Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Juha A. Vuori is active.

Publication


Featured researches published by Juha A. Vuori.


Critical Studies on Security | 2015

Security, resilience and desecuritization: multidirectional moves and dynamics

Philippe Bourbeau; Juha A. Vuori

In its current configuration, Security Studies tends to analyse the relationship between security, resilience and non-security politics in cases where the issue of concern has been securitized, when some issue already has the status function and label of a security issue. The literature consistently frames desecuritization and resilience as processes that take place after an issue has been securitized. The overarching objective of this article is to tell a different sociopolitical story of the connections between desecuritization, resilience and securitization. In order to do this, we present a triangular model of dual relationships among security, resilience and non-security politics. By doing so, we propose a theorization of the relations among these concepts that takes into account not only instances in which desecuritization moves and resiliencization moves follow security, but also instances in which desecuritization and resilience arise before security – when securitization is still brewing. Empirical vignettes are employed throughout our discussion to illustrate key points of our argument.


Asian Journal of Political Science | 2009

Regime Transition and the Chinese Politics of Technology: From Mass Science to the Controlled Internet

Lauri Paltemaa; Juha A. Vuori

Abstract The article employs the concepts of the politics of technology and regime transition for analysing the connection between political power and the application of technology in contemporary Chinese history. Examining the Maoist policy of ‘mass science’ and the contemporary Chinese Communist Party (CCP) policies on information and communication technologies, and Internet control, shows how regime-determined policy goals, namely social transformation and political security, have been reflected in the politics of technology during the Maoist and the post-Maoist eras. Through this examination, the article shows how controlling technologies has always been closely connected to the political order in China and how this diagram of power has changed through time. The transition from a totalitarian to a post-totalitarian political order has shifted the Chinese politics of technology from the hard core of the political order to its protective belt. Accordingly, the criteria set for allowed forms of technology have been reduced from the Maoist plural must-nots to the single must-not: technology must not be allowed to jeopardize the position of the CCP as the exclusive holder of the ultimate political power in China. Still, maintaining a post-totalitarian autocratic system requires engaging in a distinct type of politics of technology.


Global Discourse | 2017

To boldly torture where no one has tortured before – Star Trek and the transformation of the ‘progressive’ social imaginary of torture in the United States

Juha A. Vuori

Star Trek has become a staple for studying the interrelations of popular culture and international politics. In the literature on Star Trek and international politics, this quintessential component...


Global Discourse | 2018

Let’s just say we’d like to avoid any great power entanglements: desecuritization in post-Mao Chinese foreign policy towards major powers

Juha A. Vuori

ABSTRACTPrevious studies on securitization in China have shown how security discourses can have various domestic political functions, how even security issues can be contested, and how China engages with the securitization moves of neighbouring states. Despite this growing literature, there is however no general view of desecuritization as a part of Chinese foreign policy towards the major powers. To fill this gap, the present article examines desecuritization in the foreign policy of post-Mao China. This discussion begins with the desecuritization of the Cold War, and then views how China has sought to prevent the securitization of China’s rise in the US. This discussion contributes to the study of Chinese foreign policy maxims by providing it with insights seen through the lens of desecuritization.


Global Discourse | 2018

The politics of securitized technology

Juha A. Vuori

This is a reply to:Lacy, M. 2018. “Securitization and the global politics of cybersecurity.” Global Discourse 8 (1): 100–115. https://doi.org/10.1080/23269995.2017.1415082.


European Journal of International Relations | 2008

Illocutionary Logic and Strands of Securitization: Applying the Theory of Securitization to the Study of Non-Democratic Political Orders

Juha A. Vuori


Issues & Studies | 2006

How Cheap Is Identity Talk?— A Framework of Identity Frames and Security Discourse for the Analysis of Repression and Legitimization of Social Movements in Mainland China

Lauri Paltemaa; Juha A. Vuori


Archive | 2014

Critical security and Chinese politics : the anti-Falungong campaign

Juha A. Vuori


Routledge New Security Studies | 2018

Making norms visible: police uniforms and the social meaning of policing

Xavier Guillaume; Juha A. Vuori; Rune Andersen


University of Minnesota Press | 2016

Making Things International 2

Xavier Guillaume; Juha A. Vuori; Rune Andersen

Collaboration


Dive into the Juha A. Vuori's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rune Andersen

University of Copenhagen

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge