<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-3108</journal-id>
<journal-title><![CDATA[Revista Criminalidad]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Crim.]]></abbrev-journal-title>
<issn>1794-3108</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-31082019000300265</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Una mirada al concepto de seguridad humana en los estudios de seguridad y algunos de sus usos políticos]]></article-title>
<article-title xml:lang="en"><![CDATA[A look at the concept of human security in security studies and some of its political uses]]></article-title>
<article-title xml:lang="pt"><![CDATA[Uma olhada ao conceito de segurança humana nos estudos de segurança e alguns dos seus usos políticos]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Muñoz-Tejada]]></surname>
<given-names><![CDATA[Julián Andrés]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Antioquia Medellín  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2019</year>
</pub-date>
<volume>61</volume>
<numero>3</numero>
<fpage>265</fpage>
<lpage>278</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-31082019000300265&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-31082019000300265&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-31082019000300265&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este artículo revisa las posiciones de algunos autores acerca del concepto seguridad humana en los estudios de seguridad. Plantea una mirada a dicho concepto en términos instrumentales. Visto de esa manera, propone mirarlo no tanto a partir de lo que dice cuando es meramente enunciado, sino a partir de los usos concretos, los fines con los que ciertos actores se han valido de él y los efectos que ha producido dicho aprovechamiento en campos como el político o el académico. Se trata de una revisión documental que pretende situar algunos de los debates que ha suscitado el concepto seguridad humana en los campos académico y político a nivel internacional, como también de la apropiación que en términos locales tuvo para un caso local como el del Observatorio de Seguridad Humana de Medellín. Para ello, por un lado, se efectuó una selección de artículos con base en los criterios de análisis bibliométrico de Scopus y, por otro, se realizaron algunas entrevistas semiestructuradas en la ciudad de Medellín. El artículo concluye con comentarios sobre la importancia de comprender que, como ocurre con cualquier otro concepto en la política, el significado de la seguridad humana está necesariamente vinculado a sus usos políticos.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This article reviews the positions of some authors about the concept of human security in security studies. Considers a look at this concept in instrumental terms. Seen this way, proposes to look at it not so much from what it says when it is merely stated, but from the concrete uses, the purposes for which certain actors have used it and the effects that such exploitation has produced in fields like the political or the academic. It is about a documentary review that aims to place some of the debates that the concept of human security has raised in the academic and political fields at international level, as well as the appropriation that it had in local terms for a local case such as the Human Security Observatory from Medellin. For this, on one hand, a selection of articles was made based on the criteria of Scopus bibliometric analysis and, on the other, some semi-structured interviews were conducted in the city of Medellín. The article concludes with comments on the importance of understanding that, as happens with any other concept in politics, the meaning of human security is necessarily linked to its political uses.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo Este artigo revisa as posições de alguns autores sobre o conceito segurança humana nos estudos de segurança. Expõe uma olhada ao referido conceito em termos instrumentais. Visto de essa maneira, propõe olhar para este não tanto a partir do que diz quando é meramente enunciado, sino a partir das utilizações específicas, os fins com os que certos atores se valeram deste e os efeitos que tem produzido referido aproveitamento em campos como o político ou o académico. Trata-se de uma revisão documental que pretende situar alguns dos debates que tem suscitado o conceito segurança humana nos campos académico e político a nível internacional, como também da apropriação que em termos locais teve para um caso local como o do Observatório de Segurança Humana de Medellín. Para isso, por um lado, foi efetuada uma seleção de artigos com base nos critérios de análise bibliométrico de Scopus e, por outro, foram realizadas algumas entrevistas semiestruturadas na cidade de Medellín. O artigo conclui com comentários sobre a importância de compreender que, como ocorre com qualquer outro conceito na política, o significado da segurança humana está necesariamente vinculado aos seus usos políticos.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Naciones Unidas]]></kwd>
<kwd lng="es"><![CDATA[seguridad humana]]></kwd>
<kwd lng="es"><![CDATA[derechos humanos]]></kwd>
<kwd lng="es"><![CDATA[desarrollo humano]]></kwd>
<kwd lng="es"><![CDATA[seguridad internacional]]></kwd>
<kwd lng="es"><![CDATA[UNTERM).]]></kwd>
<kwd lng="en"><![CDATA[United Nations]]></kwd>
<kwd lng="en"><![CDATA[human security]]></kwd>
<kwd lng="en"><![CDATA[human rights]]></kwd>
<kwd lng="en"><![CDATA[human development]]></kwd>
<kwd lng="en"><![CDATA[international security]]></kwd>
<kwd lng="pt"><![CDATA[Nações Unidas]]></kwd>
<kwd lng="pt"><![CDATA[segurança humana]]></kwd>
<kwd lng="pt"><![CDATA[direitos humanos]]></kwd>
<kwd lng="pt"><![CDATA[desenvolvimento humano]]></kwd>
<kwd lng="pt"><![CDATA[segurança internacional]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abello]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pearce]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;Security from Below&#8221;: Humanizing Security in contexts of chronic violence]]></article-title>
<source><![CDATA[Transforming Security and Development in an Unequal World]]></source>
<year>2009</year>
