Security Threats and Public Perception pp 201-215

Part of the New Security Challenges book series (NSECH) | Cite as

Conclusions

  • Elizaveta Gaufman
Chapter

Abstract

The results of this research, due to its multidisciplinarian nature, offer relevant contributions to security studies, nationalism, sociology, media studies, gender studies, post-Soviet studies, and digital humanities in general. In any climate where fearmongering is ubiquitous and permeates everyday life, there is a heightened need to critically analyse narratives. This book engages in a similar process: by pointing out the constructed nature of threat narratives it creates a normative push to perceive the phenomena already accepted by the audience as existential threats in non-securitized terms.

References

  1. Balzacq, T., ed. 2011. Securitization Theory: How Security Problems Emerge and Dissolve. New York: Routledge.Google Scholar
  2. Burnham, P., K.G. Lutz, W. Grant, and Z. Layton-Henry. 2008. Research Methods in Politics. Basingstoke: Palgrave Macmillan.Google Scholar
  3. Christou, O., and C. Adamides. 2013. Energy Securitization and Desecuritization in the New Middle East. Security Dialogue 44(5–6): 507–522.CrossRefGoogle Scholar
  4. Diez, T. 2004. Europe’s Others and the Return of Geopolitics. Cambridge Review of International Affairs 17(2): 319–335.CrossRefGoogle Scholar
  5. Efal, A. 2007. Warburg’s “Pathos Formula” in Psychoanalytic and Benjaminian Con-texts. Assaph: Studies in Art History 5: 221–238.Google Scholar
  6. Fedor, J. 2013. Conclusion. In Memory, Conflict and New Media. Web Wars in Post-socialist States, ed. E. Rutten, J. Fedor, and V. Zvereva, 239–248. New York: Routledge.Google Scholar
  7. Floyd, R. 2011. Can Securitization Theory Be Used in Normative Analysis? Towards a Just Securitization Theory. Security Dialogue 42(4–5): 427–439.CrossRefGoogle Scholar
  8. Gunitsky, S. 2015. Corrupting the Cyber-Commons: Social Media as a Tool of Autocratic Stability. Perspectives on Politics 13(01): 42–54.CrossRefGoogle Scholar
  9. Hansen, L. 2006. Security as Practice: Discourse Analysis and the Bosnian War. Milton Park: Routledge.Google Scholar
  10. ———. 2011. Theorizing the Image for Security Studies. Visual Securitization and the Muhammad Cartoon Crisis. European Journal of International Relations 17(1): 51–74.CrossRefGoogle Scholar
  11. ———. 2015. How Images Make World Politics: International Icons and the Case of Abu Ghraib. Review of International Studies 41(02): 263–288.CrossRefGoogle Scholar
  12. Heck, A., and G. Schlag. 2013. Securitizing Images: The Female Body and the War in Afghanistan. European Journal of International Relations 19(4): 891–914.CrossRefGoogle Scholar
  13. Hutchings, S. and V. Tolz (2011). Spartacus Unchained: Russian Television Mediations of the December 2010 Race Riots and the Failed Discourse of Nation. Unpublished Manuscript.Google Scholar
  14. Huysmans, J. 2000. The European Union and Securitization of Migration. Journal of Common Market Studies 38(5): 751–777.CrossRefGoogle Scholar
  15. Ibrahim, M. 2005. The Securitization of Migration: A Racial Discourse. International migration 43(5): 163–187.CrossRefGoogle Scholar
  16. Kamusella, T. 2008. The Politics of Language and Nationalism in Modern Central Europe. Basingstoke: Palgrave Macmillan.Google Scholar
  17. Katzenstein, P.J., and R.O. Keohane. 2007. Anti-Americanisms in World Politics. Ithaca: Cornell University Press.Google Scholar
  18. Léonard, S., and C. Kaunert. 2010. Reconceptualizing the Audience in Securitization Theory. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq, 57–76. London: Routledge.Google Scholar
  19. Lupovici, A. 2014. Securitization Climax: Putting the Iranian Nuclear Project at the Top of the Israeli Public Agenda (2009–2012). Foreign Policy Analysis. doi:10.1111/fpa.12081.Google Scholar
  20. Milliken, J. 1999. The Study of Discourse in International Relations: A Critique of Research and Methods. European Journal of International Relations 5(2): 225–254.CrossRefGoogle Scholar
  21. Möller, F. 2013. Visual Peace: Images, Spectatorship, and the Politics of Violence. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
  22. Morozov, V. 2009a. Rossiya I Drugie. Identichnost I Granitsy Politicheskogo Soobshestva. Moscow: Novoe Literaturnoe Obozrenie.Google Scholar
  23. Moskovskiy Komsomolets. 2015, April 25. Devushek, tantsevavshikh u memoriala “Malaya zemlya”, arestovali na 15 sutok. http://www.mk.ru/social/2015/04/25/devushek-tancevavshikh-u-memoriala-malaya-zemlya-arestovali-na-15-sutok.html
  24. Nyman, J. 2013. Securitisation Theory. In Critical Approaches to Security: Theories and Method, ed. L. Shepherd. NY: Routledge.Google Scholar
  25. RIA-Novosti. 2015. Skandal vokrug opery “Tangeyzer” v Novosibirske. http://ria.ru/trend/tannhauser_novosibirsk_scandal_01042015/. Accessed 20 July 2015.
  26. Riabova, T., and O. Riabov. 2013. Gayropa’—gendernoe izmerenie obraza Yevropy v praktikah politicheskoi mobilizacii’, Zhenshina v rossiiskom obshestve, 3 (68).Google Scholar
  27. Riabova T., and O. Riabov. 2015. “Gayromaidan”: Gendered Aspects of the Hegemonic Russian Media Discourse on the Ukrainian Crisis. Journal of Soviet and Post-Soviet Politics and Society, № 1(1) . (Inaugural Special Issue on Russia Media & the War in Ukraine), 83–109.Google Scholar
  28. Sakwa, R. 2012. Conspiracy Narratives as a Mode of Engagement in International Politics: The Case of the 2008 Russo-Georgian War. The Russian Review 71(4): 581–609.CrossRefGoogle Scholar
  29. Salter, M.B. 2011. When Securitization Fails: The Hard Case of Counter-Terrorism Programs, 116–131. Securitization Theory: How Security Problems Emerge and Dissolve.Google Scholar
  30. Seddon, M. 2014, June 2. Documents Show How Russia’s Troll Army Hit America. BuzzFeed News. http://www.buzzfeed.com/maxseddon/documents-show-how-russias-troll-army-hit-america#.nxEvk1YVWZ. Accessed 21 September 2014.
  31. Sperling, V. 2015. Sex, Politics, and Putin: Political Legitimacy in Russia. Oxford: Oxford University Press.Google Scholar
  32. Stritzel, H. 2007. Towards a Theory of Securitization: Copenhagen and Beyond. European Journal of International Relations 13(3): 357–383.CrossRefGoogle Scholar
  33. Tétrault-Farber, G. 2015, March 22. Russian, European Far-Right Parties Converge in St. Petersburg. The Moscow Times. http://www.themoscowtimes.com/news/article/russian-european-far-right-parties-converge-in-st-petersburg/517839.html. Accessed 22 March 2015.
  34. Van Dijck, J. 2007. Mediated Memories in the Digital Age. Stanford: Stanford University Press.Google Scholar
  35. Verkhovsky, A. 2015. Aleksandr Verkhovskiy o dinamike napadeniy, sovershayemykh na pochve nenavisti. Informatsionno-analiticheskiy tsentr ‘Sova’. http://www.sova-center.ru/racism-xenophobia/publications/2015/06/d32294/. Accessed 20 July 2015.
  36. Vuori, J. 2008. Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-Democratic Political Orders. European Journal of International Relations 14(1): 65–99.CrossRefGoogle Scholar
  37. Warburg, A. 1939. A Lecture on Serpent Ritual. Journal of the Warburg Institute 2(4): 277–292.CrossRefGoogle Scholar
  38. Wilson, A. 2005. Virtual Politics: Faking Democracy in the Post-Socialist World. New Haven: Yale University Press.Google Scholar

Copyright information

© The Author(s) 2017

Authors and Affiliations

  • Elizaveta Gaufman
    • 1
  1. 1.University of TübingenTübingenGermany

Personalised recommendations