Identifying Security Logics in the EU Policy Discourse : : The Migration Crisis and the EU.

Saved in:
Bibliographic Details
Superior document:IMISCOE Research Series
:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2022.
{copy}2022.
Year of Publication:2022
Edition:1st ed.
Language:English
Series:IMISCOE Research Series
Online Access:
Physical Description:1 online resource (209 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5006887015
ctrlnum (MiAaPQ)5006887015
(Au-PeEL)EBL6887015
(OCoLC)1298202913
collection bib_alma
record_format marc
spelling Stępka, Maciej.
Identifying Security Logics in the EU Policy Discourse : The Migration Crisis and the EU.
1st ed.
Cham : Springer International Publishing AG, 2022.
{copy}2022.
1 online resource (209 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
IMISCOE Research Series
Identifying Security Logics in the EU Policy Discourse -- Acknowledgements -- Contents -- Chapter 1: Introduction -- 1.1 Introduction -- 1.2 Migration and Security in Academic Literature -- 1.3 Aims of the Book -- 1.4 Methods -- 1.5 Clarifying the Scope and Main Characteristics of the Book -- 1.6 Structure of the Book -- References -- Chapter 2: The Copenhagen School and Beyond. A Closer Look at Securitisation Theory -- 2.1 Introduction -- 2.2 The Concept of Securitisation -- 2.3 Securitisation and the Speech Act Approach -- 2.4 Securitisation the Logic of Exception -- 2.5 Securitisation and the Audience-Actor Interaction -- 2.6 Conclusion: Moving Forward with Securitisation Theory -- References -- Chapter 3: Securitisation as the Work of Framing -- 3.1 Introduction -- 3.2 Securitisation Beyond Speech Act -- 3.3 Securitisation Beyond Exceptionalism -- 3.3.1 Security Logics -- "Exceptionalist" Security Logic -- Risk (Management and Resilience) -- Human Security -- 3.4 Securitisation Beyond the Actor-Audience Dichotomy -- 3.5 Defining the Process of Acceptance -- 3.6 Including Context in the Securitisation Process -- 3.7 Conclusion: Key Points of "Securitisation as the Work of Framing" Approach -- References -- Chapter 4: EU Migration-Security Continuum. Investigating Security Frames Before the "Migration Crisis" -- 4.1 Introduction -- 4.2 From Maastricht to Lisbon. Tracing "Constitutional" Securitising Moves and Security Frames -- 4.3 Schengen and Border Control - Building "Fortress Europe" -- 4.3.1 Frontex and Protection of the EU Borders -- 4.4 Detention and Deportation - Reception and Return -- 4.5 Migration and Asylum Policies - Between "Bogus Asylum Seekers" and Irregular Migrants -- 4.5.1 Irregular Migration, Organised Crime and Terrorism -- 4.6 Externalisation of Migration Control. Securitisation Within the Internal-External Security Nexus.
4.7 Conclusion -- References -- Chapter 5: Analysing Diagnosis and Evaluation of the "Migration Crisis" at the EU Level -- 5.1 Introduction -- 5.2 Human Security -- 5.2.1 Naming and Categorising the Humanitarian Features of the "Migration Crisis" -- 5.2.2 Conceptualising the Push Factors and Defining Threats -- 5.2.3 Defining the Human Referent Object -- 5.2.4 Comments -- 5.3 Risk Management -- 5.3.1 Naming and Categorising the Risk-Oriented Features of the "Migration Crisis" -- 5.3.2 Defining Non-human Referent Objects -- 5.3.3 Conceptualising Risks -- 5.3.4 Comments -- 5.4 "Exceptionalist" Security -- 5.4.1 Human Security - "Exceptionalist" Security -- 5.4.2 Risk Management - "Exceptionalist" Security -- 5.4.3 Comments -- 5.5 Conclusion -- References -- Chapter 6: Analysing the Conceptualisation of Remedial Actions Towards the "Migration Crisis" at the EU Level -- 6.1 Introduction -- 6.2 Risk Management -- 6.2.1 The "Hotspot Approach" -- 6.2.2 Returns, Readmission and Detention -- 6.2.3 Intelligence Cooperation, Surveillance and Control -- 6.2.4 EU-Turkey Statement -- 6.2.5 Relocation and Resettlement -- 6.2.6 Comments -- 6.3 Resilience -- 6.3.1 Reforming Common European Asylum System -- 6.3.2 European Union Trust Funds -- 6.3.3 EU Border, Capacity Building and Assistance Missions -- 6.3.4 Comments -- 6.4 "Exceptionalist" Security -- 6.4.1 EUNAVFOR MED "Sophia" -- 6.4.2 Joint Border Operations -- 6.4.3 Comments -- 6.5 Conclusion -- References -- Chapter 7: Conclusions -- 7.1 Introduction -- 7.2 Revisiting Security Logics in the EU Frame-Narrative on the "Migration Crisis" -- 7.3 Reflecting on Securitisation as the Work of Framing -- 7.4 Final Reflections on Risk and Securitisation of Migration in the EU -- References.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
Print version: Stępka, Maciej Identifying Security Logics in the EU Policy Discourse Cham : Springer International Publishing AG,c2022 9783030930349
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6887015 Click to View
language English
format eBook
author Stępka, Maciej.
