The Library
Can securitization theory be used in normative analysis? Towards a just securitization theory
Tools
Floyd, Rita (2011) Can securitization theory be used in normative analysis? Towards a just securitization theory. Security Dialogue, Vol.42 (No.4-5). pp. 427-439. doi:10.1177/0967010611418712 ISSN 0967-0106.
Research output not available from this repository.
Request-a-Copy directly from author or use local Library Get it For Me service.
Official URL: http://dx.doi.org/10.1177/0967010611418712
Abstract
While securitization studies have paid considerable attention to the moral value of desecuritization, they have paid almost no attention to the morality of securitization. In this article, I attempt to rectify that situation by proposing a revision of securitization theory that specifies three criteria that – if fulfilled at the same time – would render a securitization morally right. The criteria are: (1) that there is an objective existential threat; (2) that the referent object of security is morally legitimate; and (3) that the security response is appropriate to the threat in question. Although what is suggested here is considerably removed from the Copenhagen School’s original securitization theory, it is akin to that framework insofar as it retains the functional distinction between the security analyst and the securitizing actor. Indeed, the development of criteria that determine the moral rightness of securitization is analogous to the Copenhagen School’s devising criteria that determine both the existence and the success of securitization.
Item Type: | Journal Article | ||||
---|---|---|---|---|---|
Subjects: | H Social Sciences > HV Social pathology. Social and public welfare J Political Science > JZ International relations |
||||
Divisions: | Faculty of Social Sciences > Politics and International Studies | ||||
Journal or Publication Title: | Security Dialogue | ||||
Publisher: | Sage Publications Ltd. | ||||
ISSN: | 0967-0106 | ||||
Official Date: | August 2011 | ||||
Dates: |
|
||||
Volume: | Vol.42 | ||||
Number: | No.4-5 | ||||
Page Range: | pp. 427-439 | ||||
DOI: | 10.1177/0967010611418712 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published | ||||
Access rights to Published version: | Restricted or Subscription Access |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |