Critical security history : (de)securitisation, ontological security and insecure memories
MetadataShow full item record
Altmetrics Handle Statistics
Altmetrics DOI Statistics
This article makes a case for incorporating the concept of ‘Critical Security History’ (CSH) into security studies. While history plays a powerful role in a cornucopia of security stories, we contend that it often goes unnoticed in scholarly research and teaching. Against this backdrop, we present a detailed guide to study how history is told and enacted in non-linear ways. To do this, the article outlines how CSH can contribute to securitisation and ontological security studies. As shown, this lens casts a new light on the legacies of (de)securitisation processes and how they are commemorated. It also illustrates that ontological security studies have only begun to call into question the concept of historicity. Working through these observations, the article marshals insights from Halvard Leira's notion of ‘engaged historical amateurism’ to entice scholars interested in ‘doing’ CSH. While acknowledging that this research agenda is hard to achieve, our study of the 2012 Sarajevo Red Line project helps to illustrate the added value of trying to ‘do’ CSH in theory and in practice. We end with some reflections for future research and continued conversations.
Donnelly , F & Steele , B J 2019 , ' Critical security history : (de)securitisation, ontological security and insecure memories ' , European Journal of International Security , vol. 4 , no. 2 , pp. 209-226 . https://doi.org/10.1017/eis.2019.5
European Journal of International Security
© 2019, British International Studies Association. This work has been made available online in accordance with the publisher's policies. This is the author created accepted version manuscript following peer review and as such may differ slightly from the final published version. The final published version of this work is available at https://doi.org/10.1017/eis.2019.5
Items in the St Andrews Research Repository are protected by copyright, with all rights reserved, unless otherwise indicated.