‘Securitization’ Revisited: Theory and cases

Thierry Balzacq, Jan Ruzicka, Sarah Léonard

Research output: Contribution to journalArticlepeer-review

233 Citations (SciVal)


Securitization theory seeks to explain the politics through which (1) the security character of public problems is established, (2) the social commitments resulting from the collective acceptance that a phenomenon is a threat are fixed and (3) the possibility of a particular policy is created. In the last decade, research on securitization has grown significantly. The aim of this article is to evaluate the achievements of securitization theory. First, its main concepts and premises are critically discussed. This article then proceeds to examine the empirical applications of securitization theory to a broad range of issues, as well as the theoretical implications of these studies. Finally, it discusses the main challenges faced by securitization scholars and puts forward strategies to overcome them. This article develops three inter-related arguments. First, notably thanks to empirical studies, securitization theory has significantly developed beyond its initial focus on the speech act. Second, as a result, the distinctiveness of securitization theory currently lies in its capacity to articulate a specific approach to security – influenced by the speech act – with an ‘analytics of government’, which emphasizes practices and processes. Third, securitization theory faces three types of challenges, related, respectively, to theory, method and methodology. The capacity of scholars to overcome those will strongly influence the extent to which securitization theory will be able to make significant contributions to the debates in Security Studies and International Relations in the years to come
Original languageEnglish
Pages (from-to)494-531
JournalInternational Relations
Issue number4
Early online date05 Aug 2015
Publication statusPublished - 01 Dec 2016


  • case sudies
  • evolution
  • methods
  • securitization
  • theory
  • analytics of government


Dive into the research topics of '‘Securitization’ Revisited: Theory and cases'. Together they form a unique fingerprint.

Cite this