Aufsatz(gedruckt)2004

Saugumo studijos - grizimas prie objektyvistinio analizes modelio

In: Politologija, Heft 2, S. 40-71

Verfügbarkeit an Ihrem Standort wird überprüft

Abstract

Security studies have survived a lot of transformations. Like any other social theory, security studies have gone through a number of consecutive development stages: the dominance of traditional theories (realism/neorealism), the rise of critical & discourse approaches as well as the attempts to modify the traditional theories & methodological frameworks & to search for the synthetic or universal theoretic models. Author reviews how the security studies developed in the last few decades. Further attention is devoted to the attempts of Barry Buzan to provide for a compromised frameworks for security analysis in his works People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era (1991), & Security: A New Framework for Analysis (1998). The first work was an attempt to sum up the most valuable inputs for a widening security agenda; it includes the new aspects of security (economic, political, social & ecological), acknowledging that a state can be one of the many other subjects in the security studies. The greatest value of this work is a model of sectorization of security studies -- analytical proposition to classify threats by sectors. The second framework for analysis seeks to preserve the use of the security sectors' concept. However B. Buzan, 0. Waever & J. de Wilde propose to include a discursive theory of securitization into the framework. Authors suggest that security is not an objective condition -- it is about presenting issues as existential threats that require emergency measures. Some critiques (eg. J. Eriksson) argue, theories of securitization & sectonzation are incompatible in methodological meaning. The author of this article gives some suggestions that a model of sectorization of security studies should be supplemented by a new sector -- the communication sector. This expansion of the model could help fill some gaps left in the B. Buzan model -- i.e. the way threats emerge, the reason why one threat is considered differently from the other one as well as why they enjoy a specific influence on the other security sectors. 3 Schemas. Adapted from the source document.

Problem melden

Wenn Sie Probleme mit dem Zugriff auf einen gefundenen Titel haben, können Sie sich über dieses Formular gern an uns wenden. Schreiben Sie uns hierüber auch gern, wenn Ihnen Fehler in der Titelanzeige aufgefallen sind.