Academic literature on the topic 'International securitization'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'International securitization.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "International securitization"

1

Farasoo, Abbas. "Rethinking Proxy War Theory in IR: A Critical Analysis of Principal–Agent Theory." International Studies Review 23, no. 4 (October 13, 2021): 1835–58. http://dx.doi.org/10.1093/isr/viab050.

Full text
Abstract:
Abstract This paper explores the question of what drives proxy alignment in war and argues that current proxy war scholarship needs further thinking to go beyond focusing on the principal–agent theory and individual actors’ motivation analysis. Rather, there is a need to look at the generative mechanisms of proxy alignment as a process that constitutes patterns of friend–enemy relations. The paper argues securitization patterns from domestic to regional and international levels drive actors to re-evaluate their positions and define their enemies and friends. This is a process of securitization alignment and confluence, which serves as a generative mechanism for proxy alignment in a conflict. Securitization alignment is based on a convergence of securitizations by different actors that create a friend–enemy dynamic and convergence of security interests between actors. The confluence of securitizations from the domestic level to regional and beyond also connects actors across different levels to be in alignment and impact the conflict.
APA, Harvard, Vancouver, ISO, and other styles
2

Bittucci, Lucilla, Stefano Marzioni, Pina Murè, and Marco Spallone. "Securitization of (bad) loans to Italian SMES: The role of the public guarantee." Banks and Bank Systems 16, no. 4 (December 21, 2021): 193–208. http://dx.doi.org/10.21511/bbs.16(4).2021.16.

Full text
Abstract:
This study investigates the main factors driving the evolution of the securitization of loans to Italian small and medium-sized enterprises (SMEs). The value of securitization increased in last two years, even though it has not been used as collateral for central banks. The disposal of non-performing loans (NPLs) may have been rather triggered by increasing attention of the international institutions to such an issue, within the general purpose of financial stability. The purpose of this paper is to interpret such a phenomenon focusing on Italian banks and restricting the analysis to the case of securitizations backed with loans to small and medium-sized enterprises (SMEs). The interesting result that emerges, supported by econometrically tested empirical evidence, is that given the orientation of international financial institutions, such as the ECB and the EBA, and reacting to incentives coming from the fiscal policy authorities for the public guarantee of loans, banks have been using securitization to reduce the burden on their bad balance sheets due to (NPLs). It was found that the public guarantee had a positive impact on SME securitization, whereas securitization in other sectors has not been affected significantly. Such evidence suggests that, in the absence of a public guarantee, the financial stability target would have been at risk, and the effectiveness of collateral-based policies in the recent past must be improved to enhance access to credit for SMEs.
APA, Harvard, Vancouver, ISO, and other styles
3

Mustafa, Tahani. "Securitization Dysfunction." Contemporary Arab Affairs 12, no. 1 (March 1, 2019): 19–38. http://dx.doi.org/10.1525/caa.2019.121002.

Full text
Abstract:
This article contributes to the critical discourse on security sector reform (SSR) by explicitly acknowledging its political dimensions and implications. Through a consideration of the role of SSR in international processes of securitization and state-building, it highlights the paradoxes implicit in this model, and the subsequent consequences of its implementation on the ground using the case of occupied Palestinian territories where SSR has significantly altered the local security landscape.
APA, Harvard, Vancouver, ISO, and other styles
4

Taureck, Rita. "Securitization theory and securitization studies." Journal of International Relations and Development 9, no. 1 (March 2006): 53–61. http://dx.doi.org/10.1057/palgrave.jird.1800072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chernykh, Irina, and Rustam Burnashev. "Conditions for Securitization of International Terrorism in Central Asia." Connections: The Quarterly Journal 04, no. 1 (2005): 131–42. http://dx.doi.org/10.11610/connections.04.1.09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Holbraad, Martin, and Morten Axel Pedersen. "Revolutionary securitization: an anthropological extension of securitization theory." International Theory 4, no. 2 (June 15, 2012): 165–97. http://dx.doi.org/10.1017/s1752971912000061.

