Introduction

  • Elizaveta Gaufman
Chapter

Abstract

The Ukraine crisis amplified a number of existing threat narratives and put them back on the agenda, despite the absence of Russia’s own ‘Maidan’, i.e. Russia’s own mass scale movement that led to a regime change. Thus, this book focuses on the time period between 2011 and 2015, covering the discursive struggles around electoral protests, resurgent anti-Americanism with its adoption ban and foreign agents legislation, Pussy Riot trial, debates on sexuality, the fascism discourse in relation to the Ukraine crisis and anti-migration narratives. This book is the first study of this scale to investigate the conditions for the success and failure of securitization narratives using social network data and problematizing the notion of audience and embeddedness of the securitization discourse.

References

  1. Assmann, A. 2011. Cultural Memory and Western Civilization: Functions, Media, Archives. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  2. Balzacq, T., ed. 2011. Securitization Theory: How Security Problems Emerge and Dissolve. New York: Routledge.Google Scholar
  3. Bode, N., and A. Makarychev. 2013. The New Social Media in Russia: Political Blogging by the Government and the Opposition. Problems of Post-Communism 60(2): 53–62.CrossRefGoogle Scholar
  4. Bourbeau, P. 2011. The Securitization of Migration: A Study of Movement and Order. London: Taylor & Francis.Google Scholar
  5. Buzan, B. 1983. People, States and Fear: The National Security Problem in International Relations. Colchester: ECPR Press.Google Scholar
  6. ———. 1993. Societal Security, State Security and Internationalisation. In Identity, Migration and the New Security Agenda in Europe, eds. O. Wæver, B. Buzan, M. Kelstrup, and P. Lemaitre. New York: St. Martin’s Press.Google Scholar
  7. Buzan, B., O. Wæver, and J. de Wilde. 1998. Security. A New Framework for Analysis. Lynne Rienner: Boulder/London.Google Scholar
  8. Cameron, F., and S. Kenderdine. 2007. Theorizing Digital Cultural Heritage: A Critical Discourse (Media in Transition). Cambridge: MIT Press.CrossRefGoogle Scholar
  9. Eriksson, J., and E. Noreen. 2002. Setting the Agenda of Threats: An Explanatory Model. Uppsala: Department of Peace and Conflict Research, Uppsala University.Google Scholar
  10. Garde-Hansen, J., A. Hoskins, and A. Reading, eds. 2009. Save As… Digital Memories. Basingstoke: PalgraveMacmillian.Google Scholar
  11. Gaufman, E. 2015. Memory, Media and Securitization: Russian Media Framing of the Ukrainian Crisis. Journal of Soviet and Post—Soviet Politics and Society 1(1): 141–173.Google Scholar
  12. Gudkov, L. (2005). The Fetters of Victory: How the War Provides Russia with Its Identity. Osteuropa Web Special. http://www.osteuropa.dgo-online.org/hefte/international/eurozine-en/the-fetters-of-victory/
  13. Gunitsky, S. 2015. Corrupting the Cyber-Commons: Social Media as a Tool of Autocratic Stability. Perspectives on Politics 13(01): 42–54.CrossRefGoogle Scholar
  14. Halbwachs, M. (1992) On Collective Memory. Trans. Lewis Coser. Chicago: Chicago University Press.Google Scholar
  15. Hansen, Lene. 2011. Theorizing the Image for Security Studies. Visual Securitization and the Muhammad Cartoon Crisis. European Journal of International Relations 17(1): 51–74.CrossRefGoogle Scholar
  16. Hansen, L. 2015. How Images Make World Politics: International Icons and the Case of Abu Ghraib. Review of International Studies 41(02): 263–288.CrossRefGoogle Scholar
  17. Heck, A., and G. Schlag. 2013. Securitizing Images: The Female Body and the War in Afghanistan. European Journal of International Relations 19(4): 891–914.CrossRefGoogle Scholar
  18. Hopf, T. 2002. Social Construction of International Politics. Identities and Foreign Policies: Moscow, 1955 and 1999. London and Ithaca: Cornell University Press.Google Scholar
  19. Hopf, T. 2012. Reconstructing the Cold War. The Early Years 1945–1958. New York: Oxford University Press.CrossRefGoogle Scholar
  20. Kalay, Y., T. Kvan, and J. Affleck, eds. 2007. New Heritage: New Media and Cultural Heritage. New York: Routledge.Google Scholar
  21. Karimova, A. 2012, February 13. Kremlevskaia blogodel’nia. Kommersant. http://www.kommersant.ru/doc/1868022. Accessed 3 February 2013.
  22. Laclau, E. 2000. Structure, History, and the Political. In Contingency, Hegemony, Universality: Contemporary Dialogues on the Left, eds. J. Butler, E. Laclau, and S. Žižek. New York: Verso.Google Scholar
  23. Laruelle, M. 2015. The Three Colors of Novorossiya, or the Russian Nationalist Mythmaking of the Ukrainian Crisis. Post-Soviet Affairs, (ahead-of-print), 1–20.Google Scholar
  24. Léonard, S., and C. Kaunert. 2010. Reconceptualizing the Audience in Securitization Theory. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. T. Balzacq, 57–76. London: Routledge.Google Scholar
  25. Levada. 2013. Ustanovki rossiyan i ugrozy strane. http://www.levada.ru/11-07-2013/ustanovki-rossiyan-i-ugrozy-strane. Accessed 3 February 2014.
  26. Levada. 2014. Natsionalism, Ksenofobia, Migratsia. http://www.levada.ru/2014/08/26/natsionalizm-ksenofobiya-i-migratsiya/. Accessed 20 June 2015.
  27. ———. 2015. Ukrainskii Krizis. http://www.levada.ru/05-05-2015/ukrainskii krizis. Accessed 20 June 2015.
  28. Levitt, S.D., and J.A. List. 2009. Field Experiments in Economics: The Past, the Present, and the Future. European Economic Review 53(1): 1–18.CrossRefGoogle Scholar
  29. Mälksoo, M. 2015. ‘Memory Must Be Defended’: Beyond the Politics of Mnemonical Security. Security Dialogue 46(3): 221–237.CrossRefGoogle Scholar
  30. Mearsheimer, J.J. 2014. Why the Ukraine Crisis Is the West’s Fault. Foreign Affairs 93(5): 77–89.Google Scholar
  31. Meduza. 2015, July 3. «Derzkikh planov mnogo. Malo vremeni» Interv’yu direktora biblioteki inostrannoy literatury Yekateriny Geniyevoy. https://meduza.io/feature/2015/07/03/derzkih-planov-mnogo-malo-vremeni. Accessed 22 July 2015.
  32. Morozov, V. 2009. Rossiya I Drugie. Identichnost I Granitsy Politicheskogo Soobshestva. Moscow: Novoe Literaturnoe Obozrenie.Google Scholar
  33. ———. 2013. Subaltern Empire? Toward a Postcolonial Approach to Russian Foreign Policy. Problems of Post-Communism 60(6): 16–28.CrossRefGoogle Scholar
  34. Nemtsova, A. 2015. Putin’s Witch Hunt Targets ‘Foreign Agents’ and Intellectuals. The Daily Beast. http://www.thedailybeast.com/articles/2015/07/09/putin-s-witch-hunt-targets-foreign-agents-and-intellectuals.html. Accessed 20 July 2015.
  35. Oushakine, S.A. 2013. Remembering in Public: On the Affective Management of History. Ab Imperio 2013(1): 269–302.CrossRefGoogle Scholar
  36. Plugotarenko, S. 2014. Glavnyi analiticheskii doklad agregiruiushchii informatsiiu po sostoianiiu razvitiia Runeta—po itogam proshedshego goda, Rossiiskii internet-forum 2014. http://www.slideshare.net/Dimanius/2014-rif-2014. Accessed 20 July 2015.
  37. Rutten, E., J. Fedor, and V. Zvereva, eds. 2013. Memory, Conflict and New Media. Web Wars in Post-socialist States. New York: Routledge.Google Scholar
  38. Satjukow, S. and R. Gries (Hrsg). 2004. Unsere Feinde. Konstruktion des anderen im Sozialismus. Leipzig: Leipziger Universitätsverlag GmBH.Google Scholar
  39. Sharafutdinova, G. 2014. The Pussy Riot Affair and Putin’s Démarche from Sovereign Democracy to Sovereign Morality. Nationalities Papers 42(4): 615–621.CrossRefGoogle Scholar
  40. Sjoberg, L. 2015. Intimacy, Warfare, and Gender Hierarchy. Political Geography 44: 74–76.CrossRefGoogle Scholar
  41. Stritzel, H. 2007. Towards a Theory of Securitization: Copenhagen and Beyond. European Journal of International Relations 13(3): 357–383.CrossRefGoogle Scholar
  42. ———. 2014. Security in Translation: Securitization Theory and the Localization of Threat. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
  43. TNS. 2013. Auditoriya Interneta v Rossii 2013. RIF+KIB 2013. http://www.slideshare.net/dmitriyisaev/rif13-17aprs0tagiev130423023826phpapp02. Accessed 22 March 2014.
  44. Van Dijck, J. 2007. Mediated Memories in the Digital Age. Stanford: Stanford University Press.Google Scholar
  45. Volkov, D., and S. Goncharov. 2014. Rossiiski media-landshaft: televidenie, press, Internet, Analiticheskii Tsentr Yuriia Levady. http://www.levada.ru/17-06-2014/rossiiskii-media-landshaft-televidenie-pressa-internet. Accessed 21 September 2014.
  46. Vuori, J. 2008. Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-democratic Political Orders. European Journal of International Relations 14(1): 65–99.CrossRefGoogle Scholar
  47. Vuori, J.A. 2014. Critical Security and Chinese Politics: The Anti-Falungong Campaign. New York: Routledge.Google Scholar
  48. Walt, Stephen. 2015. Why Arming Kiev Is a Really, Really Bad Idea. Foreign Policy. http://foreignpolicy.com/2015/02/09/how-not-to-save-ukraine-arming-kiev-is-a-bad-idea/. Accessed 20 July 2015.
  49. Weller, C. 2001. Feindbilder: Ansätze und Probleme ihrer Forschung. Bremen: InIIS-Arbeitspapier.Google Scholar
  50. Winter, J. 2006. Remembering War: The Great War Between Memory and History in the 20th Century. New Haven: Yale University Press.Google Scholar

Copyright information

© The Author(s) 2017

Authors and Affiliations

  • Elizaveta Gaufman
    • 1
  1. 1.University of TübingenTübingenGermany

Personalised recommendations