GLORIA

GEOMAR Library Ocean Research Information Access

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    Cambridge University Press (CUP) ; 2016
    In:  European Journal of International Security Vol. 1, No. 2 ( 2016-07), p. 176-198
    In: European Journal of International Security, Cambridge University Press (CUP), Vol. 1, No. 2 ( 2016-07), p. 176-198
    Kurzfassung: This article argues that some core tenets of Actor-Network Theory (ANT) can serve as heuristics for a better understanding of what the stakes of cyber-security are, how it operates, and how it fails. Despite the centrality of cyber-incidents in the cyber-security discourse, researchers have yet to understand their link to, and affects on politics. We close this gap by combining ANT insights with an empirical examination of a prominent cyber-incident (Stuxnet). We demonstrate that the disruptive practices of cyber-security caused by malicious software (malware), lie in their ability to actively perform three kinds of space (regions, networks, and fluids), each activating different types of political interventions. The article posits that the fluidity of malware challenges the consistency of networks and the sovereign boundaries set by regions, and paradoxically, leads to a forceful re-enactment of them. In this respect, the conceptualisation of fluidity as an overarching threat accounts for multiple policy responses and practices in cyber-security as well as attempts to (re-)establish territoriality and borders in the virtual realm. While this article concentrates on cyber-security, its underlying ambition is to indicate concretely how scholars can profitably engage ANT’s concepts and methodologies.
    Materialart: Online-Ressource
    ISSN: 2057-5637 , 2057-5645
    Sprache: Englisch
    Verlag: Cambridge University Press (CUP)
    Publikationsdatum: 2016
    ZDB Id: 2836745-5
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Cambridge University Press (CUP) ; 2017
    In:  Perspectives on Politics Vol. 15, No. 3 ( 2017-09), p. 939-941
    In: Perspectives on Politics, Cambridge University Press (CUP), Vol. 15, No. 3 ( 2017-09), p. 939-941
    Materialart: Online-Ressource
    ISSN: 1537-5927 , 1541-0986
    Sprache: Englisch
    Verlag: Cambridge University Press (CUP)
    Publikationsdatum: 2017
    ZDB Id: 2097690-2
    ZDB Id: 2113021-8
    SSG: 7,26
    SSG: 3,6
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    SAGE Publications ; 2016
    In:  International Relations Vol. 30, No. 4 ( 2016-12), p. 494-531
    In: International Relations, SAGE Publications, Vol. 30, No. 4 ( 2016-12), p. 494-531
    Kurzfassung: Securitization theory seeks to explain the politics through which (1) the security character of public problems is established, (2) the social commitments resulting from the collective acceptance that a phenomenon is a threat are fixed and (3) the possibility of a particular policy is created. In the last decade, research on securitization has grown significantly. The aim of this article is to evaluate the achievements of securitization theory. First, its main concepts and premises are critically discussed. This article then proceeds to examine the empirical applications of securitization theory to a broad range of issues, as well as the theoretical implications of these studies. Finally, it discusses the main challenges faced by securitization scholars and puts forward strategies to overcome them. This article develops three inter-related arguments. First, notably thanks to empirical studies, securitization theory has significantly developed beyond its initial focus on the speech act. Second, as a result, the distinctiveness of securitization theory currently lies in its capacity to articulate a specific approach to security – influenced by the speech act – with an ‘analytics of government’, which emphasizes practices and processes. Third, securitization theory faces three types of challenges, related, respectively, to theory, method and methodology. The capacity of scholars to overcome those will strongly influence the extent to which securitization theory will be able to make significant contributions to the debates in Security Studies and International Relations in the years to come.
    Materialart: Online-Ressource
    ISSN: 0047-1178 , 1741-2862
    RVK:
    Sprache: Englisch
    Verlag: SAGE Publications
    Publikationsdatum: 2016
    ZDB Id: 2058898-7
    SSG: 8
    SSG: 3,6
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    SAGE Publications ; 2015
    In:  International Relations Vol. 29, No. 1 ( 2015-03), p. 97-102
    In: International Relations, SAGE Publications, Vol. 29, No. 1 ( 2015-03), p. 97-102
    Materialart: Online-Ressource
    ISSN: 0047-1178 , 1741-2862
    RVK:
    Sprache: Englisch
    Verlag: SAGE Publications
    Publikationsdatum: 2015
    ZDB Id: 2058898-7
    SSG: 8
    SSG: 3,6
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    SAGE Publications ; 2015
    In:  Political Studies Review Vol. 13, No. 4 ( 2015-11), p. 546-559
    In: Political Studies Review, SAGE Publications, Vol. 13, No. 4 ( 2015-11), p. 546-559
    Kurzfassung: Recent research shows that interpretations and uses of the precautionary principle can exacerbate the relations between states. Indeed, the precautionary principle increasingly plays a pivotal role in explaining how actors position themselves on various issues related to health, safety and environmental (HSE) risks. However, the books under review tend to subscribe to the approach that separates out precaution from risk assessment. In contrast, it is suggested in this article that the precautionary reasoning is a distinctive view of risk regulation, which reworks rather than repudiates risk assessment. This turn might help scholars to embark on the difficult task of understanding the extent to which the precautionary principle affects how HSE norms on risks are crafted, the channels through which they spread and the mechanisms that enable them to operate effectively.
    Materialart: Online-Ressource
    ISSN: 1478-9299 , 1478-9302
    RVK:
    Sprache: Englisch
    Verlag: SAGE Publications
    Publikationsdatum: 2015
    ZDB Id: 2106656-5
    SSG: 3,6
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Cambridge University Press (CUP) ; 2018
    In:  European Journal of International Security Vol. 3, No. 1 ( 2018-02), p. 22-44
    In: European Journal of International Security, Cambridge University Press (CUP), Vol. 3, No. 1 ( 2018-02), p. 22-44
    Kurzfassung: The use of numbers has been remarkably effective at pressing global claims. While research has documented the historical processes through which numbers gained such prominence, and has examined the political and ethical consequences of this omnipresence, very little is known regarding the specific ways in which numbers create the outcomes that sustain governance. This article proposes to close that gap. Building on the literature that acknowledges that numbers not only describe things but also have profound impacts on things themselves, this article offers an integrated account of the working dynamics of numbers in the governance of security. To do so, the article identifies three distinct but connected vectors of power through which numbers shape security governance: persuasion, (de)politicisation, and standardisation. These insights are exemplified through the prism of different empirical examples, the variety of which aims to display the advantages of the approach we propose.
    Materialart: Online-Ressource
    ISSN: 2057-5637 , 2057-5645
    Sprache: Englisch
    Verlag: Cambridge University Press (CUP)
    Publikationsdatum: 2018
    ZDB Id: 2836745-5
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Brill ; 2017
    In:  European Review of International Studies Vol. 4, No. 2-3 ( 2017-12-26), p. 119-121
    In: European Review of International Studies, Brill, Vol. 4, No. 2-3 ( 2017-12-26), p. 119-121
    Materialart: Online-Ressource
    ISSN: 2196-6923 , 2196-7415
    Sprache: Unbekannt
    Verlag: Brill
    Publikationsdatum: 2017
    ZDB Id: 2870035-1
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Informa UK Limited ; 2019
    In:  Security Studies Vol. 28, No. 1 ( 2019-01), p. 58-86
    In: Security Studies, Informa UK Limited, Vol. 28, No. 1 ( 2019-01), p. 58-86
    Materialart: Online-Ressource
    ISSN: 0963-6412 , 1556-1852
    Sprache: Englisch
    Verlag: Informa UK Limited
    Publikationsdatum: 2019
    ZDB Id: 2097675-6
    SSG: 8
    SSG: 3,6
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Informa UK Limited ; 2018
    In:  West European Politics Vol. 41, No. 4 ( 2018-07-04), p. 890-913
    In: West European Politics, Informa UK Limited, Vol. 41, No. 4 ( 2018-07-04), p. 890-913
    Materialart: Online-Ressource
    ISSN: 0140-2382 , 1743-9655
    RVK:
    Sprache: Englisch
    Verlag: Informa UK Limited
    Publikationsdatum: 2018
    ZDB Id: 716441-5
    ZDB Id: 2061982-0
    SSG: 8
    SSG: 3,6
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    SAGE Publications ; 2015
    In:  International Relations Vol. 29, No. 1 ( 2015-03), p. 96-96
    In: International Relations, SAGE Publications, Vol. 29, No. 1 ( 2015-03), p. 96-96
    Kurzfassung: One of the great appeals of securitization theory, and a major reason for its success, has been its usefulness as a tool for empirical research: an analytic framework capable of practical application. However, the development of securitization has raised several criticisms, the most important of which concern the nature of securitization theory. In fact, the appropriate methods, the research puzzles and type of evidence accepted all derive to a great extent from the kind of theory scholars bequeath their faith to. This Forum addresses the following questions: What type of theory (if any) is securitization? How many kinds of theories of securitization do we have? How can the differences between theories of securitization be drawn? What is the status of exceptionalism within securitization theories, and what difference does it make to their understandings of the relationship between security and politics? Finally, if securitization commands that leaders act now before it is too late, what status has temporality therein? Is temporality enabling securitization to absorb risk analysis or does it expose its inherent theoretical limits?
    Materialart: Online-Ressource
    ISSN: 0047-1178 , 1741-2862
    RVK:
    Sprache: Englisch
    Verlag: SAGE Publications
    Publikationsdatum: 2015
    ZDB Id: 2058898-7
    SSG: 8
    SSG: 3,6
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...