Article published In:
Journal of Language and Politics
Vol. 16:5 (2017) ► pp.658682
References (28)
References
Agamben, Giorgio. 2003. State of Exception. Chicago: University of Chicago Press.Google Scholar
Balzacq, Thierry. 2010. “A theory of securitization: Origins, Core assumptions and variants.” In Securitization Theory: How Security Problems Emerge and Dissolve, edited by Thierry Balzacq. Routledge: New York. DOI logoGoogle Scholar
Brown, Anne M. 2002. Human Rights and the Borders of Suffering: The Promotion of Human Rights in International Politics. New York: Manchester University Press. DOI logoGoogle Scholar
Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. London: Lynne Rienner Publishers.Google Scholar
Counter-Terrorism and Security Act 2015. Accessed 10 June 2015. Available at [URL].
Slack, James. 2016. “EU may ban deporting terrorism suspects: Top Brussels court plans power grab on human rights cases,” Daily Mail, 11 May. Accessed 10 July 2016. [URL].
Donnelly, Jack. 1999. “The Social Construction of International Human Rights.” in Dunne, T. and Wheeler, N.J. (eds.) Human Rights in Global Politics, 71–101. Cambridge: Cambridge University Press. DOI logoGoogle Scholar
Dunne, Tim. 2010. “The English School,” in International Relations Theories: Discipline and Diversity, edited by Tim Dunne, Milja Kurki, and Steve Smith, 132–152. Oxford: Oxford University Press.Google Scholar
Fisher, Kathryn Marie. 2015. Security, Identity, and British Counterterrorism Policy. London: Palgrave Macmillan. DOI logoGoogle Scholar
Forsythe, David P. 2000. Human Rights in International Relations. Cambridge: Cambridge University Press. DOI logoGoogle Scholar
Goffman, Erving. 1986. Frame Analysis: An Essay on the Organization of Experience. Boston: Northeastern University Press.Google Scholar
Goold, Benjamin J. and Lazarus, Liora. 2007. Security and Human Rights. Portland: Hart Publishing.Google Scholar
HM Government. 2011. Review of Counter-terrorism and Security Powers. Accessed 10 February 2013. [URL].
House of Lords. 16 December 2004. Opinions of the Lords of Appeal for the Judgment in the Cause A (FC) and others (FC) (Appellants) v. Secretary of State for the Home Department (Respondent) X (FC) and another (FC) (Appellants) v. Secretary of State for the Home Department (Respondent). Accessed 05 October 2013. [URL].
Human Rights Act 1998 (Designated Derogation) Order 2001. Accessed 10 February 2014. [URL].
Huysman, Jef and Buonfino, Alessandra. 2008. “Politics of Exception and Unease: Immigration, Terrorism, and Asylum in the Parliamentary Debates in the UK.” In Political Studies, 56 (4): 766–788. DOI logoGoogle Scholar
Jackson, Richard. 2005. Writing the War on Terrorism: Language, Politics, and Counter-terrorism. Manchester: Manchester University Press.Google Scholar
Kuypers, Jim A. 2009. “Framing Analysis.” In Rhetorical Criticism: Perspectives in Action, (ed.) Jim A. Kuypers, 181–204. Plymouth, UK: Lexington Books.Google Scholar
Neal, Andrew W. 2012. “Normalization and Legislative Exceptionalism: Counterterrorist Lawmaking and the Changing Times of Security Emergencies.” In International Political Sociology, vol. 61: 260–276. DOI logoGoogle Scholar
Parker, Tom. 2006. “The Fateful Triangle: Identity Politics, Security Policy and the Anglo-Irish Relations.” In National Counter-terrorism Strategies, edited by R. W. Orttung and A. Makarychev, 79–105. Netherlands: IOS Press.Google Scholar
Risse, Thomas, Ropp Stephen C., and Sikkink Kathryn. 1999. The Power of Human Rights. Cambridge: Cambridge University Press. DOI logoGoogle Scholar
Savic, Obrad. 1999. “Introduction: The Global and the Local in Human Rights.” In The Politics of Human Rights, edited by Obrad Savic, 3–15. London: Verso.Google Scholar
Travis, Alan. 2013. “Conservatives promise to scrap Human Rights Act after next election.” The Guardian 30 September. Accessed 20 April 2014. [URL].
Tsoukala, Anastassia. 2008. “Defining the terrorist threat in the post-September 11 era.” In Terror, Insecurity, and Liberty: Illiberal practices of liberal regime after 9/11, edited by Bigo, Didier and Tsoukala, Anastassia, 50–99. Routledge: New York. DOI logoGoogle Scholar
Verloo, Mieke and Lombardo, Emanuela. 2007. “Contested Gender Equality and Policy Variety in Europe: Introducing a Critical Frame Analysis Approach.” In Multiple Meanings of Gender Equality: A Critical Frame Analysis of Gender Policies in Europe, edited by Mieke Verloo, 21–50. Budapest: CEU Press.Google Scholar
Wæver, Ole. 1995. “Securitization and Desecuritization.” In On Security, edited by R. Lipschutz, pp. 46–86. New York: Columbia University Press.Google Scholar
Wolfendale, Jessica. 2006. “Terrorism, Security and the Threat of Counterterrorism.” Studies in Conflict and Terrorism, 29 (7): 753–770. DOI logoGoogle Scholar
Zarakol, Ayşe. 2011. “What Makes Terrorism Modern? Terrorism, Legitimacy, and the International System.” Review of International Studies, 37 (5): 2311–2336. DOI logoGoogle Scholar
Cited by (2)

Cited by two other publications

Lähteenmäki, Liisa & Anne Alvesalo
2021. Beyond the exceptional. Journal of Language and Politics 20:3  pp. 407 ff. DOI logo
Lock, Irina, Charlotte Stachel & Peter Seele
2020. Traveling frames: How corporate and civil society actors try to influence public administration and courts in a case on nuclear emission data in Switzerland. Journal of Public Affairs 20:1 DOI logo

This list is based on CrossRef data as of 5 july 2024. Please note that it may not be complete. Sources presented here have been supplied by the respective publishers. Any errors therein should be reported to them.