Defining Securitization, Enemy Images, and Memory

  • Elizaveta Gaufman


In this chapter I begin to examine three approaches to the study of threat narratives that are used in this book: securitization, enemy image research, and memory studies. Even though securitization provides the list of felicity conditions that are supposed to map out the success or failure of securitization as a process, it has a number of limitations with regard to the audience and analysis of threat narratives. Thus, securitization provides a detailed account of political processes but does not address the classification of threats, even though the latter is an intrinsic notion within the securitization framework.


  1. Abizadeh, A. 2005. Does Collective Identity Presuppose an Other? On the Alleged Incoherence of Global Solidarity. American Political Science Review 99(01): 45–60.CrossRefGoogle Scholar
  2. Abou Assi, E. 2010. Collective Memory and Management of the Past: The Entrepreneurs of Civil War Memory in Post-War Lebanon. International Social Science Journal 61(202): 399–409.CrossRefGoogle Scholar
  3. Adamides, C. 2009. The Cyprus Conflict: Evidence of Institutionalized Securitization. 5th hellenic observatory PhD symposium on contemporary Greece and Cyprus. London: London School of Economics and Political Science, June 25–26.Google Scholar
  4. Albrecht, S. 2006. Whose Voice is Heard in Online Deliberation? A Study of Participation and Representation in Political Debates on the Internet. Communication and Society 9: 62–82.CrossRefGoogle Scholar
  5. Allport, G. 1954. The Nature of Prejudice. Reading MA: Addison Wesley.Google Scholar
  6. Amodio, D., and M. Lieberman. 2009. Pictures in Our Heads: Contributions of FMRI to the Study of Prejudice and Stereotyping. In Handbook of Prejudice, Stereotyping and Discrimination, ed. Todd Nelson. New York: Psychology Press.Google Scholar
  7. Aradau, C. 2004. Security and the Democratic Scene: Desecuritization and Emancipation. Journal of International Relations and Development 7: 388–413.CrossRefGoogle Scholar
  8. Assmann, J. 1992. Das kulturelle Gedächtnis: Schrift, Erinnerung und politische Identität in frühen Hochkulturen. Munich: Beck.Google Scholar
  9. Assmann, A. 2006. Der Lange Schatten der Vergangenheit: Erinnerungskultur und Geschichtspolitik. Munich: Beck.Google Scholar
  10. ———. 2011. Cultural Memory and Western Civilization: Functions, Media, Archives. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  11. Balzacq, T. 2005. The Three Faces of Securitization: Political Agency, Audience and Context. European Journal of International Relations 11(2): 171–201.CrossRefGoogle Scholar
  12. ———. ed. 2011. Securitization Theory: How Security Problems Emerge and Dissolve. New York: Routledge.Google Scholar
  13. Baum, M. 2002. The Constituent Foundations of the Rally-Round-the-Flag Phenomenon. International Studies Quarterly 46(2): 263–298.CrossRefGoogle Scholar
  14. Bigo, D. 1994. The European Internal Security Field: Stakes and Rivalries in a Newly Developing Area of Police Intervention. In Policing Across National Boundaries, eds. M. Anderson and M. den Boer, 161–173. London/New York: Pinter.Google Scholar
  15. ———. 2001. The Möbius Ribbon of Internal and External Security(ies). In Identities, Borders, Orders: Rethinking International Relations Theory, eds. M. Albert, D. Jacobson, and Y. Lapid, 91–116. Minneapolis/London: University of Minnesota Press.Google Scholar
  16. Boellstorff, T. 2012. Rethinking Digital Anthropology. In Digital Anthropology, ed. Heather A. Horst, and Daniel Miller, 39–60. London: Berg.Google Scholar
  17. Boulding, K. 1959. National Images and International Systems. Journal of Conflict Resolution 3(2): 120–131.CrossRefGoogle Scholar
  18. Bourbeau, P. 2011. The Securitization of Migration: A Study of Movement and Order. London: Taylor & Francis.Google Scholar