spellingShingle Stępka, Maciej.
Identifying Security Logics in the EU Policy Discourse : The Migration Crisis and the EU.
IMISCOE Research Series
Identifying Security Logics in the EU Policy Discourse -- Acknowledgements -- Contents -- Chapter 1: Introduction -- 1.1 Introduction -- 1.2 Migration and Security in Academic Literature -- 1.3 Aims of the Book -- 1.4 Methods -- 1.5 Clarifying the Scope and Main Characteristics of the Book -- 1.6 Structure of the Book -- References -- Chapter 2: The Copenhagen School and Beyond. A Closer Look at Securitisation Theory -- 2.1 Introduction -- 2.2 The Concept of Securitisation -- 2.3 Securitisation and the Speech Act Approach -- 2.4 Securitisation the Logic of Exception -- 2.5 Securitisation and the Audience-Actor Interaction -- 2.6 Conclusion: Moving Forward with Securitisation Theory -- References -- Chapter 3: Securitisation as the Work of Framing -- 3.1 Introduction -- 3.2 Securitisation Beyond Speech Act -- 3.3 Securitisation Beyond Exceptionalism -- 3.3.1 Security Logics -- "Exceptionalist" Security Logic -- Risk (Management and Resilience) -- Human Security -- 3.4 Securitisation Beyond the Actor-Audience Dichotomy -- 3.5 Defining the Process of Acceptance -- 3.6 Including Context in the Securitisation Process -- 3.7 Conclusion: Key Points of "Securitisation as the Work of Framing" Approach -- References -- Chapter 4: EU Migration-Security Continuum. Investigating Security Frames Before the "Migration Crisis" -- 4.1 Introduction -- 4.2 From Maastricht to Lisbon. Tracing "Constitutional" Securitising Moves and Security Frames -- 4.3 Schengen and Border Control - Building "Fortress Europe" -- 4.3.1 Frontex and Protection of the EU Borders -- 4.4 Detention and Deportation - Reception and Return -- 4.5 Migration and Asylum Policies - Between "Bogus Asylum Seekers" and Irregular Migrants -- 4.5.1 Irregular Migration, Organised Crime and Terrorism -- 4.6 Externalisation of Migration Control. Securitisation Within the Internal-External Security Nexus.
4.7 Conclusion -- References -- Chapter 5: Analysing Diagnosis and Evaluation of the "Migration Crisis" at the EU Level -- 5.1 Introduction -- 5.2 Human Security -- 5.2.1 Naming and Categorising the Humanitarian Features of the "Migration Crisis" -- 5.2.2 Conceptualising the Push Factors and Defining Threats -- 5.2.3 Defining the Human Referent Object -- 5.2.4 Comments -- 5.3 Risk Management -- 5.3.1 Naming and Categorising the Risk-Oriented Features of the "Migration Crisis" -- 5.3.2 Defining Non-human Referent Objects -- 5.3.3 Conceptualising Risks -- 5.3.4 Comments -- 5.4 "Exceptionalist" Security -- 5.4.1 Human Security - "Exceptionalist" Security -- 5.4.2 Risk Management - "Exceptionalist" Security -- 5.4.3 Comments -- 5.5 Conclusion -- References -- Chapter 6: Analysing the Conceptualisation of Remedial Actions Towards the "Migration Crisis" at the EU Level -- 6.1 Introduction -- 6.2 Risk Management -- 6.2.1 The "Hotspot Approach" -- 6.2.2 Returns, Readmission and Detention -- 6.2.3 Intelligence Cooperation, Surveillance and Control -- 6.2.4 EU-Turkey Statement -- 6.2.5 Relocation and Resettlement -- 6.2.6 Comments -- 6.3 Resilience -- 6.3.1 Reforming Common European Asylum System -- 6.3.2 European Union Trust Funds -- 6.3.3 EU Border, Capacity Building and Assistance Missions -- 6.3.4 Comments -- 6.4 "Exceptionalist" Security -- 6.4.1 EUNAVFOR MED "Sophia" -- 6.4.2 Joint Border Operations -- 6.4.3 Comments -- 6.5 Conclusion -- References -- Chapter 7: Conclusions -- 7.1 Introduction -- 7.2 Revisiting Security Logics in the EU Frame-Narrative on the "Migration Crisis" -- 7.3 Reflecting on Securitisation as the Work of Framing -- 7.4 Final Reflections on Risk and Securitisation of Migration in the EU -- References.
