{"title":"EIS volume 8 issue 2 Cover and Front matter","authors":"","doi":"10.1017/eis.2023.7","DOIUrl":"https://doi.org/10.1017/eis.2023.7","url":null,"abstract":"","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":"8 1","pages":"f1 - f2"},"PeriodicalIF":2.2,"publicationDate":"2023-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47800146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EIS volume 8 issue 2 Cover and Back matter","authors":"","doi":"10.1017/eis.2023.8","DOIUrl":"https://doi.org/10.1017/eis.2023.8","url":null,"abstract":"","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":" ","pages":"b1 - b2"},"PeriodicalIF":2.2,"publicationDate":"2023-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46807086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract IR’s visual turn has emphasised visual analysis over visual method, centring images of war and crisis. Meanwhile security studies centres great power politics and moments of rupture. Together, they reinforce a dominant image of security as spectacular. This article unites two ethnographic projects focused on everyday security: one examining everyday security landscapes in China, and one examining health security at the UK border. Both found a gap between the dominant image of security and what we saw, and explored this gap through photography. Building on the everyday and visual turns, the article introduces interpretive photography as method to make two contributions. The first is methodological: it introduces interpretive photography as a distinct critical qualitative method that operates on five modes: enabling the seeing-capturing-making-sharing of visual artefacts, it also disrupts dominant visions and contributes to the construction of international relations. The second contribution is empirical: a deeper, richer account of what security looks like. While the discipline associates security with emergency politics or a state of exception, Nyman’s photographs show the exception-made-everyday, while Ferhani’s photos reject the exception by showing banal routines. In this way, photography engages the visuality of security, and can change how we see security.
{"title":"What does security look like? Exploring interpretive photography as method","authors":"Adam Ferhani, Jonna Nyman","doi":"10.1017/eis.2023.6","DOIUrl":"https://doi.org/10.1017/eis.2023.6","url":null,"abstract":"Abstract IR’s visual turn has emphasised visual analysis over visual method, centring images of war and crisis. Meanwhile security studies centres great power politics and moments of rupture. Together, they reinforce a dominant image of security as spectacular. This article unites two ethnographic projects focused on everyday security: one examining everyday security landscapes in China, and one examining health security at the UK border. Both found a gap between the dominant image of security and what we saw, and explored this gap through photography. Building on the everyday and visual turns, the article introduces interpretive photography as method to make two contributions. The first is methodological: it introduces interpretive photography as a distinct critical qualitative method that operates on five modes: enabling the seeing-capturing-making-sharing of visual artefacts, it also disrupts dominant visions and contributes to the construction of international relations. The second contribution is empirical: a deeper, richer account of what security looks like. While the discipline associates security with emergency politics or a state of exception, Nyman’s photographs show the exception-made-everyday, while Ferhani’s photos reject the exception by showing banal routines. In this way, photography engages the visuality of security, and can change how we see security.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":"8 1","pages":"354 - 376"},"PeriodicalIF":2.2,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41510062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emergence of military ad hoc coalitions (AHCs) in Africa as a tool for conflict management outside established institutional frameworks brings about a number of questions: are they undermining existing security structures such as the African Peace and Security Architecture (APSA) or are they contributing to further regime complexity? In order to answer these questions, the article applies the logic of functional differentiation as it is used in the literature on regime complexity and inter-organisational studies. Scope conditions are developed exploring when and how functional differentiation operates and what consequences it brings about for interacting institutions. Empirically the example of military ad hoc coalitions in the Lake Chad Basin and Sahel is at the centre of analysis. It will be argued that ad hoc coalitions are part of a functionally differentiated system response within the African Security Regime Complex and not in direct competition to the APSA.
{"title":"Military ad hoc coalitions and functional differentiation in inter-organisational relations","authors":"M. Brosig","doi":"10.1017/eis.2023.5","DOIUrl":"https://doi.org/10.1017/eis.2023.5","url":null,"abstract":"\u0000 The emergence of military ad hoc coalitions (AHCs) in Africa as a tool for conflict management outside established institutional frameworks brings about a number of questions: are they undermining existing security structures such as the African Peace and Security Architecture (APSA) or are they contributing to further regime complexity? In order to answer these questions, the article applies the logic of functional differentiation as it is used in the literature on regime complexity and inter-organisational studies. Scope conditions are developed exploring when and how functional differentiation operates and what consequences it brings about for interacting institutions. Empirically the example of military ad hoc coalitions in the Lake Chad Basin and Sahel is at the centre of analysis. It will be argued that ad hoc coalitions are part of a functionally differentiated system response within the African Security Regime Complex and not in direct competition to the APSA.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":" ","pages":""},"PeriodicalIF":2.2,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43414334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Stratospheric Aerosol Injection (SAI), is often referred to as a ‘Plan B’ if mitigation strategies to reduce emissions fail and the need to rapidly reduce global temperatures becomes urgent. In theory, SAI would help buy more time to bring carbon and other emissions down while also cooling or keeping the planet below the threshold for dangerous warming, though it is not a solution to the problem of climate change in itself. What little attention it has received in International Relations (IR) is usually focused on the need for governance of the technology and assumes that development and use of the technology will be driven primarily by vulnerability to climate impacts. Through an analysis of common security assumptions and preemptive security framings the article shows that while current assessments of SAI focus on the technology’s environmental impact, broader political and security dynamics, particularly the desire to render climate change more intelligible as a security problem with a solution may have substantial influence on how the technology is used and by whom.
