2011
DOI: 10.1017/s0260210510001579
|View full text |Cite
|
Sign up to set email alerts
|

Security as translation: threats, discourse, and the politics of localisation

Abstract: This article aims at enhancing our understanding of how collective interpretations of threats, stabilised and temporarily fixed in names, travel across different local discourse communities. I contend that globally accepted names result from gradual cross-cultural processes of localisation. Specifically, I argue that the discursive dynamics of elusiveness, compatibility and adaptation suggest a framework of analysis for how collective interpretations or names travel.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 53 publications
0
17
0
Order By: Relevance
“…Our analysis has highlighted the importance of context and agency in the localisation of a security threat (see also Capie, 2008;Stritzel, 2011aStritzel, , 2011bStritzel, , 2014. Similar to De Goede and Simon (2013), our case studies have also demonstrated that understanding and countering radicalisation do not materialise in the same ways across different national locales.…”
Section: Resultsmentioning
confidence: 95%
See 3 more Smart Citations
“…Our analysis has highlighted the importance of context and agency in the localisation of a security threat (see also Capie, 2008;Stritzel, 2011aStritzel, , 2011bStritzel, , 2014. Similar to De Goede and Simon (2013), our case studies have also demonstrated that understanding and countering radicalisation do not materialise in the same ways across different national locales.…”
Section: Resultsmentioning
confidence: 95%
“…The actual process of localisation of a norm/idea/belief usually includes local actors employing various strategies of matching and/or addressing factual or political incompatibilities to enhance compatibility between content and context. These strategies include (re)framing, selection, grafting, and linking (see Acharya, 2004;Barnett, 1999;Stritzel, 2011aStritzel, , 2014, as well as 'strategies of stretching' and even altering of the new norm/idea/belief (see Farrell, 2005;Stritzel, 2011aStritzel, , 2014. The overarching goal of these strategies is to make a pre-existing but 'foreign' norm/idea/belief seem local and appealing to local audiences.…”
Section: Localisation Theorymentioning
confidence: 99%
See 2 more Smart Citations
“…To be able to overcome the static and rather succinct character of the original securitization theory in the analysis of the linguistic and normative aspects of security, Lupták decided to draw from Holger Stritzel's recent addition in the form of security as translation (Stritzel 2010(Stritzel , 2011. The final (at least at this time) addition to the conceptual toolbox was intertwined with the attempts to explore a particular part of the research field, that is, the communal celebrations of security experts (workshops, conferences, symposia, anniversary meetings etc.).…”
mentioning
confidence: 99%