Skip to main content

Security: A Revised Framework for Analysis

  • Chapter
HIV/AIDS in China and India
  • 183 Accesses

Abstract

What is security? The Oxford English Dictionary defines it as “the condition of being secure”; “freedom from doubt; confidence, assurance”; “freedom from care, anxiety or apprehension; [and] a feeling of safety or freedom from, or absence of, danger.”1 Simply put, security involves (1) describing the physical condition of being protected from, or not exposed to danger, and (2) delineating the psychological condition of feeling secure. These definitions relate to the general meaning of security, but are different from the concept used by IR theorists and experts when referring to national security or security policies.2

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. Ole Wæver, “Securitization and Desecuritization,” in On Security, ed. Ronnie D. Lipschutz (New York: Columbia University Press, 1995), 50.

    Google Scholar 

  2. Barry Buzan, People, States & Fear: An Agenda for International Security Studies in the Post-Cold War Era (Boulder, CO: Lynne Rienner Great Britain: Hartnolls, 1991), 3–4.

    Google Scholar 

  3. See David Chandler, “Review Essay: Human Security: The Dog That Didn’t Bark,” Security Dialogue 39, no. 4 (2008): 427–438.

    Article  Google Scholar 

  4. Michael J. Selgelid and Christian Enemark, “Infectious Diseases, Security and Ethics: The Case of HIV/AIDS,” Bioethics 22, no. 9 (2008): 458.

    Google Scholar 

  5. Daniel Deudney, “The Case against Linking Environmental Degradation and National Security,” Millennium Journal of International Studies 19, no. 3 (1990): 464.

    Article  Google Scholar 

  6. Jef Huysmans, “Revisiting Copenhagen: Or, on the Creative Development of a Security Studies Agenda in Europe,” European Journal of International Relations 4, no. 4 (1998): 491.

    Article  Google Scholar 

  7. Stephen M. Walt, “The Renaissance of Security Studies,” International Studies Quarterly 35, no. 2 (1991): 213.

    Google Scholar 

  8. Richard H. Ullman, “Redefining Security,” International Security 8, no. 1 (1983): 135.

    Google Scholar 

  9. Ullman A, “Redefining Security,” 139; Jessica Tuchman Mathews, “Redefining Security,” Foreign Affairs 68, no. 2 (1989): 162.

    Article  Google Scholar 

  10. Edward Newman, “Human Security and Constructivism,” International Studies Perspectives 2, no. 3 (2001): 241; Chandler, “Review Essay,” 427.

    Article  Google Scholar 

  11. Laura Neack, Elusive Security: States First, People Last (New York: Rowman & Littlefield. 2007), 220.

    Google Scholar 

  12. Astri Suhrke, “Human Security and the Interests of States,” Security Dialogue 30, no. 3 (1999): 275;

    Article  Google Scholar 

  13. Mely Caballero-Anthony, “Human Security and Primary Health Care in Asia: Realities and Challenges,” in Global Health Challenges for Human Security, ed. Lincoln C. Chen, Jennifer Leaning, and Vasant Narasimhan (Cambridge, MA: Global Equity Initiative, Asia Center, Harvard University, 2003), 235;

    Google Scholar 

  14. Nicholas Thomas and William T. Tow, “The Utility of Human Security: Sovereignty and Humanitarian Intervention,” Security Dialogue 33, no. 2 (2002): 177;

    Article  Google Scholar 

  15. Chandler, “Review Essay,” 428; Edward Newman, “Critical Human Security Studies,” Review of International Studies 36, no. 1 (2010): 91.

    Google Scholar 

  16. Ole Wæver, “Aberystwyth, Paris, Copenhagen: New ‘Schools’ in Security Theory and Their Origins between Core and Periphery” (paper presented at the annual meeting for the International Studies Association, Montreal, March 17–20, 2004).

    Google Scholar 

  17. Ole Wæver, “Security, Insecurity and Asecurity in the West European Non-War Community,” in Security Communities, eds. Emanuel Adler, and Michael N. Barnett (Cambridge: Cambridge University Press, 1998), 79.

    Google Scholar 

  18. Barry Buzan, Ole Wæver, and Jaap de Wilde, Security: A New Framework for Analysis (Boulder, CO: Lynne Rienner, 1998), 31; Wæver, “Securitization,” 12.

    Google Scholar 

  19. Ole Wæver, “The EU as a Security Actor: Reflections from a Pessimistic Constructivist on Post-Sovereign Security Orders,” in International Relations Theory and the Politics of European Integration, ed. Morten Kelstrup and Michael C. Williams (London: Routledge, 2000), 251.

    Google Scholar 

  20. Ole Wæver, “Securitization: Taking Stock of a Research Program in Security Studies,” unpublished draft, 2003, 14.

    Google Scholar 

  21. Buzan, Wæver, and de Wilde, Security, 31; Wæver, “Securitization,” 11; Juha A. Vuori, “Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-Democratic Political Orders,” European Journal of International Relations 14, no. 1 (2008): 65–99. However, the theory does not consider the fact that the securitizers can use lies and misinformation to deceive the audience. For example, Tony Blair is sometimes alleged to have delivered a 45-minute speech to mislead the British parliament in the run up to the Iraq war.

