The Handbook of Communication and Security

The Handbook of Communication and Security provides a comprehensive collection and synthesis of communication scholarship that engages security at multiple levels, including theoretical vs. practical, international vs. domestic, and public vs. private. The handbook includes chapters that leverage co...

Full description

Saved in:
Bibliographic Details
Main Authors Taylor, Bryan C, Bean, Hamilton
Format eBook
LanguageEnglish
Published Oxford Routledge 2019
Taylor and Francis
Taylor & Francis Group
Edition1
SeriesICA Handbook Series
Subjects
Online AccessGet full text

Cover

Loading…
Table of Contents:
  • Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- List of Figures -- List of Contributors -- EDITORS -- CONTRIBUTORS -- Series Editor's Foreword -- Introduction: Conceptualizing Communication ← → Security -- COMMUNICATION MEETS "SECURITY" -- SECURITY MEETS "COMMUNICATION" -- VOLUME OVERVIEW -- CONCLUSION -- NOTES -- REFERENCES -- PART I: COMMUNICATION CONTEXTS AND GENRES -- Chapter 1: Communication History and Security -- SPEECH ACTS AND THE IN/SECURITY OF TRANSFORMATIVE ACCESS -- GUNS IN THE UNITED STATES: A BRIEF HISTORY OF TRANSFORMATIVE ACCESS -- CONCLUSION -- REFERENCES -- Chapter 2: Crisis/Emergency Communication and Security -- SECURITY AS STRATEGIC COMMUNICATION -- A WORKING DEFINITION OF CRISIS AND EMERGENCY COMMUNICATION -- BEST PRACTICES FOR CRISIS AND EMERGENCY RISK COMMUNICATION -- MARGINALIZATION IN CRISIS PLANNING AND RESPONSE -- CRISIS RESILIENCE, RENEWAL, AND RESISTANCE TO CHANGE -- CASE STUDY: CRISIS AND EMERGENCY COMMUNICATION IN ACTION -- SUMMARY -- REFERENCES -- Chapter 3: Ecological Communication and Security -- COMMUNICATION, ARTICULATION, SECURITY, AND SECURITIZATION -- SECURITY AND SECURITIZATION -- ANALYTICAL/CRITICAL INTERSECTIONS -- NUCLEAR ENTANGLEMENTS -- CONCLUSION: COMMON GROUND FOR SECURITY STUDIES AND COMMUNICATION STUDIES -- NOTES -- REFERENCES -- Chapter 4: Discourse and Security -- INTRODUCTION -- DISSIDENT SCHOLARSHIP IN INTERNATIONAL RELATIONS: THE DISCURSIVE NATURE OF GEOPOLITICS -- CRISES OF MEANING: DISCOURSE, IDENTITY, AND SECURITY -- CRITICAL DISCOURSE STUDIES: THE SOCIO-POLITICAL NATURE OF LANGUAGE AND DISCOURSE -- CASE STUDY: CDS'S "POST" CONCEPTUALIZATIONS OF SECURITY -- CONCLUSION -- NOTES -- REFERENCES -- Chapter 5: Group Communication and Security -- PROSOCIAL GROUPS AND SECURITY-RELATED COMMUNICATION -- CASE STUDY 1: OUR COASTAL FUTURE FORUM
  • Chapter 20: Strategic Narrative and Security -- POLITICAL COMMUNICATION AND STRATEGIC NARRATIVES IN A NEW MEDIA ECOLOGY -- STRATEGIC NARRATIVE AND EXIT STRATEGY IN MILITARY INTERVENTIONS -- CASE STUDY: STRATEGIC NARRATIVE CONSISTENCY AND MULTILATERAL NARRATIVE CONGRUENCE IN 21ST-CENTURY EXIT STRATEGIES -- POLICY IMPLICATIONS FOR STRATEGIC NARRATIVE AND SECURITY -- CONCLUDING REMARKS AND FUTURE RESEARCH -- REFERENCES -- Chapter 21: Surveillance and Communication -- SURVEILLANCE AND SECURITY -- SURVEILLANCE AND COMMUNICATION: INTERSECTIONS AND NEW PATHS -- SMART SURVEILLANCE, SMART SECURITY -- CONCLUSION -- REFERENCES -- Chapter 22: Communicating Terrorism and Counterterrorism -- TERRORISTS -- NATIONAL LEADERS -- EXPLORING THE RELATIONSHIP BETWEEN MEDIA AND MILITARY CAMPAIGNS: A CASE STUDY -- CONCLUSION -- NOTE -- REFERENCES -- PART III: THE FUTURES OF COMMUNICATION ← → SECURITY -- Chapter 23: Commentary: Communication and Security Creep -- ANALYSIS AND CRITIQUE -- STRATEGIC COMMUNICATION -- SECURITY CREEP -- CRITICAL INTERVENTION -- OBSERVATION -- REFERENCES -- Names Index -- Subject Index
