‘Securitization’ revisited: Theory and cases

Thierry Braspenning, Sarah Léonard, Jan Rizicka

Résultats de recherche: Contribution à un journal/une revueArticleRevue par des pairs

Résumé

Securitization theory seeks to explain the politics through which (1) the security character of public problems is established, (2) the social commitments resulting from the collective acceptance that a phenomenon is a threat are fixed and (3) the possibility of a particular policy is created. In the last decade, research on securitization has grown significantly. The aim of this article is to evaluate the achievements of securitization theory. First, its main concepts and premises are critically discussed. This article then proceeds to examine the empirical applications of securitization theory to a broad range of issues, as well as the theoretical implications of these studies. Finally, it discusses the main challenges faced by securitization scholars and puts forward strategies to overcome them. This article develops three inter-related arguments. First, notably thanks to empirical studies, securitization theory has significantly developed beyond its initial focus on the speech act. Second, as a result, the distinctiveness of securitization theory currently lies in its capacity to articulate a specific approach to security – influenced by the speech act – with an ‘analytics of government’, which emphasizes practices and processes. Third, securitization theory faces three types of challenges, related, respectively, to theory, method and methodology. The capacity of scholars to overcome those will strongly influence the extent to which securitization theory will be able to make significant contributions to the debates in Security Studies and International Relations in the years to come.
langue originaleAnglais
Pages (de - à)494-531
Nombre de pages38
journale-International Relations
Volume30
Numéro de publication4
Date de mise en ligne précoce5 août 2015
Les DOIs
Etat de la publicationPublié - 1 déc. 2016

Empreinte digitale

Examiner les sujets de recherche de « ‘Securitization’ revisited: Theory and cases ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation