Sovereignty Games 2008
DOI: 10.1057/9780230616936_9
|View full text |Cite
|
Sign up to set email alerts
|

Securing Sovereignty by Governing Security through Markets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0
1

Year Published

2011
2011
2019
2019

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 33 publications
0
7
0
1
Order By: Relevance
“…In finance, this has meant the increased integration of private sector advocacy associations in the design of regulatory regimes (see Tsingou, 2009;Baker, 2010;Young, 2012). In security, the use of private sector actors has similarly increased, as private firms now take on many critical functions of security provision --everything from basic administrative functions to logistics to the widespread use of private security companies to carry out combat operations (Leander, 2005(Leander, , 2009Percy, 2007). As military operations are often conducted with and/or by private companies there has been a commercialization and globalization of organized violence.…”
Section: Interrelationships Between Security and Financementioning
confidence: 99%
“…In finance, this has meant the increased integration of private sector advocacy associations in the design of regulatory regimes (see Tsingou, 2009;Baker, 2010;Young, 2012). In security, the use of private sector actors has similarly increased, as private firms now take on many critical functions of security provision --everything from basic administrative functions to logistics to the widespread use of private security companies to carry out combat operations (Leander, 2005(Leander, , 2009Percy, 2007). As military operations are often conducted with and/or by private companies there has been a commercialization and globalization of organized violence.…”
Section: Interrelationships Between Security and Financementioning
confidence: 99%
“…Additionally, the redrawing of public–private distinctions occurs through the workings of different (security) rationalities (Leander 2007; Abrahamsen and Williams 2011). Indeed, different modes of governance inform the ways in which the public–private divides are being recast and reassembled.…”
Section: Private Security and The Public–private Dividementioning
confidence: 99%
“…Indeed, different modes of governance inform the ways in which the public–private divides are being recast and reassembled. Leander explains that the logic and politics of security production must also be seen in light of how “the coexistence of neo‐liberal and sovereign forms of governance function in the field of security” (Leander 2007:3; Salter 2007:54, 2009; Klauser, Ruegg, and November 2009). She further points out that PSCs also help—indeed are hired to—define security problems (Leander 2006).…”
Section: Private Security and The Public–private Dividementioning
confidence: 99%
“… Bourdieu often referred to political science as the “science of de‐politicization” precisely because it hid politics from view by accepting a statist understanding of politics as its point of departure (Wacquant 2005). I have drawn on this insight repeatedly and perhaps most explicitly in an article where I argue that the public private divide is key to the power of commercial security (Leander 2011). …”
mentioning
confidence: 99%