ABSTRACT

This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization ‘works’ within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume – drawn from different disciplinary, ontological, and geographic ‘spaces’ – orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms. 

This volume will be of great interest to scholars of critical security studies, international security, and International Relations.

Chapter 6 of this book is freely available as a downloadable Open Access PDF at https://www.taylorfrancis.com under a Creative Commons Attribution-Non Commercial-No Derivatives (CC-BY-NC-ND) 4.0 license. 

part I|66 pages

Theoretical insights

chapter |25 pages

Introduction

Revisiting securitization and the ‘constructivist turn’ in security studies

chapter 1|19 pages

Assessing securitization theory

Theoretical discussions and empirical developments

chapter 2|20 pages

Regional security complex theory

Reflections and reformulations

part II|76 pages

Securitization in application

chapter 3|22 pages

Counter-terrorism as a technology of securitization

Approaching the Moroccan case

chapter 4|25 pages

When advocacy securitizes

Non-state actors and the circulation of narratives around sexualized violence in conflict

chapter 5|27 pages

Securitizing the environment

Climate change as first-order threat

part III|81 pages

Mechanisms of desecuritization

chapter 6|23 pages

Conflict management redux

Desecuritizing intractable conflicts

chapter 7|26 pages

Beyond the speech act

Contact, desecuritization, and peacebuilding in Cyprus

chapter |7 pages

Conclusion

Securitization, revisited: revealed insights, future directions