{"title":"Considering stratospheric aerosol injections beyond an environmental frame: The intelligible ‘emergency’ techno-fix and preemptive security","authors":"Danielle N. Young","doi":"10.1017/eis.2023.4","DOIUrl":"https://doi.org/10.1017/eis.2023.4","url":null,"abstract":"Abstract Stratospheric Aerosol Injection (SAI), is often referred to as a ‘Plan B’ if mitigation strategies to reduce emissions fail and the need to rapidly reduce global temperatures becomes urgent. In theory, SAI would help buy more time to bring carbon and other emissions down while also cooling or keeping the planet below the threshold for dangerous warming, though it is not a solution to the problem of climate change in itself. What little attention it has received in International Relations (IR) is usually focused on the need for governance of the technology and assumes that development and use of the technology will be driven primarily by vulnerability to climate impacts. Through an analysis of common security assumptions and preemptive security framings the article shows that while current assessments of SAI focus on the technology’s environmental impact, broader political and security dynamics, particularly the desire to render climate change more intelligible as a security problem with a solution may have substantial influence on how the technology is used and by whom.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":"8 1","pages":"262 - 280"},"PeriodicalIF":2.2,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41778846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Scholars and policymakers agree that major powers have leverage over their more junior partners. Giving security assistance or providing arms is supposed to increase this leverage. However, major powers often hit roadblocks when trying to influence the behaviour of their junior partners. This article demonstrates that junior partners are often successful in constraining the behaviour of the major power partners, and have particular success in extracting additional resources from their major partners. This article develops the concept of loyalty coercion to explain that leverage is based on rhetorical and symbolic moves, rather than material preponderance. It then uses cases of US arms sales to show that weapons transfers did not lead to US leverage, instead opened opportunities for junior partner influence. The article contributes to scholarly and policy perspectives on alliance management and reputation, and leverage in world politics.
{"title":"Arms for influence? The limits of Great Power leverage","authors":"J. Spindel","doi":"10.1017/eis.2023.3","DOIUrl":"https://doi.org/10.1017/eis.2023.3","url":null,"abstract":"Abstract Scholars and policymakers agree that major powers have leverage over their more junior partners. Giving security assistance or providing arms is supposed to increase this leverage. However, major powers often hit roadblocks when trying to influence the behaviour of their junior partners. This article demonstrates that junior partners are often successful in constraining the behaviour of the major power partners, and have particular success in extracting additional resources from their major partners. This article develops the concept of loyalty coercion to explain that leverage is based on rhetorical and symbolic moves, rather than material preponderance. It then uses cases of US arms sales to show that weapons transfers did not lead to US leverage, instead opened opportunities for junior partner influence. The article contributes to scholarly and policy perspectives on alliance management and reputation, and leverage in world politics.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":"8 1","pages":"395 - 412"},"PeriodicalIF":2.2,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48717126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The 1967 Outer Space Treaty reserved outer space for ‘peaceful purposes’, yet recent decades have witnessed growing competition and calls for new multilateral rules including a proposed ban on the deployment of weapons in space. These diplomatic initiatives have stalled in the face of concerted opposition from the United States. To explain this outcome, we characterise US diplomacy as a form of ‘antipreneurship’, a type of strategic norm-focused competition designed to preserve the prevailing normative status quo in the face of entrepreneurial efforts. We substantially refine and extend existing accounts of antipreneurship by theorising three dominant forms of antipreneurial agency – rhetorical, procedural, and behavioural – and describing the mechanisms and scope conditions though which they operate. We then trace the development of US resistance to proposed restraints on space weapons from 2000–present. Drawing on hundreds of official documents, we show how successive US administrations have employed a range of interlayered diplomatic strategies and tactics to preserve the permissive international legal framework governing outer space and protect US national security priorities. Our study illustrates the specific techniques and impacts of resistance in a domain of growing strategic importance, with implications for further refining understandings of norm competition in other issue areas.
{"title":"Contesting the heavens: US antipreneurship and the regulation of space weapons","authors":"Adam Bower, Jeffrey S. Lantis","doi":"10.1017/eis.2023.2","DOIUrl":"https://doi.org/10.1017/eis.2023.2","url":null,"abstract":"\u0000 The 1967 Outer Space Treaty reserved outer space for ‘peaceful purposes’, yet recent decades have witnessed growing competition and calls for new multilateral rules including a proposed ban on the deployment of weapons in space. These diplomatic initiatives have stalled in the face of concerted opposition from the United States. To explain this outcome, we characterise US diplomacy as a form of ‘antipreneurship’, a type of strategic norm-focused competition designed to preserve the prevailing normative status quo in the face of entrepreneurial efforts. We substantially refine and extend existing accounts of antipreneurship by theorising three dominant forms of antipreneurial agency – rhetorical, procedural, and behavioural – and describing the mechanisms and scope conditions though which they operate. We then trace the development of US resistance to proposed restraints on space weapons from 2000–present. Drawing on hundreds of official documents, we show how successive US administrations have employed a range of interlayered diplomatic strategies and tactics to preserve the permissive international legal framework governing outer space and protect US national security priorities. Our study illustrates the specific techniques and impacts of resistance in a domain of growing strategic importance, with implications for further refining understandings of norm competition in other issue areas.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":" ","pages":""},"PeriodicalIF":2.2,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46636746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Following its exceptional response to the 2003 severe acute respiratory syndrome (SARS) outbreak, the World Health Organization (WHO) gained new powers to securitise infectious disease outbreaks via the revised 2005 International Health Regulations (IHRs) and the ability to declare a Public Health Emergency of International Concern (PHEIC). This article investigates the declaration of a PHEIC in relation to the 2009 H1N1 flu pandemic, the 2014–16 Ebola outbreak, and the ongoing COVID-19 pandemic. It argues that the securitisation of these outbreaks was dependent upon global surveillance networks that utilised genetic technologies to visualise the molecular characteristics and spread of the pathogen in question. Genetic evidence in these cases facilitated the creation of a securitised object by revealing the unique and ‘untypable’ nature of the H1N1 and SARS-CoV-2 viruses and made visible the widespread prevalence of Ebola across the population of West Africa. The power of this evidence draws from a societal perception of science as producing objective ‘facts’ about the world that objectivise their objects of concern and empower political actors in the implementation of their security agendas. As a result, scientific evidence provided by genetic technologies now plays a necessary and indispensable role in the securitisation of infectious disease outbreaks.
{"title":"Securitising infectious disease outbreaks: The WHO and the visualisation of molecular life","authors":"Christopher Long","doi":"10.1017/eis.2022.36","DOIUrl":"https://doi.org/10.1017/eis.2022.36","url":null,"abstract":"Abstract Following its exceptional response to the 2003 severe acute respiratory syndrome (SARS) outbreak, the World Health Organization (WHO) gained new powers to securitise infectious disease outbreaks via the revised 2005 International Health Regulations (IHRs) and the ability to declare a Public Health Emergency of International Concern (PHEIC). This article investigates the declaration of a PHEIC in relation to the 2009 H1N1 flu pandemic, the 2014–16 Ebola outbreak, and the ongoing COVID-19 pandemic. It argues that the securitisation of these outbreaks was dependent upon global surveillance networks that utilised genetic technologies to visualise the molecular characteristics and spread of the pathogen in question. Genetic evidence in these cases facilitated the creation of a securitised object by revealing the unique and ‘untypable’ nature of the H1N1 and SARS-CoV-2 viruses and made visible the widespread prevalence of Ebola across the population of West Africa. The power of this evidence draws from a societal perception of science as producing objective ‘facts’ about the world that objectivise their objects of concern and empower political actors in the implementation of their security agendas. As a result, scientific evidence provided by genetic technologies now plays a necessary and indispensable role in the securitisation of infectious disease outbreaks.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":"8 1","pages":"493 - 512"},"PeriodicalIF":2.2,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47519271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EIS volume 8 issue 1 Cover and Back matter","authors":"","doi":"10.1017/eis.2022.35","DOIUrl":"https://doi.org/10.1017/eis.2022.35","url":null,"abstract":"","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":" ","pages":"b1 - b2"},"PeriodicalIF":2.2,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46368581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EIS volume 8 issue 1 Cover and Front matter","authors":"Karin Aggestam","doi":"10.1017/eis.2022.34","DOIUrl":"https://doi.org/10.1017/eis.2022.34","url":null,"abstract":"","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":"8 1","pages":"f1 - f3"},"PeriodicalIF":2.2,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43328281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}