Securitization and Discourse

Part of the SpringerBriefs in Environment, Security, Development and Peace book series (BRIEFSSECUR, volume 3)


Classical or realist security studies failed to foresee the end of the Cold War and to address new challenges. In the aftermath of the Cold War there was a widening of the narrow meta-theoretical assumptions of traditional security studies. The wide range of approaches in this field is often subsumed under Critical Security Studies. This field of study stresses the claim that threats are a product of the politics of representation. Only through the actions of security agencies is a potential threat transformed into a matter of security. By reifying the initially constructed security threat, it is understood as a given fact and seen to exist externally of the agencies that produced it. Critical Security Studies tries to dismantle the implicit assumptions by which threats to security are defined.


Security Threat Human Security Collective Understanding Security Study East Banker 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Abizadeh, Arash, 2005: “Does Collective Identity Presuppose an Other? On the Alleged Incoherence of Global Solidarity”, in: American Political Science Review, 99,1 (February): 45−60.Google Scholar
  2. Annan, Kofi, 2000a: Millenium Report: We the Peoples. The Role of the United Nations in the 21st century; at: <> (30 November 2011).
  3. Assmann, Jan, 1995: “Collective Memory and Cultural Identity”, in: New German Critique, 65: 125−133.Google Scholar
  4. Austin, John Langshaw, 2005: How to Do Things With Words (Cambridge MA: Harvard University Press).Google Scholar
  5. Baki, Aminuddin, 2009: Conceptualization of collective identity. Global Institute for Asian Regional Integration (GIARI) (Tokyo: Waseda University); at: < (25 November 2011).
  6. Balzacq, Thierry; Burgess, J. Peter, 2010: Securitization Theory: How Security Problems Emerge and Dissolve (New York: Routledge Chapman & Hall).Google Scholar
  7. Blunden, Andy, 2010: An Interdisciplinary Theory of Activity. Studies in Critical Social Sciences (Leiden: Brill Academic Publishing). Google Scholar
  8. Booth, Ken, 2005: Critical Security Studies and World Politics (Boulder, CO: Lynne Rienner Publishers).Google Scholar
  9. Brauch, Hans-Günter, 2006. Impact of Global Environmental Change on National, Environmental and Human Security in the Mediterranean Region by 2020 and 2050.Presentation at: NATO Collaborative Linkage Grant “Combating Desertification with Traditional Knowledge – A Contribution to Euro-Mediterranean Security”.Google Scholar
  10. Brown, Spencer, 1969: Laws of Form (London: Allen&Unwin).Google Scholar
  11. Buzan, Barry; Wæver, Ole; de Wilde, Jaap, 1997: Security: A New Framework for Analysis (Boulder: Lynne Rienner Publishers).Google Scholar
  12. Buzan, Barry; Wæver, Ole; de Wilde, Jaap, 1998: Security: A New Framework for Analysis (Boulder: Lynne Rienner Publishers).Google Scholar
  13. Buzan, Barry, 2004: From International to World Society?: English School Theory and the Social Structure of Globalisation (Cambridge: Cambridge University Press).Google Scholar
  14. Buzan, Barry; Wæver, Ole, 2009: “Macrosecuritisation and security constellations: reconsidering scale in securitisation theory”, in: Review of International Studies, 35,2: 253−276.Google Scholar
  15. Chourou, Bechir, 2005: Promoting Human Security: Ethical, Normative and Educational Frame-works in the Arab States. United Nations Educational, Scientific and Cultural Organi-zation (Paris: UNESCO); at: <> (3 November 2011).
  16. Ciută, Felix, 2004: Security from Concept to Context to Policy. (Standing Group on International Relations: Brussels).Google Scholar
  17. Fairclough, Norman; Holes, Clive, 1999: Critical Discourse Analysis: The Critical Study of Language. 2nd edition. (London: Longman).Google Scholar
  18. Foucault, Michel, 2002: Archäologie des Wissens (Frankfurt a/M.: Suhrkamp Verlag). Google Scholar
  19. Fuchs, Peter, 2004: Niklas Luhmannbeobachtet (Wiesbaden: Verlag für Sozialwissenschaften).Google Scholar
  20. Gee, James Paul, 2005: An Introduction to Discourse Analysis: Theory and Method (London: Routledge).Google Scholar
  21. Goff, Patricia M.; Dunn, Kevin C., 2004: Identity and Global Politics: Theoretical and Empirical Elaborations (New York – Houndsmill – Basingstoke – Hampshire: Palgrave MacMillan).Google Scholar
  22. Hansen, Lene, 2006: Security as Practice: Discourse Analysis and the Bosnian War (London: Taylor & Francis).Google Scholar
  23. Hintermeier, Stefan, 2005: “Reconceptualisation of External Security in the European Union after 1990”, first draft, to be published in: Brauch, Hans Günter; Grin, John; Mesjasz, Czeslaw; Dunay, Pal; Behera, Navnita; Chourou, Béchir; Oswald Spring, Ursula; Liotta, P. H. ; Kameri-Mbote, Patricia (Eds.), 2006: Globalisation and Environmental Challenges: Reconceptualising Security in the 21st Century (Berlin–Heidelberg–New York–Hong Kong–London–Milan–Paris–Tokyo. Springer–Verlag).Google Scholar
  24. Jäger, Siegfried, 2006: “Diskurs und Wissen. Theoretische und methodische Aspekte einer kritischen Diskurs- und Dispositivanalyse”, in: Keller, Reiner; Hirselnad, Andreas; Schneider, Werner; Vierhöver, Willy (Eds.): Handbuch Sozialwissenschaftliche Diskursanalyse. Theorien und Methoden (Wiesba-den: VS Verlag für Sozialwissenschaften): 83−114.Google Scholar
  25. Jäger, Siegfried; Maier, Florentine, 2009: “Theoretical and methodological aspects of Foucauldian discourse analysis and dispositive analysis”, in: Wodak, Ruth; Meyer, Michael (Eds.): Methods of Critical Discourse Analysis. (Introducing Qualitative Methods) (London: Sage): 34−62.Google Scholar
  26. Jenkins, Richard, 2008: Social Identity: Key Ideas (New York: Routledge – Chapman & Hall).Google Scholar
  27. Katz, Steven T., 1993: Historicism, the Holocaust, and Zionism: Critical Studies in Modern Jewish Thought and History: Critical Studies in Contemporary Jewish History and Thought (New York: New York University Press).Google Scholar
  28. King, Gary; Murray, Christopher J.L., 2002: “Rethinking Human Security”, in: Political Science. Quarterly, 116,4 (Winter): 585−610.Google Scholar
  29. Lapid, Yosef; Kratochwil, Friedrich, 1996: The Return of Culture and Identity in IR Theory (Boulder CO: Lynne Rienner).Google Scholar
  30. Leontjew, A. N., 1978: Activity, Consciousness and Personality (Upper Saddle River- Prentice Hall).Google Scholar
  31. Miller, David, 1989: “In what Sense Must Socialism Be Communitarian?”, in: Social Philosophy & Policy, 6,2 (Spring): 51−73.Google Scholar
  32. Neumann, I. B., 1998: “Identity and the Outbreak of War: or Why the Copenhagen School of Security Studies Should Include the Idea of ‘Violization’ in its Framework of Analysis”, in: International Journal of Peace Studies, 3,1 (January): 1−10.Google Scholar
  33. Owen, Taylor, 2004: “Human security – conflict, critique and consensus: Colloquium remarks and a proposal for a threshold-based definition”, in: Security Dialogue, 35,3 (September): 373−387.Google Scholar
  34. PCBS [Palestinian Central Bureau of Statistics], 2009: “Press Release on the Palestinians in the World”; at: <> (3 December 2011).
  35. Sa’Di, Ahmad H.; Abu-Lughod, Lila, 2007: Nakba: Palestine, 1948, and the Claims of Memory (New York: Columbia University Press).Google Scholar
  36. Shapiro, Michael J., 2005: “Every Move You Make: Bodies, Surveillance, and Media”, in: Social Text, 23,2 (Summer): 21−34.Google Scholar
  37. Shlaim, Avi, 2007: Lion of Jordan; The Life of King Hussein in War and Peace (London: Allen Lane). Google Scholar
  38. Stryker, Sheldon; Owens, Timothy J.; White, Robert, 2000: Self, Identity, and Social Movements (Minneapolis: University of Minnesota Press.Google Scholar
  39. UNDP, 2002: Arab Human Development Report 2002: Creating Opportunities for Future Generations (New York: United Nations Publications).Google Scholar
  40. Wæver, Ole, 1995: “Securitization and Desecuritization”, in: Lipschutz, Ronnie D. (Ed.): On Security (New York: Columbia University Press): 46−86.Google Scholar
  41. Wæver, Ole, 1996: “European Security Identities”, in: Journal of Common Market Studies, 34,1 (March): 103–32. Google Scholar
  42. Wæver, Ole, 2000. European Security Identities 2000. European Security Identities: Contested Understandings of EU and NATO. (PRIO: Oslo).Google Scholar
  43. Wæver, Ole, 2006. Critical approaches to security in Europe: A networked manifesto. In:Security Dialogue, 37, pp. 443–487.Google Scholar
  44. Wæver, Ole, 2007: “Peace and Security: Two Evolving Concepts and Their Changing Relationship”. In: Brauch, Hans Günter; Oswald Spring, Ursula; Mesjasz, Czeslaw; Grin, John; Dunay, Pal; Behera, Navnita Chadha; Chourou, Béchir; Kameri-Mbote, Patricia; Liotta, P.H. (Eds.): Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century. Hexagon Series on Human and Environmental Security and Peace (Berlin–Heidelberg–New York: Springer): 99–111.Google Scholar
  45. Warner, Jeroen F., 2000: “Plugging the GAP - Working with Buzan: the Ilisu Dam as a Security Issue”; at: <> (18 November 2011).
  46. Wendt, Alexander, 1992: “Anarchy is What States Make of It: The Social Construction of Power Politics”, in: International Organization, 46,2 (Spring): 391−425.Google Scholar
  47. Williams, Michael C., 2003: “Words, Images, Enemies: Securitization and International Politics”, in: International Studies Quarterly, 47,4 (December): 511−531.Google Scholar
  48. Wodak, Ruth; Meyer, Michael, 2009: Methods of Critical Discourse Analysis. Introducing Qualitative Methods. (London: Sage).Google Scholar
  49. Zeitoun, Mark, 2006: Palestinian-Israeli water: secure or violated? Securitization, Opportunization and Violation along the Jordan River (Jerusalem: Israel; Palestine Centre for Research and Information); at: <> (7 December 2011).

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Weisenheim am BergGermany

Personalised recommendations