Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-v9fdk Total loading time: 0 Render date: 2024-11-05T05:30:55.983Z Has data issue: false hasContentIssue false

7 - Everyday Exceptions

The Paradox of a Perpetual State of Emergency

from Part II - The West in Use

Published online by Cambridge University Press:  20 January 2017

Gunther Hellmann
Affiliation:
Goethe-Universität Frankfurt Am Main
Benjamin Herborth
Affiliation:
Rijksuniversiteit Groningen, The Netherlands
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Uses of 'the West'
Security and the Politics of Order
, pp. 136 - 155
Publisher: Cambridge University Press
Print publication year: 2016

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

AdlerEmanuel and Barnett, Michael, eds. (1998) Security Communities (Cambridge: Cambridge University Press).CrossRefGoogle Scholar
AlbertMathias, Brock, Lothar, and Wolf, Klaus Dieter (2000) Civilizing World Politics: Society and Community beyond the State (Oxford: Rowman & Littlefield).Google Scholar
AradauClaudia and van Munster, Rens (2008) ‘Insuring Terrorism, Assuring Subjects, Ensuring Normality. The Politics of Risk after 9/11,’ Alternatives: Global, Local, Political 33, 2, pp. 191210.CrossRefGoogle Scholar
AradauClaudia and van Munster, Rens (2007) ‘Governing Terrorism through Risk: Taking Precautions, (un)Knowing the Future,’ European Journal of International Relations 13, 1, pp. 89115.CrossRefGoogle Scholar
BalzacqThierry (2005) ‘The Three Faces of Securitization: Political Agency, Audience and Context,’ European Journal of International Relations 11, 2, pp. 171201.CrossRefGoogle Scholar
BartelsonJens (1995) A Genealogy of Sovereignty (Cambridge: Cambridge University Press).CrossRefGoogle Scholar
Bially MatternJanice (2005) Ordering International Politics: Identity, Crisis, and Representational Force (New York: Routledge).Google Scholar
BigoDidier (2001) ‘Internal and External Security(ies): The Möbius Ribbon,’ in Albert, Mathias, Jacobson, David and Lapid, Yosef, eds., Identities, Borders, Orders: Rethinking International Relations Theory (Minneapolis: University of Minnesota Press), pp. 91136.Google Scholar
BigoDidier (2008) ‘Globalized (In)security: the Field and the Ban-Opticon,’ in Bigo, Didier and Tsoukala, Anastassia, eds., Terror, Insecurity and Liberty: Illiberal Practices of Liberal Regimes after 9/11 (London: Routledge), pp. 1048.CrossRefGoogle Scholar
BuzanBarry and Wæver, Ole (2003) Regions and Powers: The Structure of International Security (Cambridge: Cambridge University Press).CrossRefGoogle Scholar
BuzanBarry and Wæver, Ole (2009) ‘Macrosecuritisation and Security Constellations: Reconsidering Scale in Securititisation Theory’, Review of International Studies, 35, 2, pp. 253276.CrossRefGoogle Scholar
BuzanBarry, Wæver, Ole, and de Wilde, Jaap (1998) Security: A New Framework for Analysis (Boulder, CO: Lynne Rienner).Google Scholar
Council of Europe (2006) Parliamentary Assembly, Resolution 1507, ‘Alleged Secret Detentions and Unlawful Inter-state Transfers of Detainees Involving Council of Europe Member States’, available at http://assembly.coe.int/main.asp?link=/documents/adoptedtext/ta06/eres1507.htm.Google Scholar
DershowitzAlan (2002) ‘Want to Torture? Get a Warrant', San Francisco Chronicle, 22 January 2002.Google Scholar
GreenbergKaren J., ed. (2005a) The Torture Debate in America (Cambridge: Cambridge University Press).CrossRefGoogle Scholar
GreenbergKaren J., ed. (2005b) The Torture Papers: The Road to Abu Ghraib (Cambridge: Cambridge University Press).CrossRefGoogle Scholar
HallStuart (1992) ‘The West and the Rest: Discourse and Power’, in Hall, Stuart and Gieben, Bram, eds., Formations of Modernity (Cambridge: Polity Press), pp. 275320.Google Scholar
HansenLene (2006) Security as Practice: Discourse Analysis and the Bosnian War (London: Routledge).Google Scholar
HellmannGunther and Herborth, Benjamin (2008) ‘Fishing in the Mild West: Militarized Interstate Disputes in the Transatlantic Community’, Review of International Studies 34, pp. 481506.CrossRefGoogle Scholar
HenleyJon (2001) ‘Swiss Terror Swoop Discomposes Boulez, 75', The Guardian, 5 January 2001.Google Scholar
