Pablo Victor Fontes, Victoria Motta de Lamare França
{"title":"The reproduction of American identities in Somalia through terrorism and ethnicity","authors":"Pablo Victor Fontes, Victoria Motta de Lamare França","doi":"10.1080/21624887.2023.2286776","DOIUrl":"https://doi.org/10.1080/21624887.2023.2286776","url":null,"abstract":"","PeriodicalId":29930,"journal":{"name":"Critical Studies on Security","volume":"2010 12","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139239565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Naming the city: on the governing forces of narratives in the formation of security dispositifs","authors":"León von der Burg, Susanne Krasmann","doi":"10.1080/21624887.2023.2286770","DOIUrl":"https://doi.org/10.1080/21624887.2023.2286770","url":null,"abstract":"","PeriodicalId":29930,"journal":{"name":"Critical Studies on Security","volume":"29 7","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139242545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solidarity through service: the role of the guild of IT service managers in the field of European (in)security","authors":"Eileen Murphy Maguire","doi":"10.1080/21624887.2023.2278260","DOIUrl":"https://doi.org/10.1080/21624887.2023.2278260","url":null,"abstract":"","PeriodicalId":29930,"journal":{"name":"Critical Studies on Security","volume":"142 2","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139262075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arms, aviation, and apologies: mapping the Boeing social media response to the 2019 Ethiopian Airlines crash","authors":"Natalie Jester, Emma Dolan","doi":"10.1080/21624887.2023.2267328","DOIUrl":"https://doi.org/10.1080/21624887.2023.2267328","url":null,"abstract":"Boeing is famous for aviation but also produces arms, making $29.2 billion from the latter in 2018. The role of the arms trade in facilitating death can be considered a ‘public secret’ - known, but socially unacknowledged. This allows Boeing to represent its role as one of ‘neutral’ technological advancement, obscuring violence engendered by certain products. This paper builds on works on public secrecy, which investigate how (un)acknowledgement obscures everyday security arrangements. How can we know the public secret? We argue that public apology and scandal are boundary-delineating practices, locating certain issues within the public secret and rendering others knowable and sayable. We examine Boeing’s Twitter response to the March 2019 Ethiopian Airlines flight 302 crash. The content: 1) produced the crash as a tragedy, positioning Boeing as ‘sorry’ and capable of grief, 2) allowed Boeing to ‘take responsibility’, positioning safe operation of their products as a moral obligation. Within the wider political contexts of the arms trade and responsibility for safety in commercial aviation, we explain Boeing’s Twitter navigation of apology/scandal not as simply corporate face-saving, but as a practice of (re)confirming the public secret, positioning aviation deaths as knowable/grievable, and those lost to the arms industry as neither.","PeriodicalId":29930,"journal":{"name":"Critical Studies on Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136210850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combatting insecurity in the everyday: the global anti-street harassment movement as everyday security practitioners","authors":"Karen Desborough, Jutta Weldes","doi":"10.1080/21624887.2023.2248435","DOIUrl":"https://doi.org/10.1080/21624887.2023.2248435","url":null,"abstract":"Street harassment renders countless women, girls and others insecure in their everyday lives. Over the past two decades a global grassroots movement developed to combat street harassment and its attendant insecurities. But neither phenomenon has excited the attention of Security Studies, critical or otherwise. In this paper, we focus on the global anti-street harassment movement, conceptualising its activists as ‘everyday security practitioners’ who, like privileged security practitioners in the state or the academy, theorise street harassment and devise and implement strategies to tackle it. In so doing we argue that Security Studies should pay more attention to the everyday, to insecurities like street harassment, and to such ‘everyday security practitioners’. To illustrate this argument we first define street harassment. We then consider Security Studies and its exclusion of the everyday. To argue for its inclusion in Security Studies, we explicate the diverse insecurities produced by street harassment, conceptualise 'everyday security practitioners’, and provide some illustrations of strategies deployed by the global anti-street harassment movement both to bring street harassment to wider public attention as a pervasive everyday insecurity and to combat it. We conclude with two suggestions for Security Studies.","PeriodicalId":29930,"journal":{"name":"Critical Studies on Security","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134969896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preparing for War: wargaming the NATO-Russia confrontation in the Baltics","authors":"Cindy Regnier","doi":"10.1080/21624887.2023.2253043","DOIUrl":"https://doi.org/10.1080/21624887.2023.2253043","url":null,"abstract":"ABSTRACT The recent literature has inquired how media, official discourses, popular culture, or even sports and toys, can shape political imaginary into thinking that military intervention is the only relevant course of action. In this endeavour, the role of wargaming in justifying further militarisation remains largely understudied. By building upon