Skip to main content
Social Sci LibreTexts

14: Securitization Theory

  • Page ID
    13076
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    Securitization theory shows us that national security policy is not a natural given, but carefully designated by politicians and decision-makers. According to securitization theory, political issues are constituted as extreme security issues to be dealt with urgently when they have been labeled as ‘dangerous’, ‘menacing’, ‘threatening’, ‘alarming’ and so on by a ‘securitising actor’ who has the social and institutional power to move the issue ‘beyond politics’. So, security issues are not simply ‘out there’ but rather must be articulated as problems by securitizing actors. Calling immigration a ‘threat to national security’, for instance, shifts immigration from a low priority political concern to a high priority issue that requires action, such as securing borders. Securitization theory challenges traditional approaches to security in IR and asserts that issues are not essentially threatening in themselves; rather, it is by referring to them as ‘security’ issues that they become security problems.


    This page titled 14: Securitization Theory is shared under a CC BY-NC license and was authored, remixed, and/or curated by Stephen McGlinchey, Rosie WAters & Christian Scheinpflug.

    • Was this article helpful?