Skip to main content

Energy Securitisation: Applying the Copenhagen School’s Framework to Energy

  • Chapter
  • First Online:
Energy Security in Europe

Part of the book series: Energy, Climate and the Environment ((ECE))

Abstract

Drawing on Buzan, Wæver and Wilde—central to the so-called Copenhagen School in Security Studies—the chapter proposes a way of applying the classic formulation of the securitisation model to energy security. Signalling some important critique that the Copenhagen School model picked up over the last two decades, we propose some reformulations. This proves necessary, as ‘securitisation theory’ does not provide clear guidance for empirical research. Most importantly, extra-ordinary measures which should result from a securitising move—and so, the changes in political practice going beyond what is usually accepted—are specified in a way which enables empirical research of securitisation in the energy sector. Furthermore, we expand the idea of a security speech act, and shift the focus onto securitised discourses, rather than individual utterances. Finally, we delineate ‘securitisation proper’ from similar notions of riskification, security jargon and draw a (de-)securitisation ‘pendulum’, which can move from de-politicisation, through politicisation to securitisation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Despite its importance for the success of a securitisation move, however, the audience is not among Buzan’s et al. (1998: 36) units of analysis. This has been seen as problematic and a weakness of this approach (e.g., Balzacq 2011a). However, the methodological challenges of addressing audienc e acceptance have been too difficult to tackle in a comparative project like ours. Some of the studies do address the question of acceptance, but this issue has been left to the researchers’ discretion.

  2. 2.

    Even Buzan et al. (1998: 179–189) do not mention em ergency measures in their case study on EU policy.

  3. 3.

    The notion of a ‘security imagin ary’ draws on Weldes (1999) and Guzzini (2012) and is understood as ‘a structure of well-established meanings and social relations out of which representations about the world of international relations are created’ (Weldes 1999: 10). This suggests that securitisation, by invoking (most often) national security positions, an issue in an inherently inter-national us-them, Self-Other dyadic frame, even if it occurs in a domestic debate without a clear reference to foreign policy.

  4. 4.

    Entman’s def inition comes very close to a description of the mechanism of securitisation: ‘To frame is to select some aspects of a perceived reality and make them more salient in a communicating text, in such a way as to promote a particular problem definition, causal interpretation, moral evaluation, and/or treatment recommendation for the item described’ (Entman 1993: 52).

  5. 5.

    For a detailed description of the operationalisation of the research project, see ‘Documentation of data collection’, available at: http://www.forschungsstelle.uni-bremen.de/UserFiles/file/04-Forschung/documentation_data-collection.pdf.

  6. 6.

    No interviews were conducted for the case study on the Nord Stream gas pipeline.

References

  • Abrahamson, Rita. 2005. Blair’s Africa: The Politics of Securitization and Fear. Alternatives 30 (1): 55–80.

    Article  Google Scholar 

  • Agamben, Giorgio. 2005. State of Exception. Chicago: University of Chicago Press.

    Book  Google Scholar 

  • Balzacq, Thierry. 2008. The Policy Tools of Securitization: Information Exchange, EU Foreign and Interior Policies. Journal of Common Market Studies 46 (1): 75–100.

    Article  Google Scholar 

  • ———. 2011a. A Theory of Securitization: Origins, Core Assumptions, and Variants. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq, 1–30. London: Routledge (PRIO New Security Studies).

    Google Scholar 

  • ———. 2011b. Enquiries into Methods: A New Framework for Securitization Analysis. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq, 31–53. London: Routledge (PRIO New Security Studies).

    Google Scholar 

  • Behnke, Andreas. 2007. Presence and Creation: A Few (meta-) Critical Comments on the c.a.s.e. Manifesto. Security Dialogue 38 (1): 105–111.

    Article  Google Scholar 

  • Besson, Mark, and McDonald, Matt. 2011. The Dog that Didn’t Bark: The Securitization of Climate Change in Australia. Paper Prepared for the International Studies Association Asia-Pacific Regional Section Inaugural Conference, Brisbane, Queensland, Australia, 29–30 September 2011.