Full text
Abstract:
This article proposes an anthropological extension of the so-called Copenhagen School theory of securitization in International Relations. In contrast to existing attempts to show how, suitably elaborated, this model can be ‘applied’ to various non-Western contexts, our anthropological strategy is to use the contingency of empirical materials (namely the Cuban Revolution and the political forms it instantiates) as a means for transforming the basic coordinates of the model itself. The argument involves two main steps. First we relativize the Copenhagen School model, showing the contingency of its premises. In its paradigmatic form, we argue, the model is liberal in that its abiding concern with states of emergency turns on an ontological distinction between political subjects (e.g. people) and political structures (e.g. state). By contrast, revolutionary politics in Cuba concertedly rescinds just this distinction, to bring about an alternative, non-liberal political ontology. We then go on to use the Cuban case to construct an alternative model of securitization, which we call revolutionary. On this model, the move of securitization pertains, not to a passage from ordinary politics into a realm of emergency, but to a deliberate ontological fusion of the two, such that rule and exception also become coterminous.
APA, Harvard, Vancouver, ISO, and other styles
7

Balzacq, Thierry, Sarah Léonard, and Jan Ruzicka. "‘Securitization’ revisited: theory and cases." International Relations 30, no. 4 (July 27, 2016): 494–531. http://dx.doi.org/10.1177/0047117815596590.

Full text
Abstract:
Securitization theory seeks to explain the politics through which (1) the security character of public problems is established, (2) the social commitments resulting from the collective acceptance that a phenomenon is a threat are fixed and (3) the possibility of a particular policy is created. In the last decade, research on securitization has grown significantly. The aim of this article is to evaluate the achievements of securitization theory. First, its main concepts and premises are critically discussed. This article then proceeds to examine the empirical applications of securitization theory to a broad range of issues, as well as the theoretical implications of these studies. Finally, it discusses the main challenges faced by securitization scholars and puts forward strategies to overcome them. This article develops three inter-related arguments. First, notably thanks to empirical studies, securitization theory has significantly developed beyond its initial focus on the speech act. Second, as a result, the distinctiveness of securitization theory currently lies in its capacity to articulate a specific approach to security – influenced by the speech act – with an ‘analytics of government’, which emphasizes practices and processes. Third, securitization theory faces three types of challenges, related, respectively, to theory, method and methodology. The capacity of scholars to overcome those will strongly influence the extent to which securitization theory will be able to make significant contributions to the debates in Security Studies and International Relations in the years to come.
APA, Harvard, Vancouver, ISO, and other styles
8

Jamal, Amal. "Ontological Counter-securitization in Asymmetric Power Relations: Lessons from Israel." International Studies Review 22, no. 4 (December 16, 2019): 932–56. http://dx.doi.org/10.1093/isr/viz057.

Full text
Abstract:
Abstract This article seeks to enhance the understanding of ontological counter-securitization and the constitution of securitized subjects in the context of asymmetrical power relations. It builds on the available critique of the conceptualization of counter-securitization and the differentiation between physical and ontological securitization in order to facilitate a better understanding of the identity formation of securitized subjects as resistance. It argues that whereas the current literature deals with the differentiation between physical and ontological dimensions of securitization and recently with the meaning of counter-securitization, nonetheless the treatment of the later as a resistance is limited. It remains in the realm of the physical dimensions of securitization, rendering ontological ones unaddressed. The article argues that ontological counter-securitization emerges as an analytical category when the mismatch between the physical and ontological securitization policies is utilized as a structural opportunity for resisting asymmetrical power relations. The article exemplifies its theoretical arguments through exploring the complicated securitization policies of Israel toward its Palestinian citizens and the resistance of the latter to such policies. It argues that despite the fact that the Israeli physical and ontological securitization of its Palestinian citizens have not matched, they have been constructed as complementary and therefore have not been morally justifiable. This lack of moral justifiability has had repercussions on the legitimacy of the securitization policy, leading to the rise of the securitized subject as a securitizing agency that is able to practice counter-securitization. Since the power relations between the state and its Palestinian citizens has been asymmetrical, the latter limited their counter-securitization to the ontological dimension, manifested through politicizing their indigenous identity. The conceptualization of politicizing indigeneity as an ontological counter-securitization strategy of resistance has not been addressed in the available literature on securitization theory. Thus, exploring its analytical merits is a central goal of this article.
APA, Harvard, Vancouver, ISO, and other styles
9

Baysal, Basar. "Coercion by fear: Securitization of Iraq prior to the 2003 war." International Journal: Canada's Journal of Global Policy Analysis 74, no. 3 (September 2019): 363–86. http://dx.doi.org/10.1177/0020702019875967.

Full text
Abstract:
The Iraq War was one of the most prominent events of the early 2000s. The prelude to the war halted the sense of optimism that captivated International Relations as a discipline after the end of the Cold War. The United States initiated this war following a lengthy securitization process. This study focuses on analyzing the securitization process in Iraq prior to the 2003 war. To that end, the article investigates the securitization process by asking, “How, within what context, and when did the securitization of Iraq take place?” For the study, 85 speeches made by President Bush are analyzed to examine how the president presented Iraq as an existential threat. The study also examines the kinds of arguments used by the Bush administration in securitizing Iraq. This study contributes to the literature on the 2003 Iraq War and security studies by applying Securitization Theory to the Iraq case by incorporating two essential contributions to the securitization analysis: context and audience(s).
APA, Harvard, Vancouver, ISO, and other styles
10

Williams, Michael C. "Words, Images, Enemies: Securitization and International Politics." International Studies Quarterly 47, no. 4 (December 2003): 511–31. http://dx.doi.org/10.1046/j.0020-8833.2003.00277.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "International securitization"

1

Gregirchak, Yaroslav. "International securitization : Implications for law reform in Ukraine." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32802.

Full text
Abstract:
Prospects of securing affordable and efficient development finance for Central and Eastern European countries largely depends upon development of international securitizaton in the region, which is characterized by an undercapitalized banking sector and weak domestic investors' base.
Securitization in the United States is examined as an example of how a developed jurisdiction can deploy this institution. The study of the cross-border structured finance experience gained by Latin American countries serves to show that this financing technique can be used in Ukraine. Ukraine is viewed as a target developing jurisdiction, and relevant proposals for Ukrainian law reform with emphasis on secured financing and bankruptcy regimes are elaborated.
APA, Harvard, Vancouver, ISO, and other styles
2

Walker, Robin E. "Securitization : the case of post-9/11 United States Africa policy." Master's thesis, University of Cape Town, 2009. http://hdl.handle.net/11427/9234.

Full text
Abstract:
Includes bibliographical references (leaves 103-127).
In the wake of AI Qaeda's attack against the United States on September 11, 2001, Africa has gained strategic significance due to the belief that its weak states are a danger to American national security. US Africa policy is now centered on the logic that weak African governments unable to provide for the basic needs of their people and lacking full control of their borders provide both a breeding ground and safe-haven for terrorist organizations. Africa has thus gone from being a marginalized humanitarian concern in the 1990s, to a continent of strategic significance in the US War on Terror (USW01) in the wake of the attacks on the World Trade Center, as seen in the fact that American aid to the continent has more than tripled in the years following 9/11. The purpose of this thesis is to critically analyze the political process behind this shift in policy in order to address the question of who was responsible for this change in US Africa policy and how did they make the change happen. This study takes the form of a theoretical case study, using the Copenhagen School's Securitization Theory, designed to identify the means by which an issue is placed on the national security agenda, to address this change in post-9/11 US Africa policy. In accordance with this theoretical framework, primary sources from government and non-government agencies including policy statements, speeches and legislative testimonies are surveyed to identify instances of the claim being articulated that Africa represents a threat to American national security and its legitimation and reiteration by an audience. This study finds that the unified executive branch under the Bush administration and Washington think tanks made the unified claim that the condition of Africa is a threat to US national security and the legislative branch served as the singular audience, legitimating this claim and appropriating dramatically increased and enhanced aid to the continent. The factors of political agency and context are offered as additions to the Securitization Theory framework in this study, and their incorporation in this case determines that the high-level of the agency of the securitizing actors and audience facilitated the legitimation process, as did the use of the contextual factors of the trauma of9/11 and the American identity as promoters of democratic ideals. These additional factors underscore both the political power of the actors involved and the techniques they use to support their claims, thereby developing the political quality of the theory and providing a more complete representation of the securitization process.
APA, Harvard, Vancouver, ISO, and other styles
3

Ramos, Munoz David <1979&gt. "Securitization and Special Purpose Vehicles in an International Setting: a Systemic View." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1933/.

Full text
Abstract:
The present work tries to display a comprehensive and comparative study of the different legal and regulatory problems involved in international securitization transactions. First, an introduction to securitization is provided, with the basic elements of the transaction, followed by the different varieties of it, including dynamic securitization and synthetic securitization structures. Together with this introduction to the intricacies of the structure, a insight into the influence of securitization in the financial and economic crisis of 2007-2009 is provided too; as well as an overview of the process of regulatory competition and cooperation that constitutes the framework for the international aspects of securitization. The next Chapter focuses on the aspects that constitute the foundations of structured finance: the inception of the vehicle, and the transfer of risks associated to the securitized assets, with particular emphasis on the validity of those elements, and how a securitization transaction could be threatened at its root. In this sense, special importance is given to the validity of the trust as an instrument of finance, to the assignment of future receivables or receivables in block, and to the importance of formalities for the validity of corporations, trusts, assignments, etc., and the interaction of such formalities contained in general corporate, trust and assignment law with those contemplated under specific securitization regulations. Then, the next Chapter (III) focuses on creditor protection aspects. As such, we provide some insights on the debate on the capital structure of the firm, and its inadequacy to assess the financial soundness problems inherent to securitization. Then, we proceed to analyze the importance of rules on creditor protection in the context of securitization. The corollary is in the rules in case of insolvency. In this sense, we divide the cases where a party involved in the transaction goes bankrupt, from those where the transaction itself collapses. Finally, we focus on the scenario where a substance over form analysis may compromise some of the elements of the structure (notably the limited liability of the sponsor, and/or the transfer of assets) by means of veil piercing, substantive consolidation, or recharacterization theories. Once these elements have been covered, the next Chapters focus on the regulatory aspects involved in the transaction. Chapter IV is more referred to “market” regulations, i.e. those concerned with information disclosure and other rules (appointment of the indenture trustee, and elaboration of a rating by a rating agency) concerning the offering of asset-backed securities to the public. Chapter V, on the other hand, focuses on “prudential” regulation of the entity entrusted with securitizing assets (the so-called Special Purpose vehicle), and other entities involved in the process. Regarding the SPV, a reference is made to licensing requirements, restriction of activities and governance structures to prevent abuses. Regarding the sponsor of the transaction, a focus is made on provisions on sound originating practices, and the servicing function. Finally, we study accounting and banking regulations, including the Basel I and Basel II Frameworks, which determine the consolidation of the SPV, and the de-recognition of the securitized asset from the originating company’s balance-sheet, as well as the posterior treatment of those assets, in particular by banks. Chapters VI-IX are concerned with liability matters. Chapter VI is an introduction to the different sources of liability. Chapter VII focuses on the liability by the SPV and its management for the information supplied to investors, the management of the asset pool, and the breach of loyalty (or fiduciary) duties. Chapter VIII rather refers to the liability of the originator as a result of such information and statements, but also as a result of inadequate and reckless originating or servicing practices. Chapter IX finally focuses on third parties entrusted with the soundness of the transaction towards the market, the so-called gatekeepers. In this respect, we make special emphasis on the liability of indenture trustees, underwriters and rating agencies. Chapters X and XI focus on the international aspects of securitization. Chapter X contains a conflicts of laws analysis of the different aspects of structured finance. In this respect, a study is made of the laws applicable to the vehicle, to the transfer of risks (either by assignment or by means of derivatives contracts), to liability issues; and a study is also made of the competent jurisdiction (and applicable law) in bankruptcy cases; as well as in cases where a substance-over-form is performed. Then, special attention is also devoted to the role of financial and securities regulations; as well as to their territorial limits, and extraterritoriality problems involved. Chapter XI supplements the prior Chapter, for it analyzes the limits to the States’ exercise of regulatory power by the personal and “market” freedoms included in the US Constitution or the EU Treaties. A reference is also made to the (still insufficient) rules from the WTO Framework, and their significance to the States’ recognition and regulation of securitization transactions.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Ke Zheng. "The risk-isolating paradox in China's asset securitization." Thesis, University of Macau, 2012. http://umaclib3.umac.mo/record=b2586529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lazell, Melita. "The securitization of development debate within the global governance literature : a critique." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/342183/.

Full text
Abstract:
Since the late1990s, theorists have attempted to understand an apparent securitization of development within the policies produced by global governance networks and institutions (Beall et al., 2005; Duffield, 2007; Woods, 2005). The key assumptions central to much of the securitization of development debate are that; significant areas of the South are excluded from formal global economic networks, but are reintegrating through parallel economic activity; the discourses of security and development are linked by global governance institutions, such that significant areas of the South are conceived as an international security threat; the major agencies of global governance are unified through a liberal consensus, and pursue liberal change through the distribution of aid and through development programmes. This research is concerned with the ways in which this debate aids our understanding of contemporary global governance, and its limitations. This theoretical and empirical evaluation takes a number of forms including: an analysis of the policy discourse of key global governance institutions; an examination of world economic trends; a statistical project investigating the distribution of development aid; and a case study of development programming. This thesis argues that the securitization of development debate aids our understanding of global governance through its identification of both liberal societal transformation as a key rationale of global governance and the security development nexus as a central framework for North-South relations. It further provides important insights into the productive power of liberal global governance networks and develops a fruitful application of post-structural analysis to the problematic of global development. This research also identifies theoretical and empirical limitations within this debate. In light of these, an approach is proposed which takes greater account of firstly, the structural dynamics of the global economy and secondly, the internal contradictions and complexities inherent within the discourses of global governance. The former would involve greater engagement with the literature that demonstrates a complex and varied picture of global economic expansion and contraction. This research further suggests that the effect of the axiom that there can be no development without security is ambiguous. And also argues that the suggestion that global governance pursues liberal change through the distribution of aid needs qualification. Finally, further analysis to determine the utility of engaging with the governmentality literature is proposed.
APA, Harvard, Vancouver, ISO, and other styles
6

