2018
DOI: 10.1111/spsr.12304
|View full text |Cite
|
Sign up to set email alerts
|

The Programmatic and Institutional (Re‐)Configuration of the Swiss National Security Field

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 51 publications
0
2
0
Order By: Relevance
“…Important research strands within reflexive quarters also embrace socio‐material ontologies of everyday political processes to analyze the variegated manifestations of such wider politics (whereas socio‐linguistic parsing of policies and speeches prevailed earlier). Today, considerable work focuses on unarticulated and habitual practices of enacting in‐ and exclusion policies (Hagmann et al 2018; Pouliot 2008), and – as demonstrated also in other contributions to this debate – the role of ‘things’, such as cameras, databases, drones and fences (Schouten 2014) to that politics.…”
Section: Reflexive Security Politics and Methodsmentioning
confidence: 99%
“…Important research strands within reflexive quarters also embrace socio‐material ontologies of everyday political processes to analyze the variegated manifestations of such wider politics (whereas socio‐linguistic parsing of policies and speeches prevailed earlier). Today, considerable work focuses on unarticulated and habitual practices of enacting in‐ and exclusion policies (Hagmann et al 2018; Pouliot 2008), and – as demonstrated also in other contributions to this debate – the role of ‘things’, such as cameras, databases, drones and fences (Schouten 2014) to that politics.…”
Section: Reflexive Security Politics and Methodsmentioning
confidence: 99%
“…The idea was, after a first round of exploratory data collection, to then set the basis for two main techniques of visualization. The first was a Bourdieu-inspired multiple correspondence analysis of the field 3 contributing to the growing exploration of field analysis in critical security studies (Bigo, Bonditti, and Olsson 2011;Hagmann et al 2018). The second was a network analysis, a visualization technique used to map security networks (Baird 2017) but which could also be used for controversy analysis of a Latourian tradition.…”
Section: The Birth Of a Centipedementioning
confidence: 99%