Redefinition of Security Concept: The Value of Securitisation Theory
Pendefinisian Semula Konsep Sekuriti: Nilai Teori Sekuritisasi
Keywords:human security, non-traditional security (NTS), security, securitisation theory
The concept of security is generally associated with anything related to military issues, e.g., war and conflict. However, the rise of non-traditional security (hereinafter NTS) threats like terrorism, ethnic cleansing, and infectious diseases challenge the conventional security concept. The debate created a significant question of how to broaden the scope of security to encompass other non-military issues while avoiding losing its analytical value. Hence, the article focuses on the debate of re-conceptualising and widening the concept of security. Two possible outcomes of this debate are explored using the library method: securitisation theory and human security. Although human security is viewed as one of the solutions to the debate, it has been criticised for its lack of a meaningful concept, particularly in addressing NTS threats. It is in this contextual gap that securitisation theory has attempted to fill. However, the theory also comes with conceptual and methodological shortcomings. By offering an outline of the theory, this article highlights the value of the theory while noting that it requires further refinement.
Aradau, C. (2004). Security and the Democratic Scene: Desecuritization and Emancipation. Journal of International Relations and Development, 7(4), 388–413. https://doi.org/10.1057/palgrave.jird.1800030.
Aradau, C. (2008). Rethinking Trafficking in Women: Politics out of Security. Palgrave Macmillan.
Booth, K. (2007). Theory of World Security. Cambridge University Press.
Buzan, B. (1991). People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era. Harvester Wheatsheaf.
Buzan, B. (1999). Rethinking Security after Cold War. Cooperation and Conflict, 32(1), 5–28. https://doi.org/0803973233.
Buzan, B., & Wæver, O. (2003). Regions and Power: The Structure of International Security. Cambridge University Press.
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A New Framework for Analysis. Lynne Rienner Publishers.
Crick, E. (2012). Drugs as an Existential Threat: An Analysis of the International Securitization of Drugs. International Journal of Drug Policy, 23(5), 407–14. https://doi.org/10.1016/j.drugpo.2012.03.004.
Deudney, D. (1990). The Case against Linking Environmental Degradation and National Security. Millennium - Journal of International Studies, 19(3), 461–76. https://doi.org/10.1177/03058298900190031001.
Emmers, R. (2003). ASEAN and the Securitization of Transnational Crime in Southeast Asia. The Pacific Review, 16(3), 419–38. https://doi.org/10.1080/0951274032000085653.
Floyd, R. (2007). Towards a Consequentialist Evaluation of Security: Bringing Together the Copenhagen and the Welsh Schools of Security Studies. Review of International Studies, 33, 327–50. https://doi.org/10.1017/S026021050700753X.
Floyd, R. (2010). Security and the Environment : Securitisation Theory and US Environmental Security Policy. Cambridge University Press. https://doi.org/10.1017/CBO9780511730146
Floyd, R. (2011). Can Securitization Theory Be Used in Normative Analysis? Towards a Just Securitization Theory. Security Dialogue, 42(4–5), 427–39. https://doi.org/10.1177/0967010611418712.
Floyd, R. (2014). Just and Unjust Desecuritization. In T. Balzacq (Ed.), Contesting Security: Strategies and Logics (pp. 122–138). Routledge.
Floyd, R. (2016). Extraordinary or Ordinary Emergency Measures: What, and Who, Defines the ‘Success’ of Securitization? Cambridge Review of International Affairs, 29(2), 668–85. https://doi.org/10.1080/09557571.2015.1077651.
Floyd, R. (2018). Parallels with the Hate Speech Debate: The Pros and Cons of Criminalising Harmful Securitising Requests. Review of International Studies, 44(1), 43–63. https://doi.org/10.1017/S0260210517000328.
Fox, J., & Akbaba, Y. (2013). Securitization of Islam and Religious Discrimination: Religious Minorities in Western Democracies, 1990–2008. Comparative European Politics, 13(2), 175–97. https://doi.org/10.1057/cep.2013.8.
Gjørv, G. H. (2012). Security by Any Other Name: Negative Security, Positive Security, and a Multi-Actor Security Approach. Review of International Studies, 38(4), 835–59. https://doi.org/10.1017/S0260210511000751.
Haftendorn, H. (1991). The Security Puzzle: Theory-Building and Discipline-Building in International Security. International Studies Quarterly, 35(1), 3. https://doi.org/10.2307/2600386.
Hough, P. (2008). Understanding Global Security (2nd ed.). Routledge.
Huysmans, J. (1998). Revisiting Copenhagen: Or, on the Creative Development of a Security Studies Agenda in Europe. European Journal of International Relations, 4(4), 479–505. https://doi.org/0803973233.
