Securitization revisited : : contemporary applications and insights / / edited by Michael J. Butler.
This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuriti...
Saved in:
Superior document: | Routledge critical security studies series |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Abingdon, Oxon : : Routledge,, 2020. |
Year of Publication: | 2019 2020 |
Language: | English |
Series: | Routledge critical security studies series.
|
Physical Description: | 1 online resource (247 pages). |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993541033204498 |
---|---|
ctrlnum |
(CKB)4100000008780778 (MiAaPQ)EBC5840086 (OCoLC)1112073905 (OCoLC-P)1112073905 (FlBoTFG)9780429054648 (oapen)https://directory.doabooks.org/handle/20.500.12854/26945 (EXLCZ)994100000008780778 |
collection |
bib_alma |
record_format |
marc |
spelling |
Vuković, Siniša auth Securitization revisited : contemporary applications and insights / edited by Michael J. Butler. Taylor & Francis 2019 Abingdon, Oxon : Routledge, 2020. 1 online resource (247 pages). text txt rdacontent computer c rdamedia online resource cr rdacarrier Routledge critical security studies series Description based on print version record. Includes bibliographical references and index. This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization ‘works’ within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume – drawn from different disciplinary, ontological, and geographic ‘spaces’ – orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms. This volume will be of great interest to scholars of critical security studies, international security, and International Relations. English Security, International Case studies. National security Case studies. Conflict management Case studies. empirical applications; Climate Change; Conflict Management; Copenhagen School; constructivism; desecuritization; gender-based violence; inter-state conflict; processes; securitization; securitization applications; terrorism 0-367-15037-9 Butler, Michael J., editor. Routledge critical security studies series. |
language |
English |
format |
eBook |
author |
Vuković, Siniša |
spellingShingle |
Vuković, Siniša Securitization revisited : contemporary applications and insights / Routledge critical security studies series |
author_facet |
Vuković, Siniša Butler, Michael J., |
author_variant |
s v sv |
author2 |
Butler, Michael J., |
author2_variant |
m j b mj mjb |
author2_role |
TeilnehmendeR |
author_sort |
Vuković, Siniša |
title |
Securitization revisited : contemporary applications and insights / |
title_sub |
contemporary applications and insights / |
title_full |
Securitization revisited : contemporary applications and insights / edited by Michael J. Butler. |
title_fullStr |
Securitization revisited : contemporary applications and insights / edited by Michael J. Butler. |
title_full_unstemmed |
Securitization revisited : contemporary applications and insights / edited by Michael J. Butler. |
title_auth |
Securitization revisited : contemporary applications and insights / |
title_new |
Securitization revisited : |
title_sort |
securitization revisited : contemporary applications and insights / |
series |
Routledge critical security studies series |
series2 |
Routledge critical security studies series |
publisher |
Taylor & Francis Routledge, |
publishDate |
2019 2020 |
physical |
1 online resource (247 pages). |
isbn |
0-429-62012-8 0-429-05464-5 0-429-62227-9 0-367-15037-9 |
callnumber-first |
J - Political Science |
callnumber-subject |
JZ - International Relations |
callnumber-label |
JZ5588 |
callnumber-sort |
JZ 45588 S438 42020EB |
genre_facet |
Case studies. |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
350 - Public administration & military science |
dewey-ones |
355 - Military science |
dewey-full |
355.0335 |
dewey-sort |
3355.0335 |
dewey-raw |
355.0335 |
dewey-search |
355.0335 |
oclc_num |
1112073905 |
work_keys_str_mv |
AT vukovicsinisa securitizationrevisitedcontemporaryapplicationsandinsights AT butlermichaelj securitizationrevisitedcontemporaryapplicationsandinsights |
status_str |
n |
ids_txt_mv |
(CKB)4100000008780778 (MiAaPQ)EBC5840086 (OCoLC)1112073905 (OCoLC-P)1112073905 (FlBoTFG)9780429054648 (oapen)https://directory.doabooks.org/handle/20.500.12854/26945 (EXLCZ)994100000008780778 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Routledge critical security studies series |
is_hierarchy_title |
Securitization revisited : contemporary applications and insights / |
container_title |
Routledge critical security studies series |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1764992692382597120 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01967nam a2200505Ki 4500</leader><controlfield tag="001">993541033204498</controlfield><controlfield tag="005">20190820011912.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr un||||uuuuu</controlfield><controlfield tag="008">190812s2020 enk eo 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-62012-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-05464-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-429-62227-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780429054648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000008780778</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC5840086</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1112073905</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC-P)1112073905</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(FlBoTFG)9780429054648</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/26945</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000008780778</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OCoLC-P</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">OCoLC-P</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JZ5588</subfield><subfield code="b">.S438 2020eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="x">027000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">011000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">GTJ</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.0335</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Vuković, Siniša</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Securitization revisited :</subfield><subfield code="b">contemporary applications and insights /</subfield><subfield code="c">edited by Michael J. Butler.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">Taylor & Francis</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Abingdon, Oxon :</subfield><subfield code="b">Routledge,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (247 pages).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Routledge critical security studies series</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization ‘works’ within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume – drawn from different disciplinary, ontological, and geographic ‘spaces’ – orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms. This volume will be of great interest to scholars of critical security studies, international security, and International Relations.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Security, International</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Conflict management</subfield><subfield code="v">Case studies.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">empirical applications; Climate Change; Conflict Management; Copenhagen School; constructivism; desecuritization; gender-based violence; inter-state conflict; processes; securitization; securitization applications; terrorism</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-367-15037-9</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Butler, Michael J.,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Routledge critical security studies series.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 19:40:01 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-08-10 22:08:00 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5338973260004498&Force_direct=true</subfield><subfield code="Z">5338973260004498</subfield><subfield code="8">5338973260004498</subfield></datafield></record></collection> |