author_facet Stępka, Maciej.
author_variant m s ms
author_sort Stępka, Maciej.
title Identifying Security Logics in the EU Policy Discourse : The Migration Crisis and the EU.
title_sub The Migration Crisis and the EU.
title_full Identifying Security Logics in the EU Policy Discourse : The Migration Crisis and the EU.
title_fullStr Identifying Security Logics in the EU Policy Discourse : The Migration Crisis and the EU.
title_full_unstemmed Identifying Security Logics in the EU Policy Discourse : The Migration Crisis and the EU.
title_auth Identifying Security Logics in the EU Policy Discourse : The Migration Crisis and the EU.
title_new Identifying Security Logics in the EU Policy Discourse :
title_sort identifying security logics in the eu policy discourse : the migration crisis and the eu.
series IMISCOE Research Series
series2 IMISCOE Research Series
publisher Springer International Publishing AG,
publishDate 2022
physical 1 online resource (209 pages)
edition 1st ed.
contents Identifying Security Logics in the EU Policy Discourse -- Acknowledgements -- Contents -- Chapter 1: Introduction -- 1.1 Introduction -- 1.2 Migration and Security in Academic Literature -- 1.3 Aims of the Book -- 1.4 Methods -- 1.5 Clarifying the Scope and Main Characteristics of the Book -- 1.6 Structure of the Book -- References -- Chapter 2: The Copenhagen School and Beyond. A Closer Look at Securitisation Theory -- 2.1 Introduction -- 2.2 The Concept of Securitisation -- 2.3 Securitisation and the Speech Act Approach -- 2.4 Securitisation the Logic of Exception -- 2.5 Securitisation and the Audience-Actor Interaction -- 2.6 Conclusion: Moving Forward with Securitisation Theory -- References -- Chapter 3: Securitisation as the Work of Framing -- 3.1 Introduction -- 3.2 Securitisation Beyond Speech Act -- 3.3 Securitisation Beyond Exceptionalism -- 3.3.1 Security Logics -- "Exceptionalist" Security Logic -- Risk (Management and Resilience) -- Human Security -- 3.4 Securitisation Beyond the Actor-Audience Dichotomy -- 3.5 Defining the Process of Acceptance -- 3.6 Including Context in the Securitisation Process -- 3.7 Conclusion: Key Points of "Securitisation as the Work of Framing" Approach -- References -- Chapter 4: EU Migration-Security Continuum. Investigating Security Frames Before the "Migration Crisis" -- 4.1 Introduction -- 4.2 From Maastricht to Lisbon. Tracing "Constitutional" Securitising Moves and Security Frames -- 4.3 Schengen and Border Control - Building "Fortress Europe" -- 4.3.1 Frontex and Protection of the EU Borders -- 4.4 Detention and Deportation - Reception and Return -- 4.5 Migration and Asylum Policies - Between "Bogus Asylum Seekers" and Irregular Migrants -- 4.5.1 Irregular Migration, Organised Crime and Terrorism -- 4.6 Externalisation of Migration Control. Securitisation Within the Internal-External Security Nexus.