<volume>40</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>11-9</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acharya]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Holistic Paradigm]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>355-6</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acharya]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Idea Shift: How Ideas from the Rest are Reshaping Global Order]]></article-title>
<source><![CDATA[Third World Quarterly]]></source>
<year>2016</year>
<volume>37</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1156-70</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Albert]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Buzan]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securitization, sectors and functional differentiation]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2011</year>
<volume>42</volume>
<numero>4-5</numero>
<issue>4-5</issue>
<page-range>413-25</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alkire]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Vital Core that Must be Treated with the Same Gravitas as Traditional Security Threats]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>359-60</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Angarita]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Propuestas de seguridad desde organizaciones de base en contextos violentos]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Angarita]]></surname>
<given-names><![CDATA[A. Abello &amp; P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Nuevo pensamiento sobre seguridad en América Latina. Hacia la seguridad como un valor democrático]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Medellín ]]></publisher-loc>
<publisher-name><![CDATA[Observatorio de Seguridad Humana del Consejo Latinoamericano de Ciencias Sociales (CLACSO)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Axworthy]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A New Scientific Field and Policy Lens]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>348-9</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Balzacq]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Enquiries into methods. T. Balzaq]]></article-title>
<source><![CDATA[Securitization Theory. How security problems emerge and dissolve]]></source>
<year>2011</year>
<page-range>31-53</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Balzacq]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The &#8216;essence&#8217; of securitization: Theory, ideal type, and a sociological science of security]]></article-title>
<source><![CDATA[International Relations]]></source>
<year>2015</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>103-13</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Balzacq]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Guzzini]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Introduction: `What kind of theory -if any- is securitization?]]></article-title>
<source><![CDATA[International Relations]]></source>
<year>2015</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>97-102</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bedoya]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La coerción social extorsiva y el milagro de Medellín: la contracara de un modelo]]></article-title>
<source><![CDATA[Canadian Journal of Latin American and Caribbean Studies]]></source>
<year>2017</year>
<volume>42</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>400-16</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellamy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[McDonald]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA['The Utility of Human Security': Which Humans? What Security? A Reply to Thomas &amp; Tow]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2002</year>
<volume>33</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>373-7</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burgess]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Commentary]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>403-4</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burgess]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Owen]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Editor&#8217;s Note. Special Section: What is 'Human Security'?]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>345-6</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buzan]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Reductionist, Idealistic Notion that Adds Little Analytical Value]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>3</volume>
<numero>35</numero>
<issue>35</issue>
<page-range>369-70</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buzan]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Wæver]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[De Wilde]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Security. A new Framework for Analysis]]></source>
<year>1999</year>
<publisher-loc><![CDATA[Colorado ]]></publisher-loc>
<publisher-name><![CDATA[Reiner]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caprioli]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Democracy and Human Rights versus Women&#8217;s Security: A Contradiction?]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>411-28</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chandler]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Human Security: The Dog That Didn`t Bark]]></article-title>
<source><![CDATA[Human Security]]></source>
<year>2008</year>
<volume>39</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>427-38</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Christie]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Critical voices and human security: to endure, to engage or to critique?]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2010</year>
<volume>41</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>169-90</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Certeau]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[La invención de lo cotidiano 1, artes de hacer]]></source>
<year>2007</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Iberoamericana]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Larrinaga]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Doucet]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sovereing Power and the Biopolitics of Human Security]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2008</year>
