, to see if you have full access to this publication.
Edited Book No access

Securitization in Statebuilding and Intervention

Editors:
Publisher:
 2017

Summary

Critical security studies have emphasized that the identification of security threats paves the way for international and domestic interventions. Over the last three decades, statebuilding has developed into a powerful global practice of intervention in domestic affairs – not only with respect to failed states, but more broadly as a tool used in development cooperation and governance assistance. Statebuilding is increasingly framed as a policy which can enhance international, as well as domestic, security and peace, and yet historical and contemporary examples of statebuilding have often involved considerable violence. This volume draws on securitization studies to analyze the role of security in international and domestic statebuilding interventions. Individual case studies explore international statebuilding in Libya, Iraq, Kosovo, and Cameroon, discourses of intervention in the USA, and internal statebuilding in Turkey, Mexico, Tajikistan and South Sudan. These empirical investigations offer a compelling insight into the multiplicity, and global character, of security dynamics.



Bibliographic data

Edition
1/2017
Copyright Year
2017
ISBN-Print
978-3-8487-4312-4
ISBN-Online
978-3-8452-8582-5
Publisher
Nomos, Baden-Baden
Series
Politiken der Sicherheit | Politics of Security
Volume
1
Language
English
Pages
295
Product Type
Edited Book

Table of contents

ChapterPages
  1. Titelei/Inhaltsverzeichnis No access Pages 1 - 8
  2. Authors:
    1. 1. The Concept and Practice of “Statebuilding” and the Politics of Security No access
      Authors:
    2. 2. Critical Security Studies and Securitization No access
      Authors:
    3. 3. The Chapters No access
      Authors:
    1. Authors:
      1. 1. Introduction No access
        Authors:
      2. 2. The death of liberal peacebuilding and its critique No access
        Authors:
      3. 3. Framing peacebuilding as security: survival through securitisation No access
        Authors:
      4. 4. The frame: investigating the peace-security nexus No access
        Authors:
      5. 5. Problematizing the frame: whose security? No access
        Authors:
      6. 6. Framing peace as security: examples from Cyprus and Bosnia-Herzegovina No access
        Authors:
      7. 7. Conclusion: implications for peacebuilding No access
        Authors:
    2. Authors:
      1. 1. Introduction No access
        Authors:
      2. 2. Securitization Theory and Militia Research in the context of Libya No access
        Authors:
      3. 3. Analytical Framework No access
        Authors:
      4. Authors:
        1. a) Did governments communicate the danger of unbound militias prior to the intervention, and to what extent was Qaddafi’s defeat deemed more urgent? No access
          Authors:
        2. b) Did governments problematize arms supplies as a contributing factor to the 2015 crisis? No access
          Authors:
      5. 5. Conclusion No access
        Authors:
    3. Authors:
      1. 1. Introduction No access
        Authors:
      2. Authors:
        1. Religion in International Relations No access
          Authors:
        2. Fundamentals of Securitization and Sectors of Analysis No access
          Authors:
        3. Approaching Religion in Securitization Studies No access
          Authors:
      3. Authors:
        1. Franklin D. Roosevelt – The USA enters World War II No access
          Authors:
        2. Jimmy Carter – US intervention in Afghanistan No access
          Authors:
        3. Ronald Reagan – Support of ‘Freedom Fighters’ (Reagan Doctrine) No access
          Authors:
        4. George W. Bush – Invasion of Iraq No access
          Authors:
        5. Barack Obama – the fight against ISIL No access
          Authors:
      4. 4. Conclusion No access
        Authors:
    4. Authors:
      1. 1. Introduction No access
        Authors:
      2. 2. The dialectics of securitization, macrosecuritization and desecuritization in the context of UN missions No access
        Authors:
      3. Authors:
        1. Social contextualization of securitization No access
          Authors:
        2. Linguistic and semantic specificities of the speech context No access
          Authors:
        3. Empirical qualification of desecuritization No access
          Authors:
      4. Authors:
        1. Inscriptions of desecuritization in UNAMI’s mandate No access
          Authors:
      5. Authors:
        1. Bridging friend–enemy dichotomies in program implementation No access
          Authors:
      6. 7. Conclusion No access
        Authors:
    5. Authors:
      1. 1. Introduction No access
        Authors:
      2. Authors:
        1. How can we characterize the two constellations of trusteeship in the eras of decolonization and Post-Cold War? No access
          Authors:
      3. Authors:
        1. Case Introduction: Cameroun No access
          Authors:
        2. Case Introduction: Kosovo No access
          Authors:
        3. Authors:
          1. Cameroun No access
            Authors:
          2. Kosovo No access
            Authors:
        4. Authors:
          1. Cameroun No access
            Authors:
          2. Kosovo No access
            Authors:
        5. Authors:
          1. Cameroun No access
            Authors:
          2. Kosovo No access
            Authors:
        6. Authors:
          1. “Tout est calme à Yaoundé” – Cameroun No access
            Authors:
          2. Kosovo No access
            Authors:
      4. 4. Conclusion No access
        Authors:
    6. Authors:
      1. 1. Introduction No access
        Authors:
      2. 2. Securitizing Decolonization No access
        Authors:
      3. 3. The UN Trusteeship as a Global Audience No access
        Authors:
      4. Authors:
        1. a) The Trusteeship Council and the Decolonization of Cameroon No access
          Authors:
        2. b) Audience – Emerging Competition in the Trusteeship Council? No access
          Authors:
        3. Authors:
          1. French delegitimizing presentations against U.P.C. claims No access
            Authors:
          2. U. P.C. in front of the Council – Claims for Sovereignty and Independence No access
            Authors:
      5. 5. Conclusion No access
        Authors:
    1. Authors:
      1. 1. Introduction No access
        Authors:
      2. 2. Desecuritization of religion? Securitization of secularism? No access
        Authors:
      3. 3. Taking the AKP at face value: the long-awaited desecuritizing actor No access
        Authors:
      4. 4. AKP as a securitizing actor: the construction of a “regime of truth” No access
        Authors:
      5. 5. Conclusion No access
        Authors:
    2. Authors:
      1. 1. Introduction No access
        Authors:
      2. Authors:
        1. Securitization and Conflict Transformation No access
          Authors:
        2. Context – Civil Society in Conflict No access
          Authors:
        3. CSO Identity –Social Capital and Political Identity No access
          Authors:
        4. Framework of Action – Different Kinds of Human Rights Articulations No access
          Authors:
        5. Political Opportunity Structure – ‘Filter’ of Human rights activism No access
          Authors:
      3. 3. Research Framework No access
        Authors:
      4. Authors:
        1. Conflict Context No access
          Authors:
        2. Centro de Derechos Humanos Fray Bartolomé de Las Casas (FrayBa) No access
          Authors:
        3. Enlace Civil No access
          Authors:
        4. Political Opportunity Structure and Outcome No access
          Authors:
      5. 5. Conclusion No access
        Authors:
    3. Authors:
      1. 1. Introduction No access
        Authors:
      2. 2. Perspectives on (il)liberal statebuilding No access
        Authors:
      3. 3. A sociological understanding of statebuilding No access
        Authors:
      4. 4. Dynamics of security in statebuilding No access
        Authors:
      5. 5. Dynamics of security and illiberal statebuilding in Tajikistan No access
        Authors:
      6. 6. Conclusion No access
        Authors:
    4. Authors:
      1. 1. Introduction No access
        Authors:
      2. 2. Securitization Theories No access
        Authors:
      3. 3. Securitization in the Global South No access
        Authors:
      4. 4. A History of (In)Security in South Sudan No access
        Authors:
      5. 5. Travails of a post-liberation state No access
        Authors:
      6. 6. Securitization as a Means to Regime Security: Security Sector Reform No access
        Authors:
      7. 7. Demobilization, Disarmament, and Reintegration No access
        Authors:
      8. 8. Chequebook Securitization: Appeasement by Integration No access
        Authors:
      9. 9. Internationalization of National Security No access
        Authors:
      10. 10. Popular bottom-up responses to the official policies of securitization No access
        Authors:
      11. 11. Filling the void of an absent state No access
        Authors:
      12. 12. South Sudan Police Service No access
        Authors:
      13. 13. Self-help security from below No access
        Authors:
      14. 14. Conclusions No access
        Authors:

Similar publications

from the series "Politiken der Sicherheit | Politics of Security"
Cover of book: Aktenzeichen XY…ungelöst (1967–1997)
Monograph No access
Karsten Köhler
Aktenzeichen XY…ungelöst (1967–1997)
Cover of book: Haus – Geschlecht – Sicherheit
Edited Book Full access
Sigrid Ruby, Inken Schmidt-Voges
Haus – Geschlecht – Sicherheit
Cover of book: Gefährliche Bilder
Monograph No access
Katharina Krause
Gefährliche Bilder