  • Chapter 13: Biosecurity and Communication -- DEFINING BIOSECURITY: A BRIEF RHETORICAL HISTORY -- THE BIOPOLITICS OF BIOSECURITIES -- COMMUNICATION STUDIES AND BIOSECURITIES -- CASE STUDY: BIOSECURITY, HEALTH SECURITY, AND A SAFER FUTURE -- CONCLUSION -- REFERENCES -- Chapter 14: Communicatively Countering Violent Extremism Online -- FOUNDATIONS OF VIOLENT EXTREMISM AND COUNTERING VIOLENT EXTREMISM -- THE INTERNET AND VIOLENT EXTREMISM -- COUNTERING VIOLENT EXTREMISM ONLINE -- EXTANT ONLINE CVE EFFORTS -- CASE STUDY: CONDUCTING CVE THROUGH ONLINE COUNTER-NARRATIVES -- CONCLUSION -- REFERENCES -- Chapter 15: Cybersecurity and Communication -- CYBERSECURITY IN COMMUNICATION AND CRITICAL SECURITY STUDIES -- CYBER PEARL HARBOR: A CASE STUDY -- CONCLUSION -- REFERENCES -- APPENDIX A: CYBER PEARL HARBOR-KEY TEXTS -- Chapter 16: Communicative Dimensions of Neoliberalism, Globalisation, and Militarism -- NEOLIBERALISM -- GLOBALISATION -- MILITARISM -- CONCLUSION -- REFERENCES -- Chapter 17: Memory, Security, and Communication -- NEW LEGISLATIVE MEASURES -- FEAR 1: PERFECT DIGITAL MEMORY -- FEAR 2: INSTANT AMNESIA -- TOWARD SECURING A DIGITAL MEMORY OF WAR -- CASE STUDY: STRAVA AND U.S. MILITARY INSECURITY -- CONCLUSION -- NOTE -- REFERENCES -- Chapter 18: Nuclear Deterrence and Communication -- OVERVIEW OF NUCLEAR DETERRENCE THEORY AND STRATEGY -- NUCLEAR DETERRENCE AND COMMUNICATION ONTOLOGIES -- CASE STUDY: SYMBOLIZING "THE BUTTON" IN U.S.-NORTH KOREAN DETERRENCE -- CONCLUSION -- NOTES -- REFERENCES -- Chapter 19: Rituals of Communication and Security -- UNDERSTANDING THE RITUAL OF COMMUNICATION -- EXISTING DEBATES CONCERNING SECURITY: EXPLORING FEMINIST SECURITY STUDIES -- WHY PENAL ABOLITION? -- UNDERSTANDING BIOMETRIC TECHNOLOGIES AND THEIR LINK WITH THE PRISON INDUSTRIAL COMPLEX -- CONCLUSION -- NOTES -- REFERENCES
  • ANTISOCIAL GROUPS AS EMBEDDED SYSTEMS -- CASE STUDY 2: THE GARDEN CITY PLOT -- CONCLUSION -- REFERENCES -- Chapter 6: Health Communication and Security -- HEALTH AND/AS SECURITY -- CASE STUDY: SECURITY, PUBLIC HEALTH PREPAREDNESS, AND EMERGENCY RISK COMMUNICATION -- QUESTIONS AND TENSIONS IN HEALTH COMMUNICATION AND SECURITY -- CONCLUSION -- REFERENCES -- Chapter 7: Intercultural Communication and Security -- E. T. HALL AND THE "SECURITY LOGIC" OF INTERCULTURAL COMMUNICATION -- THE EVOLUTION OF THE SECURITY LOGIC OF INTERCULTURAL COMMUNICATION -- INTERACTIONAL CONTEXT -- A CASE STUDY: MASATO AND THE U.S. ACADEMIC ADVISER -- CONCLUSION -- REFERENCES -- Chapter 8: Organizational Communication and Security -- AN ORGANIZATIONAL COMMUNICATION PERSPECTIVE ON SECURITY -- CASE STUDY: ORGANIZATIONAL COMMUNICATION AND U.S. NATIONAL SECURITY STRATEGY -- CONCLUSION -- REFERENCES -- Chapter 9: Political Communication and Security -- THE AMBIGUITY OF SECURITY -- NATIONAL SECURITY PARADIGMS -- AMERICA FIRST? -- CONCLUSION -- REFERENCES -- Chapter 10: Rhetoric and Security -- RHETORIC AND INTERNATIONAL RELATIONS -- CONTEXTS OF RHETORIC AND SECURITY -- CASE STUDY: THE RHETORIC OF MASS DESTRUCTION -- CONCLUSION -- REFERENCES -- Chapter 11: Strategic Communication and Security -- CONSIDERING PROPAGANDA -- CONSIDERING PUBLIC DIPLOMACY -- CASE STUDY: MOVING FROM OFFENSIVE TO DEFENSIVE POSTURES IN U.S. STRATEGIC COMMUNICATION -- CONCLUSION -- REFERENCES -- Chapter 12: Visual Communication and Security -- SHOWING AND SEEING AS POLITICAL PRACTICES -- VISUALITY AND PERFORMATIVITY -- VISUAL SECURITIZATION AND FRAMING IN CSS AND VCS -- THE POLITICS OF SHOWING AND SEEING: VISUAL SECURITIZATION, FORENSIC ARCHITECTURE, AND THE SAYDNAYA TORTURE PRISON -- THE "ARCHITECTURAL TORTURE" FRAME -- CONCLUSION -- REFERENCES -- PART II: SPECIAL TOPICS