Securitization theory seeks to explain the politics through which (1) the security character of public problems is established, (2) the social commitments resulting from the collective acceptance that a phenomenon is a threat are fixed and (3) the possibility of a particular policy is created. In the last decade, research on securitization has grown significantly. The aim of this article is to evaluate the achievements of securitization theory. First, its main concepts and premises are critically discussed. This article then proceeds to examine the empirical applications of securitization theory to a broad range of issues, as well as the theoretical implications of these studies. Finally, it discusses the main challenges faced by securitiza...
Since securitization processes are agued to be able to create excessive power to actors, there are a...
This is the author accepted manuscript. The final version is available from Oxford University PressN...
Why does security require to be handled carefully? Can there be too much security? The scholars of t...
Securitization theory seeks to explain the politics through which (1) the security character of publ...
Securitization theory seeks to explain the politics through which: (i) the security character of pub...
© 2015, © The Author(s) 2015. Securitization theory seeks to explain the politics through which (1) ...
This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore,...
Theory of securitization is one of the most significant approaches to security in recent decades. It...
This volume aims to provide a new framework for the analysis of securitization processes, increasing...
This contribution to the symposium examines tensions holding back the development of securitization ...
This article addresses the normative dilemma located within the application of `securitization,’ as ...
One of the great appeals of securitization theory, and a major reason for its success, has been its ...
Those interested in the construction of security in contemporary international politics have increas...
This is the accepted author manuscript. The final version is available from Oxford University Press ...
While securitization studies have paid considerable attention to the moral value of desecuritization...
Since securitization processes are agued to be able to create excessive power to actors, there are a...
This is the author accepted manuscript. The final version is available from Oxford University PressN...
Why does security require to be handled carefully? Can there be too much security? The scholars of t...
Securitization theory seeks to explain the politics through which (1) the security character of publ...
Securitization theory seeks to explain the politics through which: (i) the security character of pub...
© 2015, © The Author(s) 2015. Securitization theory seeks to explain the politics through which (1) ...
This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore,...
Theory of securitization is one of the most significant approaches to security in recent decades. It...
This volume aims to provide a new framework for the analysis of securitization processes, increasing...
This contribution to the symposium examines tensions holding back the development of securitization ...
This article addresses the normative dilemma located within the application of `securitization,’ as ...
One of the great appeals of securitization theory, and a major reason for its success, has been its ...
Those interested in the construction of security in contemporary international politics have increas...
This is the accepted author manuscript. The final version is available from Oxford University Press ...
While securitization studies have paid considerable attention to the moral value of desecuritization...
Since securitization processes are agued to be able to create excessive power to actors, there are a...
This is the author accepted manuscript. The final version is available from Oxford University PressN...
Why does security require to be handled carefully? Can there be too much security? The scholars of t...