• Constantinos AdamidesEmail author
Part of the Rethinking Peace and Conflict Studies book series (RCS)


This chapter provides an overview of the mainstream reading of securitization and presents the main challenges and limitations of the theory. The chapter commences with a brief synopsis on how and why securitization is used by political and other elite, followed by the challenges raised against the theory, with particular attention on the under-explored role of the audience(s) and the under-focused importance of the social context in the emergence and perpetuation of securitization. The last part of the chapter provides a brief overview of the five sectors of the theory, namely the military, economic, societal, political and environmental sectors.


Securitization Speech acts Multiple audience Social context Securitization sectors 


  1. Alexseev, Mikhail. 2011. Societal Security, the Security Dilemma, and Extreme Anti-migrant Hostility in Russia. Journal of Peace Research 48 (4): 509–523.CrossRefGoogle Scholar
  2. Austin, John L. 1967. How to Do Things with Words. Cambridge: Harvard University Press.Google Scholar
  3. Balzacq, Thierry. 2005. The Three Faces of Securitization: Political Agency, Audience and Context. European Journal of International Relations 111 (2): 171–201.CrossRefGoogle Scholar
  4. Balzacq, Thierry. 2011. A Theory of Securitization: Origins, Core Assumptions, and Variants. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq. London: Routledge.Google Scholar
  5. Bigo, Didier. 2002. Security and Immigration: Towards a Critique of the Governmentality of Unease. Special Issue, Alternatives 27: 63–92.Google Scholar
  6. Bigo, Didier. 2005. Frontier Controls in the European Union: Who Is in Control? In Controlling Frontiers: Free Movement into and Within Europe, ed. Didier Bigo and Elspeth Guild. Aldershot: Ashgate.Google Scholar
  7. Bigo, Didier, and R.B.J. Walker. 2002. Security and Migration. Alternatives 27 (1): 63–92.CrossRefGoogle Scholar
  8. Booth, Ken. 1991. Security and Emancipation. Review of International Studies 17 (4): 313–326.CrossRefGoogle Scholar
  9. Buzan, Barry. 1991. People, States, and Fear: An Agenda for International Security Studies in the Post-cold Era. Boulder: Lynne Rienner Publishers.Google Scholar
  10. Buzan, Barry. 2006. Will the ‘Global War on Terrorism’ Be the New Cold War? International Affairs 82 (6): 1101–1118.CrossRefGoogle Scholar
  11. Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. London: Lynne Rienner Publishers.Google Scholar
  12. Floyd, Rita. 2007. Human Security and the Copenhagen School’s Securitization Approach: Conceptualizing Human Security as a Securitization Move. Human Security Journal 5 (Winter): 38–49.Google Scholar
  13. Hansen, Lene. 2000. The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the Copenhagen School. Millenium: Journal of International Studies 29(2): 285–306.Google Scholar
  14. Huysmans, Jef. 2006. The Politics of Insecurity: Fear, Migration and Asylum in the EU. New International Relations Series. London, UK: Routledge.Google Scholar
  15. Kanli Y. 2017. Migration Is a Killer for Turkish Cypriots. Hurriyet Daily News. Available at–110099. Accessed January 7, 2018.
  16. Leonard, Sarah, and Christian Kaunert. 2011. Reconceptualizing the Audience in Securitization Theory. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq. London: Routledge.Google Scholar
  17. Roe, Paul. 2008. Actor, Audience(s) and Emergency Measures: Securitization and the UK’s Decision to Invade Iraq. Security Dialogue 39 (6): 615–635.Google Scholar
  18. Salter, Mark B. 2008. Securitization and Desecuritization: A Dramaturgical Analysis of the Canadian Air Transport Security Authority. Journal of International Relations and Development 11: 321–349.CrossRefGoogle Scholar
  19. Salter, Mark B. 2011. When Securitization Fails: The Hard Case of Counter-Terrorism Programs. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq. London: Routledge.Google Scholar
  20. Stritzel, Holger. 2007. Towards a Theory of Securitization: Copenhagen and Beyond. European Journal of International Relations 13 (3): 357–383.CrossRefGoogle Scholar
  21. Vuori, Juha A. 2008. Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-democratic Political Orders. European Journal of International Relations 14 (1): 65–99.CrossRefGoogle Scholar
  22. Wæver, Ole. 1995. Identity, Integration and Security: Solving the Sovereign Puzzle in E.U. Studies. Journal of International Affairs 48 (2): 389–431.Google Scholar
  23. Wæver, Ole. 2011. Politics, Security, Theory. Security Dialogue 42 (4–5): 465–480.CrossRefGoogle Scholar
  24. Watson, S.D. 2012 ‘Framing’ the Copenhagen School: Integrating the Literature on Threat Construction. Millennium: Journal of International Studies 40 (2): 279–301.Google Scholar
  25. Williams, Michael C. 2003. Words, Images, Enemies: Securitization and International Politics. International Studies Quarterly 47 (4): 511–531.CrossRefGoogle Scholar
  26. Wishnick, Elizabeth. 2010. Dilemmas of Securitization and Health Risk Management in the People’s Republic of China: The Cases of SARS and Avian Influenza. Health Policy and Planning 25 (6): 454–466.CrossRefGoogle Scholar
  27. Wyn Jones, Richard. 1999. Security, Strategy and Critical Theory. Boulder: Lynne Rienner.Google Scholar

Copyright information

© The Author(s) 2020

Authors and Affiliations

  1. 1.University of NicosiaNicosiaCyprus

Personalised recommendations