4.7 Conclusion -- References -- Chapter 5: Analysing Diagnosis and Evaluation of the "Migration Crisis" at the EU Level -- 5.1 Introduction -- 5.2 Human Security -- 5.2.1 Naming and Categorising the Humanitarian Features of the "Migration Crisis" -- 5.2.2 Conceptualising the Push Factors and Defining Threats -- 5.2.3 Defining the Human Referent Object -- 5.2.4 Comments -- 5.3 Risk Management -- 5.3.1 Naming and Categorising the Risk-Oriented Features of the "Migration Crisis" -- 5.3.2 Defining Non-human Referent Objects -- 5.3.3 Conceptualising Risks -- 5.3.4 Comments -- 5.4 "Exceptionalist" Security -- 5.4.1 Human Security - "Exceptionalist" Security -- 5.4.2 Risk Management - "Exceptionalist" Security -- 5.4.3 Comments -- 5.5 Conclusion -- References -- Chapter 6: Analysing the Conceptualisation of Remedial Actions Towards the "Migration Crisis" at the EU Level -- 6.1 Introduction -- 6.2 Risk Management -- 6.2.1 The "Hotspot Approach" -- 6.2.2 Returns, Readmission and Detention -- 6.2.3 Intelligence Cooperation, Surveillance and Control -- 6.2.4 EU-Turkey Statement -- 6.2.5 Relocation and Resettlement -- 6.2.6 Comments -- 6.3 Resilience -- 6.3.1 Reforming Common European Asylum System -- 6.3.2 European Union Trust Funds -- 6.3.3 EU Border, Capacity Building and Assistance Missions -- 6.3.4 Comments -- 6.4 "Exceptionalist" Security -- 6.4.1 EUNAVFOR MED "Sophia" -- 6.4.2 Joint Border Operations -- 6.4.3 Comments -- 6.5 Conclusion -- References -- Chapter 7: Conclusions -- 7.1 Introduction -- 7.2 Revisiting Security Logics in the EU Frame-Narrative on the "Migration Crisis" -- 7.3 Reflecting on Securitisation as the Work of Framing -- 7.4 Final Reflections on Risk and Securitisation of Migration in the EU -- References.
isbn 9783030930356
9783030930349
callnumber-first J - Political Science
callnumber-subject JV - Colonization, Immigration
callnumber-label JV6001-9480
callnumber-sort JV 46001 49480
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6887015
illustrated Not Illustrated
oclc_num 1298202913
work_keys_str_mv AT stx119pkamaciej identifyingsecuritylogicsintheeupolicydiscoursethemigrationcrisisandtheeu
status_str n
ids_txt_mv (MiAaPQ)5006887015
(Au-PeEL)EBL6887015
(OCoLC)1298202913
carrierType_str_mv cr
hierarchy_parent_title IMISCOE Research Series
is_hierarchy_title Identifying Security Logics in the EU Policy Discourse : The Migration Crisis and the EU.
container_title IMISCOE Research Series
_version_ 1792331062150430720
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05722nam a22004093i 4500</leader><controlfield tag="001">5006887015</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073845.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2022 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030930356</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783030930349</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006887015</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6887015</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1298202913</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JV6001-9480</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">St&amp;#x119;pka, Maciej.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identifying Security Logics in the EU Policy Discourse :</subfield><subfield code="b">The Migration Crisis and the EU.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">{copy}2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (209 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">IMISCOE Research Series</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Identifying Security Logics in the EU Policy Discourse -- Acknowledgements -- Contents -- Chapter 1: Introduction -- 1.1 Introduction -- 1.2 Migration and&amp;#xA0;Security in&amp;#xA0;Academic Literature -- 1.3 Aims of&amp;#xA0;the&amp;#xA0;Book -- 1.4 Methods -- 1.5 Clarifying the&amp;#xA0;Scope and&amp;#xA0;Main Characteristics of&amp;#xA0;the&amp;#xA0;Book -- 1.6 Structure of&amp;#xA0;the&amp;#xA0;Book -- References -- Chapter 2: The Copenhagen School and&amp;#xA0;Beyond. A&amp;#xA0;Closer Look at&amp;#xA0;Securitisation Theory -- 2.1 Introduction -- 2.2 The Concept of&amp;#xA0;Securitisation -- 2.3 Securitisation and&amp;#xA0;the&amp;#xA0;Speech Act Approach -- 