2020
DOI: 10.1080/14650045.2020.1774749
|View full text |Cite
|
Sign up to set email alerts
|

Reconfiguring Desecuritization: Contesting Expert Knowledge in the Securitization of Migration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 46 publications
0
9
0
Order By: Relevance
“…Among the numerous ways to approach the law, agency and security nexus, this article was inspired by D. Cole (2004), A. W. Neal (2012), E. Guild (2014) and S. Scheel (2020), with particular reference to Neal in terms of the concept of executive deterrence and the limited role of the judiciary in the context of the laws adopted in the face of security threats. First, due to the specificity of time, their adoption is expected by the public to be fast, while 'unmaking' by the courts due to, inter alia, unconstitutionality, violating the higher laws in the hierarchy, occurs slowly (Neal, 2012).…”
Section: Kateryna Krakhmalovamentioning
confidence: 99%
See 1 more Smart Citation
“…Among the numerous ways to approach the law, agency and security nexus, this article was inspired by D. Cole (2004), A. W. Neal (2012), E. Guild (2014) and S. Scheel (2020), with particular reference to Neal in terms of the concept of executive deterrence and the limited role of the judiciary in the context of the laws adopted in the face of security threats. First, due to the specificity of time, their adoption is expected by the public to be fast, while 'unmaking' by the courts due to, inter alia, unconstitutionality, violating the higher laws in the hierarchy, occurs slowly (Neal, 2012).…”
Section: Kateryna Krakhmalovamentioning
confidence: 99%
“…Cole emphasises an understanding of the importance of judicial review of the actions of the executive branch in times of crisis and in relation to the limitations of individuals' rights, which usually apply to the most vulnerable (Cole, 2004). Finally, Scheel points out the difficulty of challenging security knowledge from the 'outside' (Scheel, 2020), potentially indicating the unlikelihood of IDPs being able to mount a successful challenge to the unfavourable legal provisions in the courts. Nevertheless, he also shows the potential for change and desecuritisation in his study, in which the visa applicants subjected to security practices resorted to coping strategies, and security professionals employed the 'trickster narrative' in relation to them, but the resulting 'culture of suspicion' was uncomfortable for both sides (Scheel, 2020: 14-22).…”
Section: Kateryna Krakhmalovamentioning
confidence: 99%
“…In order establish 'truthfulness' of individual accounts, data sources such as social media or the smartphones of migrants are supposed to reveal details about their countries of origin, their journeys, social relations, and activities (Latonero and Kift 2018;Noori 2020). The credibility of data thus becomes valued higher than the one attributed to human story-telling, particularly in contexts of "institutionalized distrust" (Griffiths 2012;Scheel 2020) that tends to prevail in asylum and migration procedures. Similar conceptions of credibility have also been shown in other contexts, for example when a hit in a biometric database such as the Visa Information System (VIS) is considered as more truthful than the identity claims of the person concerned (Glouftsios and Scheel 2021).…”
Section: How Data Come To Mattermentioning
confidence: 99%
“…Under a logic of service, new boundaries on what qualifies as practices of security are being determined. In this article, I will show that the securitisation/desecuritisation dualism, which saturates the scholarly literature (see Scheel, 2022), cannot comprehend fully the role of an Agency like eu-LISA or the role of the professionals who staff it. New actors are developing new claims on they understand their role in processes of (in)securitisation, opening up a continuum of positions from which they participate in the field.…”
Section: Introductionmentioning
confidence: 89%
“…Huymans (1998, p. 570) describes desecuritisation as a critical strategy for the unmaking of a securitisation. Scheel (2022Scheel ( , p. 1051 argues that the impetus behind desecuritisation is to destabilise the credibility and authority of security professionals' expert knowledge and related regimes of truth, depriving security of its epistemic foundation. In this article, I propose that neither the concept of securitisation nor desecuritisation is adequate for understanding how actors in the guild of IT service management relate to the field (in)security.…”
Section: Delimiting Securitymentioning
confidence: 99%