Essays about: "Securitizing Speech Act"

Found 3 essays containing the words Securitizing Speech Act.

  1. 1. Hydro-securitization in the Indus River basin: An analysis of Indo-Pakistani security frames

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Vidar Wirén Gimle; [2019]
    Keywords : Securitization theory; India-Pakistan; Hydropolitics; Security frames; Transboundary waters; Law and Political Science;

    Abstract : The animosities between India and Pakistan have been continuous since partition of British India over seven decades ago. Disputes over Kashmir and the rivers flowing through the region can be said to represent a nucleus of the tensions between the two countries. READ MORE

  2. 2. Securitizing Libya: The securitizing aspects of UN:s and NATO:s justification of Operation Unified Protector

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Christian Norelius; [2014]
    Keywords : Securitization; Referent Object; Securitizing Actor; Securitizing Speech Act; Military Intervention; Libya; UNSC; NATO; Law and Political Science;

    Abstract : One of the toughest challenges for the international community is to justify military interventions in sovereign states. Echoing in terms of post-colonialism, underlying interest and power domination, military interventions must be argued for and legitimized in order to gain support from both public and institutional opinion. READ MORE

  3. 3. The Securitization of Cyberspace

    University essay from Lunds universitet/Statsvetenskapliga institutionen

    Author : Ola Hjalmarsson; [2013]
    Keywords : Cyberspace; Securitization; Copenhagen School; Speech-act; Obama Administration; Law and Political Science;

    Abstract : This essay explores how the American Government understands and characterizes cyberspace and its relation to security. Building on the theory of securitization, the essay seeks to understand and describe the speech-acts that the American Government under the Obama Administration engages in in order to securitize the cyber domain and related referent objects. READ MORE