scholarly journals An overview of the Copenhagen school’s approach to security studies: constructing (in)security through performative power

2016 ◽  
Vol 8 (2) ◽  
pp. 47-72
Author(s):  
Luiza-Maria Filimon

Security has generally posed a challenge to those who have attempted to reach an ideal, comprehensive and encompassing definition of the concept. Orthodox perspectives have mainly focused on the state as a “harbinger” of security that defends its territory and citizens against external enemies through the acquisition of military grade weapons. Neorealist theorist, Stephen Walt defines security as “the study of threat, use, and control of military force” (1991, 212). Since security is a seemingly self-explanatory concept, it has also been rather underdeveloped to the point that International Relations theorist Barry Buzan argues that before the ‘80s, “conceptual literature on security” was rather neglected if not, a sorely absent field of inquiry (1983, 3-4). Buzan himself, along with Ole Wæver and Jaap de Wilde, proposed a new research agenda for security as evidenced in the book: “Security: A New Framework for Analysis” (1997). These authors are regarded as the main representatives of what today we refer to as the Copenhagen School of Security Studies. The present article provides an analysis of the Copenhagen School’s “good practices” on security and securitization as speech acts (Mutimer 2016, 93) and intersubjective processes (de Graaf 2011, 11), in order to address the performative power behind the contemporaneous security architecture and the security practices of threat construction.

2021 ◽  
Vol 21 (1) ◽  
pp. 20-32
Author(s):  
Oleg Sergeevich Gaidaev

More than 20 years have passed since B. Buzan, O. Wver and J. de Wilde published their Security: A New Framework for Analysis, which has become a classic in the discipline of security studies. Although Russian scholars increasingly attempt to use the securitization theorys conceptual apparatus in their research, the knowledge of the theory itself remains rather fragmentary. The overwhelming majority of existing papers refer to the so-called Copenhagen Schools (CS) intellectual heritage, while more comprehensive approaches and recent studies remain almost unknown among Russian scholars. The author attempts to fill this gap. This article is first in line of a series of studies, entirely devoted to the phenomenon of securitization: from the earliest milestones to the modern stage of development of the theory. The paper examines the theoretical and philosophical premises, as well as the ideas and assumptions of the securitization theory, first formulated by O. Wver in the late 1980s. The author refers to the original texts of the main figures of the CS: O. Wver and B. Buzan, conceptualizing the history of the concept of securitization and immersing the reader into the atmosphere of security studies field at the end of the 20th century. As a result, it becomes possible to determine the key elements of the early theory of securitization: security as a speech act, national security as a main focus of study, post-structural realism as a research agenda of O. Wver, and the idea of security as a negative meaning. The article concludes that despite the shortcomings of the early theory of securitization noted by many critics, it was based on a valuable and fruitful idea - an attempt to go beyond the notion of security as an absolute good or a metaphysical entity, which was typical of traditional and many alternative approaches to the definition of security.


Author(s):  
David Mutimer

This chapter provides a partial history of the label ‘Critical Security Studies’ and the way it has developed and fragmented since the early 1990s. It considers the primary claims of the major divisions that have emerged within the literatures to which the label has been applied: constructivism, critical theory, and poststructuralism. It looks at the 1994 conference held at York University in Toronto entitled Strategies in Conflict: Critical Approaches to Security Studies, which spawned a book called Critical Security Studies: Concepts and Cases (1997b), and Security: A New Framework for Analysis (1998), which was published to serve as a relatively comprehensive statement of ‘securitization studies’, or the Copenhagen School. The chapter argues that Critical Security Studies needs to foster an ‘ethos of critique’ in either the study or refusal of security. Finally, it examines Ken Booth’s views on poststructuralism as part of a broad Critical Security Studies.


2011 ◽  
Vol 20 (2) ◽  
pp. 207-214 ◽  
Author(s):  
BARBARA LÜTHI

Despite the present-day attraction of ‘security’ as an attention-grabbing word in politics and the public sphere, the study of security is a missing chapter in many state-of-the-art surveys of historical literature. Its central relevance for the modern statehood has been obvious for centuries in the European context. In Thomas Hobbes's mid-seventeenth-century Leviathan, written in the context of the devastating English civil war and previous religious wars, government was given the fundamental role in guaranteeing security. Over the course of the twentieth century, intellectuals have constantly debated Hobbes's ideas and concepts about security and societal peace. Especially after the second world war, security has found major attention in the fields of International Relations and its sub-discipline security studies. Security studies evolved during the nuclear age and were originally foremost about the study of the threat, use and control of military force, as one proponent of security studies, Stephen Walt, stated. They were mainly concerned with military strategy and giving policy advice to the military. Since the cold war, the study of security has come a long way. Most importantly, as Emma Rothschild has reminded us, during the past two decades or so, the concept was first extended downwards from states to individuals, upwards from the nation to the biosphere and horizontally from the military to the economic, social, political and environmental. It is the reflection of this dynamic change in theory, methodology and empirical research that connects most of the books under review in this article.


2018 ◽  
Vol 9 ◽  
pp. 46-56
Author(s):  
Nafisa Abdulhamid

The European Union (EU) presents an intriguing case-study for examining the normative and empirical degree of the securitization of immigration in the post-9/11 context. The following paper uses the Copenhagen school of security studies to argue that in the aftermath of the 9/11 attacks, the securitization of immigration (through direct and indirect elite speech acts) has legitimized exclusionary policies and practices, thereby constituting a “new (cultural) racism.” This new cultural racism acts as a justification against immigration. My argument will be presented in three parts. The first outlines how elite direct and indirect speech acts creates an “immigration-as-a-cultural-threat discourse” that constitutes a “new racism.” The second analyzes how the securitization of immigration discourse has been implemented through legal and institutional practices, including in the Convention Implementing the Schengen Agreement (CISA), the Dublin Convention, and various border security practices. The final section examines the significance of 9/11 in connecting perceived Muslim immigrants to terrorism, thus constructing a discourse that identifies immigration with a direct threat to European identity and social cohesion.


Author(s):  
Ralf Emmers

This chapter examines the Copenhagen School and its securitization model. The Copenhagen School broadens the definition of security by encompassing five different sectors: military, political, societal, economic, and environmental security. It first provides an overview of the Copenhagen School’s securitization model before discussing its application to empirical research as well as the limitations of the securitization model. It then considers the role of the securitizing actor and the importance of the ‘speech act’ in convincing a specific audience of a threat’s existential nature. It argues that the Copenhagen School allows for non-military matters to be included in Security Studies while still offering a coherent understanding of the concept of security. It also describes the dangers and the negative connotations of securitizing an issue and concludes with some cases of securitization, including the securitization of undocumented migration, securitization of drug trafficking, and the failure of securitization in the Iraq War.


Author(s):  
Ralf Emmers

This chapter examines the Copenhagen School and its securitization model. The Copenhagen School broadens the definition of security by encompassing five different sectors: military, political, societal, economic, and environmental security. It first provides an overview of the Copenhagen School’s securitization model before discussing its application to empirical research as well as the limitations of the securitization model. It then considers the role of the securitizing actor and the importance of the ‘speech act’ in convincing a specific audience of a threat’s existential nature. It argues that the Copenhagen School allows for non-military matters to be included in Security Studies while still offering a coherent understanding of the concept of security. It also describes the dangers and the negative connotations of securitizing an issue and concludes with some cases of securitization, including the securitization of undocumented migration, securitization of drug trafficking, and the failure of securitization in the Iraq War.


Author(s):  
David Mutimer

This chapter provides a partial history of the label ‘Critical Security Studies’ and the way it has developed and fragmented since the early 1990s. It considers the primary claims of the major divisions that have emerged within the literatures to which the label has been applied: constructivism, critical theory, and poststructuralism. It looks at the 1994 conference held at York University in Toronto entitled Strategies in Conflict: Critical Approaches to Security Studies, which spawned a book called Critical Security Studies: Concepts and Cases (1997b), and Security: A New Framework for Analysis (1998), which was published to serve as a relatively comprehensive statement of ‘securitization studies’, or the Copenhagen School. The chapter argues that Critical Security Studies needs to foster an ‘ethos of critique’ in either the study or refusal of security. Finally, it examines Ken Booth’s views on poststructuralism as part of a broad Critical Security Studies.


2020 ◽  
Author(s):  
Isra Revenia

This article is made to know the destinantion and the administrasi functions of the school in order to assist the leader of an organazation in making decisions and doing the right thing, recording of such statements in addition to the information needs also pertains to the function of accountabilitty and control functions. Administrative administration is the activity of recording for everything that happens in the organization to be used as information for leaders. While the definition of administration is all processing activities that start from collecting (receiving), recording, processing, duplicating, minimizing and storing all the information of correspondence needed by the organization. Administration is as an activity to determine everything that happens in the organization, to be used as material for information by the leadership, which includes all activities ranging from manufacturing, managing, structuring to all the preparation of information needed by the organization.


1994 ◽  
Vol 30 (1) ◽  
pp. 167-175
Author(s):  
Alan H. Vicory ◽  
Peter A. Tennant

With the attainment of secondary treatment by virtually all municipal discharges in the United States, control of water pollution from combined sewer overflows (CSOs) has assumed a high priority. Accordingly, a national strategy was issued in 1989 which, in 1993, was expanded into a national policy on CSO control. The national policy establishes as an objective the attainment of receiving water quality standards, rather than a design storm/treatment technology based approach. A significant percentage of the CSOs in the U.S. are located along the Ohio River. The states along the Ohio have decided to coordinate their CSO control efforts through the Ohio River Valley Water Sanitation Commission (ORSANCO). With the Commission assigned the responsibility of developing a monitoring approach which would allow the definition of CSO impacts on the Ohio, research by the Commission found that very little information existed on the monitoring and assessment of large rivers for the determination of CSO impacts. It was therefore necessary to develop a strategy for coordinated efforts by the states, the CSO dischargers, and ORSANCO to identify and apply appropriate monitoring approaches. A workshop was held in June 1993 to receive input from a variety of experts. Taking into account this input, a strategy has been developed which sets forth certain approaches and concepts to be considered in assessing CSO impacts. In addition, the strategy calls for frequent sharing of findings in order that the data collection efforts by the several agencies can be mutually supportive and lead to technically sound answers regarding CSO impacts and control needs.


1996 ◽  
Vol 118 (3) ◽  
pp. 482-488 ◽  
Author(s):  
Sergio Bittanti ◽  
Fabrizio Lorito ◽  
Silvia Strada

In this paper, Linear Quadratic (LQ) optimal control concepts are applied for the active control of vibrations in helicopters. The study is based on an identified dynamic model of the rotor. The vibration effect is captured by suitably augmenting the state vector of the rotor model. Then, Kalman filtering concepts can be used to obtain a real-time estimate of the vibration, which is then fed back to form a suitable compensation signal. This design rationale is derived here starting from a rigorous problem position in an optimal control context. Among other things, this calls for a suitable definition of the performance index, of nonstandard type. The application of these ideas to a test helicopter, by means of computer simulations, shows good performances both in terms of disturbance rejection effectiveness and control effort limitation. The performance of the obtained controller is compared with the one achievable by the so called Higher Harmonic Control (HHC) approach, well known within the helicopter community.


Sign in / Sign up

Export Citation Format

Share Document