{"id":1768,"date":"2025-08-14T13:48:43","date_gmt":"2025-08-14T17:48:43","guid":{"rendered":"https:\/\/carleton.ca\/eetn\/?p=1768"},"modified":"2025-08-14T14:08:30","modified_gmt":"2025-08-14T18:08:30","slug":"regional-security-complex-theory-a-critical-approach-to-the-arctic","status":"publish","type":"post","link":"https:\/\/carleton.ca\/eetn\/2025\/regional-security-complex-theory-a-critical-approach-to-the-arctic\/","title":{"rendered":"Regional Security Complex Theory: \nA Critical Approach to the Arctic"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-max  md:space-y-10 cu-prose-first-last\">\n\n        \n                    \n                    \n            \n    <div class=\"cu-wideimage relative flex items-center justify-center mx-auto px-8 overflow-hidden md:px-16 rounded-xl not-prose  my-6 md:my-12 first:mt-0 bg-opacity-50 bg-cover bg-cu-black-50 py-24 md:py-28 lg:py-36 xl:py-48\" style=\"background-image: url(https:\/\/carleton.ca\/eetn\/wp-content\/uploads\/sites\/44\/2025\/08\/mohit-kumar-Q-tzZuNU-XI-unsplash-1-768x398.jpg); background-position: 48% 49%;\">\n\n                    <div class=\"absolute top-0 w-full h-screen\" style=\"background-color:rgba(0,0,0,0.600);\"><\/div>\n        \n        <div class=\"relative z-[2] max-w-4xl w-full flex flex-col items-center gap-2 cu-wideimage-image cu-zero-first-last\">\n            <header class=\"mx-auto mb-6 text-center text-white cu-pageheader cu-component-updated cu-pageheader--center md:mb-12\">\n\n                                    <h1 class=\"cu-prose-first-last font-semibold mb-2 text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] cu-pageheader--center text-center mx-auto after:left-px\">\n                        Regional Security Complex Theory: \nA Critical Approach to the Arctic\n                    <\/h1>\n                \n                                    \n\n<p>By Bogdan Koutsenko<\/p>\n\n\n                            <\/header>\n        <\/div>\n\n            <\/div>\n\n    \n\n    <\/div>\n<\/section>\n\n\n\n<p><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;background-position: 0px 100%;background-repeat: repeat-x;));border-bottom-width: 1px;border-bottom-color: transparent\">Regional s<\/span><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">ecurity complex theory (RSCT) is a critical approach to International Relations, which saw one of its first applications to Arctic policy as early as 2008, when the Norwegian defense analyst Kristian Atland used it to evaluate Mikhail Gorbachev\u2019s 1987 Murmansk Speech. In his paper, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;background-position: 0px 100%;background-repeat: repeat-x;));border-bottom-width: 1px;border-bottom-color: transparent\">Atland<\/span><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\"> argues that, through his speech, Gorbachev endeavored to de-securitize the Arctic in order to remove one possible vector of attack against the USSR <\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">(Dean 2022, 16)<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">. However, classification of the Arctic as a region in RSCT has a fraught history.&nbsp;Some scholars question whether the Arctic can function as a security region, noting that national interests of Arctic states on the global stage are often conflated with their region-specific interests in the Far North&nbsp;<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">(\u00d8sthagen 2021)<\/span><\/span><span class=\"TextRun SCXW265621324 BCX4\" data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">.&nbsp;<\/span><\/span><span class=\"EOP SCXW265621324 BCX4\" data-ccp-props=\"{&quot;335559731&quot;:720}\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">The Arctic is both insulated and interconnected. Up until Russia\u2019s full-scale invasion of Ukraine, the Arctic was a space where cooperative behavior was able to flourish, even among geopolitical foes during times of heightened tension (Taub 2024). Between the end of the Cold War and Russia\u2019s annexation of Crimea in 2014, the region underwent a period of deliberately engineered depoliticization. \u00d8sthagen critiques the assumptions underlying the treatment of the Arctic as a coherent security region, arguing instead that the Arctic is formed through the discursive and political processes that reinforce its identity as a geopolitical unit. Without adopting an explicitly post-structuralist framework, his analysis emphasizes how the Arctic is socially constructed through competing narratives and strategic interests (\u00d8sthagen 2021, 66). However, because of the decades-long process of depoliticization \u2014 actuated through the liberal institutionalism that characterized the 1990s and 2000s \u2014 there is no autochthonous security language for conceptualizing the Arctic as a region characterized, in some measure, by hard security concerns (\u00d8sthagen 2021).\u00a0<\/span>\u00a0<\/span><\/p>\n\n\n\n<p><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">The mechanism that transforms policy items into a prioritized security issue is described by RSCT theorists as the \u201cspeech act\u201d; it is carried out by the \u201csecuritizing actor\u201d and justifies responsive measures that may subvert ordinary political processes and norms <\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">(Buzan, W\u00e6ver, and Wilde 1998)<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">. This is a process that may result in the suspension of civil and political rights; increased surveillance; use of emergency powers and\/or extralegal measures; and expansion of police and military power.&nbsp; As W\u00e6ver and his colleagues make clear \u2013 extraordinary measures are not only permissible under these conditions but often expected.<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\"> <\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">For neoclassical realism, objective threats exist but are highly prone to distortion by domestic factors and the decision-making capabilities and perceptions of the Foreign Policy Executive (FPE) <\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">(<\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;background-position: 0px 100%;background-repeat: repeat-x;));border-bottom-width: 1px;border-bottom-color: transparent\">Ripsman<\/span><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">, Taliaferro, and Lobell 2016)<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">. Despite the systematic efforts made by scholars of neoclassical realism to incorporate \u2018intervening variables\u2019 and complicate the monolithic, \u2018black box\u2019 conception of the state, RSCT offers a more dynamic, critical analysis through its focus on discursive spaces.