dc.contributor.author | Zwierlein, Cornel | de |
dc.contributor.author | Graaf, Beatrice de | de |
dc.date.accessioned | 2014-04-08T11:06:39Z | |
dc.date.available | 2015-11-04T16:16:22Z | |
dc.date.issued | 2013 | de |
dc.identifier.issn | 0172-6404 | |
dc.identifier.uri | http://www.ssoar.info/ssoar/handle/document/38154 | |
dc.description.abstract | This introduction offers a brief historiographic account on current histories of security. A case is made for historians to rely more on and profit from recent theories and concepts in political science, most notably the concepts invented by the Copenhagen School on securitization. Furthermore, an attempt is made to ‘historicize security’ and provide some new methodological perspectives, in particular the idea of connecting security to conspiracy as an operational dispositive for analyzing instances of security policy making. | en |
dc.language | en | de |
dc.subject.ddc | Internationale Beziehungen | de |
dc.subject.ddc | Politikwissenschaft | de |
dc.subject.ddc | Geschichte | de |
dc.subject.ddc | History | en |
dc.subject.ddc | International relations | en |
dc.subject.ddc | Political science | en |
dc.subject.other | Securitization; Verschwörungstheorie | |
dc.title | Historicizing security - entering the conspiracy dispositive | de |
dc.title.alternative | Die Historisierung von Sicherheit - ein Versuch zur Einführung des Verschwörungsdispositivs | de |
dc.description.review | begutachtet (peer reviewed) | de |
dc.description.review | peer reviewed | en |
dc.source.journal | Historical Social Research | |
dc.source.volume | 38 | de |
dc.publisher.country | DEU | |
dc.source.issue | 1 | de |
dc.subject.classoz | Peace and Conflict Research, International Conflicts, Security Policy | en |
dc.subject.classoz | allgemeine Geschichte | de |
dc.subject.classoz | Friedens- und Konfliktforschung, Sicherheitspolitik | de |
dc.subject.classoz | International Relations, International Politics, Foreign Affairs, Development Policy | en |
dc.subject.classoz | General History | en |
dc.subject.classoz | internationale Beziehungen, Entwicklungspolitik | de |
dc.subject.thesoz | Dispositiv | de |
dc.subject.thesoz | international relations | en |
dc.subject.thesoz | historische Entwicklung | de |
dc.subject.thesoz | dispositif | en |
dc.subject.thesoz | Transformation | de |
dc.subject.thesoz | Methodologie | de |
dc.subject.thesoz | security | en |
dc.subject.thesoz | Diskurs | de |
dc.subject.thesoz | discourse | en |
dc.subject.thesoz | Forschungsstand | de |
dc.subject.thesoz | legitimation | en |
dc.subject.thesoz | historical development | en |
dc.subject.thesoz | operationalization | en |
dc.subject.thesoz | Foucault, M. | en |
dc.subject.thesoz | Sprache | de |
dc.subject.thesoz | Legitimation | de |
dc.subject.thesoz | security policy | en |
dc.subject.thesoz | transformation | en |
dc.subject.thesoz | methodology | en |
dc.subject.thesoz | Geschichtswissenschaft | de |
dc.subject.thesoz | Sicherheitspolitik | de |
dc.subject.thesoz | language | en |
dc.subject.thesoz | science of history | en |
dc.subject.thesoz | Foucault, M. | de |
dc.subject.thesoz | Operationalisierung | de |
dc.subject.thesoz | Sicherheit | de |
dc.subject.thesoz | internationale Beziehungen | de |
dc.subject.thesoz | research status | en |
dc.identifier.urn | urn:nbn:de:0168-ssoar-381547 | |
dc.rights.licence | Creative Commons - Attribution 4.0 | en |
dc.rights.licence | Creative Commons - Namensnennung 4.0 | de |
ssoar.gesis.collection | aDIS | de |
ssoar.contributor.institution | GESIS | de |
internal.status | formal und inhaltlich fertig erschlossen | de |
internal.identifier.thesoz | 10043982 | |
internal.identifier.thesoz | 10036028 | |
internal.identifier.thesoz | 10034801 | |
internal.identifier.thesoz | 10041158 | |
internal.identifier.thesoz | 10045348 | |
internal.identifier.thesoz | 10036566 | |
internal.identifier.thesoz | 10053758 | |
internal.identifier.thesoz | 10077078 | |
internal.identifier.thesoz | 10037376 | |
internal.identifier.thesoz | 10042741 | |
internal.identifier.thesoz | 10043388 | |
internal.identifier.thesoz | 10037331 | |
internal.identifier.thesoz | 10050763 | |
internal.identifier.thesoz | 10044014 | |
dc.type.stock | article | de |
dc.type.document | journal article | en |
dc.type.document | Zeitschriftenartikel | de |
dc.source.pageinfo | 46-64 | de |
internal.identifier.classoz | 30301 | |
internal.identifier.classoz | 10505 | |
internal.identifier.classoz | 10507 | |
internal.identifier.journal | 152 | |
internal.identifier.document | 32 | |
internal.identifier.ddc | 327 | |
internal.identifier.ddc | 320 | |
internal.identifier.ddc | 900 | |
dc.source.issuetopic | Security and conspiracy in history | de |
dc.identifier.doi | https://doi.org/10.12759/hsr.38.2013.1.46-64 | |
dc.subject.methods | Grundlagenforschung | de |
dc.subject.methods | historical | en |
dc.subject.methods | Theorieanwendung | de |
dc.subject.methods | theory application | en |
dc.subject.methods | historisch | de |
dc.subject.methods | basic research | en |
dc.description.pubstatus | Published Version | en |
dc.description.pubstatus | Veröffentlichungsversion | de |
internal.identifier.licence | 16 | |
internal.identifier.methods | 15 | |
internal.identifier.methods | 9 | |
internal.identifier.methods | 8 | |
internal.identifier.pubstatus | 1 | |
internal.identifier.review | 1 | |
dc.subject.classhort | 10500 | de |
internal.embargo.terms | 2015-01-01 | de |
internal.check.abstractlanguageharmonizer | CERTAIN | |
internal.check.languageharmonizer | CERTAIN_RETAINED | |