|
|
|
|
| LEADER |
05725nam a22004093i 4500 |
| 001 |
EBC6887015 |
| 003 |
MiAaPQ |
| 005 |
20231204023221.0 |
| 006 |
m o d | |
| 007 |
cr cnu|||||||| |
| 008 |
231204s2022 xx o ||||0 eng d |
| 020 |
|
|
|a 9783030930356
|q (electronic bk.)
|
| 020 |
|
|
|z 9783030930349
|
| 035 |
|
|
|a (MiAaPQ)EBC6887015
|
| 035 |
|
|
|a (Au-PeEL)EBL6887015
|
| 035 |
|
|
|a (OCoLC)1298202913
|
| 040 |
|
|
|a MiAaPQ
|b eng
|e rda
|e pn
|c MiAaPQ
|d MiAaPQ
|
| 050 |
|
4 |
|a JV6001-9480
|
| 100 |
1 |
|
|a Stępka, Maciej.
|
| 245 |
1 |
0 |
|a Identifying Security Logics in the EU Policy Discourse :
|b The Migration Crisis and the EU.
|
| 250 |
|
|
|a 1st ed.
|
| 264 |
|
1 |
|a Cham :
|b Springer International Publishing AG,
|c 2022.
|
| 264 |
|
4 |
|c {copy}2022.
|
| 300 |
|
|
|a 1 online resource (209 pages)
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 490 |
1 |
|
|a IMISCOE Research Series
|
| 505 |
0 |
|
|a Identifying Security Logics in the EU Policy Discourse -- Acknowledgements -- Contents -- Chapter 1: Introduction -- 1.1 Introduction -- 1.2 Migration and Security in Academic Literature -- 1.3 Aims of the Book -- 1.4 Methods -- 1.5 Clarifying the Scope and Main Characteristics of the Book -- 1.6 Structure of the Book -- References -- Chapter 2: The Copenhagen School and Beyond. A Closer Look at Securitisation Theory -- 2.1 Introduction -- 2.2 The Concept of Securitisation -- 2.3 Securitisation and the Speech Act Approach -- 2.4 Securitisation the Logic of Exception -- 2.5 Securitisation and the Audience-Actor Interaction -- 2.6 Conclusion: Moving Forward with Securitisation Theory -- References -- Chapter 3: Securitisation as the Work of Framing -- 3.1 Introduction -- 3.2 Securitisation Beyond Speech Act -- 3.3 Securitisation Beyond Exceptionalism -- 3.3.1 Security Logics -- "Exceptionalist" Security Logic -- Risk (Management and Resilience) -- Human Security -- 3.4 Securitisation Beyond the Actor-Audience Dichotomy -- 3.5 Defining the Process of Acceptance -- 3.6 Including Context in the Securitisation Process -- 3.7 Conclusion: Key Points of "Securitisation as the Work of Framing" Approach -- References -- Chapter 4: EU Migration-Security Continuum. Investigating Security Frames Before the "Migration Crisis" -- 4.1 Introduction -- 4.2 From Maastricht to Lisbon. Tracing "Constitutional" Securitising Moves and Security Frames -- 4.3 Schengen and Border Control - Building "Fortress Europe" -- 4.3.1 Frontex and Protection of the EU Borders -- 4.4 Detention and Deportation - Reception and Return -- 4.5 Migration and Asylum Policies - Between "Bogus Asylum Seekers" and Irregular Migrants -- 4.5.1 Irregular Migration, Organised Crime and Terrorism -- 4.6 Externalisation of Migration Control. Securitisation Within the Internal-External Security Nexus.
|
| 505 |
8 |
|
|a 4.7 Conclusion -- References -- Chapter 5: Analysing Diagnosis and Evaluation of the "Migration Crisis" at the EU Level -- 5.1 Introduction -- 5.2 Human Security -- 5.2.1 Naming and Categorising the Humanitarian Features of the "Migration Crisis" -- 5.2.2 Conceptualising the Push Factors and Defining Threats -- 5.2.3 Defining the Human Referent Object -- 5.2.4 Comments -- 5.3 Risk Management -- 5.3.1 Naming and Categorising the Risk-Oriented Features of the "Migration Crisis" -- 5.3.2 Defining Non-human Referent Objects -- 5.3.3 Conceptualising Risks -- 5.3.4 Comments -- 5.4 "Exceptionalist" Security -- 5.4.1 Human Security - "Exceptionalist" Security -- 5.4.2 Risk Management - "Exceptionalist" Security -- 5.4.3 Comments -- 5.5 Conclusion -- References -- Chapter 6: Analysing the Conceptualisation of Remedial Actions Towards the "Migration Crisis" at the EU Level -- 6.1 Introduction -- 6.2 Risk Management -- 6.2.1 The "Hotspot Approach" -- 6.2.2 Returns, Readmission and Detention -- 6.2.3 Intelligence Cooperation, Surveillance and Control -- 6.2.4 EU-Turkey Statement -- 6.2.5 Relocation and Resettlement -- 6.2.6 Comments -- 6.3 Resilience -- 6.3.1 Reforming Common European Asylum System -- 6.3.2 European Union Trust Funds -- 6.3.3 EU Border, Capacity Building and Assistance Missions -- 6.3.4 Comments -- 6.4 "Exceptionalist" Security -- 6.4.1 EUNAVFOR MED "Sophia" -- 6.4.2 Joint Border Operations -- 6.4.3 Comments -- 6.5 Conclusion -- References -- Chapter 7: Conclusions -- 7.1 Introduction -- 7.2 Revisiting Security Logics in the EU Frame-Narrative on the "Migration Crisis" -- 7.3 Reflecting on Securitisation as the Work of Framing -- 7.4 Final Reflections on Risk and Securitisation of Migration in the EU -- References.
|
| 588 |
|
|
|a Description based on publisher supplied metadata and other sources.
|
| 590 |
|
|
|a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
|
| 655 |
|
4 |
|a Electronic books.
|
| 776 |
0 |
8 |
|i Print version:
|a Stępka, Maciej
|t Identifying Security Logics in the EU Policy Discourse
|d Cham : Springer International Publishing AG,c2022
|z 9783030930349
|
| 797 |
2 |
|
|a ProQuest (Firm)
|
| 830 |
|
0 |
|a IMISCOE Research Series
|
| 856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/matrademy/detail.action?docID=6887015
|z Click to View
|