Skip to main content
    • Aa
    • Aa
  • Get access
    Check if you have access via personal or institutional login
  • Cited by 2
  • Cited by
    This article has been cited by the following publications. This list is generated based on data provided by CrossRef.

    Bright, Jonathan 2015. In Search of the Politics of Security. The British Journal of Politics & International Relations, Vol. 17, Issue. 4, p. 585.

    Floyd, Rita 2015. Extraordinary or ordinary emergency measures: what, and who, defines the ‘success’ of securitization?. Cambridge Review of International Affairs, p. 1.


Securitisation, terror, and control: towards a theory of the breaking point


Securitisations permit the breaking of rules: but which rules? This article argues that any given security situation could be handled by a variety of different ‘rule breaking’ procedures, and that securitisations themselves, whilst permitting rule breaking in general, do not necessarily specify in advance which rules in particular have to be broken. This begs the question: how do specific threats result in specific rule breaking measures? This article explores this question through reference to ‘control orders’, an unusual legal procedure developed in the UK during the course of the war on terrorism. Once applied to an individual, a control order gives the government a meticulous control over every aspect of their life, up to and including deciding on which educational qualifications they can take. Despite this control, individuals under the regime remain technically ‘free’: and have frequently used this freedom to abscond from the police who are supposed to be watching them. How did a security policy which controls a suspect's educational future, but not their physical movements, develop? This article aims to answer this question, and in so doing present a reevaluation of the mechanisms through which the effects of securitisation manifest themselves.

Linked references
Hide All

This list contains references from the content that can be linked to their source. For a full set of references and notes please see the PDF or HTML where available.

M. C. Williams , ‘Words, Images, Enemies: Securitization and International Politics’, International Studies Quarterly, 47:4 (2003), pp. 511–3, at p. 511

J. Eriksson , ‘Observers or advocates? On the political role of security analysis’, Cooperation and Conflict, 34:3 (1999), pp. 311–32

T. Balzacq , ‘The Three Faces of Securitization: Political Agency, Audience and Context’, European Journal of International Relations, 11:2 (2005), pp. 171201

H. Strizel , ‘Towards a theory of securitization: Copenhagen and beyond’, European Journal of International Relations, 13:3 (2007), pp. 357–83

J. A. Vuori , ‘Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-Democratic Political Orders’, European Journal of International Relations, 14:1 (2008)

Thierry Balzacq , ‘The Policy Tools of Securitization: Information Exchange, EU Foreign and Interior Policies’, Journal of Common Market Studies, 46:1 (2008), pp. 75100

A. Neal , ‘Securitization and Risk at the EU Border: The Origins of FRONTEX’, Journal of Common Market Studies, 47:2 (2009), pp. 333–56

M. Salter , ‘Securitization and desecuritization: a dramaturgical analysis of the Canadian Air Transport Security Authority’, Journal of International Relations and Development, 11:4 (2008)

M. McDonald , ‘Securitization and the Construction of Security’, European Journal of International Relations, 14:4 (2008), pp. 563–87

L. Hansen , ‘Theorizing the image for Security Studies: Visual securitization and the Muhammad Cartoon Crisis’, European Journal of International Relations, 17:1 (2011), pp. 5174

L. Hansen , ‘The Little Mermaid's Silent Security Dilemma and the Absence of Gender in the Copenhagen School’, Millenium: Journal of International Studies, 29:2 (2000), pp. 285306

C. Wilkinson , ‘The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Usable Outside Europe?’, Security Dialogue, 38:1 (2007), pp. 525

A. Collins , ‘Securitization, Frankenstein's Monster, and Malaysian Education’, The Pacific Review, 18:4 (2005), pp. 567–88

P. Roe ‘Actor, Audience(s) and Emergency Measures: Securitization and the UK's Decision To Invade Iraq’, Security Dialogue, 39:6 (2008), pp. 615–35

B. Buzan , ‘Will the ‘global war on terrorism’ be the new Cold War?’, International Affairs, 82:6 (2006), pp. 1101–18

S. Elbe , ‘Should HIV/AIDS be Securitized? The Ethical Dilemmas of Linking HIV/AIDS and Security’, International Studies Quarterly, 50:1 (2006), pp. 119–44

C. Boswell ‘Migration Control in Europe After 9/11: Explaining the Absence of Securitization’, Journal of Common Market Studies, 45:3 (2007), pp. 589610

W. Werner , ‘Securitization and Judicial Review: A Semiotic Perspective on the Relation Between the Security Council and International Judicial Bodies’, International Journal for the Semiotics of Law, 14:4 (2001), pp. 345–66

L. Hansen and H. Nissenbaum , ‘Digital Disaster, Cyber Security, and the Copenhagen School’, International Studies Quarterly, 53 (2009), pp. 1155–75

R. Taureck , ‘Securitization theory and securitization studies’, Journal of International Relations and Development, 9 (2006), pp. 5361

J. Vaughan , ‘The Unlikely Securitizer: Humanitarian Organizations and the Securitization of Indistinctiveness’, Security Dialogue, 40:3 (2009), pp. 263–85. See especially p. 278

S. Tierney , ‘Determining the State of Exception: What role for parliament and the courts?’, The Modern Law Review, 68 (2005), pp. 668–72

Recommend this journal

Email your librarian or administrator to recommend adding this journal to your organisation's collection.

Review of International Studies
  • ISSN: 0260-2105
  • EISSN: 1469-9044
  • URL: /core/journals/review-of-international-studies
Please enter your name
Please enter a valid email address
Who would you like to send this to? *