Ideas, identities and internalization: Explaining securitizing moves

Why do some events take precedence over others in terms of being viewed as security issues? This article argues that in order to answer this question it is necessary to move beyond the assumption that threat images are self-evident. Rather, a distinction should be made between the contextual conditi...

Full description

Saved in:
Bibliographic Details
Published in:Cooperation and conflict Vol. 48; no. 1; pp. 143 - 164
Main Author: Sjostedt, Roxanna
Format: Journal Article
Language:English
Published: London, England SAGE Publications 01-03-2013
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Why do some events take precedence over others in terms of being viewed as security issues? This article argues that in order to answer this question it is necessary to move beyond the assumption that threat images are self-evident. Rather, a distinction should be made between the contextual conditions that may lay the foundation for a threat image and the subjective problem formulation by actors. In addition, in order to analyze how, why, and when an actor constructs a threat image and initiates a so-called securitization process, a broad conceptual and analytical framework should be employed. This article suggests a framework that incorporates ideas and identity at the international and domestic levels, and the internalization processes of the central decision-making unit performing the securitization. The article argues that while the diffusion of ideas by entrepreneurs forms an important basis for the threat constructions of national decision-makers, it is necessary to take the role of national and domestic identities into account in order to explain why some idea diffusion processes succeed while other do not. Identity serves as a catalyst or gate-keeper of idea diffusion. The internalization of the decision-making unit, finally, is a central mechanism that highlights the process between the explanatory factors and the outcome (securitization). By including these three concepts into the analysis, this article takes a holistic approach that can be employed to analyze different kinds of actor-based and non-actor-based threat images.
Bibliography:ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
ObjectType-Article-1
ObjectType-Feature-2
ISSN:0010-8367
1460-3691
1460-3691
DOI:10.1177/0010836712445023