2.4 Securitisation the&amp;#xA0;Logic of&amp;#xA0;Exception -- 2.5 Securitisation and&amp;#xA0;the&amp;#xA0;Audience-Actor Interaction -- 2.6 Conclusion: Moving Forward with&amp;#xA0;Securitisation Theory -- References -- Chapter 3: Securitisation as&amp;#xA0;the&amp;#xA0;Work of&amp;#xA0;Framing -- 3.1 Introduction -- 3.2 Securitisation Beyond Speech Act -- 3.3 Securitisation Beyond Exceptionalism -- 3.3.1 Security Logics -- "Exceptionalist" Security Logic -- Risk (Management and&amp;#xA0;Resilience) -- Human Security -- 3.4 Securitisation Beyond the&amp;#xA0;Actor-Audience Dichotomy -- 3.5 Defining the&amp;#xA0;Process of&amp;#xA0;Acceptance -- 3.6 Including Context in&amp;#xA0;the&amp;#xA0;Securitisation Process -- 3.7 Conclusion: Key Points of&amp;#xA0;"Securitisation as&amp;#xA0;the&amp;#xA0;Work of&amp;#xA0;Framing" Approach -- References -- Chapter 4: EU Migration-Security Continuum. Investigating Security Frames Before the&amp;#xA0;"Migration Crisis" -- 4.1 Introduction -- 4.2 From Maastricht to&amp;#xA0;Lisbon. Tracing "Constitutional" Securitising Moves and&amp;#xA0;Security Frames -- 4.3 Schengen and&amp;#xA0;Border Control&amp;#xA0;- Building "Fortress Europe" -- 4.3.1 Frontex and&amp;#xA0;Protection of&amp;#xA0;the&amp;#xA0;EU Borders -- 4.4 Detention and&amp;#xA0;Deportation&amp;#xA0;- Reception and&amp;#xA0;Return -- 4.5 Migration and&amp;#xA0;Asylum Policies&amp;#xA0;- Between "Bogus Asylum Seekers" and&amp;#xA0;Irregular Migrants -- 4.5.1 Irregular Migration, Organised Crime and&amp;#xA0;Terrorism -- 4.6 Externalisation of&amp;#xA0;Migration Control. Securitisation Within the&amp;#xA0;Internal-External Security Nexus.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.7 Conclusion -- References -- Chapter 5: Analysing Diagnosis and&amp;#xA0;Evaluation of&amp;#xA0;the&amp;#xA0;"Migration Crisis" at&amp;#xA0;the&amp;#xA0;EU Level -- 5.1 Introduction -- 5.2 Human Security -- 5.2.1 Naming and&amp;#xA0;Categorising the&amp;#xA0;Humanitarian Features of&amp;#xA0;the&amp;#xA0;"Migration Crisis" -- 5.2.2 Conceptualising the&amp;#xA0;Push Factors and&amp;#xA0;Defining Threats -- 5.2.3 Defining the&amp;#xA0;Human Referent Object -- 5.2.4 Comments -- 5.3 Risk Management -- 5.3.1 Naming and&amp;#xA0;Categorising the&amp;#xA0;Risk-Oriented Features of&amp;#xA0;the&amp;#xA0;"Migration Crisis" -- 5.3.2 Defining Non-human Referent Objects -- 5.3.3 Conceptualising Risks -- 5.3.4 Comments -- 5.4 "Exceptionalist" Security -- 5.4.1 Human Security&amp;#xA0;- "Exceptionalist" Security -- 5.4.2 Risk Management&amp;#xA0;- "Exceptionalist" Security -- 5.4.3 Comments -- 5.5 Conclusion -- References -- Chapter 6: Analysing the&amp;#xA0;Conceptualisation of&amp;#xA0;Remedial Actions Towards the&amp;#xA0;"Migration Crisis" at the&amp;#xA0;EU Level -- 6.1 Introduction -- 6.2 Risk Management -- 6.2.1 The "Hotspot Approach" -- 6.2.2 Returns, Readmission and&amp;#xA0;Detention -- 6.2.3 Intelligence Cooperation, Surveillance and&amp;#xA0;Control -- 6.2.4 EU-Turkey Statement -- 6.2.5 Relocation and&amp;#xA0;Resettlement -- 6.2.6 Comments -- 6.3 Resilience -- 6.3.1 Reforming Common European Asylum System -- 6.3.2 European Union Trust Funds -- 6.3.3 EU Border, Capacity Building and&amp;#xA0;Assistance Missions -- 6.3.4 Comments -- 6.4 "Exceptionalist" Security -- 6.4.1 EUNAVFOR MED "Sophia" -- 6.4.2 Joint Border Operations -- 6.4.3 Comments -- 6.5 Conclusion -- References -- Chapter 7: Conclusions -- 7.1 Introduction -- 7.2 Revisiting Security Logics in&amp;#xA0;the&amp;#xA0;EU Frame-Narrative on&amp;#xA0;the&amp;#xA0;"Migration Crisis" -- 7.3 Reflecting on&amp;#xA0;Securitisation as&amp;#xA0;the&amp;#xA0;Work of&amp;#xA0;Framing -- 7.4 Final Reflections on&amp;#xA0;Risk and&amp;#xA0;Securitisation of&amp;#xA0;Migration in&amp;#xA0;the&amp;#xA0;EU -- References.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">St&amp;#x119;pka, Maciej</subfield><subfield code="t">Identifying Security Logics in the EU Policy Discourse</subfield><subfield code="d">Cham : Springer International Publishing AG,c2022</subfield><subfield code="z">9783030930349</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">IMISCOE Research Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6887015</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>