    Google Scholar 

  • Bigo, Didier. 2002. Security and Immigration: Towards a Critique of the Governmentality of Unease. Alternatives 27 (Special Issue): 63–92.

    Article  Google Scholar 

  • Bubandt, Nils. 2005. Vernacular Security: The Politics of Feeling Safe in Global, National and Local Worlds. Security Dialogue 36 (3): 275–296.

    Article  Google Scholar 

  • Buzan, Barry. 1991. People, States and Fear: An Agenda for International Security Studies in the Post Cold War Era. 2nd ed. London: Harvester Wheatsheaf.

    Google Scholar 

  • Buzan, Barry, and Ole Wæver. 2003. Regions and Powers. The Structure of International Security, Fifth Printing 2007. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder: Lynne Rienner.

    Google Scholar 

  • Cherp, Aleh, and Jessica Jewell. 2014. The Concept of Energy Security: Beyond the Four As. Energy Policy 75: 415–421.

    Article  Google Scholar 

  • Ciută, Felix. 2009. Security and the Problem of Context: A Hermeneutical Critique of Securitisation Theory. Review of International Studies 35 (2): 301–326.

    Article  Google Scholar 

  • ———. 2010. Conceptual Notes on Energy Security: Total or Banal Security? Security Dialogue 41 (2): 123–144.

    Article  Google Scholar 

  • Collier, Stephen J., and Andrew Lakoff. 2015. Vital Systems Security: Reflexive Biopolitics and the Government of Emergency. Theory, Culture & Society 32 (2): 19–51.

    Article  Google Scholar 

  • Corry, Olaf. 2012. Securitisation and ‘Riskification’: Second-Order Security and the Politics of Climate Change. Millennium 40 (2): 235–258.

    Article  Google Scholar 

  • Curley, Melissa G., and Jonathan Herington. 2010. The Securitization of Avian Influenza: International Discourses and Domestic Politics in Asia. Review of International Studies 37 (1): 141–166.

    Article  Google Scholar 

  • Entman, Robert M. 1993. Framing: Toward Clarification of a Fractured Paradigm. Journal of Communication 43 (4): 51–58.

    Article  Google Scholar 

  • Fischhendler, Itay. 2015. The Securitization of Water Discourse: Theoretical Foundations, Research Gaps and Objectives of the Special Issue. International Environmental Agreements 15 (3): 245–255.

    Article  Google Scholar 

  • Fischhendler, Itay, and David Katz. 2013. The Use of ‘Security’ Jargon in Sustainable Development Discourse: Evidence from the UN Commission on Sustainable Development. International Environmental Agreements 13 (3): 321–342.

    Article  Google Scholar 

  • Fischhendler, Itay, Lior Herman, and Jaya Anderman. 2016. The Geopolitics of Cross-Border Electricity Grids: The Israeli-Arab Case. Energy Policy 98: 533–543.

    Article  Google Scholar 

  • Flinders, Matthew, and Jim Buller. 2006. Depoliticisation: Principles, Tactics and Tools. British Politics 1 (3): 293–318.

    Article  Google Scholar 

  • Gitlin, Todd. 1980. The Whole World Is Watching: Mass Media in the Making and Unmaking of the New Left. Berkeley: University of California Press.

    Google Scholar 

  • Guzzini, Stefano. 2011. Securitization as a Causal Mechanism. Security Dialogue 42 (4–5): 329–341.

    Article  Google Scholar 

  • ———, ed. 2012. The Return of Geopolitics in Europe?: Social Mechanisms and Foreign Policy Identity Crises. Cambridge: Cambridge University Press.

    Google Scholar 

  • Hansen, Lene. 2000. The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the Copenhagen School. Millennium 29 (2): 285–306.

