2005
DOI: 10.1111/j.1468-2486.2005.00483.x
|View full text |Cite
|
Sign up to set email alerts
|

Bottoms Up! A Toast to Regional Security?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
3

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 6 publications
0
6
0
3
Order By: Relevance
“…Regions are formed by 'patterns of amity and enmity' between neighboring states, with the limits of the RSC being defined by the power-projection capabilities of the states in question (Buzan, 1991, p. 190). Interactions between geographically proximate states, whether positive or negative, will be more intense, compounding over time (Hoogensen, 2005). This translates into regional security dilemmas informed by shared histories (Buzan & Waever, 2003, p. 46).…”
Section: Security Regionsmentioning
confidence: 99%
“…Regions are formed by 'patterns of amity and enmity' between neighboring states, with the limits of the RSC being defined by the power-projection capabilities of the states in question (Buzan, 1991, p. 190). Interactions between geographically proximate states, whether positive or negative, will be more intense, compounding over time (Hoogensen, 2005). This translates into regional security dilemmas informed by shared histories (Buzan & Waever, 2003, p. 46).…”
Section: Security Regionsmentioning
confidence: 99%
“…Thus for example, Wilkinson has criticized the model for its Westerncentric assumptions, namely that the notion of the referent object presupposes a much more coherent and stable set of identities than is usually found in practice (Wilkinson 2007 p.10-11). Hoogensen has suggested that securitization theory is overly concerned with the state as the main referent object (Hoogensen 2005), whilst more recently Rumelili has questioned the relationship between the Self/Other in processes of (de)securitization, suggesting a difference between ontological and physical security with different dynamics and objects operating in each (Rumelili 2015). In turn, Christou and Adamides (2013) have sought to problematize the nature of the referent object when it comes to energy, noting that this particular referent object cuts across all five sectors of security identified in the original model, namely the military, political, economic, societal and environmental sectors.…”
Section: B) Multiple Referent Objects and Processes Of De-securitizationmentioning
confidence: 99%
“…Indeed, Buzan and Wæver (2009) themselves noted that scale should be taken into account in securitization theory. Yet whilst scholars have rightly criticized securitization theory for being overly concerned with the state as a referent object (Hoogensen, 2005), even usage of the state as a referent object continues to be uncritically conceptualized as a political unity, rather than a territorial or spatial unit. The few (de)securitization studies that have included questions of spatial politics have been framed according a single spatial referent object (e.g.…”
Section: The State Of the (De)securitization Debatementioning
confidence: 99%
“…De siste 20 årene har vi også sett en rekke regionale studier av sikkerhetspolitikk. Etter at den kalde krigens systemiske maktbalanse på internasjonalt nivå avtok, fikk regionale sikkerhetspolitiske dynamikker i regioner som for eksempel Middelhavet, Sørøst-Asia eller Arktis økt akademisk oppmerksomhet (Buzan, Waever & Wilde, 1998;Hoogensen, 2005). Den avgjørende faktoren i slike studier er geografisk naerhet.…”
Section: Introduksjonunclassified