HershSeymour M. (2004) Chain of Command: The Road from 9/11 to Abu Ghraib (New York: HarperCollins).Google Scholar
HuysmansJef (2006) The Politics of Insecurity: Fear, Migration and Asylum in the EU (London: Routledge).CrossRefGoogle Scholar
JacksonPatrick Th. (2006) Civilizing the Enemy: German Reconstruction and the Invention of the West (Ann Arbor: University of Michigan Press).CrossRefGoogle Scholar
KesslerOliver (2008) ‘Is Risk Changing the Politics of Legal Argumentation?, Leiden Journal of International Law 21, pp. 863884.CrossRefGoogle Scholar
KesslerOliver (2010) ‘Risk,’ in Burgess, Peter, ed., The Routledge Handbook of New Security Studies (London: Routledge), pp. 1726.Google Scholar
KesslerOliver and Daase, Christopher (2008) ‘From Insecurity to Uncertainty: Risk and the Paradox of Security Politics,’ Alternatives: Global, Local, Political 33, 2, pp. 211232.CrossRefGoogle Scholar
KoskenniemiMartti (2002) The Gentle Civilizer of Nations: The Rise and Fall of International Law 1870–1960 (Cambridge University Press, Cambridge).Google Scholar
KoskenniemiMartti (2009) ‘Miserable Comforters: International Relations as New Natural Law,’ European Journal of International Relations 15, 3, pp. 395422.CrossRefGoogle Scholar
KratochwilFriedrich (1989) Rules, Norms, and Decisions: On the Conditions of Practical and Legal Reasoning in International Relations and Domestic Affairs (Cambridge: Cambridge University Press).CrossRefGoogle Scholar
MayerJane (2008) The Dark Side: The Inside Story of How the War on Terror Turned into a War on American Ideals (New York: Doubleday).Google Scholar
NeumannIver B. (1999) Uses of the Other: ‘The East’ in European Identity Formation (Minneapolis: University of Minnesota Press).Google Scholar
OnufNicholas (1989) World of Our Making: Rules and Rule in Social Theory and International Relations (Columbia: University of South Carolina Press).Google Scholar
PetersenKaren Lund (2008) ‘Terrorism: When Risk Meets Security,’ Alternatives: Global, Local, Political 33, 2, pp. 173190.CrossRefGoogle Scholar
PrantlHeribert (2008) Der Terrorist als Gesetzgeber. Wie man mit Angst Politik macht (München: Droemer).Google Scholar
RejaliDarius (2007) Torture and Democracy (Princeton, NJ: Princeton University Press).Google Scholar
RoePaul (2004) ‘Securitization and Minority Rights: Conditions of Desecuritization,’ Security Dialogue 35, 3, pp. 279294.CrossRefGoogle Scholar
RortyRichard (2004a) ‘Post-Democracy: Richard Rorty on Anti-terrorism and the National Security State,’ London Review of Books, 26, 7, pp. 1011.Google Scholar
RortyRichard (2004b) ‘Anti-Terrorism and the National Security State,’ Online Talk at the Einstein Forum, available at: http://www.content-tv.com/NewFiles/Rorty.html.Google Scholar
SikkinkKathryn (2013) ‘The United States and Torture: Does the Spiral Model Work?’, in Risse, Thomas, Ropp, Stephen C., and Sikkink, Kathryn, eds., The Persistent Power of Human Rights: From Commitment to Compliance (Cambridge: Cambridge University Press), pp. 145163.CrossRefGoogle Scholar
StritzelHolger (2007) ‘Towards a Theory of Securitization: Copenhagen and Beyond,European Journal of International Relations 13, 3, pp. 357383.CrossRefGoogle Scholar
WaxSteven T. (2008) Kafka Comes to America: Fighting for Justice in the War on Terror – A Public Defender's Inside Account (New York: Other Press).Google Scholar
WæverOle (1995) ‘Self-Referential Concepts of Security as an Instrument for Reconstruction of an Open-Ended Realism in IR,’ in Wæver, Ole, Concepts of Security (Copenhagen: University of Copenhagen).Google Scholar
WæverOle (1998) ‘Insecurity, Security, and Asecurity in the West European Non-war Community,’ in Adler, Emmanuel and Barnett, Michael, eds., Security Communities (Cambridge: Cambridge University Press), pp. 69118.CrossRefGoogle Scholar
WæverOle (2009) ‘What Exactly Makes a Continuous Existential Threat Existential – and How Is It Discontinued?’ in Barak, Oren and Sheffer, Gabi, eds., Existential Threats and Civil-Security Relations (Lanham: Lexington Books), pp. 1935.Google Scholar
YooJohn (2006) War by Other Means: An Insider's Account of the War on Terror (New York: Atlantic Monthly Press).Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×