dc.contributor.author | Heide, Liesbeth van der | de |
dc.date.accessioned | 2014-05-21T08:04:05Z | |
dc.date.available | 2015-11-04T16:16:24Z | |
dc.date.issued | 2013 | de |
dc.identifier.issn | 0172-6404 | |
dc.identifier.uri | http://www.ssoar.info/ssoar/handle/document/38775 | |
dc.description.abstract | "The Claim that Iraq possessed Weapons of Mass Destruction (WMD) led to the invasion of frag in 2003 by the US army. For the George W. Bush administration, the likely presence of WMD in Iraq was the major justification for boing to war. However, Bush' opponents suspected he used the WMD-dispositive as a legitimation for an invasion that was already set in motion for different reasons. The Iraq invasion and the underlying ideas about the presence of WMD thus provide a tangible case for the analysis of theories of conspiracy and security. The development of the WMD-dispositive will be contextualized using the toolkit of securitization theory. The article explores the notions of security and conspiracy that were used to build the dispositive and shows how it ultimately failed and turned into a counter-narrative in which the Bush administration itself became the Great Conspirator." (author's abstract) | en |
dc.language | en | de |
dc.subject.ddc | Internationale Beziehungen | de |
dc.subject.ddc | Politikwissenschaft | de |
dc.subject.ddc | Geschichte | de |
dc.subject.ddc | History | en |
dc.subject.ddc | International relations | en |
dc.subject.ddc | Political science | en |
dc.title | Cherry-picked intelligence: the weapons of mass destruction dispositive as a legitimation for national security in the post 9/11 age | de |
dc.title.alternative | Geheimdienste mit Scheuklappen: das Dispositiv der Massenvernichtungswaffen als Legitimation für Nationale Sicherheit nach 9/11 | de |
dc.description.review | begutachtet (peer reviewed) | de |
dc.description.review | peer reviewed | en |
dc.source.journal | Historical Social Research | |
dc.source.volume | 38 | de |
dc.publisher.country | DEU | |
dc.source.issue | 1 | de |
dc.subject.classoz | Peace and Conflict Research, International Conflicts, Security Policy | en |
dc.subject.classoz | allgemeine Geschichte | de |
dc.subject.classoz | Friedens- und Konfliktforschung, Sicherheitspolitik | de |
dc.subject.classoz | International Relations, International Politics, Foreign Affairs, Development Policy | en |
dc.subject.classoz | General History | en |
dc.subject.classoz | internationale Beziehungen, Entwicklungspolitik | de |
dc.subject.thesoz | Irak | de |
dc.subject.thesoz | Iraq | en |
dc.subject.thesoz | Krieg | de |
dc.subject.thesoz | war | en |
dc.subject.thesoz | Massenvernichtungswaffe | de |
dc.subject.thesoz | weapon of mass destruction | en |
dc.subject.thesoz | Legitimation | de |
dc.subject.thesoz | legitimation | en |
dc.subject.thesoz | 21. Jahrhundert | de |
dc.subject.thesoz | twenty-first century | en |
dc.subject.thesoz | nationale Sicherheit | de |
dc.subject.thesoz | national security | en |
dc.subject.thesoz | Geheimdienst | de |
dc.subject.thesoz | secret service | en |
dc.subject.thesoz | USA | de |
dc.subject.thesoz | United States of America | en |
dc.subject.thesoz | militärische Intervention | de |
dc.subject.thesoz | military intervention | en |
dc.subject.thesoz | Invasion | de |
dc.subject.thesoz | invasion | en |
dc.subject.thesoz | Bush, G. | de |
dc.subject.thesoz | Bush, G. | en |
dc.subject.thesoz | Terrorismusbekämpfung | de |
dc.subject.thesoz | fight against terrorism | en |
dc.subject.thesoz | Sicherheit | de |
dc.subject.thesoz | security | en |
dc.subject.thesoz | Theorie | de |
dc.subject.thesoz | theory | en |
dc.subject.thesoz | Nahost | de |
dc.subject.thesoz | Middle East | en |
dc.subject.thesoz | Diskurs | de |
dc.subject.thesoz | discourse | en |
dc.subject.thesoz | CIA | de |
dc.subject.thesoz | CIA (Central Intelligence Agency) | en |
dc.subject.thesoz | internationale Politik | de |
dc.subject.thesoz | international politics | en |
dc.subject.thesoz | internationale Sicherheit | de |
dc.subject.thesoz | international security | en |
dc.subject.thesoz | Asien | de |
dc.subject.thesoz | Asia | en |
dc.subject.thesoz | arabische Länder | de |
dc.subject.thesoz | Arab countries | en |
dc.identifier.urn | urn:nbn:de:0168-ssoar-387759 | |
dc.rights.licence | Creative Commons - Attribution 4.0 | en |
dc.rights.licence | Creative Commons - Namensnennung 4.0 | de |
ssoar.gesis.collection | aDIS | de |
ssoar.contributor.institution | GESIS | de |
internal.status | formal und inhaltlich fertig erschlossen | de |
internal.identifier.thesoz | 10035865 | |
internal.identifier.thesoz | 10035033 | |
internal.identifier.thesoz | 10039582 | |
internal.identifier.thesoz | 10050763 | |
internal.identifier.thesoz | 10064679 | |
internal.identifier.thesoz | 10042911 | |
internal.identifier.thesoz | 10039986 | |
internal.identifier.thesoz | 10041244 | |
internal.identifier.thesoz | 10047962 | |
internal.identifier.thesoz | 10038787 | |
internal.identifier.thesoz | 10070669 | |
internal.identifier.thesoz | 10081893 | |
internal.identifier.thesoz | 10036566 | |
internal.identifier.thesoz | 10035127 | |
internal.identifier.thesoz | 10034609 | |
internal.identifier.thesoz | 10041158 | |
internal.identifier.thesoz | 10040310 | |
internal.identifier.thesoz | 10037372 | |
internal.identifier.thesoz | 10042910 | |
internal.identifier.thesoz | 10036843 | |
internal.identifier.thesoz | 10034608 | |
dc.type.stock | article | de |
dc.type.document | Zeitschriftenartikel | de |
dc.type.document | journal article | en |
dc.source.pageinfo | 286-307 | de |
internal.identifier.classoz | 30301 | |
internal.identifier.classoz | 10505 | |
internal.identifier.classoz | 10507 | |
internal.identifier.journal | 152 | |
internal.identifier.document | 32 | |
internal.identifier.ddc | 327 | |
internal.identifier.ddc | 320 | |
internal.identifier.ddc | 900 | |
dc.source.issuetopic | Security and conspiracy in history | de |
dc.identifier.doi | https://doi.org/10.12759/hsr.38.2013.1.286-307 | |
dc.subject.methods | historisch | de |
dc.subject.methods | historical | en |
dc.subject.methods | Theorieanwendung | de |
dc.subject.methods | theory application | en |
dc.description.pubstatus | Veröffentlichungsversion | de |
dc.description.pubstatus | Published Version | en |
internal.identifier.licence | 16 | |
internal.identifier.methods | 9 | |
internal.identifier.methods | 15 | |
internal.identifier.pubstatus | 1 | |
internal.identifier.review | 1 | |
dc.description.misc | gesis-solis-00591551 | de |
internal.embargo.terms | 2015-01-01 | de |
internal.check.abstractlanguageharmonizer | CERTAIN | |
internal.check.languageharmonizer | CERTAIN_RETAINED | |