    Article  Google Scholar 

  22. Ole Wæver, “Securitizing Sectors? Reply to Eriksson.” Cooperation and Conflict 34, no. 3 (1999): 337.

    Article  Google Scholar 

  23. Melissa G. Curley and Siu-lun Wong, Security and Migration in Asia: The Dynamics of Securitization (London: Routledge, 2008), 7–9.

    Google Scholar 

  24. See Lene Hansen, “The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the Copenhagen School,” Millennium Journal of International Studies 29, no. 2 (2000): 285–306;

    Article  Google Scholar 

  25. Michael C. Williams, “Words, Images, Enemies: Securitization and International Politics,” International Studies Quarterly 47, no. 4 (2003): 511–531;

    Article  Google Scholar 

  26. Claire Wilkinson, “The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Useable Outside Europe?” Security Dialogue 38, no. 1 (2007): 5–25;

    Article  Google Scholar 

  27. Frank Möller, “Photographic Interventions in Post-9/11 Security Policy,” Security Dialogue 38, no. 2 (2007): 179–196;

    Article  Google Scholar 

  28. Matt McDonald, “Securitization and the Construction of Security,” European Journal of International Relations 14, no. 4 (2008): 563–587.

    Article  Google Scholar 

  29. Lene Hansen, “The Politics of Securitization and the Muhammad Cartoon Crisis: A Post-Structuralist Perspective,” Security Dialogue 42, nos. 4–5 (2011): 357–369.

    Article  Google Scholar 

  30. John Langshaw Austin, How to Do Things with Words (Oxford: Oxford University Press, 1962), 8–9.

    Google Scholar 

  31. Felix Ciută, “Security and the Problem of Context: A Hermeneutical Critique of Securitization Theory,” Review of International Studies 35, no. 2 (2009): 316.

    Google Scholar 

  32. Roxanna Sjöstedt, “Health Issues and Securitization: The Construction of HIV/AIDS as a US National Security Threat,” in Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq (London: Routledge, 2011), 151.

    Google Scholar 

  33. Mely Caballero-Anthony and Ralf Emmers, “The Dynamics of Securitization in Asia,” in Studying Non-Traditional Security in Asia: Trends and Issues, ed. Ralf Emmers, Mely Caballero-Anthony, and Amitav Acharya (Singapore: Marshall Cavendish Academic, 2006b), 25; Wæver, “Securitization,” 26.

    Google Scholar 

  34. Mark B. Salter, “When Securitization Fails: The Hard Case of Counter-Terrorism Programs,” in Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq (London: Routledge, 2011), 121.

    Google Scholar 

  35. See Jocelyn Vaughn, “The Unlikely Securitizer: Humanitarian Organizations and the Securitization of Indistinctiveness,” Security Dialogue 40, no. 3 (2009): 263–285.

    Article  Google Scholar 

  36. Thierry Balzacq, “The Three Faces of Securitization: Political Agency, Audience and Context,” European Journal of International Relations 11, no. 2 (2005): 184.

    Article  Google Scholar 

  37. Holger Stritzel, “Towards a Theory of Securitization: Copenhagen and Beyond,” European Journal of International Relations 13, no. 3 (2007): 363.

    Article  Google Scholar 

  38. Rita Floyd, “Can Securitization Theory Be Used in Normative Analysis? Towards a Just Securitization Theory,” Security Dialogue 42, nos. 4–5 (2011): 428.

    Google Scholar 

  39. For example, Huysmans, “Revisiting Copenhagen,” 499–501; Mely Caballero-Anthony, and Ralf Emmers, “Understanding the Dynamics of Securitizing Non-Traditional Security,” in Non-Traditional Security in Asia: Dilemmas in Securitization, ed. Mely Caballero-Anthony, Ralf Emmers, and Amitav Acharya (Singapore: Ashgate Publishing Limited, 2006a), 5; Wilkinson, “The Copenhagen School,” 5–25; Vuori, “Illocutionary Logic and Strands of Securitization,” 65–99; Curley and Herington, “The Securitization,” 141–166.

    Google Scholar 

  40. Ralf Emmers, Greener B. Barcham, and Nicholas Thomas, “Securitizing Human Trafficking in the Asia-Pacific: Regional Organizations and Response Strategies,” in Security and Migration in Asia: The Dynamics of Securitization, ed. Melissa G. Curley and Siu-lun Wong (London: Routledge, 2008), 62.

    Google Scholar 

  41. In-taek Hyun, Sung-han Kim, and Geun Lee, “Bringing Politics Back in: Globalization, Pluralism, and Securitization in East Asia,” in Studying Non-Traditional Security in Asia: Trends and Issues, ed. Ralf Emmers, Mely Caballero-Anthony, and Amitav Acharya (Singapore: Marshall Cavendish Academic, 2006b), 122.

