Summary and Keywords
Since it was launched in the mid-1990s, the concept of securitization has consistently been in vogue, at least among European scholars of world politics and security studies. The idea of viewing security as intersubjective, where anyone or anything can be a threat if constructed as such, is both an appealing and useful conceptualization when analyzing security issues beyond the traditional, realist, state-centric view of security being equal to military issues. However, the precise aspects that make securitization appealing have also limited its broader impact on security studies or foreign policy analysis (FPA), as these fields often adhere to the assumption of threats being actor-based and external. Nevertheless, several studies demonstrate that both the theoretical assumptions of securitization theory and prior empirical applications of these assumptions are useful when analyzing different policy and security issues, and the concept can be applied to a broad range of issue areas, contexts, and actors. In order to capture the applicability of securitization theory to the study of foreign policy, this article will set out to describe and review the central assumptions of securitization theory and the different conceptual developments that have taken place since its inception. I thereafter proceed to outline different issue areas to which securitization has been employed, focusing on both domestic and external military and nonmilitary threats. This review of prior works demonstrates that although many studies are not self-proclaimed analyses of foreign policy, they capture important dynamics of the internal-external security nexus that epitomizes politics in the globalized era. The article concludes with a discussion of the added value that a securitization framework can bring to FPA.
Access to the complete content on Oxford Research Encyclopedia of Politics requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.