(De) Securitizing the Arctic? Functional actors and the shaping of Canadian Arctic security policy. ...
This dissertation examines the development of modern Arctic security policy. It is a longitudinal investigation that begins in 1985 when Canada had an Arctic policy of “ad hocery” and ends in 2010 with the completion of an integrated policy. It investigates how the threat perceptions and policy pres...
Main Author: | |
---|---|
Format: | Article in Journal/Newspaper |
Language: | English |
Published: |
Arts
2022
|
Subjects: | |
Online Access: | https://dx.doi.org/10.11575/prism/40536 https://prism.ucalgary.ca/handle/1880/115602 |
id |
ftdatacite:10.11575/prism/40536 |
---|---|
record_format |
openpolar |
spelling |
ftdatacite:10.11575/prism/40536 2023-11-05T03:38:14+01:00 (De) Securitizing the Arctic? Functional actors and the shaping of Canadian Arctic security policy. ... Dean, Ryan 2022 https://dx.doi.org/10.11575/prism/40536 https://prism.ucalgary.ca/handle/1880/115602 en eng Arts University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. Arctic Exceptionalism Policy "Northern Strategy" Stewardship Security Securitization "Thinning Ice" "Use it or lose it" Education--Social Sciences Political Science--International Law and Relations Public Administration article doctoral thesis CreativeWork Other 2022 ftdatacite https://doi.org/10.11575/prism/40536 2023-10-09T11:06:44Z This dissertation examines the development of modern Arctic security policy. It is a longitudinal investigation that begins in 1985 when Canada had an Arctic policy of “ad hocery” and ends in 2010 with the completion of an integrated policy. It investigates how the threat perceptions and policy prescriptions of various domestic actors were transmitted into government policy, moving some conceptualizations of security up or to the top of the agenda whilst moving others down or off of it. Second generation securitization theory is systematically applied to a series of exceptional case studies that best track the change over time in Arctic security policy. A mixed methodology of process tracing and discourse analysis interrogate the creation and changing of context, and how context was critical in setting the conditions for shaping policy. The dissertation finds that context matters in the securitization process, largely being created by securitization theory’s undertheorized functional actor. These actors ... Article in Journal/Newspaper Arctic DataCite Metadata Store (German National Library of Science and Technology) |
institution |
Open Polar |
collection |
DataCite Metadata Store (German National Library of Science and Technology) |
op_collection_id |
ftdatacite |
language |
English |
topic |
Arctic Exceptionalism Policy "Northern Strategy" Stewardship Security Securitization "Thinning Ice" "Use it or lose it" Education--Social Sciences Political Science--International Law and Relations Public Administration |
spellingShingle |
Arctic Exceptionalism Policy "Northern Strategy" Stewardship Security Securitization "Thinning Ice" "Use it or lose it" Education--Social Sciences Political Science--International Law and Relations Public Administration Dean, Ryan (De) Securitizing the Arctic? Functional actors and the shaping of Canadian Arctic security policy. ... |
topic_facet |
Arctic Exceptionalism Policy "Northern Strategy" Stewardship Security Securitization "Thinning Ice" "Use it or lose it" Education--Social Sciences Political Science--International Law and Relations Public Administration |
description |
This dissertation examines the development of modern Arctic security policy. It is a longitudinal investigation that begins in 1985 when Canada had an Arctic policy of “ad hocery” and ends in 2010 with the completion of an integrated policy. It investigates how the threat perceptions and policy prescriptions of various domestic actors were transmitted into government policy, moving some conceptualizations of security up or to the top of the agenda whilst moving others down or off of it. Second generation securitization theory is systematically applied to a series of exceptional case studies that best track the change over time in Arctic security policy. A mixed methodology of process tracing and discourse analysis interrogate the creation and changing of context, and how context was critical in setting the conditions for shaping policy. The dissertation finds that context matters in the securitization process, largely being created by securitization theory’s undertheorized functional actor. These actors ... |
format |
Article in Journal/Newspaper |
author |
Dean, Ryan |
author_facet |
Dean, Ryan |
author_sort |
Dean, Ryan |
title |
(De) Securitizing the Arctic? Functional actors and the shaping of Canadian Arctic security policy. ... |
title_short |
(De) Securitizing the Arctic? Functional actors and the shaping of Canadian Arctic security policy. ... |
title_full |
(De) Securitizing the Arctic? Functional actors and the shaping of Canadian Arctic security policy. ... |
title_fullStr |
(De) Securitizing the Arctic? Functional actors and the shaping of Canadian Arctic security policy. ... |
title_full_unstemmed |
(De) Securitizing the Arctic? Functional actors and the shaping of Canadian Arctic security policy. ... |
title_sort |
(de) securitizing the arctic? functional actors and the shaping of canadian arctic security policy. ... |
publisher |
Arts |
publishDate |
2022 |
url |
https://dx.doi.org/10.11575/prism/40536 https://prism.ucalgary.ca/handle/1880/115602 |
genre |
Arctic |
genre_facet |
Arctic |
op_rights |
University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. |
op_doi |
https://doi.org/10.11575/prism/40536 |
_version_ |
1781693903048540160 |