James, S. (2013). Human Security, Environmental Security, Securitization and Sovereignty. Journal of Human Security Studies, 2(1), 30–47.
Jones, L. (2011). Beyond Securitization: Explaining the Scope of Security Policy in Southeast Asia. International Relations of the Asia-Pacific, 11(3), 403–32. https://doi.org/10.1093/irap/lcr002.
Karyotis, G. (2012). Securitization of Migration in Greece: Process, Motives, and Implications. International Political Sociology, 6(4), 390–408. https://doi.org/10.1111/ips.12002.
Keohane, R. O. (1986). Theory of World Politics: Structural Realism and Beyond. In R. O. Keohane (Ed.), NeoRealism and Its Critics (pp. 158–203). Columbia University Press.
Khong, Y. F. (2001). Human Security: A Shotgun Approach to Alleviating Human Misery? Global Governance, 7(3), 231–236.
Krause, K. (2004). Is Human Security “More than Just a Good IdeaP=”?. In M. Brzoska & P. J. Croll (Eds.), Promoting Security: But How and For Whom? Contributions to BICC’s Ten-Year Anniversary Conference (pp. 43–46). Bonn International Center for Conversion.
Laki, J. (2006). Non-Traditional Security Issues: Securitisation of Transnational Crime in Asia. (IDSS Working Paper Series No. 98). https://www.rsis.edu.sg/rsis-publication/nts/98-wp098-non%E2%80%91traditional-secu/#.Y56F9HZByyw
Lo, Y.-P. (2012). The Securitisation of HIV/AIDS: China and India. [Master’s thesis, The University of Hong Kong]. The HKU Scholars Hub. https://hub.hku.hk/handle/10722/173927
Mathews, J. T. (1989). Redefining Security. Foreign Affairs, 68, 162–77.
Mearsheimer, J. J. (1995). The False Promise of International Institutions. International Security, 19(3), 5–49.
Newman, E. (2001). Human Security and Constructivism. International Studies Perspectives, 2(3), 239–251. https://doi.org/10.1111/1528-3577.00055.
Newman, E. (2010). Critical Human Security Studies. Review of International Studies, 36 (1), 77–94. https://doi.org/10.1017/S0260210509990519.
Nishikawa, Yukiko. (2010). Human Security in Southeast Asia. Taylor & Francis e-Library.
Nyman, J. (2016). What Is the Value of Security? Contextualising the Negative/Positive Debate. Review of International Studies, 42(part 5), 821–839. https://doi.org/10.1017/S0260210516000140.
Paris, R. (2001). Human Security: Paradigm Shift or Hot Air? International Security, 26(2), 87–102. https://doi.org/10.1162/016228801753191141.
Peoples, C., & Vaughan-Williams, N. (2010). Critical Security Studies: An Introduction. Routledge.
Roe, P. (2014). Gender and ‘positive’ Security. International Relations, 28(1), 116–138. https://doi.org/10.1177/0047117813502503.
Selgelid, M. J., & Enemark, C. (2008). Infectious Diseases, Security and Ethics: The Case of HIV/AIDS. Bioethics, 22(9), 457–465. https://doi.org/10.1111/j.1467-8519.2008.00696.x.
Thomas, N., & Tow, W. T. (2002). The Utility of Human Security: Sovereignty and Humanitarian Intervention. Security Dialogue, 33(2), 177–192. https://doi.org/10.1177/0967010602033002006.
Ullman, R. H. (1983). Redefining Security. International Security, 8(1), 129–153.
Wæver, O. (1995). Securitization and Desecuritization. In R. D. Lipschutz (Ed.), On Security (pp. 46–86). Columbia University Press.
Wæver, O. (1999). Securitizing Sectors? Reply to Eriksson. Cooperation and Conflict, 34(3), 334–340.
Wæver, O. (2011). Politics, Security, Theory. Security Dialogue, 42(4–5), 465–480. https://doi.org/10.1177/0967010611418718.
Waite, M., & Hawker, S. (Eds.). (2009). Oxford Paperback: Dictionary and Thesaurus (3rd ed.). Oxford University Press.
Walt, S. M. (1991). The Renaissance of Security Studies. International Studies Quaterly, 35(2), 211–239. http://jstor.org/stable2600471.
Yuk-Ping, C. Lo., & Thomas, N. (2010). How Is Health a Security Issue? Politics, Responses and Issues. Health Policy and Planning, 25(6), 447–453. https://doi.org/10.1093/heapol/czq063.
How to Cite
Copyright (c) 2022 Nadirah Mohd Azmi
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.