Cookies Policy
X

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.

I accept this policy

Find out more here

Security Studies: Towards a Reformational Approach

No metrics data to plot.
The attempt to load metrics for this article has failed.
The attempt to plot a graph for these metrics has failed.
The full text of this article is not currently available.

Brill’s MyBook program is exclusively available on BrillOnline Books and Journals. Students and scholars affiliated with an institution that has purchased a Brill E-Book on the BrillOnline platform automatically have access to the MyBook option for the title(s) acquired by the Library. Brill MyBook is a print-on-demand paperback copy which is sold at a favorably uniform low price.

Access this article

+ Tax (if applicable)
Add to Favorites
You must be logged in to use this functionality

image of Philosophia Reformata

How can reformational philosophy help us reconceptualise the notion of security? In the field of Security Studies, theoretical isms abound, each of them rooted in a different philosophical tradition. One of these approaches, “securitization theory”, portrays security in connection to five “sectors” that seem to reflect some of the basic aspects of the cosmos analysed by reformational philosophy. I consider the potential of this theory in an initial attempt to introduce a reformational approach to Security Studies. I also briefly consider some of its shortcomings. Finally, I reflect on the basic elements of a reformational notion of security. At this stage I am not offering a new theory of security but merely beginning to sketch a new concept of security in light of reformational philosophy.

Affiliations: 1: North-West University, Potchefstroom, South Africa Universidade Autonoma de Lisboa, Lisbon, Portugal lgfreire@gmail.com

10.1163/23528230-08101001
/content/journals/10.1163/23528230-08101001
dcterms_title,pub_keyword,dcterms_description,pub_author
10
5
Loading
Loading

Full text loading...

/content/journals/10.1163/23528230-08101001
Loading

Data & Media loading...