Piche, Genevieve. "Nouvelle vague: The securitization of the US-Canada border in American political discourse." Thesis, University of Ottawa (Canada), 2009. http://hdl.handle.net/10393/28416.

Full text
Abstract:
In recent history, particularly over the last decade, the US-Canada border has been increasingly treated as a security issue. During this period, policies and measures have been put in place, such as strict identification documentation requirements, advanced surveillance equipment, information-sharing between law-enforcement and intelligence agencies on both sides of the border, and greater numbers of border patrol agents. These measures represent a significant departure from what was previously understood as a permeable, "undefended" border that prioritized above all else the facilitation of trade and travel. In my study, I have sought to better understand the process by which the US-Canada border is becoming understood by some as a security issue. Participants in critical security studies argue that issues, such as borders, become security matters through a process. The Copenhagen School (CoS) argues that this process, called securitization, occurs when a speaker performs a discursive action, "speech-act," claiming that the issue constitutes a security matter, and is successful when the relevant audience accepts this claim, thus legitimating the use of exceptional measures as a response. (Buzan, de Wilde and Waever, 1998) While I argue that this is an oversimplified interpretation of the process, I use this theory as a point of departure for my research and attempt to use my case study to illustrate the merits of a more comprehensive understanding of securitization. Based on the CoS's emphasis on the discursive element of the securitization process, I have asked: how is the US-Canada border being securitized in American political discourse? I have conducted a discourse analysis of statements made by President George W. Bush and the Department of Homeland Security within the period beginning with the signing of the Intelligence Reform and Terrorism Prevention Act in December, 2004 and ending with the signing of the Security and Prosperity Partnership of North America in June 2005. I have sought to understand how these speakers participate in the securitization of the US-Canada border, analyzing the discursive tools they have adopted, the contexts within which they speak, and the way they structure their claims. The results of my analysis have led me to conclude that, first, the securitization process as a whole must not be understood as a singular speaker performing a singular speech-act in a singular moment accepted by a singular audience, but rather as the on-going interaction between varying relevant actors who participate in creating momentum or resistance within an issue's securitization. Secondly, I conclude that within the securitization of the US-Canada border, the two speakers included in this research participate in the perpetuation of the process through both what is said -- primarily the identification of the terrorist threat, but also the inclusion of borders in larger, existing security contexts -- and what is not said -- the absence of details and definitions, as well as the choices made by the speakers in terms of the types of evidence provided. Taken together, these findings illustrate the importance of considering a more complex understanding of the securitization process and create an opportunity for an expanded research project that will include an analysis of activities performed by a wide range of actors.
APA, Harvard, Vancouver, ISO, and other styles
7

Mann, Monique Michaëla. "A Story of Organized Crime : Constructing Criminality and Building Institutions." Thesis, Griffith University, 2015. http://hdl.handle.net/10072/366676.

