The Routledge Handbook of European Security
DOI: 10.4324/9780203098417.ch19
|View full text |Cite
|
Sign up to set email alerts
|

The EU and Counter-Terrorism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…At risk of simplification, there are presently two main literatures on EU counter-terrorism policy. The first is a body of research that offers a conventional account of the historical development of policy in this area, which is largely based on historical-institutionalist and public policy making approaches that are situated within the field of European Studies (Kaunert, 2010;Argomaniz, 2011;Bures, 2011;Bossong, 2012). The second body of literature, drawing on interpretive and critical approaches to the study of security, has highlighted the importance of discourse, language and identity (Tsoukala, 2004;Jackson, 2007;Hassan, 2010;Baker-Beall, 2014, as well as technologies of governance (Bigo, 2007;Wittendorp, 2016aWittendorp, , 2016b, in the creation of security practices and, specifically, the formulation of EU counter-terrorism policy.…”
Section: Literature Review: the Eu As An Emerging Cyber-security And ...mentioning
confidence: 99%
“…At risk of simplification, there are presently two main literatures on EU counter-terrorism policy. The first is a body of research that offers a conventional account of the historical development of policy in this area, which is largely based on historical-institutionalist and public policy making approaches that are situated within the field of European Studies (Kaunert, 2010;Argomaniz, 2011;Bures, 2011;Bossong, 2012). The second body of literature, drawing on interpretive and critical approaches to the study of security, has highlighted the importance of discourse, language and identity (Tsoukala, 2004;Jackson, 2007;Hassan, 2010;Baker-Beall, 2014, as well as technologies of governance (Bigo, 2007;Wittendorp, 2016aWittendorp, , 2016b, in the creation of security practices and, specifically, the formulation of EU counter-terrorism policy.…”
Section: Literature Review: the Eu As An Emerging Cyber-security And ...mentioning
confidence: 99%
“…Monar et al (2003),Baldaccini et al (2007),Balzacq and Carrera (2006),Huysmans (2006),Guild and Geyer (2008), van Munste (2009) andBigo et al (2010).2 Zimmermann (2006),Spence (2007),Eckes (2009), Brown (2010,Bures (2006;), Argomaniz (2011), Kaunert (20052010a;2010b;2010c),Kaunert and Della Giovanna (2010),Kaunert and Léonard (2011),Léonard and Kaunert (2012),Kaunert et al (2012a),Bossong (2008; andMacKenzie et al (2013).3 Baldaccini(2007),Geddes (2008),Léonard (2009) andBoswell and Geddes (2011).4 Fletcher and Lö ö f (2008) andEckes and Konstadinides (2011).5 Anderson and Apap (2002),Occhipinti (2003) andGuild and Geyer (2008).6 Kaunert et al (2012b) andKaunert and Zwolski (2013).7 Balzacq(2009), Wolff et al (2009), Wolff (2009; 2012) and Trauner (2011).Introduction 499 Downloaded by [UQ Library] at 03:54 15 March 2015…”
mentioning
confidence: 94%
“…Agromaniz 2011;Bendiek 2006;Bures 2011;Den Boer and Monar 2002;Kaunert 2010;Rees 2006;Spence 2007), the case of the TFTP is relatively unknown. In addition, the issue of secrecy and its relation to European security remains understudied.…”
Section: Introduction: Terrorism Finance Tracking Programme Secrecymentioning
confidence: 99%