{"id":31,"date":"2024-02-21T21:34:40","date_gmt":"2024-02-21T21:34:40","guid":{"rendered":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/?p=31"},"modified":"2024-02-22T12:23:41","modified_gmt":"2024-02-22T12:23:41","slug":"desecuritisation-in-the-classroom","status":"publish","type":"post","link":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/","title":{"rendered":"(De)securitisation in the classroom"},"content":{"rendered":"\n<p>Our journey begun in September 2023. We started our learning travels with the puzzle of the security-migration nexus. We had many stops along the way, unpacking the theoretical limitations of the 1998&#8217;s <a href=\"https:\/\/www.rienner.com\/title\/Security_A_New_Framework_for_Analysis\" data-type=\"URL\" data-id=\"https:\/\/www.rienner.com\/title\/Security_A_New_Framework_for_Analysis\">Securitisation framework<\/a>, expanding the agents, forms\/devices, contexts, factors, and current challenges. From health, climate change, food (in)security, to the use of apps and drones, borders, and forms of resistance and contestation; from <a href=\"https:\/\/lapatrona.wordpress.com\/\" data-type=\"URL\" data-id=\"https:\/\/lapatrona.wordpress.com\/\">Las Patronas <\/a>in Mexico, to<a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1369183X.2018.1496816\" data-type=\"URL\" data-id=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/1369183X.2018.1496816\"> narratives of vulnerability in <\/a>the UK, to <a href=\"https:\/\/www.cambridge.org\/core\/journals\/european-journal-of-international-security\/article\/abs\/contesting-security-multiple-modalities-ngos-and-the-securitymigration-nexus-in-scotland\/622BF7361DEC48B3E41C0D4638ADC115\" data-type=\"URL\" data-id=\"https:\/\/www.cambridge.org\/core\/journals\/european-journal-of-international-security\/article\/abs\/contesting-security-multiple-modalities-ngos-and-the-securitymigration-nexus-in-scotland\/622BF7361DEC48B3E41C0D4638ADC115\">desecuritisation in Scotland<\/a> <a href=\"https:\/\/www.cambridge.org\/core\/journals\/european-journal-of-international-security\/article\/we-opened-the-door-too-much-the-challenging-desecuritisation-of-colombian-refugees-in-ecuador\/DDC8647B7AE5EEFA7B3478E1A70A4606#metrics\" data-type=\"URL\" data-id=\"https:\/\/www.cambridge.org\/core\/journals\/european-journal-of-international-security\/article\/we-opened-the-door-too-much-the-challenging-desecuritisation-of-colombian-refugees-in-ecuador\/DDC8647B7AE5EEFA7B3478E1A70A4606#metrics\">and Ecuador,<\/a> the receiving society&#8217;s reactions to refugees in South Africa, our journey has been expansive in breadth and depth. We further wondered if the framework can save itself, following <a href=\"https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/09670106211027795\" data-type=\"URL\" data-id=\"https:\/\/journals.sagepub.com\/doi\/abs\/10.1177\/09670106211027795\">Gomes and Rodrigues Marques calls for decolonial, global South interventions.<\/a> <\/p>\n\n\n\n<p>On week 18, it was timely to stop and reflect. <\/p>\n\n\n\n<p> Not too long ago, scholars pointed out that:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Security studies in both \u2018\u2018traditional\u2019\u2019 and \u2018\u2018critical\u2019 guises has for the most part privileged the rhetoric, speech acts and (in)securitising moves of politicians, policymaking communities, security professionals, private security companies and other elites<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<\/blockquote>\n<cite>Vaughan-Williams and Stevens 2015, p. 241<\/cite><\/blockquote>\n\n\n\n<p> And taking their claim, our class turned to the path of reflexivity, of connecting affect, seeing the classroom in Streatham Court as a site of possible contestation, resistance, and probably institutionalisation of Security repertoires. Students and I, as their lecturer, are agents in this journey because knowledge production and understandings have implications. <\/p>\n\n\n\n<p>Are we inevitably situated in this process?<\/p>\n\n\n\n<p>Taking one of the module&#8217;s topic on visual securitisation, we turned the classroom into <a href=\"https:\/\/uk.sagepub.com\/en-gb\/eur\/visual-methodologies\/book277282\" data-type=\"URL\" data-id=\"https:\/\/uk.sagepub.com\/en-gb\/eur\/visual-methodologies\/book277282\">a &#8216;site of production&#8217; <\/a>(Rose, 2001), and through words, symbols, images, scraps, we reflected upon our POL3300 Securitisation of Migration journey. Collage-making was the method through which this fascinating and revealing exercise took place. <\/p>\n\n\n\n<p>The task was broad but not simple. I asked students to channel their learning experience in our module through the collage. There was no specific theme, students could focus on a concept, a feeling, a case, a memory. The only task was to think of themselves as a student of POL3300 Securitisation of Migration.<\/p>\n\n\n\n<p>With the collaboration and expertise of my fellow Latin American educator and visual artist <a href=\"https:\/\/exeterphoenix.org.uk\/events\/art-and-ideas\/\" data-type=\"URL\" data-id=\"https:\/\/exeterphoenix.org.uk\/events\/art-and-ideas\/\">Ludmila Centuri\u00f3n Segovia<\/a>, we were able to produce beautiful and compelling pieces. What you will see next is the creation of students&#8217; narrative of securitisation. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1-768x1024.jpg\" alt=\"\" class=\"wp-image-43\" srcset=\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1-768x1024.jpg 768w, https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1-225x300.jpg 225w, https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1-1152x1536.jpg 1152w, https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1.jpg 1200w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\">Collage-making materials, all set for our workshop!