Chapter 6 Conflict Management Redux : Desecuritizing Intractable Conflicts

This book seeks to interrogate how contemporary policy issues become 'securitized' and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and...

Full description

Bibliographic Details
Main Author: Vuković, Siniša (auth)
Format: eBook
Published: Taylor & Francis 2019
Subjects:
Online Access:Get fulltext
LEADER 02496naaaa2200253uu 4500
001 40151
005 20200729
041 0 |h English 
042 |a dc 
100 1 |a Vuković, Siniša  |e auth 
245 1 0 |a Chapter 6 Conflict Management Redux : Desecuritizing Intractable Conflicts 
260 |b Taylor & Francis  |c 2019 
300 |a 1 electronic resource (24 p.) 
856 |z Get fulltext  |u https://library.oapen.org/handle/20.500.12657/40151 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This book seeks to interrogate how contemporary policy issues become 'securitized' and, furthermore, what the implications of this process are. A generation after the introduction of the concept of securitization to the security studies field, this book engages with how securitization and desecuritization 'works' within and across a wide range of security domains including terrorism and counter-terrorism, climate change, sexual and gender-based violence, inter-state and intra-state conflict, identity, and memory in various geographic and social contexts. Blending theory and application, the contributors to this volume - drawn from different disciplinary, ontological, and geographic 'spaces' - orient their investigations around three common analytical objectives: revealing deficiencies in and through application(s) of securitization; considering securitization through speech-acts and discourse as well as other mechanisms; and exposing latent orthodoxies embedded in securitization research. The volume demonstrates the dynamic and elastic quality of securitization and desecuritization as concepts that bear explanatory fruit when applied across a wide range of security issues, actors, and audiences. It also reveals the deficiencies in restricting securitization research to an overly narrow set of issues, actors, and mechanisms. This volume will be of great interest to scholars of critical security studies, international security, and International Relations. 
540 |a Creative Commons 
546 |a English 
650 7 |a Military history  |2 bicssc 
650 7 |a International relations  |2 bicssc 
650 7 |a Political control & freedoms  |2 bicssc 
650 7 |a Warfare & defence  |2 bicssc 
653 |a empirical applications; Climate Change; Conflict Management; Copenhagen School; constructivism; desecuritization; gender-based violence; inter-state conflict; processes; securitization; securitization applications; terrorism 
773 1 0 |t Securitization Revisited  |7 nnaa