  19. Brown, K. 2012. ‘What It Was Like to Live Through a Day’: Transitional Justice and the Memory of the Everyday in a Divided Society. International Journal of Transitional Justice. Special Issue: Transitional Justice and the Everyday 7(1): 444–466.CrossRefGoogle Scholar
  20. Burke, P. 1989. History as Social Memory. In Memory: History, Culture and the Mind (Wolfson College Lectures), ed. Thomas Butler. Oxford: Basil Blackwell.Google Scholar
  21. Buzan, B. 1993. Societal Security, State Security and Internationalisation. In Identity, Migration and the New Security Agenda in Europe, eds. O. Wæver, B. Buzan, M. Kelstrup, and P. Lemaitre. New York: St. Martin’s Press.Google Scholar
  22. Buzan, B., O. Wæver, and J. de Wilde. 1998. Security. A New Framework For Analysis. Boulder/London: Lynne Rienner.Google Scholar
  23. Campbell, D. 1998. Writing Security. Minnesota, MN: Minnesota University Press.Google Scholar
  24. Chapman, T., and D. Reiter. 2004. The United Nations Security Council and the Rally ’Round the Flag Effect. Journal of Conflict Resolution 48(6): 886–909.CrossRefGoogle Scholar
  25. Christiansen, B. 1959. Attitudes Toward Foreign Affairs as a Function of Personality. Oslo: Oslo University Press.Google Scholar
  26. Coleman, E.G. 2010. Ethnographic Approaches to Digital Media. Annual Review of Anthropology 39: 487–505.CrossRefGoogle Scholar
  27. Cull, N. 2008. The Cold Ear and the United States Information Agency. New York: Cambridge University Press.CrossRefGoogle Scholar
  28. Dean, M. 1999. Power and Rule in Modern Society. London: Sage.Google Scholar
  29. Delovoi Peterburg. 2014, October 28. Тrolli iz Ol’gino pereekhali v novyi chetyrekhetazhnyi ofis na Savushkina, Accessed 22 March 2015.
  30. DeRouen, K. Jr. 2000. Presidents and the Diversionary Use of Force: A Research Note. International Studies Quarterly 44(2): 317–328.CrossRefGoogle Scholar
  31. Diez, T. 2004. Europe’s Others and the Return of Geopolitics. Cambridge Review of International Affairs 17(2): 319–335.CrossRefGoogle Scholar
  32. ———. 2013. Not Quite “Sui Generis” Enough: Interrogating European Values. European Societies 14(4): 522–539.CrossRefGoogle Scholar
  33. Diez, T., S. Stetter, and M. Albert. 2006. The European Union and Border Conflicts: The Transformative Power of Integration. International Organization 60(3): 563–593.CrossRefGoogle Scholar
  34. Dovidio, J., K. Kawakami, C. Johnson, B. Johnson, and A. Howard. 1997. On the Nature of Prejudice: Automatic and Controlled processes. Journal of Experimental Social Psychology 69: 1013–1027.Google Scholar
  35. Duchkowitsch, W. 1990. Judenhetze als Journalistischer Industriezweig. In: Medien Und Zeit. Forum für historische Kommunikationsforschung, 5, Heft 4.Google Scholar
  36. Efal, A. (2007) Warburg’s “Pathos Formula” in Psychoanalytic and Benjaminian Con-texts. Assaph: Studies in Art History, 5: 221–238.Google Scholar
  37. Eriksson, J., and E. Noreen. 2002. Setting the Agenda of Threats: An Explanatory Model. Uppsala: Department of Peace and Conflict Research, Uppsala University.Google Scholar
  38. Erll, A., and A. Rigney. 2009. Mediation, Remediation, and the Dynamics of Cultural Memory. Berlin: Walter de Gruyter.CrossRefGoogle Scholar
  39. Etkind, A. 2009. Post-Soviet Hauntology: Cultural Memory of the Soviet Terror. Constellations 16(1): 182–200.CrossRefGoogle Scholar
  40. ———. 2013. Warped Mourning: Stories of the Undead in the Land of the Unburied. Stanford: Stanford University Press.Google Scholar
  41. Fako, E. 2012 Strategies of Desecuritization. MA Thesis at the Central European University, Budapest.Google Scholar
  42. Fauser, M. 2006 Transnational Migration–A National Security Risk? Securitization of Migration Policies in Germany, Spain and the United Kingdom (Reports and Analyses 2/06). Warsaw: Center for International Relations.Google Scholar
  43. Fendt, M., and M. Fanselow. 1999. The Neuroanatomical and Neurochemical Basis for Conditioned Fear. Neuroscience and Behavioural Reviews 23: 743–760.CrossRefGoogle Scholar