<volume>39</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>517-37</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duffield]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Human Security: Linking Development and Security in an Age of Terror]]></source>
<year>2005</year>
<conf-name><![CDATA[ New Interfaces between Security and Development, 11]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duffield]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Liberal Way of Development and the Development-Security Impasse: Exploring the Global LIfe-Chance Divide]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2010</year>
<volume>41</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>53-76</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fox]]></surname>
<given-names><![CDATA[M.-J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Girl Soldiers: Human Security and Gendered Insecurity]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>465-79</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gallardo]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Usos políticos del lenguaje. Un discurso paradójico]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Anthropos Editorial]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gómez]]></surname>
<given-names><![CDATA[H. E]]></given-names>
</name>
</person-group>
<source><![CDATA[Control territorial y resistencias. Una lectura desde la seguridad humana]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Medellín ]]></publisher-loc>
<publisher-name><![CDATA[Observatorio de Seguridad Humana-Personería de Medellín-Universidad de Antioquia-IPC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grayson]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Challenge to the Power over Knowledge of Traditional Security Studies]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>357</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Guzzini]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securitization as a causal mechanism]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2011</year>
<volume>42</volume>
<numero>4-5</numero>
<issue>4-5</issue>
<page-range>329-41</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hampson]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Concept in Need of a Global Policy Response]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>349-50</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hansen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Olsson]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Guest Editor&#8217;s Introduction]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>405-9</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hoogensen]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Stuvøy]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Gender, Resistance and Human Security]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2006</year>
<volume>37</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>207-28</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hubert]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Idea that Works in Practice]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>351-2</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hudson]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8216;Doing&#8217; Security as Though Humans Matter: A Feminist Perspective on Gender and the Politics of Human Security]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2005</year>
<volume>36</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>155-74</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Centre]]></surname>
<given-names><![CDATA[Human Security]]></given-names>
</name>
</person-group>
<source><![CDATA[Human Security Report 2005]]></source>
<year>2005</year>
<conf-name><![CDATA[ War and peace in the 21st centuty]]></conf-name>
<conf-loc>New York </conf-loc>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<collab>Human Security Centre</collab>
<source><![CDATA[Human Security Brief 2006]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Vancouver ]]></publisher-loc>
<publisher-name><![CDATA[University of British Columbia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<collab>Human Security Centre</collab>
<source><![CDATA[Human Security Brief]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Vancouver ]]></publisher-loc>
<publisher-name><![CDATA[School for International Studies-Simon Fraser University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<collab>Human Security Report Project</collab>
<source><![CDATA[Human Security Report 2012. Sexual violence, education, and war: beyond the mainstrem narrative]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Canadá. Vancouver ]]></publisher-loc>
<publisher-name><![CDATA[Human Security Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Project]]></surname>
<given-names><![CDATA[Human Security Research]]></given-names>
</name>
</person-group>
<source><![CDATA[Human Security Report 2009/2010. The causes of peace and the shrinking costs of war]]></source>
<year>2011</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<collab>Human Security Research Project</collab>
<source><![CDATA[Human Security Report 2013. The decline in global violence: evidence, explanation, and contestation]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Vancouver ]]></publisher-loc>
<publisher-name><![CDATA[Human Security Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="">
<collab>Journal of Human Security</collab>
<source><![CDATA[]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krause]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The key to a powerful Agenda, if properly delimited]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>367-8</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laclau]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[¿Por qué los significantes vacíos son importantes para la política? Debate Ernesto Laclau y Jorge Alemán]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Alemán]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Para una izquieda lacaniana... intervenciones y textos]]></source>
