Securitization theory (ST) makes an insightful and significant contribution to security studies. Through the use of discursive speech act, ST provides an innovative strategy for understanding the application of security’s distinctive character and dynamics to any issue in order to make it a security issue. Valuable as the theory is to security studies, the subaltern appear missing in existing securitization analyses. Even when the subaltern are examined, for instance in critiques of classical ST, they are conceived and presented as passive, lacking agency, voice, and power, and suffering from security silence problem. ST’s reliance on discursive speech act and focus on state political elite prevent it from capturing the subaltern and subalt...
Thesis (PhD (Leadership and Security Studies))--University of Pretoria, 2022.This study analyses the...
Copyright © 2015 SAGE PublicationsCritical analysis of security presents processes of securitization...
Securitization is arguably the most successful theoretical framework to analyse security beyond the ...
Security is one of the cardinal projects necessary for engendering an organized society and everybod...
This book analyses securitization processes outside of the West, with a focus on Africa. The aim...
Securitization theory seeks to explain the politics through which (1) the security character of publ...
This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore,...
Securitization theory seeks to explain the politics through which: (i) the security character of pub...
This study grounded within the discipline of conflict resolution in the field of intern...
This volume aims to provide a new framework for the analysis of securitization processes, increasing...
This contribution to the symposium examines tensions holding back the development of securitization ...
The issue of security has taken the front burner in Nigeria in particular and the world at large in ...
© 2015, © The Author(s) 2015. Securitization theory seeks to explain the politics through which (1) ...
This is the final version. Available on open access from the American Anthropological Association, S...
This article addresses the normative dilemma located within the application of `securitization,’ as ...
Thesis (PhD (Leadership and Security Studies))--University of Pretoria, 2022.This study analyses the...
Copyright © 2015 SAGE PublicationsCritical analysis of security presents processes of securitization...
Securitization is arguably the most successful theoretical framework to analyse security beyond the ...
Security is one of the cardinal projects necessary for engendering an organized society and everybod...
This book analyses securitization processes outside of the West, with a focus on Africa. The aim...
Securitization theory seeks to explain the politics through which (1) the security character of publ...
This book seeks to interrogate how contemporary policy issues become ‘securitized’ and, furthermore,...
Securitization theory seeks to explain the politics through which: (i) the security character of pub...
This study grounded within the discipline of conflict resolution in the field of intern...
This volume aims to provide a new framework for the analysis of securitization processes, increasing...
This contribution to the symposium examines tensions holding back the development of securitization ...
The issue of security has taken the front burner in Nigeria in particular and the world at large in ...
© 2015, © The Author(s) 2015. Securitization theory seeks to explain the politics through which (1) ...
This is the final version. Available on open access from the American Anthropological Association, S...
This article addresses the normative dilemma located within the application of `securitization,’ as ...
Thesis (PhD (Leadership and Security Studies))--University of Pretoria, 2022.This study analyses the...
Copyright © 2015 SAGE PublicationsCritical analysis of security presents processes of securitization...
Securitization is arguably the most successful theoretical framework to analyse security beyond the ...