    Article  Google Scholar 

  • ———. 2012. Reconstructing Desecuritisation: The Normative-Political in the Copenhagen School and Directions for How to Apply It. Review of International Studies 38 (3): 525–546.

    Article  Google Scholar 

  • Huysmans, Jef. 2006. The Politics of Insecurity: Fear, Migration and Asylum in the EU. London: Routledge.

    Google Scholar 

  • ———. 2011. What’s in an Act? On Security Speech Acts and Little Security Nothings. Security Dialogue 42 (4–5): 371–383.

    Article  Google Scholar 

  • Judge, Anadrew, and Tomas Maltby. 2017. European Energy Union? Caught Between Securitisation and ‘Riskification’. European Journal of International Security 2 (2): 1–24.

    Article  Google Scholar 

  • Krebs, Ronald R., and Patrick T. Jackson. 2007. Twisting Tongues and Twisting Arms: The Power of Political Rhetoric. European Journal of International Relations 13 (1): 35–66.

    Article  Google Scholar 

  • Kuzemko, Caroline. 2014. Politicising UK Energy: What ‘Speaking Energy Security’ Can Do. Policy & Politics 42 (2): 259–274.

    Article  Google Scholar 

  • ———. 2016. Energy Depoliticisation in the UK: Destroying Political Capacity. British Journal of Politics and International Relations 18 (1): 107–124.

    Article  Google Scholar 

  • Lipschutz, Ronnie D. 1995a. On Security. In On Security, ed. Ronnie D. Lipschutz, 1–23. New York: Columbia University Press.

    Google Scholar 

  • ———. 1995b. Negotiating the Boundaries of Difference and Security at Millennium’s End. In On Security, ed. Ronnie D. Lipschutz, 212–228. New York: Columbia University Press.

    Google Scholar 

  • McDonald, Matt. 2008. Securitization and the Construction of Security. European Journal of International Relations 14 (4): 563–587.

    Article  Google Scholar 

  • Mulligan, Shane. 2010. Energy, Environment, and Security: Crucial Links in a Post-peak World. Global Environmental Politics 10 (4): 79–100.

    Article  Google Scholar 

  • Nyman, Jonna. 2013. Ethics, Securitization and Energy Security: The Case of the United States. Paper Presented at the 8th Pan-European International Studies Conference, Warsaw, 18–21 September 2013.

    Google Scholar 

  • Richert, Jörn. 2010. State-Centric Not Only in Its Findings: How the Acquiescence Framework Is Still Held Hostage by Methodological Nationalism. Paper Prepared for the SGIR 7th Pan-European International Relations Conference, Stockholm, Sweden, 9–11 September 2010.

    Google Scholar 

  • Rogers-Hayden, T., F. Hatton, and I. Lorenzoni. 2011. ‘Energy Security’ and ‘Climate Change’: Constructing UK Energy Discursive Realities. Global Environmental Change 21 (1): 134–142.

    Article  Google Scholar 

  • Salter, Mark B. 2008. Securitization and Desecuritization: A Dramaturgical Analysis of the Canadian Air Transport Security Authority. Journal of International Relations and Development 11 (4): 321–349.

    Article  Google Scholar 

  • ———. 2011. When Securitization Fails: The Hard Case of Counter-Terrorism Programs. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq, 116–131. London: Routledge (PRIO New Security Studies).

    Google Scholar 

  • Schiffrin, Deborah. 1994. Approaches to Discourse. Oxford: Blackwell.

    Google Scholar 

  • Schmitt, Carl. 1985 [1922]. Political Theology: Four Chapters on the Concept of Sovereignty. Chicago: University of Chicago Press.

    Google Scholar 

  • Sjöstedt, Roxanna. 2008. Exploring the Construction of Threats: The Securitization of HIV/AIDS in Russia. Security Dialogue 39 (1): 7–29.