  44. Finlay, J., O. Holsti, and R. Fragen. 1967. Enemies in Politics. Chicago: Rand-McNally.Google Scholar
  45. Flohr, H. 1987. Biological Bases of Prejudice. International Political Science Review/Revue internationale de science politique 8(2):183–192. (Main Currents in Biopolitics).Google Scholar
  46. Foucault, M. 1980. The Confession of the Flesh. In Power/Knowledge: Selected Interviews and Other Writings, ed. C. Gordon, 194–228. Pantheon: New York, NY.Google Scholar
  47. Fowler, B. 2005. Collective Memory and Forgetting Components for a Study of Obituaries. Theory, Culture & Society 22(6): 53–72.CrossRefGoogle Scholar
  48. Frei, D. 1985. Feindbilder und Abrüstung. Die gegenseitige Einschätzung der UdSSR und der USA. München: Verlag C. H. Beck.Google Scholar
  49. Galli, F. (2008) The Legal and Political Implications of the Securitisation of Counter-Terrorism Measures across the Mediterranean. EuroMesco Paper 71.Google Scholar
  50. Garde-Hansen, J., A. Hoskins, and A. Reading, eds. 2009. Save As… Digital Memories. Basingstoke: PalgraveMacmillian.Google Scholar
  51. Gaufman, E. 2014. Blogging Nation: Russian Race Riots Online. Journal of Print and Media Technology research 3(2): 119–129.Google Scholar
  52. ———. 2015. Memory, Media and Securitization: Russian Media Framing of the Ukrainian Crisis. Journal of Soviet and Post-Soviet Politics and Society 1(1): 141–173.Google Scholar
  53. Gauntlett, D., and R. Horsley. 2004. Web Studies. London: Arnold.Google Scholar
  54. Gilman, S. 1993. The Jew’s body. New York: Routledge.Google Scholar
  55. Gilman, S.L. 1999. Making the Body Beautiful: A Cultural History of Aesthetic Surgery. Princeton: Princeton University Press.Google Scholar
  56. Gudkov, L. (2004) Ideologema «vraga»: «Vragi» kak massovyy sindrom i mekhanizm sotsiokul’turnoy integratsii. Obraz vraga. Moskva: OGI.Google Scholar
  57. ———. (2005). The fetters of victory: How the war provides Russia with its identity. Osteuropa Web Special.
  58. Guzzini, S. 2011. Securitization as a Causal Mechanism. Security Dialogue 42(4–5): 329–341.CrossRefGoogle Scholar
  59. Halbwachs, M. 1992. On Collective Memory (trans: Lewis Coser). Chicago: Chicago University Press.Google Scholar
  60. Hansen, L. 2006. Security as Practice: Discourse Analysis and the Bosnian War. Milton Park: Routledge.Google Scholar
  61. ———. 2011. Theorizing the Image for Security Studies. Visual Securitization and the Muhammad Cartoon Crisis. European Journal of International Relations 17(1): 51–74.CrossRefGoogle Scholar
  62. ———. 2015. How Images Make World Politics: International Icons and the Case of Abu Ghraib. Review of International Studies 41(02): 263–288.CrossRefGoogle Scholar
  63. Harris, L., and S. Fiske. 2006. Dehumanizing the Lowest of the Low: Neuroimaging Responses to Extreme Out-Groups. Psychological Science 17: 847–853.CrossRefGoogle Scholar
  64. Herrmann, R., and M. Fischerkeller. 1995. Beyond the Enemy Image and Spiral Model: Cognitive Strategic Research after the Cold War. International Organization 49(3): 415–450.CrossRefGoogle Scholar
  65. Hirsch, M. 2008. The Generation of Postmemory. Poetics Today 29(1): 103–128.CrossRefGoogle Scholar
  66. Holsti, O. 1986. The Belief System and National Images. In Psychology and the Prevention of Nuclear War, ed. R. White, 322–335. New York: New York University Press.Google Scholar
  67. Horst, H. A., and Miller, D. (Eds.). 2012. Digital anthropology. London: Berg.Google Scholar
  68. Hoskins, Andrew. 2009. Digital Network Memory. In Mediation, Remediation, and the Dynamics of Cultural Memory, eds. Astrid Erll and Ann Rigney, 91–106. Berlin: de Gruyter.Google Scholar
  69. Huysmans, J. 1998. Desecuritisation and the Aesthetics of Horror in Political Realism. Millennium 27(3): 569–589.CrossRefGoogle Scholar
  70. ———. 2000. The European Union and Securitization of Migration. Journal of Common Market Studies 38(5): 751–777.CrossRefGoogle Scholar
  71. ———. 2006. The Politics of Insecurity: Fear, Migration and Asylum in the Eu. Basingstoke: Routledge.Google Scholar
