Ideas, identities and internalization: Explaining securitizing moves
Why do some events take precedence over others in terms of being viewed as security issues? This article argues that in order to answer this question it is necessary to move beyond the assumption that threat images are self-evident. Rather, a distinction should be made between the contextual conditi...
Saved in:
Published in: | Cooperation and conflict Vol. 48; no. 1; pp. 143 - 164 |
---|---|
Main Author: | |
Format: | Journal Article |
Language: | English |
Published: |
London, England
SAGE Publications
01-03-2013
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Why do some events take precedence over others in terms of being viewed as security issues? This article argues that in order to answer this question it is necessary to move beyond the assumption that threat images are self-evident. Rather, a distinction should be made between the contextual conditions that may lay the foundation for a threat image and the subjective problem formulation by actors. In addition, in order to analyze how, why, and when an actor constructs a threat image and initiates a so-called securitization process, a broad conceptual and analytical framework should be employed. This article suggests a framework that incorporates ideas and identity at the international and domestic levels, and the internalization processes of the central decision-making unit performing the securitization. The article argues that while the diffusion of ideas by entrepreneurs forms an important basis for the threat constructions of national decision-makers, it is necessary to take the role of national and domestic identities into account in order to explain why some idea diffusion processes succeed while other do not. Identity serves as a catalyst or gate-keeper of idea diffusion. The internalization of the decision-making unit, finally, is a central mechanism that highlights the process between the explanatory factors and the outcome (securitization). By including these three concepts into the analysis, this article takes a holistic approach that can be employed to analyze different kinds of actor-based and non-actor-based threat images. |
---|---|
Bibliography: | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 ObjectType-Article-1 ObjectType-Feature-2 |
ISSN: | 0010-8367 1460-3691 1460-3691 |
DOI: | 10.1177/0010836712445023 |