    Google Scholar 

  42. Vuori A, “Illocutionary Logic,” 72; Colin McInnes and Simon Rushton, “HIV, AIDS and Security: Where Are We Now?” International Affairs 86, no. 1 (2010): 244.

    Article  Google Scholar 

  43. Michael Howlett, M. Ramesh, and Anthony Perl, Studying Public Policy: Policy Cycles & Policy Subsystems (Canada: Oxford University Press, 2009), 10.

    Google Scholar 

  44. See David Easton, A Framework for Political Analysis (Englewood Cliffs: Prentice-Hall, 1965).

    Google Scholar 

  45. Johan Eriksson, “Agendas, Threats and Politics: Securitization in Sweden” (paper presented at the ECPR Joint Sessions, workshop “Redefining Security,” Mannheim, March 26–31, 1999).

    Google Scholar 

  46. Rita Floyd, “Human Security and the Copenhagen School’s Securitization Approach: Conceptualizing Human Security as a Securitizing Move,” Human Security Journal 5, (2007): 41.

    Google Scholar 

  47. Ilavenil Ramiah, “Securitizing the AIDS Issue in Asia,” in Non-Traditional Security in Asia: Dilemmas in Securitization, ed. Mely Caballero-Anthony, Ralf Emmers, and Amitav Acharya (England: Ashgate Publishing Limited, 2006a), 150; Buzan, Wæver, and de Wilde, Security, 29.

    Google Scholar 

  48. David Matsumoto, Cultural Influences on Research Methods and Statistics (Pacific Grove, CA: Brooks/Cole Publishing Company, 1994), 31.

    Google Scholar 

  49. Elizabeth Wishnick, “The Securitization of Chinese Migration to the Russian Far East: Rhetoric and Reality,” in Security and Migration in Asia: The Dynamics of Securitization, ed. Melissa G. Curley and Siu-lun Wong (London: Routledge, 2008), 91.

    Google Scholar 

  50. Catherine Yuk-ping Lo and Nicholas Thomas, “How Is Health a Security Issue? Politics, Responses and Issues,” Health Policy and Planning 25, no. 6 (2010): 448.

    Google Scholar 

  51. Michael C. Williams, “The Continuing Evolution of Securitization Theory,” in Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq (London: Routledge, 2011), 217.

    Google Scholar 

  52. Javed Mohammad Iqbal, “AIDS and the State: A Comparison of Brazil, India and South Africa,” South Asian Survey 16, no. 1 (2009): 125.

    Article  Google Scholar 

  53. Simon Rushton, “The Development of the HIV/AIDS and Security Discourse: The Role of CSOs” (paper presented at Peter Wall Institute’s London Workshop on Civil Society Organizations and Global Health Governance, October 2007).

    Google Scholar 

  54. Rita Floyd, “Towards a Consequentialist Evaluation of Security: Bringing Together the Copenhagen and the Welsh Schools of Security Studies,” Review of International Studies 33, no. 2 (2007): 329.

    Article  Google Scholar 

  55. Pinar Bilgin, “Making Turkey’s Transformation Possible: Claiming “Security-Speak”—not Desecuritization!,” Southeast European and Black Sea Studies 7, no. 4 (2007): 558.

    Article  Google Scholar 

  56. Steve Hsu-sung Kuo, Su-fen Tsai, and Yen-fang Huang, “Taiwan,” in Fighting a Rising Tide: The Response to AIDS in East Asia, ed. Tadashi Yamamoto and Satoko Itoh (Tokyo: Japan Center for International Exchange, 2006), 239.

    Google Scholar 

  57. Vincent Rollet, “Taiwanese NGOs and HIV/AIDS: From the National to the Transnational,” China Perspectives 60, (2005): 4.

    Google Scholar 

  58. This idea borrows from Vuori’s article: Juha A. Vuori, “A Timely Prophet? The Doomsday Clock as a Visualization of Securitization Moves with a Global Referent Object,” Security Dialogue 41, no. 3 (2010): 259.

    Article  Google Scholar 

  59. Varun Gauri and Evan S. Lieberman, “AIDS and the State: The Politics of Government Responses to the Epidemic in Brazil and South Africa” (paper presented at the annual meetings for the American Political Science Association, Chicago, IL, September 2–5, 2004).

    Google Scholar 

  60. Varun Gauri and Evan S. Lieberman, “Boundary Institutions and HIV/ AIDS Policy in Brazil and South Africa,” Studies in Comparative International Development 41, no. 3 (2006): 52.

    Article  Google Scholar 

Download references

Authors

Copyright information

© 2015 Catherine Yuk-ping Lo

About this chapter

Cite this chapter

Lo, C.Yp. (2015). Security: A Revised Framework for Analysis. In: HIV/AIDS in China and India. Palgrave Macmillan, New York. https://doi.org/10.1057/9781137504210_2

Download citation

Publish with us

Policies and ethics