  72. Huyssen, A. 2003. Present Pasts: Urban Palimpsests and the Politics of Memory. Stanford: Stanford University Press.Google Scholar
  73. Ibrahim, M. 2005. The Securitization of Migration: A Racial Discourse. International migration 43(5): 163–187.CrossRefGoogle Scholar
  74. Jackson, R. 2007. Constructing Enemies: ‘Islamic Terrorism’. Political and Academic Discourse. Government and Opposition 42(3): 394–426.CrossRefGoogle Scholar
  75. Joffé, G. 2008. The European Union, Democracy and Counter-Terrorism in the Maghreb. JCMS: Journal of Common Market Studies 46(1): 147–171.Google Scholar
  76. Johnson, C.D. 2012. Memory, Metaphor, and Aby Warburg’s Atlas of images. Ithaca: Cornell University Press.CrossRefGoogle Scholar
  77. Kailitz S., and A. Umland (2010) Why the Fascists Won’t Take Over the Kremlin (for Now). A Comparison of Democracy’s Breakdown and Fascism’s Rise in Weimar Germany and Post-Soviet Russia: Working paper WP14/2010/02. Moscow: Publishing House of the University—Higher School of Economics.Google Scholar
  78. Karimova, A. (2012, February 13). Kremlevskaia blogodel’nia. Kommersant. Accessed 3 February 2013.
  79. Keen, S. 1991. Faces of the Enemy: Reflections of the Hostile Imagination. San Francisco: Harper.Google Scholar
  80. Kuhn, A. 2002. An Everyday Magic: Cinema and Cultural Memory. London: IB Tauris.Google Scholar
  81. Lawton, A. (1992). Kinoglasnost: Soviet Cinema in Our Time (No. 9). CUP Archive.Google Scholar
  82. Lee, J.R. 1977. Rallying Around the Flag: Foreign Policy Events and Presidential Popularity. Presidential Studies Quarterly 7(4): 252–256.Google Scholar
  83. Leggewie, C. (2009). Schlachtfeld Europa. Transnationale Erinnerung und europäische Identität. Blätter für Deutsche und Internationale Politik 2, 81–93.Google Scholar
  84. Leonard, S. (2011) FRONTEX and the Securitization of Migrants Through Practices. Paper presented at the Migration Working Group Seminar, European University Institute, Florence.Google Scholar
  85. Léonard, S., and C. Kaunert. 2011. Reconceptualizing the Audience in Securitization Theory. In Securitization Theory: How Security Problems Emerge and Dissolve, 57–76.Google Scholar
  86. Levitt, S.D., and J.A. List. 2009. Field Experiments in Economics: The Past, the Present, and the Future. European Economic Review 53(1): 1–18.CrossRefGoogle Scholar
  87. Levy, J.S. 1988. Domestic Politics and War. The Journal of Interdisciplinary History 18(4): 653–673. The Origin and Prevention of Major Wars CrossRefGoogle Scholar
  88. Liebermann, M., A. Hariri, J. Jarcho, N. Eisenberger, and S. Bookheimer. 2005. An fMRI Investigation of Race-Related Amygdala Activity in African-American and Caucasian-American Individuals. Nature Neuroscience 8: 720–722.CrossRefGoogle Scholar
  89. Lipsitz, G. 1991. Time Passages: Collective Memory and American Popular Culture. Minneapolis: University of Minnesota Press.Google Scholar
  90. Lißmann, H., H. Nicklas, and Ä. Ostermann. 1975. Feindbilder in Schulbüchern. In Friedensanalysen. Für Theorie und Praxis 1: Feindbilder, ed. HSFK, 37–62. Frankfurt a. M.: Suhrkamp.Google Scholar
  91. ———. 1976. Empirische Ideologiekritik als Beitrag zur Gesellschaftsanalyse. In Friedensanalysen. Für Theorie und Praxis 3, Schwerpunkt: Unterentwicklung, ed. HSFK, 186–196. Frankfurt a. M: Suhrkamp.Google Scholar
  92. Lorenzo-Dus, N., and S. Marsh. 2012. Bridging the Gap: Interdisciplinary Insights into the Securitization of Poverty. Discourse & Society 23(3): 274–296.CrossRefGoogle Scholar
  93. McDonald, M. 2008. Securitization and the Construction of Security. European Journal of International Relations 14(4): 563–587.CrossRefGoogle Scholar
  94. McSweeney, B. 1996. Identity and Security: Buzan and the Copenhagen School. Review of International Studies 22: 81–93.CrossRefGoogle Scholar
  95. Mikhaylova, L. (2012, March 3). Internet as a Battlefield in Russian Elections, The Examiner. Accessed 6 August 2014.
