Education, Science, Technology, Innovation and Life
Open Access
Sign In

A Whole-Process Exploration of the Evolution of Security Issues

Download as PDF

DOI: 10.23977/ferm.2023.060815 | Downloads: 6 | Views: 321

Author(s)

Xirong Ai 1

Affiliation(s)

1 School of Foreign Languages, Yulin University, Yulin, China

Corresponding Author

Xirong Ai

ABSTRACT

From the whole-process perspective, this paper elaborates and analyzes the ideal model of the evolution process of security issues. The ideal model for the evolution of security issues is presented as: securitization, de-securitization, and re-securitization. Analyzing the evolution of security issues from a whole-process perspective helps to gain a comprehensive understanding of the concept of "security" and also helps to gain insight into the dynamic development processes of security issues.

KEYWORDS

Whole-process, securitization, de-securitization, re-securitization

CITE THIS PAPER

Xirong Ai, A Whole-Process Exploration of the Evolution of Security Issues. Financial Engineering and Risk Management (2023) Vol. 6: 127-131. DOI: http://dx.doi.org/10.23977/ferm.2023.060815.

REFERENCES

[1] Buzan B., Wæver O. (2003) Regions and powers. Cambridge: Cambridge University Press, 491.
[2] Karyotis G., (2007) Securitization of Greek terrorism and arrest of the 'Revolutionary Organization November 17'. Cooperation and Conflict, (3), 274.
[3] Buzan B., Wæver O., Wilde J.D. (1998) Security: a new framework for analysis. Boulder, CO: Lynne Rienner, 25,24,4.
[4] Léonard S. Kaunert C. (2019) Refugees, security and the European Union.  Abingdon: Routledge.
[5] Baysal B. (2020) 20 years of securitization: strengths, limitations and a new dual framework. Uluslararasi Ilikiler, (67), 3-20.
[6] Stritzel H. (2012) Securitization, power, intertextuality: discourse theory and the translations of organized crime. Security Dialogue, (6): 553.
[7] Bourbeau P. (2014) moving forward together: logics of the securitisation process. Millennium: Journal of International Studies, (1): 190.
[8] Mavelli L. (2013) between normalisation and exception: the securitisation of Islam and the construction of the secular subject. Millennium: Journal of International Studies, 2013 (2): 174.
[9] Atland K. (2008) Mikhail Gorbachev, the Murmansk Initiative, and the desecuritization of interstate relations in the Arctic. Cooperation and Conflict, (3): 292.
[10] Wæver O. (1995) "Securitization and desecuritization" in Lipschutz, Ronnie D., ed., on security. New York: Columbia University Press, 60.
[11] Wæver O. (2000) "The EU as a security actor: reflections from a pessimistic constructivist on post-sovereign security orders" in Kelstrup, M. & Williams, M. C., eds., International relations theory and the politics of European integration: power, security and community. London: Routledge, 253.
[12] Cavelty M.D., Balzacq T., eds. (2016) Routledge handbook of security studies. London: Routledge.
[13] Wilde J.D. (2008) "Environmental security deconstructed" in Brauch, H. G. et al., eds., Globalization and environmental challenges: reconceptualizing security in the 21st century. Berlin: Springer.
[14] Yilmaz I. Barry J. (2020) The AKP's de-securitization and resecuritization of a minority community: the Alevi opening and closing. Turkish Studies, (2): 231-253.
[15] Borgh C.V.D., Savenije W. (2015) De-securitising and re-securitising gang policies: the funes government and gangs in El Salvador. Journal of Latin American Studies, (1): 149-176.

Downloads: 18073
Visits: 350398

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.