<\/figcaption><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Our journey begun in September 2023. We started our learning travels with the puzzle of the security-migration nexus. We had many stops along the way, unpacking the theoretical limitations of the 1998&#8217;s Securitisation framework, expanding the agents, forms\/devices, contexts, factors, and current challenges. From health, climate change, food (in)security, to the use of apps and [&hellip;]<\/p>\n","protected":false},"author":1645,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>(De)securitisation in the classroom - Journeys (with)in: Securitisation of Migration in the Classroom<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"(De)securitisation in the classroom - Journeys (with)in: Securitisation of Migration in the Classroom\" \/>\n<meta property=\"og:description\" content=\"Our journey begun in September 2023. We started our learning travels with the puzzle of the security-migration nexus. We had many stops along the way, unpacking the theoretical limitations of the 1998&#8217;s Securitisation framework, expanding the agents, forms\/devices, contexts, factors, and current challenges. From health, climate change, food (in)security, to the use of apps and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/\" \/>\n<meta property=\"og:site_name\" content=\"Journeys (with)in: Securitisation of Migration in the Classroom\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-21T21:34:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-22T12:23:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1-768x1024.jpg\" \/>\n<meta name=\"author\" content=\"gpg201\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"gpg201\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/\",\"url\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/\",\"name\":\"(De)securitisation in the classroom - Journeys (with)in: Securitisation of Migration in the Classroom\",\"isPartOf\":{\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1-768x1024.jpg\",\"datePublished\":\"2024-02-21T21:34:40+00:00\",\"dateModified\":\"2024-02-22T12:23:41+00:00\",\"author\":{\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#\/schema\/person\/dad07dc080cc9854120057776a2dbb07\"},\"breadcrumb\":{\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#primaryimage\",\"url\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1.jpg\",\"contentUrl\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1.jpg\",\"width\":1200,\"height\":1600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"(De)securitisation in the classroom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#website\",\"url\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/\",\"name\":\"Journeys (with)in: Securitisation of Migration in the Classroom\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#\/schema\/person\/dad07dc080cc9854120057776a2dbb07\",\"name\":\"gpg201\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41b26957ec8923a55db4f5eea804df9c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41b26957ec8923a55db4f5eea804df9c?s=96&d=mm&r=g\",\"caption\":\"gpg201\"},\"url\":\"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/author\/gpg201\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"(De)securitisation in the classroom - Journeys (with)in: Securitisation of Migration in the Classroom","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/","og_locale":"en_US","og_type":"article","og_title":"(De)securitisation in the classroom - Journeys (with)in: Securitisation of Migration in the Classroom","og_description":"Our journey begun in September 2023. We started our learning travels with the puzzle of the security-migration nexus. We had many stops along the way, unpacking the theoretical limitations of the 1998&#8217;s Securitisation framework, expanding the agents, forms\/devices, contexts, factors, and current challenges. From health, climate change, food (in)security, to the use of apps and [&hellip;]","og_url":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/","og_site_name":"Journeys (with)in: Securitisation of Migration in the Classroom","article_published_time":"2024-02-21T21:34:40+00:00","article_modified_time":"2024-02-22T12:23:41+00:00","og_image":[{"url":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1-768x1024.jpg"}],"author":"gpg201","twitter_card":"summary_large_image","twitter_misc":{"Written by":"gpg201","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/","url":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/","name":"(De)securitisation in the classroom - Journeys (with)in: Securitisation of Migration in the Classroom","isPartOf":{"@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#primaryimage"},"image":{"@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#primaryimage"},"thumbnailUrl":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1-768x1024.jpg","datePublished":"2024-02-21T21:34:40+00:00","dateModified":"2024-02-22T12:23:41+00:00","author":{"@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#\/schema\/person\/dad07dc080cc9854120057776a2dbb07"},"breadcrumb":{"@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#primaryimage","url":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1.jpg","contentUrl":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-content\/uploads\/sites\/409\/2024\/02\/collage-workshop-1.jpg","width":1200,"height":1600},{"@type":"BreadcrumbList","@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/2024\/02\/21\/desecuritisation-in-the-classroom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/"},{"@type":"ListItem","position":2,"name":"(De)securitisation in the classroom"}]},{"@type":"WebSite","@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#website","url":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/","name":"Journeys (with)in: Securitisation of Migration in the Classroom","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#\/schema\/person\/dad07dc080cc9854120057776a2dbb07","name":"gpg201","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/41b26957ec8923a55db4f5eea804df9c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41b26957ec8923a55db4f5eea804df9c?s=96&d=mm&r=g","caption":"gpg201"},"url":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/author\/gpg201\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/posts\/31"}],"collection":[{"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/users\/1645"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/comments?post=31"}],"version-history":[{"count":7,"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/posts\/31\/revisions"}],"predecessor-version":[{"id":147,"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/posts\/31\/revisions\/147"}],"wp:attachment":[{"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/media?parent=31"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/categories?post=31"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.exeter.ac.uk\/securitisationjourneys\/wp-json\/wp\/v2\/tags?post=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}