  96. Ministry of Communication. (2014). Glava Minkomsviazi Rossii vystupil na meropriatii vysokogo urovnia v ramkakh Genassamblei OON, RF Ministry of Communications and Mass Media official website. Accessed 11 August 2014.
  97. Mink, G., and L. Neumayer. 2007. L’Europe et ses passés douloureux. Paris: La Découverte.Google Scholar
  98. Moloney, K. 2006. Rethinking Public Relations: PR Propaganda and Democracy. New York: Routledge.Google Scholar
  99. Morozov, V. 2009. Obsessed with identity: The IR in Post-Soviet Russia. Journal of International Relations and Development 12(2): 200–205.CrossRefGoogle Scholar
  100. Morozov, V., and B. Rumelili. 2012. The External Constitution of European Identity: Russia and Turkey as Europe-Makers. Cooperation and Conflict 47(1): 28–48.CrossRefGoogle Scholar
  101. Nelson, T. 2009. Handbook of Prejudice, Stereotyping and Discrimination. New York: Psychology Press.Google Scholar
  102. Nicklas, Hans, Jörg Becker, Hans-Joachim Lißmann, and Änne Ostermann. 1978. Vorurteile und stereotype Muster in Schulbüchern (1975). In Vorurteil (Wege der Forschung), ed. Anitra Karsten (Hrsg.), 351–374. Darmstadt.Google Scholar
  103. Nicklas, H., and Ä. Ostermann. 1980. Vorurteil. In Handwörterbuch der Psychologie, eds. Roland Asanger and Gerd Wenninger. Beltz Verlag: Weinheim und Basel.Google Scholar
  104. Nora, P. 1989. Between Memory and History: Les Lieux de Mémoire. Representations, No. 26, Special Issue: Memory and Counter-Memory, pp. 7–24.Google Scholar
  105. Oneal, J., and A.L. Bryan. 1995. The Rally Around the Flag Effect in U.S. Foreign Policy Crises, 1950–1985. Political Behaviour 17(4): 379–401.CrossRefGoogle Scholar
  106. Ortega Breton, H. 2010. Feeling Persecuted? The Definitive Role of Paranoid Anxiety in the Constitution of “War on Terror” Television. In Discourses and Practices of Terrorism: Interrogating Terror, eds. B. Brecher, M. Devenney, and A. Winter, 93–94. Abingdon: Routledge Critical Terrorism Studies.Google Scholar
  107. Ostrom, T.M., S.L. Carpenter, C. Sedikides, and F. Li. 1993. Differential Processing of In-Group and Out-Group Information. Journal of Personality and Social Psychology 64(1): 21.CrossRefGoogle Scholar
  108. Pääbo, H. 2011. Potential of Collective Memory Based International Identity Conflicts in Post-Imperial Space Comparison of Russian Master Narrative with Estonian, Ukrainian and Georgian Master Narratives. Tartu: Tartu University Press.Google Scholar
  109. Plous, S. 2003. The Psychology of Prejudice, Stereotyping, and Discrimination. In Understanding Prejudice and Discrimination, ed. Scott Plous. New York: McGraw Hill.Google Scholar
  110. Plugotarenko, S. 2014. Glavnyi analiticheskii doklad agregiruiushchii informatsiiu po sostoianiiu razvitiia Runeta—po itogam proshedshego goda, Rossiiskii internet-forum 2014. Accessed 20 July 2015.
  111. Pollak, M. 1993. Une identité blessée. Paris: Métailié.Google Scholar
  112. Prozorov, S. 2011. The Other as Past and Present: Beyond the Logic of ‘Temporal Othering’ in IR Theory. Review of International Studies 37(03): 1273–1293.CrossRefGoogle Scholar
  113. Radio Svoboda. (2014, October 21). Karikatura dnia na Radio Svoboda. Accessed 15 December 2014.
  114. RFERL. (2015, April 4). Russian Trolls’ Vast Library of Insulting Images. Accessed 20 July 2015.
  115. Rieber, R., ed. 1991. The Psychology of War and Peace. The Image of the Enemy. NY and London: Plenum Press.Google Scholar
  116. Roe, P. 2008. Actor, Audience(s) and Emergency Measures: Securitization and the UK’s Decision to Invade Iraq. Security Dialogue 39(6): 615–635.CrossRefGoogle Scholar
  117. Rolston, B. 2010. ‘Trying to Reach the Future Through the Past’: Murals and Memory in Northern Ireland. Crime Media Culture 6(3): 285–307.CrossRefGoogle Scholar
  118. Rumelili, B. 2004. Constructing Identity and Relating to Difference: Understanding the EU’s Mode of Differentiation. Review of International Studies 30(01): 27–47.CrossRefGoogle Scholar
  119. Rutten, E., J. Fedor, and V. Zvereva, eds. 2013. Memory, Conflict and New Media. Web Wars in Post-Socialist States. New York: Routledge.Google Scholar
  120. Salter, M. B. 2011. When Securitization Fails: The Hard Case of Counter-Terrorism Programs. Securitization Theory: How Security Problems Emerge and Dissolve, 116–131. London and New York: Routledge.Google Scholar
  121. Satjukow, S. and R. Gries (Hrsg). 2004. Unsere Feinde. Konstruktion des anderen im Sozialismus. Leipzig: Leipziger Universitätsverlag GmBH.Google Scholar
  122. Schäfer, B. and B. Six. 1978. Sozialpsychologie der Vorurteils. Stuttgart: Kohlhammer, Urban Taschenbuch.Google Scholar
  123. Schrage, E. 2012. Von Ketzern und Terroristen? Zum analytischen Nutzen eines unterdisziplinären Feindbildbegriffs. In: Fürst, Alfons, Harutyun Harutyunyan, Eva-Maria Schrage, Verena Voigt (Hg.)(2012) Von Ketzern und Terroristen. Interdisziplinäre Studien zur Konstruktion und Rezeption von Feindbildern. Münster: Aschendorff Verlag.Google Scholar
  124. Senghaas, D. 1969. Abschreckung und Frieden. Studien zur Kritik organisierter Friedlosigkeit. Frankfurt am Main: Europäische Verlagsanstalt.Google Scholar
  125. ———. 1972. Zur Analyse von Drohpolitik in den internationalen Beziehungen. In Friedensforschung und Politische Praxis. Jahrbuch für Friedens- und Konfliktforschung, Band II, ed. Dieter Senghaas. Düsseldorf: Bertelsmann-Universitätsverlag.Google Scholar
  126. Silverstein, B. 1987. The Enemy Image. In Psychology Colloquium, Rutgers University, Newark, NJ (Vol. 16).Google Scholar
  127. ———. 1989. Enemy Images: The Psychology of US Attitudes and Cognitions Regarding Soviet the Union. American Psychologist 44(6): 903–913.CrossRefGoogle Scholar
  128. Sjöstedt, R. 2010. Talking Threats. The Social Construction of National Security in Russia and the United States. PhD diss., Uppsala University.Google Scholar
  129. Smirnov, S., A. Artem’ev and G. Tumanov, (2012) ‘Obvinit’ nas nikto ni v chem ne smozhet,, 8 February 2012. Accessed 3 February 2014.