Full text
Abstract:
This is a narrative about the way in which a category of crime-to-be-combated is constructed through the discipline of criminology and the agents of discipline in criminal justice. The aim was to examine organized crime through the eyes of those whose job it is to fight it (and define it), and in doing so investigate the ways social problems surface as sites for state intervention. A genealogy of organized crime within criminological thought was completed, demonstrating that there are a range of different ways organized crime has been constructed within the social scientific discipline, and each of these were influenced by the social context, political winds and intellectual climate of the time. Following this first finding, in-depth qualitative interviews were conducted with individuals who had worked at the apex of the policing of organized crime in Australia, in order to trace their understandings of organized crime across recent history. It was found that organized crime can be understood as an object of the discourse of the politics of law and order, the discourse of international securitization, new public management in policing business, and involves the forging of outlaw identities. Therefore, there are multiple meanings of organized crime that have arisen from an interconnected set of social, political, moral and bureaucratic discourses. The institutional response to organized crime, including law and policing, was subsequently examined. An extensive legislative framework has been enacted at multiple jurisdictional levels, and the problem of organized crime was found to be deserving of unique institutional powers and configurations to deal with it. The social problem of organized crime, as constituted by the discourses mapped out in this research, has led to a new generation of increasingly preemptive and punitive laws, and the creation of new state agencies with amplified powers. That is, the response to organized crime, with a focus on criminalization and enforcement, has been driven and shaped by the four discourses and the way in which the phenomenon is constructed within them. An appreciation of the nexus between the emergence of the social problem, and the formation of institutions in response to it, is important in developing a more complete understanding of the various dimensions of organized crime.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Humanities
Arts, Education and Law
Full Text
APA, Harvard, Vancouver, ISO, and other styles
8

Seaver, Derrick Charles. "The Power of Perception: Securitization, Democratic Peace, and Enduring Rivalries." Wright State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=wright1366130056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Deliyannis, Phivos Adonis. "The securitization of the “boat people” in Australia: The case of Tampa." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21705.

Full text
Abstract:
The thesis will examine how the Australian government through its Prime Minister JohnHoward presented the asylum seekers on “MV Tampa” ship as a threat jeopardizing Australian security. Using the theory of securitization as a methodological framework and Critical Discourse Analysis as utilized by Fairclough’s Three-dimensional Framework transcripts of interviews by John Howard will be analyzed in order to expose the securitization process that framed the asylum seekers as an existential threat that needed extraordinary measures.
APA, Harvard, Vancouver, ISO, and other styles
10

Janjic, Biljana. "Cultural racism in contemporary Europe| Securitization of immigration and radical right-wing parties." Thesis, Webster University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1525311.

Full text
Abstract:

The purpose of this research is to contribute to the studies of cultural racism in contemporary Europe by observing the effects of securitization of immigration and assumed confusion between terms `radical' and `radicalization' on the rise of this phenomenon. Within the framework of securitization theory developed by the Copenhagen school and its connection to the integration approaches, I firstly hypothesize that the security and integration policies show divergence in the equality protection of minority immigrant groups. Then, by treating the securitization of immigration as a fluctuating political opportunity structure, I also hypothesize that such divergence created favorable conditions for radical right-wing parties to emphasize their xenophobic and ethnocentrist appeals and target Muslim immigrant communities as a particular out-group. This is grounded in the theoretical arguments about the construction of a master frame by the radical right-wing parties which involves diffusion processes across various European countries. The research applies fuzzy set Qualitative Comparative Analysis and observes the levels of immigration, ethnic profiling of immigrant groups in security and integration policies, and the political discourse of radical right-wing parties as conditions for the surge of cultural racism. The conditions are observed in the cases of Austria, Bulgaria, Sweden and Switzerland in the period between 2000 and 2013. The main findings are that ethnic profiling and portraying minority immigrant groups as security threats are the most relevant conditions for the surge of cultural racism. On the other hand, the levels of immigration alone cannot always be claimed as sufficient constitutive condition for the increase in racist practices in Europe. The research also concludes that radical right-wing parties not only constructed Muslim immigrant minorities as particular out-group incompatible with European values but also shifted their political rhetoric to the fit the arguments of individualism, gender equality and human rights. Thus the radical right-wing parties portray themselves as defenders of the national identities and culture by incorporating arguments that have traditionally been at the opposite of their political discourse. The incomplete equality protection framework in security and integration policies created by the mainstream parties and the changing political rhetoric of radical right-wing parties produce favorable conditions for the emergence and rise of the cultural racism in selected cases.

APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "International securitization"

1

W, Anderson Ronald. Securitization and commodity contingency in international lending. London: Centre for Economic Policy Research, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dennis, Campbell, Meek Susan, and Center for International Legal Studies., eds. International asset securitization and other financing tools. Ardsley, NY: Transnational Publishers, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jude, Norton Joseph, and Spellman Paul R, eds. Asset securitization: International financial and legal perspectives. Oxford, UK: B. Blackwell Finance, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

James, Loucky, and University of Maine at Orono. Canadian American Center, eds. Canada-US border securitization: Implications for binational cooperation. Orono, Me: Canadian-American Center, University of Maine, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

The securitization of humanitarian migration: Digging moats and sinking boats. Milton Park, Abingdon, Oxon: Routledge, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Understanding security practices in South Asia: Securitization theory and the role of non-state actors. New York: Routledge, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dombret, Andreas R. Die Verbriefung als innovative Finanzierungstechnik: Strategien der Securitization am Geld- und Kapitalmarkt aus der Sicht internationaler Grossbanken. Frankfurt am Main: F. Knapp, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United, States Congress Senate Committee on Banking Housing and Urban Affairs. Changes in our financial system: Globalization of capital markets and securitization of credit : hearings before the Committee on Banking, Housing, and Urban Affairs, United States Senate, One Hundredth Congress, first session on the development of worldwide capital markets brought about by advances in computer and satellite technology ... October 13 and 14, 1987. Washington: U.S. G.P.O., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dimancescu, k. International Securitization Briefing. WorldTrade Executive, Inc., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Securitization, an international guide. London: Euromoney, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "International securitization"

1

Lessambo, Felix I. "International Securitization Markets." In International Finance, 125–38. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69232-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ridley, Martin. "The securitization of LGBT communities in Uganda." In International Security Studies, 234–43. Second edition. | New York: Routledge, 2020. |: Routledge, 2020. http://dx.doi.org/10.4324/9780429024177-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sanjurjo, Diego. "Gun Securitization and Gun Control Policies." In International Series on Public Policy, 55–96. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17917-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Biba, Sebastian. "Securitization theory and China’s international hydro-politics." In China’s Hydro-politics in the Mekong, 25–41. New York : Routledge, 2018. | Series: Routledge contemporary China series ; 186: Routledge, 2018. http://dx.doi.org/10.4324/9781315148663-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Střítecký, Vít. "Security and Securitization in Central Europe." In Regional and International Relations of Central Europe, 162–80. London: Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137283450_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Szeląg, Paulina. "Social Security of States with Limited Recognition: A Case Study of the Republic of Kosovo." In Securitization and Democracy in Eurasia, 137–51. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16659-4_9.

Full text
Abstract:
AbstractThe Organization for Security and Cooperation in Europe (OSCE) comprises 57 participating states, including almost all the countries of the Western Balkans. The only country which is not a participating state of the OSCE in this region is the Republic of Kosovo. Kosovo announced its independence from Serbia on 17 February 2008, and a number of OSCE participating states soon after recognized its statehood. However, some participating states, including Serbia, Russia, Spain, Slovakia, Romania, Cyprus, and Greece, did not. International organizations, such as the United Nations (UN), the European Union (EU), and the OSCE, have been engaged in post-conflict reconstruction of Kosovo since 1999. The aim of this article is to show the role of international community engagement in rebuilding the social security system in Kosovo since the end of the war of 1999. This analysis will enable the reader to understand not only the evolution of the social security system in Kosovo, but also the direct and indirect impact of international community on the social security of the states with limited recognition.
APA, Harvard, Vancouver, ISO, and other styles
7

Mandelbaum, Henoch Gabriel, and Brigitte Weiffen. "The Belt and Road Initiative and Autocracy Promotion as Elements of China’s Grand Strategy." In Securitization and Democracy in Eurasia, 361–74. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16659-4_25.

Full text
Abstract:
AbstractThis chapter analyses the role of autocracy promotion in China’s grand strategy and the role of the Belt and Road Initiative (BRI) in this context. Both the BRI and autocracy promotion can be considered tools Beijing uses to undermine the liberal international order. China does not engage in obvious activities to export its political system. Rather, its efforts are aimed at preventing the spread of Western democracy in its immediate vicinity, with the aims of guaranteeing the rule of the Chinese Communist Party, and ultimately, undermining the liberal values at the heart of the current international order. The BRI has a dual role in realising China’s grand strategy: it expands Beijing’s power projection and strengthens autocracy in its sphere of influence.
APA, Harvard, Vancouver, ISO, and other styles
8

Sreedharan, Shruthi, and N. Rakesh. "Securitization of Smart Home Network Using Dynamic Authentication." In International Conference on Computer Networks and Communication Technologies, 287–93. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8681-6_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhu, Ning. "Reinsurance, Securitization and Catastrophe Risks in China." In Proceedings of 2014 1st International Conference on Industrial Economics and Industrial Security, 401–7. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44085-8_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guo, Congcong. "Chinese Mortgage Securitization Risks and Prevention Measures." In Proceedings of 2014 1st International Conference on Industrial Economics and Industrial Security, 533–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44085-8_77.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "International securitization"

1

Vukosavljević, Dejan, and Danijela Vukosavljević. "SECURITIZATION AS A FUNDING SOURCE OF COMPANIES." In 5th International Scientific Conference – EMAN 2021 – Economics and Management: How to Cope With Disrupted Times. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2021. http://dx.doi.org/10.31410/eman.2021.43.

Full text
Abstract:
Securitization is in wide use and a component of many risk transfer mechanisms between various parties. It is based on selling risky assets in absolute form, as well as the synthetic transfer of specific risk aspects. This paper aims to define securitization, various contexts of its use, transaction participants and their motivation. Securitization in practice is a process in which loans, receivables and other assets are gathered into pools (packages). Money flows in connection with them are employed as well as economic value as support to securities settlements. Securitization is turning illiquid securities and illiquid assets into liquid securities and liquid assets. The final result of securitization is providing funding for activities of companies by selling their assets gathered into pools (packages), instead of using loans. Methods used in this paper are desk research, as well as the method of analysis, practical application worldwide, etc. This paper proves that securitization can practically be based on any asset the relative value of which can be determined, or which generates relatively predictable future income flow, which does contribute to providing funding of current business activities of a company.
APA, Harvard, Vancouver, ISO, and other styles
2

Feng, Xu, and Zhao Long. "Infrastructure Securitization in China." In 2010 International Conference on E-Business and E-Government (ICEE). IEEE, 2010. http://dx.doi.org/10.1109/icee.2010.723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Zunxin. "Tranche Technology of Loan Securitization." In 2007 International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 2007. http://dx.doi.org/10.1109/wicom.2007.1016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Topaloğlu, Mustafa. "Recent Development Related to Mortgage Backed Securities in Turkey." In International Conference on Eurasian Economies. Eurasian Economists Association, 2016. http://dx.doi.org/10.36880/c07.01571.

Full text
Abstract:
While mortgage backed securities are extremely important for prospering economies especially, these securities are kinds of securities capital market instruments that show increase significantly for last 30 years. These make it convenient for development of the capital market and consumers to obtain housing cost-efficiently, in that these securities provide effective fund flow from different and new financing trough. All over the world mortgage based securities are issued by two securitization ways that: the first one is off-balance sheet securitization, mortgage backed securities which are common on countries, are dominated by Anglo-Saxon financing system and another one is in the balance sheet securitization, mortgage bond system is common in Continental Europe. In the context of the Turkey practice of mortgage backed securities is enforced by Mortgage Code numbered 5582, dated 2007. And then this matter is reconverted by Capital Market Code numbered 6362 and its relevant secondary regulation.
APA, Harvard, Vancouver, ISO, and other styles
5

Xu Feng and Zhao Long. "Auto Loan-Backed Securitization in China." In 2010 2nd International Conference on Advanced Computer Control. IEEE, 2010. http://dx.doi.org/10.1109/icacc.2010.5486932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gupta, Varun Chandra, Saheb Gabadia, Menita Agarwal, and Krishna Samdani. "An Intrinsic Review on Securitization using Blockchain." In 2021 International Conference on Computational Performance Evaluation (ComPE). IEEE, 2021. http://dx.doi.org/10.1109/compe53109.2021.9752154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bakri, M. H., R. Ali, S. Ismail, F. Sufian, and A. H. Baharom. "Determinant of securitization asset pricing in Malaysia." In INTERNATIONAL CONFERENCE ON QUANTITATIVE SCIENCES AND ITS APPLICATIONS (ICOQSIA 2014): Proceedings of the 3rd International Conference on Quantitative Sciences and Its Applications. AIP Publishing LLC, 2014. http://dx.doi.org/10.1063/1.4903596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kinoshita, Hirotsugu, Tetsuya Morizumi, and Kazuhiro Suzuki. "Financial Securitization with Digital Rights Management System." In 2009 Ninth Annual International Symposium on Applications and the Internet (SAINT). IEEE, 2009. http://dx.doi.org/10.1109/saint.2009.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sun, Wenchuan. "Application of Blockchain Technology in Asset Securitization." In 2022 5th International Conference on Artificial Intelligence and Big Data (ICAIBD). IEEE, 2022. http://dx.doi.org/10.1109/icaibd55127.2022.9820512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Guo, Peng. "Securitization of Rights in Electronic Commerce Environment." In 2017 International Conference on Education Science and Economic Management (ICESEM 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/icesem-17.2017.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography