Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-mp689 Total loading time: 0 Render date: 2024-04-24T13:00:29.963Z Has data issue: false hasContentIssue false

2 - A post-Copenhagen securitization theory

Published online by Cambridge University Press:  05 June 2012

Stuart Croft
Affiliation:
University of Warwick
Get access

Summary

Introduction

Ontological security is not, as we have seen, a condition enjoyed by all individuals. And the denial of identity structures to particular groups may be a root of the ontological insecurity of some individuals, or at least might significantly increase their sense of dread. That is, the securitization of identities is a crucial issue for the understanding of ontological security. The securitization of identity leads to the securitization of subjectivity – the intensified search for and/or attribution of a single, stable identity, ‘regardless of its actual existence’. How are identities securitized, leading to the construction of ontological insecurity for some individuals?

This chapter seeks to establish the new mainstream in non-American security studies work produced in the English language, not in order to follow securitization theory slavishly, but rather to establish it as the new grammar for security studies. That grammar is then redeployed in different ways: that is, the four key elements of securitization theory are amended to produce a ‘post-Copenhagen securitization theory’. However, this is not sufficient in and of itself, because there are three elements that need to be developed in the context of this ‘post-Copenhagen’ project, elements that are not privileged in the Copenhagen School’s framework. In turn, these elements focus on the roles of identity, spatiality and temporality. Securitizations reconstitute all three elements, and this is accounted for in this new ‘post-Copenhagen securitization theory’, which enables us to understand more fully dread and ontological insecurity.

Type
Chapter
Information
Securitizing Islam
Identity and the Search for Security
, pp. 73 - 109
Publisher: Cambridge University Press
Print publication year: 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Wæver, OleOn SecurityNew YorkColumbia University Press 1995Google Scholar
1943

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×