  130. Smith, A. 1996. Diversionary Foreign Policy in Democratic Systems. International Studies Quarterly 40(1): 133–153.CrossRefGoogle Scholar
  131. Snyder, A. 1995. Warriors of Disinformation: American Propaganda, Soviet Lies and the Winning of the Cold War. New York: Arcade Publishing.Google Scholar
  132. Stangor, C. 2009. The Study of Stereotyping, Prejudice, and Discrimination Within Social Psychology. In Handbook of Prejudice, Stereotyping and Discrimination, ed. Todd Nelson. New York: Psychology Press.Google Scholar
  133. Stephan, W., L. Renfro, and M. Davis. 2008. The Role of Threat in Intergroup Relations. In Improving Intergroup Relations: Building on the Legacy of Thomas F. Pettigrew, eds. Ulrich Wagner, Linda Tropp, Gillian Finchilescu, and Colin Tredoux, 55–72. Malden, MA: Blackwell.CrossRefGoogle Scholar
  134. Stephan, W., O. Ybarra and K. Morrison. 2009. Intergroup Threat Theory. In: Nelson, Todd (2009) Handbook of Prejudice, Stereotyping and Discrimination. New York: Psychology Press.Google Scholar
  135. Stone, D., ed. 2004. The Historiography of the Holocaust. Basingstoke: Palgrave Macmillan.Google Scholar
  136. Taureck, R. 2006. Securitisation Theory and Securitisation Studies. Journal of International Relations and Development 9: 53–61.CrossRefGoogle Scholar
  137. Taylor, R. 1999. Singing on the Steppes for Stalin: Ivan Pyr’ev and the Kolkhoz Musical in Soviet Cinema. Slavic Review 58(1): 143–159.CrossRefGoogle Scholar
  138. Van Dijck, J. 2007. Mediated Memories in the Digital Age. Stanford: Stanford University Press.Google Scholar
  139. Vermeulen, P., S. Craps, R. Crownshaw, O. de Graef, A. Huyssen, V. Liska and D. Miller (2012) Dispersal and Redemption: The Future Dynamics of Memory Studies—A Roundtable. Memory Studies 5,2 (2012), 233-239.Google Scholar
  140. Vilmar, F. 1971. Systematischer Entwurf zur kritischen Friedensforschung. In: Senghaas, Dieter (Hrsg) Kritische Friedensforschung, Frankfurt a. M.: Edition Suhrkamp volume 478, 362–395.Google Scholar
  141. Vultee, F. 2011. Securitization as a Media Frame. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. T. Balzacq, 77–93. New York: Routledge.Google Scholar
  142. Vuori, J.A. 2014. Critical Security and Chinese Politics: The Anti-Falungong Campaign. New York: Routledge.Google Scholar
  143. Wæver, O. 2000. The EU as a Security Actor: Reflections from a Pessimistic Constructivist on Post-Sovereign Security Orders. In International Relations Theory and the Politics of European Integration: Power, Security, and Community, eds. Morten Kelstrup and Michael Williams, 250–294. London: Routledge.Google Scholar
  144. Wæver, O. 2003. Securitization: Taking Stock of a Research Programme. Unpublished manuscript.Google Scholar
  145. Wæver O. 2004 Aberystwyth, Paris, Copenhagen. New ‘Schools’ in Security Theory and Their Origins Between Core and Periphery. Paper presented at International Studies Association Annual Conference, Montreal, 17-20 March.Google Scholar
  146. Warburg, A. 1939. A Lecture on Serpent Ritual. Journal of the Warburg Institute 2(4): 277–292.CrossRefGoogle Scholar
  147. Weller, C. 2001. Feindbilder: Ansätze und Probleme ihrer Forschung. Bremen: InIIS-Arbeitspapier.Google Scholar
  148. Williams, M. 2003. Words, Images, Enemies: Securitization and International Politics. International Studies Quarterly 47(4): 511–531.CrossRefGoogle Scholar
  149. Winter, J. 2006. Remembering War: The Great War Between Memory and History in the 20th Century. New Haven: Yale University Press.Google Scholar
  150. Yuval-Davis, N. 1997. Women, Citizenship and Difference. Feminist Review: 4–27.Google Scholar
  151. Zhurzhenko, T. 2007. The Geopolitics of Memory. Eurozine Network.Google Scholar
  152. Zoll, R., E. Lippert, and T. Rössler. 1977. Bundeswehr und Gesellschaft, ein Wörterbuch, 90–94. Opladen: Westdeutscher Verlag.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2017

Authors and Affiliations

  • Elizaveta Gaufman
    • 1
  1. 1.University of TübingenTübingenGermany

Personalised recommendations