<year>2009</year>
<page-range>89-111</page-range><publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Grama Ediciones]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leal]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<source><![CDATA[La seguridad nacional a la deriva. Del Frente Nacional a la posguerra fría]]></source>
<year>2002</year>
<publisher-loc><![CDATA[México: Alfaomega ]]></publisher-loc>
<publisher-name><![CDATA[Flacso Ecuador]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leal]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La seguridad: difícil de abordar con democracia]]></article-title>
<source><![CDATA[Análisis Político]]></source>
<year>2002</year>
<volume>46</volume>
<page-range>58-77</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leal]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La seguridad durante el primer gobierno de Álvaro Uribe]]></article-title>
<source><![CDATA[Análisis político]]></source>
<year>2004</year>
<volume>50</volume>
<page-range>86-101</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leaning]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Psychosocial Well-being over Time]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>354-5</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lefort]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[La invención democrática]]></source>
<year>1990</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Ediciones Nueva Visión]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liotta]]></surname>
<given-names><![CDATA[P. H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A concept in Search of Relevance]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>362-3</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[MacFarlane]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Foong Khong]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<source><![CDATA[Human Security and the UN. A Critical History]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Indiana ]]></publisher-loc>
<publisher-name><![CDATA[Indiana University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mack]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Signifier of Shared Values]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>366-7</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marhia]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Some humans are more human than others: Troubling the 'human' in human security from a feminist perspective]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2013</year>
<volume>44</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>19-35</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mendia]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Saillard]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Feminismo y Seguridad Humana: Encuentros y Desencuentros]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Armiño]]></surname>
<given-names><![CDATA[K. Pérez de]]></given-names>
</name>
</person-group>
<source><![CDATA[Seguridad Humana. Aportes Críticos al Debate Teórico y Político]]></source>
<year>2013</year>
<page-range>227-46</page-range><publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Tecnos]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muñoz]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8220;Usos políticos del concepto de seguridad humana: securitización de la violación de derechos humanos y del subdesarrollo en el escenario internacional&#8221;]]></article-title>
<source><![CDATA[Territorios]]></source>
<year>2018</year>
<volume>39</volume>
<page-range>21-46</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Newman]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Normatively Atractive but Analytically Weak Concept]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>358-9</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nunes]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reclaiming the political: Emancipation and critique in secuity studies]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2012</year>
<volume>43</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>345-61</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[ONU-Hábitat-Universidad]]></surname>
<given-names><![CDATA[EAFIT]]></given-names>
</name>
</person-group>
<source><![CDATA[Libro blanco de la seguridad y la convivencia de Medellín]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Medellín ]]></publisher-loc>
<publisher-name><![CDATA[Pregón]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Owen]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Human Security-Conflict, Critique and Consensus: Colloquium Remarks and a Proposal for a Thershold-based Definition]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>373-87</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paris]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Still an Inscrutable Concept]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>370-2</page-range></nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patomäki]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Absenting the absence of future dangers and structural transformations in securitization theory]]></article-title>
<source><![CDATA[International Relations]]></source>
<year>2015</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>128-36</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pearce]]></surname>
<given-names><![CDATA[Jenny]]></given-names>
</name>
<name>
<surname><![CDATA[Angarita]]></surname>
<given-names><![CDATA[Pablo]]></given-names>
</name>
</person-group>
<source><![CDATA[&#8220;Prólogo&#8221;, en Nuevo pensamiento sobre seguridad en América Latina: hacia la seguridad como un valor democrático]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Medellín ]]></publisher-loc>
<publisher-name><![CDATA[Clacso- OSHM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peoples]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Vaughn]]></surname>
<given-names><![CDATA[Williams]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Introduction. Mapping critical security studies and traveling without maps]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Peoples Williams]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Critical Security Studies. An introduction, second edition]]></source>