1. Ann Tickner J. , (1995), ‘"Revisioning security",’ in International Relations Theory Today , edited by Booth K. , and Smith S. , 175197, Polity, Cambridge.
2. Ashley R.K. (1984), ‘"The Poverty of Neorealism",’ International Organization , Vol. Vol 38 (2), 225286. http://dx.doi.org/10.1017/S0020818300026709
3. Austin J.L. (1962), How to Do Things with Words , Clarendon, Oxford.
4. Baldwin D.A. (1995), ‘"Security Studies and the End of the Cold War",’ World Politics , Vol. Vol 48 (1), 117126. http://dx.doi.org/10.1353/wp.1995.0001
5. Baldwin D.A. (1997), ‘"The Concept of Security",’ Review of International Studies , Vol. Vol 23 (1), 526. http://dx.doi.org/10.1017/S0260210597000053
6. Booth K. (2007), Theory of World Security , Cambridge University Press, Cambridge.
7. Buzan B. ,, Jones C. , and de Wilde J. (1998), Security: A New Framework for Analysis , Lynne Rienner, Boulder.
8. Buzan B. , and Hansen L. (2009), The Evolution of International Security Studies , Cambridge University Press, Cambridge.
9. Buzan B. , and Little R. (2000), International Systems in World History: Remaking the Study of International Relations , Oxford University Press, Oxford.
10. Buzan B. , and Waever O. (2003), Regions and Powers: The Structure of International Security , Cambridge University Press, Cambridge.
11. Campbell D. (1998), Writing Security: United States Foreign Policy and the Politics of Identity , revised edition, University of Minnesota Press, Minneapolis.
12. Chaplin J. (2011), Herman Dooyeweerd: Christian Philosopher of State and Civil Society , University of Notre Dame Press, Notre Dame.
13. Clouser R.A. (1991), The Myth of Religious Neutrality: An Essay on the Hidden Role of Religious Belief in Theories , University of Notre Dame Press, Notre Dame.
14. Cox R.W. (1981), ‘"Social Forces, States and World Orders: Beyond International Relations Theory",’ Millennium: Journal of International Studies , Vol. Vol 10 (2), 126155. http://dx.doi.org/10.1177/03058298810100020501
15. Deutsch K. , et al. (1957), Political Community and the North Atlantic Area , Princeton University Press, Princeton.
16. Dooyeweerd H. (1969), A New Critique of Theoretical Thought , Vol. 1–4, translated by W.S. Young, D.H. Freeman and H. de Jongste, Presbyterian and Reformed, Philadelphia.
17. Dooyeweerd H. , (2012), In the Twilight of Western Thought , edited by Smith J.K.A. , Paideia Press, Grand Rapids.
18. Emmers R. , (2010), ‘"Securitization",’ in Contemporary Security Studies , 2nd edition, edited by Collins A. , 137151, Oxford University Press, Oxford.
19. Enloe C. (2000), Bananas, Beaches and Bases: Making Feminist Sense of International Politics , updated edition, University of California Press, Berkeley.
20. Freire L.G. (2011), ‘Opening up Space for a Reformational Approach to the Study of World Politics,’ available at: .
21. Freire L.G. (2013), ‘"The Potential and the Pitfalls of Metatheory in ir ",’ Estudos Internacionais , Vol. Vol 1 (2), 271301.
22. Freire L.G. (2014), ‘Securitisation Theory: A Reformational Reading,’ 2nd Kuyper Seminar, vu University, Amsterdam.
23. Galtung J. (1969), ‘"Violence, Peace, and Peace Research",’ Journal of Peace Research , Vol. Vol 6 (3), 167191. http://dx.doi.org/10.1177/002234336900600301
24. Huysmans J. (1998), ‘"Security! What do You Mean? From Concept to Thick Signifier",’ European Journal of International Relations , Vol. Vol 4 (2), 226255. http://dx.doi.org/10.1177/1354066198004002004
25. Independent Commission on International Development Issues (1980), North-South: A Programme for Survival , Pan Books, London.
26. Morgenthau H.J. (1948), Politics Among the Nations , Alfred Knopf, New York.
27. Niebuhr R. (1932), Moral Man and Immoral Society: A Study in Ethics and Politics , Charles Scribner’s Sons, New York.
28. Ramos L. , and Freire L.G. (2014), ‘"Introdução: Neocalvinismo, política e estado: contextualizando a abordagem de Herman Dooyeweerd",’ in H. Dooyeweerd, Estado e Soberania: Estados Selecionados , 736, Vida Nova, São Paulo.
29. Searle J.R. (1969), Speech Acts: An Essay in the Philosophy of Language , Cambridge University Press, Cambridge.
30. Singer J.D. (1961), ‘"The Level-of-Analysis Problem in International Relations",’ World Politics , Vol. Vol 14 (1), 7792. http://dx.doi.org/10.2307/2009557
31. Smith S. , (2005), ‘"The contested concept of security",’ in Critical Security Studies and World Politics , edited by Booth K. , 2762, Lynne Rienner, London.
32. Strauss D.F.M. (2009), Philosophy: Discipline of the Disciplines , Paideia Press, Grand Rapids.
33. Troost A. (2012), What is Reformational Philosophy? An Introduction to the Cosmonomic Philosophy of Herman Dooyeweerd , Paideia Press, Grand Rapids.
34. Ullman R. (1983), ‘"Redefining Security",’ International Security , Vol. Vol 8 (1), 129153. http://dx.doi.org/10.2307/2538489
35. Waever O. , (2011), ‘"Securitization",’ in Security Studies: A Reader , edited by Hughes C.W. , and Meng L.Y. , 9398, Routledge, London.
36. Waltz K.N. (1959), Man, the State, and War: A Theoretical Analysis , Columbia University Press, New York.
37. Wendt A. (1992), ‘"Anarchy is what States Make of It: The Social Construction of Power Politics",’ International Organization , Vol. Vol 46 (2), 391425. http://dx.doi.org/10.1017/S0020818300027764
38. Wolfers A. (1952), ‘"National Security as an Ambiguous Symbol",’ Political Science Quarterly , Vol. Vol 67 (4), 481502. http://dx.doi.org/10.2307/2145138
http://brill.metastore.ingenta.com/content/journals/10.1163/23528230-08101001
Loading

Article metrics loading...

/content/journals/10.1163/23528230-08101001
2016-05-04
2018-09-22

Sign-in

Can't access your account?
  • Tools

  • Add to Favorites
  • Printable version
  • Email this page
  • Subscribe to ToC alert
  • Get permissions
  • Recommend to your library

    You must fill out fields marked with: *

    Librarian details
    Your details
    Why are you recommending this title?
    Select reason:
     
    Philosophia Reformata — Recommend this title to your library
  • Export citations
  • Key

  • Full access
  • Open Access
  • Partial/No accessInformation