific Review, 18:4, 567–588
  • Corry, O (2012) ‘Securitization and “riskification”: second-order security and the politics of climate change’, Millennium: Journal of International Studies, 40:2, 235–258
  • De Goede, M (2008) ‘The politics of preemption and the war on terror in Europe’, European Journal of International Relations, 14:1, 161–185
  • Dyzenhaus, D (2010) ‘The “organic law” of Ex parte Milligan’ in Austin Sarat (ed) Sovereignty, emergency, legality (Cambridge: Cambridge University Press), 16–56
  • Floyd, R (2010) Security and the environment: securitization theory and US environmental security policy (Cambridge: Cambridge University Press)10.1017/CBO9780511730146
  • Goldstone, J (1996) ‘Debate’, environmental change and security project report’ (Washington DC: Woodrow Wilson Center), 66–71
  • Huysmans, J (2011) ‘What’s in an act? On security speech acts and little security nothings’, Security Dialogue, 42:4-5, 371–383
  • Huysmans, J (2006) The politics of insecurity (Abingdon: Routledge)
  • Huysmans, J (1998) ‘Revisiting Copenhagen: or, on the creative development of a security agenda in Europe’, European Journal of International Relations, 4:4, 479–505
  • Léonard, S (2012) ‘EU border security and migration into the European Union: FRONTEX and securitisation through practices’ in Christian Kaunert and Sarah Léonard (eds) Developing european internal security policy (London: Routledge), 89–112
  • McMahan, J (2005) ‘Just cause for war’, Ethics and International Affairs, 19:03, 1–21
  • McGreal, C. (2013) ‘US dismissive of “bellicose rhetoric” after North Korea nullifies armistice’, The Guardian, Tuesday 12 March, <<http://www.guardian.co.uk/world/2013/mar/11/us-warning-north-korea-truce-nuclear>>
  • Neal, A (2012) ‘Normalization and legislative exceptionalism: counterterrorist lawmaking and the changing times of security emergencies’, International Political Sociology, 6: 260–276
  • Neal, A (2010) Exceptionalism and the politics of counter-terrorism: liberty, security and the war on terror (Abingdon: Routledge)
  • Neocleous, M. (2008) Critique of security (Edinburgh: Edinburgh University Press)10.3366/edinburgh/9780748633289.001.0001
  • Rasmussen, MV (2006) The risk society at war: terror, technology and strategy in the twenty-first century (Cambridge: Cambridge University Press)10.1017/CBO9780511491634
  • Roe, P (2012) ‘Is securitization a “negative” concept? revisiting the normative debate over normal versus extraordinary politics’, Security Dialogue, 249–266
  • Roe, P (2008) ‘Actor, audience(s) and emergency measures: securitization and the UK's decision to invade Iraq’, Security Dialogue, 39:6, 615–635
  • Salter, MB (2011) ‘When securitization fails: the hard case of counter-terrorism programs’ in T Balzacq (ed) Securitization theory: how security problems emerge and dissolve (London: Routledge), 116–132
  • Sanders, D (2010) ‘Behavioural analysis’ in David Marsh and Gerry Stoker (eds) Theory and methods in political science (Basingstoke: Palgrave), 45–64
  • Sarat, A (2010) ‘Introduction: towards new conceptions of the relationship of law and sovereignty under conditions of emergency’’ in Austin Sarat (ed) Sovereignty, emergency, legality (Cambridge: Cambridge University Press), 1–15
  • Sjöstedt, R (2011) ‘Health issues and securitization: the construction of HIV/AIDS as a US national security threat’ in T Balzacq (ed) Securitization theory: how security problems emerge and dissolve (London: Routledge), 150–169
  • Stritzel, H (2007) ‘Towards a theory of securitization: Copenhagen and beyond’, European Journal of International Relations, 13: 357–383
  • Trombetta, MJ (2008) ‘Environmental security and climate change: analysing the discourse’, Cambridge Review of International Affairs, 21:4, 585–602
  • Vuori, J. A. (2011) How to do security with words: a grammar of securitization in the people’s Republic of China, University of Turku, Finland, unpublished manuscript
  • Waever, O (2011) ‘Politics, security, theory’, Security Dialogue, 42:4-5, 465–480
  • Wæver, O (2009a) ‘Klimatruslen—en sikkerhedspolitisk analyse’, Tidsskriftet Politik, 12:1, 5–26
  • Wæver, O (2009b), ‘What exactly makes a continuous existential threat existential? in O Barak and G Sheffer (eds) Existential threats and civil-security relations (Lanham: Lexington Books), 19–35
  • Wæver, O. (2003) ‘Securitisation: taking stock of a research programme in security studies’, unpublished mansucript
  • Wæver, O (1989) ‘Security, the speech act: analysing the politics of a word’, unpublished paper, presented at the Research Training Seminar, Sostrup Manor 1989, revised, Jerusalem/Tel Aviv, 25–26 June 1989
  • Williams, MC (2011) ‘The continuing evolution of securitization theory’ in T Balzacq (ed) Securitization theory: how security problems emerge and dissolve (London: Routledge), 212–222
  • Williams, MC (2003) ‘Words, images, enemies: securitization and international politics’, International Studies Quarterly, 47: 511–531

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.