Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Research Repository ...arrow_drop_down
image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
Research Repository UCD
Doctoral thesis . 2022
versions View all 1 versions
addClaim

Securitization and Social Media Networks: Who Tweets Security?

Authors: Umansky Casapa, Natalia;

Securitization and Social Media Networks: Who Tweets Security?

Abstract

Famously coined by the Copenhagen School of Barry Buzan, Ole Wæver, and Jaap de Wilde (1998), the concept of securitization focuses on political communication to explain how security threats come into existence. Rather than treating security as a given object, securitization understands security as a linguistic practice (Aradau et al., 2014) and builds on the constructivist idea that by 'speaking security' a given issue becomes a security problem (Austin, 1975; Stritzel, 2014; Wæver, 1995). As with other forms of political communication, the advent of social media has brought about important implications for securitization, accommodating a wider range of actors and providing more accessible means to make effective claims about threats. Yet on the basis that 'security is only articulated in an institutional voice by the elites' (Wæver, 1995: 57), the securitization scholarship has been slow to adapt to the new context of online political communication, leaving many open questions about the ways in which online networks contribute to the emergence of security problems. This dissertation explores this puzzle by integrating tools from the field of Computational Social Science to study the working mechanisms that bolster securitization on online networks. The three studies that are part of this analysis seek to address the gap between the important theoretical advancements that have been developed in previous work and their limited empirical applications by adopting diverse methodological approaches to re-examine theoretical questions in the field of security studies. In particular, this work contributes to our understating of securitization by three means: 1) it offers a systematic empirical framework to study securitization as discourse networks; 2) it delves into the question of who are the actors that define security problems online; and 3) it analyses the ways in which securitization spreads on online networks. This project, therefore, contributes to the literature both theoretically and methodologically. Most importantly, it challenges the top-down approach that has been widely adopted by the securitization scholarship and shows that the online behaviour of elite and non-elite actors has significant implications for international security.

2022-12-07 JG: Author's signature removed from PDF

Country
Ireland
Related Organizations
Keywords

Social media, Political communication, Security studies, Computational social science, 300

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Green