Supranational security states for national security problems: governing by rules & capacities in tech-driven security spaces

Ido Sivan-Sevilla*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

Despite inherent political tensions, supranational institutions are increasingly involved in national security. EU institutions not only guide but also mobilize national resources or directly produce collective security. To make sense of those variations, the article conceptualizes ideal types of ‘supranational security states’ and develops a typological theory for understanding the emergence of the studied states. Based on policy documents and secondary sources, the article conducts a case-centric process-tracing analysis of three decades of EU reforms in (1) export control over dual-use technologies, (2) network and information security and (3) border security. Three types of supranational security states emerge, driven by their path-dependency logics and response to crises. Findings suggest a more nuanced understanding of security policy instruments and the dynamics of political authority in shared security spaces, contributing to debates on the positive and regulatory European security state, technology-driven security governance, and the coherence of the EU as a security actor.

Original languageEnglish
Pages (from-to)1353-1378
Number of pages26
JournalJournal of European Public Policy
Volume30
Issue number7
DOIs
StatePublished - 2023
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2023 Informa UK Limited, trading as Taylor & Francis Group.

Keywords

  • border security
  • export control
  • historical institutionalism
  • network and information security
  • regulatory and positive security states
  • Supranational security governance

Fingerprint

Dive into the research topics of 'Supranational security states for national security problems: governing by rules & capacities in tech-driven security spaces'. Together they form a unique fingerprint.

Cite this