Securitization revisited : : contemporary applications and insights / / edited by Michael J. Butler.

This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuriti...

Full description

Saved in:
Bibliographic Details
Superior document:Routledge critical security studies series
:
TeilnehmendeR:
Place / Publishing House:Abingdon, Oxon : : Routledge,, 2020.
Year of Publication:2019
2020
Language:English
Series:Routledge critical security studies series.
Physical Description:1 online resource (247 pages).
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993541033204498
ctrlnum (CKB)4100000008780778
(MiAaPQ)EBC5840086
(OCoLC)1112073905
(OCoLC-P)1112073905
(FlBoTFG)9780429054648
(oapen)https://directory.doabooks.org/handle/20.500.12854/26945
(EXLCZ)994100000008780778
collection bib_alma
record_format marc
spelling Vuković, Siniša auth
Securitization revisited : contemporary applications and insights / edited by Michael J. Butler.
Taylor & Francis 2019
Abingdon, Oxon : Routledge, 2020.
1 online resource (247 pages).
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Routledge critical security studies series
Description based on print version record.
Includes bibliographical references and index.
This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization ‘works’ within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume – drawn from different disciplinary, ontological, and geographic ‘spaces’ – orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms. This volume will be of great interest to scholars of critical security studies, international security, and International Relations.
English
Security, International Case studies.
National security Case studies.
Conflict management Case studies.
empirical applications; Climate Change; Conflict Management; Copenhagen School; constructivism; desecuritization; gender-based violence; inter-state conflict; processes; securitization; securitization applications; terrorism
0-367-15037-9
Butler, Michael J., editor.
Routledge critical security studies series.
language English
format eBook
author Vuković, Siniša
spellingShingle Vuković, Siniša
Securitization revisited : contemporary applications and insights /
Routledge critical security studies series
author_facet Vuković, Siniša
Butler, Michael J.,
author_variant s v sv
author2 Butler, Michael J.,
author2_variant m j b mj mjb
author2_role TeilnehmendeR
author_sort Vuković, Siniša
title Securitization revisited : contemporary applications and insights /
title_sub contemporary applications and insights /
title_full Securitization revisited : contemporary applications and insights / edited by Michael J. Butler.
title_fullStr Securitization revisited : contemporary applications and insights / edited by Michael J. Butler.
title_full_unstemmed Securitization revisited : contemporary applications and insights / edited by Michael J. Butler.
title_auth Securitization revisited : contemporary applications and insights /
title_new Securitization revisited :
title_sort securitization revisited : contemporary applications and insights /
series Routledge critical security studies series
series2 Routledge critical security studies series
publisher Taylor & Francis
Routledge,
publishDate 2019
2020
physical 1 online resource (247 pages).
isbn 0-429-62012-8
0-429-05464-5
0-429-62227-9
0-367-15037-9
callnumber-first J - Political Science
callnumber-subject JZ - International Relations
callnumber-label JZ5588
callnumber-sort JZ 45588 S438 42020EB
genre_facet Case studies.
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 350 - Public administration & military science
dewey-ones 355 - Military science
dewey-full 355.0335
dewey-sort 3355.0335
dewey-raw 355.0335
dewey-search 355.0335
oclc_num 1112073905
work_keys_str_mv AT vukovicsinisa securitizationrevisitedcontemporaryapplicationsandinsights
AT butlermichaelj securitizationrevisitedcontemporaryapplicationsandinsights
status_str n
ids_txt_mv (CKB)4100000008780778
(MiAaPQ)EBC5840086
(OCoLC)1112073905
(OCoLC-P)1112073905
(FlBoTFG)9780429054648
(oapen)https://directory.doabooks.org/handle/20.500.12854/26945
(EXLCZ)994100000008780778
carrierType_str_mv cr
hierarchy_parent_title Routledge critical security studies series
is_hierarchy_title Securitization revisited : contemporary applications and insights /
container_title Routledge critical security studies series
author2_original_writing_str_mv noLinkedField
_version_ 1764992692382597120
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01967nam a2200505Ki 4500</leader><controlfield tag="001">993541033204498</controlfield><controlfield tag="005">20190820011912.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr un||||uuuuu</controlfield><controlfield tag="008">190812s2020 enk eo 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-62012-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-05464-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-62227-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780429054648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000008780778</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC5840086</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1112073905</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)1112073905</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(FlBoTFG)9780429054648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/26945</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000008780778</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OCoLC-P</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">OCoLC-P</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JZ5588</subfield><subfield code="b">.S438 2020eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="x">027000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">011000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">GTJ</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.0335</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vuković, Siniša</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Securitization revisited :</subfield><subfield code="b">contemporary applications and insights /</subfield><subfield code="c">edited by Michael J. Butler.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Taylor &amp; Francis</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Abingdon, Oxon :</subfield><subfield code="b">Routledge,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (247 pages).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Routledge critical security studies series</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization ‘works’ within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume – drawn from different disciplinary, ontological, and geographic ‘spaces’ – orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms. This volume will be of great interest to scholars of critical security studies, international security, and International Relations.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security, International</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Conflict management</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">empirical applications; Climate Change; Conflict Management; Copenhagen School; constructivism; desecuritization; gender-based violence; inter-state conflict; processes; securitization; securitization applications; terrorism</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-367-15037-9</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Butler, Michael J.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Routledge critical security studies series.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 19:40:01 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-08-10 22:08:00 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338973260004498&amp;Force_direct=true</subfield><subfield code="Z">5338973260004498</subfield><subfield code="8">5338973260004498</subfield></datafield></record></collection>