Show simple item record

dc.contributor.authorLuckham, Robin
dc.contributor.authorKirk, Tom
dc.date.accessioned2013-09-24T11:51:37Z
dc.date.available2013-09-24T11:51:37Z
dc.date.issued2013-09-02
dc.identifier.citationLuckham, R and Kirk, T 2013. The Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Research. Stability: International Journal of Security and Development 2(2):44, DOI: http://dx.doi.org/10.5334/sta.cfen_GB
dc.identifier.issn2165-2627
dc.identifier.urihttps://opendocs.ids.ac.uk/opendocs/handle/20.500.12413/2968
dc.description.abstractThis paper reframes the security and development debate through fresh theoretical lenses, which view security as highly contested both in the realm of politics and in the realm of ideas.[i] For some analysts security concerns political power, including the use of organised force to establish and maintain social orders and to protect them from external and internal threats. For others it is about how individuals and communities are protected (or protect themselves) from violence, abuse of power and other existential risks. We integrate both approaches whilst placing our focus on the deep tensions between them. Combining them is especially apposite in the hybrid political orders of conflict-torn regions in the developing world – where the state and its monopoly of violence are contested and diverse state and non-state security actors coexist, collaborate or compete. We ask what security in these hybrid contexts looks like from below, that is from the perspective of “end users”, be these citizens of states, members of local communities or those who are marginalised and insecure. What are their own vernacular understandings of security, and how do these understandings link to wider conceptions of citizen and of human security? Even when security and insecurity are experienced and decided locally, they are at the same time determined nationally and globally. It is at the interfaces between local agency, state power and global order that the most politically salient and analytically challenging issues tend to arise. To analyse these interfaces we focus on three interconnecting political spaces, each characterised by their own forms of hybridity, in which security is negotiated with end-users: (i) “unsecured borderlands” where state authority is suspended or violently challenged by alternative claimants to power or providers of security, including non-state armed groups; (ii) “contested Leviathans”, that is state security structures whose authority and capacity to deliver security are weak, disputed or compromised by special interests; and (iii) “securitised policy spaces” in which international actors collaborate to ensure peace and fulfil their responsibility to protect vulnerable end-users in unsecured regions. In making these distinctions we argue that similar analytical lenses can be turned upon international actors in securitised policy spaces as well as upon state and non-state security actors. The concluding section argues that such a reframing of the security and development debate demands not just new modes of analysis but also fresh approaches to research designed both to provide insights into the vernacular understandings, coping strategies and potential agency of end-users and to uncover the informal networks, alliances and covert strategies of the multiple actors determining their security in hybrid political orders.en_GB
dc.language.isoenen_GB
dc.publisherUbiquity Pressen_GB
dc.rightsThis is an Open Access article distributed under the terms of the Creative Commons Attribution Licenseen_GB
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/en_GB
dc.subjectGovernanceen_GB
dc.subjectPolitics and Poweren_GB
dc.subjectSecurity and Conflicten_GB
dc.titleThe Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Researchen_GB
dc.typeArticleen_GB
dc.rights.holderLuckham and Kirken_GB
dc.identifier.externalurihttp://www.stabilityjournal.org/article/view/144en_GB
dc.identifier.teamGovernanceen_GB


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

This is an Open Access article distributed under the terms of the Creative Commons Attribution License
Except where otherwise noted, this item's license is described as This is an Open Access article distributed under the terms of the Creative Commons Attribution License