    Article  Google Scholar 

  • Stetter, Stephan, Eva Herschinger, Thomas Teichler, and Matthias Albert. 2011. Conflicts About Water: Securitizations in a Global Context. Cooperation and Conflict 46 (4): 441–459.

    Article  Google Scholar 

  • Stritzel, Holger. 2007. Towards a Theory of Securitization: Copenhagen and Beyond. European Journal of International Relations 13 (3): 357–383.

    Article  Google Scholar 

  • Szulecka, Julia, and Kacper Szulecki. 2013. Analysing the Rospuda River Controversy in Poland: Rhetoric, Environmental Activism and the Influence of the European Union. East European Politics 29 (4): 397–419.

    Article  Google Scholar 

  • Szulecki, Kacper. 2016. When Energy Becomes Security: Copenhagen School Meets Energy Studies. Paper Presented at the Danish Institute of International Studies (DIIS) Research Seminar, Copenhagen, 16 June 2016.

    Google Scholar 

  • Vaughn, Jocelyn. 2009. The Unlikely Securitizer: Humanitarian Organizations and the Securitization of Indistinctiveness. Security Dialogue 40 (3): 263–285.

    Article  Google Scholar 

  • Vuori, Juha A. 2008. Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-democratic Political Order. European Journal of International Relations 14 (1): 65–99.

    Article  Google Scholar 

  • Wæver, Ole. 1989. Security, the Speech Act: Analysing the Politics of a Word. Copenhagen: Center for Peace and Conflict Research.

    Google Scholar 

  • ———. 1995. Securitization and Desecuritization. In On Security, ed. Ronnie D. Lipschutz, 46–86. New York: Columbia University Press.

    Google Scholar 

  • ———. 1996. European Security Identities. Journal of Common Market Studies 34 (1): 103–132.

    Article  Google Scholar 

  • ———. 2003. Securitization: Taking Stock of a Research Programme in Security Studies. Copenhagen: mimeo.

    Google Scholar 

  • ———. 2007. Climate Change: The Security Issue of the Future? Paper Prepared for the CRIPS Annual Lecture 2007. Coventry: University of Warwick.

    Google Scholar 

  • ———. 2015. The Theory Act: Responsibility and Exactitude as Seen from Securitization. International Relations 29 (1): 121–135.

    Article  Google Scholar 

  • Watson, Scott D. 2011. Arctic Sovereignty in Canada: A Case of Successful or Failed Securitization? Paper Prepared for the 83rd Canadian Political Science Association Annual Convention, Waterloo, Ontario, May 2011.

    Google Scholar 

  • Weldes, Jutta. 1999. Constructing National Interests. The United States and the Cuban Missile Crisis. Minneapolis: University of Minnesota Press.

    Google Scholar 

  • Williams, Michael C. 2003. Words, Images, Enemies: Securitization and International Politics. International Studies Quarterly 47 (4): 511–531.

    Article  Google Scholar 

  • ———. 2011. The Continuing Evolution of Securitization Theory. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq, 212–222. London: Routledge (PRIO New Security Studies).

    Google Scholar 

  • Wood, Matthew. 2015. Paradoxical Politics: Emergency, Security and the Depoliticisation of Flooding. Political Studies. doi:10.1111/1467-9248.12192.

  • Zittoun, Phillippe. 2015. From Policy Paradigm to Policy Statement: A Way to Grasp the Role of Knowledge in the Policymaking Process. In Policy Paradigms in Theory and Practice: Discourses, Ideas and Anomalies in Public Policy Dynamics, ed. John Hogan and Michael Howlett, 117–140. Basingstoke: Palgrave Macmillan.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Cite this chapter

Heinrich, A., Szulecki, K. (2018). Energy Securitisation: Applying the Copenhagen School’s Framework to Energy. In: Szulecki, K. (eds) Energy Security in Europe. Energy, Climate and the Environment. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-64964-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64964-1_2

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-64963-4

  • Online ISBN: 978-3-319-64964-1

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics