‘Securitization’ revisited: Theory and cases

Thierry Braspenning, Sarah Léonard, Jan Rizicka

    Research output: Contribution to journalArticle

    Abstract

    Securitization theory seeks to explain the politics through which (1) the security character of public problems is established, (2) the social commitments resulting from the collective acceptance that a phenomenon is a threat are fixed and (3) the possibility of a particular policy is created. In the last decade, research on securitization has grown significantly. The aim of this article is to evaluate the achievements of securitization theory. First, its main concepts and premises are critically discussed. This article then proceeds to examine the empirical applications of securitization theory to a broad range of issues, as well as the theoretical implications of these studies. Finally, it discusses the main challenges faced by securitization scholars and puts forward strategies to overcome them. This article develops three inter-related arguments. First, notably thanks to empirical studies, securitization theory has significantly developed beyond its initial focus on the speech act. Second, as a result, the distinctiveness of securitization theory currently lies in its capacity to articulate a specific approach to security – influenced by the speech act – with an ‘analytics of government’, which emphasizes practices and processes. Third, securitization theory faces three types of challenges, related, respectively, to theory, method and methodology. The capacity of scholars to overcome those will strongly influence the extent to which securitization theory will be able to make significant contributions to the debates in Security Studies and International Relations in the years to come.
    Original languageEnglish
    Pages (from-to)494-531
    Number of pages38
    Journale-International Relations
    Volume30
    Issue number4
    Early online date5 Aug 2015
    DOIs
    Publication statusPublished - 1 Dec 2016

    Fingerprint Dive into the research topics of '‘Securitization’ revisited: Theory and cases'. Together they form a unique fingerprint.

  • Cite this