<year>2015</year>
<page-range>1-12</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pérez de Armiño]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Seguridad humana y estudios críticos de seguridad: de la cooptación a la emancipación]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Armiño]]></surname>
<given-names><![CDATA[K. Pérez de]]></given-names>
</name>
</person-group>
<source><![CDATA[Seguridad humana. Aportes críticos al debate teórico y político]]></source>
<year>2013</year>
<page-range>23-57</page-range><publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Tecnos]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pram]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Lund]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Concepts of politics in securitization studies]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2011</year>
<volume>42</volume>
<numero>4-5</numero>
<issue>4-5</issue>
<page-range>315-28</page-range></nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sierra]]></surname>
<given-names><![CDATA[D. E]]></given-names>
</name>
</person-group>
<source><![CDATA[Re-pensando la seguridad: percepciones y representaciones en torno a la seguridad humana en Medellín. Medellín]]></source>
<year>2010</year>
<publisher-name><![CDATA[Observatorio de Seguridad Humana de Medellín-Personería de Medellín-IPC-IINER Universidad de Antioquia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stuvøy]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Human Security Research Practices: Conceptualizing Security for Women&#8217;s Crisis Centres in Russia]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2010</year>
<volume>41</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>279-99</page-range></nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Suhrke]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Human Security and the Interests of States]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>1999</year>
<volume>30</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>265-76</page-range></nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thakur]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A political Worldview]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>347-8</page-range></nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thomas]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Tow]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Utility of Human Security]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2002</year>
<volume>33</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>177-92</page-range></nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tickner]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La securitización de la crisis colombiana: bases conceptuales y tendencias generales]]></article-title>
<source><![CDATA[Colombia Internacional]]></source>
<year>2004</year>
<volume>60</volume>
<page-range>12-35</page-range></nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Uvin]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Field of Overlaps and Interactions]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>352-3</page-range></nlm-citation>
</ref>
<ref id="B71">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wæver]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Discursive Approaches]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Balzacq]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Securitization Theory. How Security Problems Emerge and Dissolve]]></source>
<year>2011</year>
<page-range>163-80</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B72">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wæver]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Politics, security, theory]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2011</year>
<volume>42</volume>
<numero>4-5</numero>
<issue>4-5</issue>
<page-range>465-80</page-range></nlm-citation>
</ref>
<ref id="B73">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wæver]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The theory act: Responsibility and exactitude as seen from securitization]]></article-title>
<source><![CDATA[International Relations]]></source>
<year>2015</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>121-7</page-range></nlm-citation>
</ref>
<ref id="B74">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Public, the Private and the Evolution of Security Studies]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2010</year>
<numero>6</numero>
<issue>6</issue>
<page-range>623-30</page-range></nlm-citation>
</ref>
<ref id="B75">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Securitization as political theory: The politics of the extraordinary]]></article-title>
<source><![CDATA[International Relations]]></source>
<year>2015</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>114-20</page-range></nlm-citation>
</ref>
<ref id="B76">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Critical security studies]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Bellamy]]></surname>
<given-names><![CDATA[Alex]]></given-names>
</name>
</person-group>
<source><![CDATA[International Society and its Critics]]></source>
<year>2005</year>
<page-range>135-50</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B77">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Security studies. An introduction]]></article-title>
<source><![CDATA[Security Studies. An introduction]]></source>
<year>2008</year>
<page-range>1-12</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B78">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Hylland]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Broad Concept that Encourages Interdisciplinary Thinking]]></article-title>
<source><![CDATA[Security Dialogue]]></source>
<year>2004</year>
<volume>35</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>361-2</page-range></nlm-citation>
</ref>
<ref id="B79">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wittgenstein]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<source><![CDATA[El libro azul]]></source>
<year>2011</year>
<publisher-name><![CDATA[bid&amp;co]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