the RAND Baltic 2014–2015 wargame and the subsequent NATO decision to deploy troops in the Baltics and Poland, I propose that certain wargames can legitimise the use of force in three ways: by reflecting the security community’s concerns in the storyline of the game, by designing the game in such a manner that preparation for war becomes the only well-founded means of tackling the issues posed by the game, and by enhancing its circulation in the defence field, notably by presenting the wargame as having the same level of credibility as science. Drawing upon assemblage theory, I propose that wargaming encompasses more than the individual experiences of its players. It encompasses the extensive sociotechnical assemblage of practices, technologies, networks of actors, and resulting emergent properties that together can amplify the conditions of possibility favourable to military deployment.","PeriodicalId":29930,"journal":{"name":"Critical Studies on Security","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45973576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Viral bodies: racialised and gendered logics in the securitisation of migration during COVID-19 in Italy","authors":"Agnese Pacciardi","doi":"10.1080/21624887.2023.2248437","DOIUrl":"https://doi.org/10.1080/21624887.2023.2248437","url":null,"abstract":"ABSTRACT Since the spread of the COVID-19 pandemic, migrants’ mobility has been increasingly securitised as governments have been adopting extraordinary measures to close both external and internal borders. Similarly, the presence of migrants within countries has often been met with lower levels of acceptance, leading to the implementation of discriminatory and xenophobic measures. Although debates on the securitisation of migration are well established in the literature, this article demonstrates how the securitisation of migration during the COVID-19 pandemic has relied on gendered and racialised notions deeply entrenched in the legacy of colonial modernity. Examining newspaper articles and declarations by Italian prominent politicians, this contribution shows how this process has happened through 4 main discursive frames imbued with racial and gendered assumptions: 1) the virus as a foreign threat; 2) migrants as diseased bodies; 3) migrants as a burden; 4) migrants as racialised hypermasculine bodies.","PeriodicalId":29930,"journal":{"name":"Critical Studies on Security","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41686163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing the platform: how Google appropriates security.","authors":"Anneroos Planqué-van Hardeveld","doi":"10.1080/21624887.2023.2239002","DOIUrl":"10.1080/21624887.2023.2239002","url":null,"abstract":"<p><p>Google is increasingly developing a manifold of security products for its users, businesses, and national security actors like the US Department of Defence. However, the company and its employees struggle with whether, and how, it should be involved in practices of security, war or weaponry. To unpack how Google emerges as a security actor, I bring new media studies perspectives regarding the socio-political roles Google plays in today's society to critical security studies. With this interdisciplinary approach to studying Big Tech's role in security, this article analyses how Google appropriates security throughout its ecosystem of platforms, products and projects. The article illustrates that Google's first and foremost objective is to secure its platform by carefully balancing between being perceived as both neutral and progressive. Google thus appropriates (in)security by developing seemingly mundane and neutral security products, services and projects that align with its platform logic. In doing so, Google locks in new users into its platforms, whilst reshaping (in)security issues into platform issues and identifying the platform as a public and security concern.</p>","PeriodicalId":29930,"journal":{"name":"Critical Studies on Security","volume":"1 1","pages":"161-175"},"PeriodicalIF":1.6,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10642423/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41609127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State in/security, ethnicity, and tourism: mapping tourist spaces and Sri Lankan identity politics","authors":"Shelby E. Ward","doi":"10.1080/21624887.2023.2239009","DOIUrl":"https://doi.org/10.1080/21624887.2023.2239009","url":null,"abstract":"ABSTRACT This article follows suggestions from participants in interview and mapping exercises in Sri Lanka from December 2017-January 2018 that travellers and tourists to the country should visit the former war zones in the North and East of the country. These were the primary territories inflicted by the Sri Lankan civil war (1983–2009) between the majority Sinhalese and the minority Tamils. I extend these discussions to underlying identity and ethnic politics that caused these now tourist locations to be war zones in the first place, as well as reflect how the exclusionary politics of nationalism reflects continued postcolonial anxiety and the acceptance (or not) of Islamic identities within the contemporary state. Examining an underlying nexus of security, development, and ethnic politics in the Sri Lankan context, I argue that economic relations within its tourism industry indicates the anxiety, insecurity, and limitations of the nation-state more broadly.","PeriodicalId":29930,"journal":{"name":"Critical Studies on Security","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42558822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}