<\/span><\/span><span class=\"EOP SCXW265621324 BCX4\" data-ccp-props=\"{&quot;335559731&quot;:720}\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\">&nbsp;<\/span><\/p>\n\n\n\n<p><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">Focusing on the \u201cconstruction\u201d of a region through discourse makes it possible to eschew a narrow focus on state capacity and employ the sectoral typology of RSCT, which offers a classification of security into military, political, economic, societal, and environmental sectors. Importantly, it also allows for explicit considerations of human security \u2013 a noteworthy development in the post-Cold War era that shifts the referent object of security from the state to the individual, broadening the scope of what is considered a threat. It also aligns with oft-observed dynamics in the Arctic, namely the ways in which issues surrounding sovereignty can be effectively addressed through means other than political, economic, or military pressure, further differentiating RSCT from realist theory. For instance, political scientist Scott Watson argues that by centering environmental concerns, Canada was able to strengthen its sovereignty claims to the Arctic during the Cold War. (Dean 2022, 17). In this view, securitization and de-securitization across numerous policy areas can be likened to a set of tools for achieving national security objectives in ways that realism might not accommodate.<\/span><\/span><\/p>\n\n\n\n<p><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\"><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">Second generation securitization scholars acknowledge that, between the initiating speech act produced by the securitizing actor and its reception by its audience, there is a discursive process of interpretation <\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">(Dean 2022; W\u00e6ver, de Wilde, and Buzan 1998)<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">. This is an \u201cintersubjective\u201d process where the security issue emerges through dialogue, a view that lends itself particularly well to treatment in the media environment, especially when one acknowledges the important role of the oft-neglected \u201cfunctional actor\u201d in security studies, a stakeholder that helps \u201c<\/span><span class=\"FindHit SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;background-color: var(--clrActiveFindHighlight,#ffee80) !important\">prepare<\/span><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\"> the intersubjective terrain between audiences and potential securitizing actors\u201d <\/span><\/span><span class=\"TextRun SCXW265621324 BCX4\" data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">(Dean 2022, 90)<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">. Media outlets do not directly wield political power; however, they are a classic example of functional actors, influencing the context in which the securitizing dynamic takes place.<\/span><\/span><span class=\"EOP SCXW265621324 BCX4\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559731&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\">&nbsp;<\/span><\/span><\/span><\/p>\n\n\n\n<p><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\"><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">What RSCT offers is a broader, more robust framework for evaluating the relationship between external security dynamics and state response in a discursively constructed region. RSCT presents a sectoral typology of threat, which can be used to observe the changing distribution of threat types over time. By contrast, traditional realist theories tend to rely on a narrow, tripartite separation of state power \u2014 economic, military, and political, each comprising an agglomeration of &#8216;real\u2019<\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;font-size: 12pt;font-style: italic;line-height: 20.925px\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\"> <\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">capabilities; this does not lend itself to a focus on media discourse as a site of meaning construction and threat assessment. Neoclassical realism complicates the relationship between threat perception and state response; however, it tends to focus on the efficacy of state institutions and processes in recognizing and addressing objective threats rather than on the ecosystem of substantive threat types.&nbsp;<\/span><\/span><span class=\"EOP SCXW265621324 BCX4\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559731&quot;:720,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\">&nbsp;<\/span><\/span><\/span><\/p>\n\n\n\n<p><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"text-indent: 48px;margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\"><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">In the remote, sparsely populated, but strategically important spaces of the Far North, Arctic countries exist in an environment of prevai<\/span><\/span><\/span><\/span><span data-contrast=\"none\" xml:lang=\"EN-US\" lang=\"EN-US\" class=\"TextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px;font-size: 12pt;line-height: 20.925px;font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, sans-serif\"><span class=\"NormalTextRun SCXW265621324 BCX4\" style=\"margin: 0px;padding: 0px\">ling uncertainty; amid the broader demands of international power dynamics, they seek to leverage the tools of diverse legitimating procedures \u2014 international forums and law, assertions of national sovereignty, and the recentering of propitious issues \u2014 in order to address security threats. This state-centric perspective, while consistent with realism, is also part and parcel of RSCT, which offers the additional advantage of introducing constructivist processes into substantive policy issues rather than the institutional arrangements and domestic processes that mediate responses to objective threats.<\/span><\/span><\/p>\n\n\n\n<p><strong>References:&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p>Buchanan, Elizabeth. Red Arctic\u202f: Russian Strategy under Putin. Washington, D.C: Brookings Institution Press, 2023.&nbsp;<\/p>\n\n\n\n<p>Dean, Ryan. \u201c(De)Securitizing the Arctic? Functional Actors and the Shaping of Canadian Arctic&nbsp;Security Policy.\u201d PhD diss., University of Calgary, 2022.&nbsp;<\/p>\n\n\n\n<p>Knutsen, Bj\u00f8rn\u202fOlav, and Marius Pedersen. 2024. \u201cHow to Understand Climate Change as a&nbsp;Threat Multiplier in the Arctic.\u201d <em>Arctic Review on Law and Politics<\/em> 15 (November): 153\u2013 76. <a href=\"https:\/\/arcticreview.no\/index.php\/arctic\/article\/view\/6500\/10605\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/arcticreview.no\/index.php\/arctic\/article\/view\/6500\/10605<\/a>.&nbsp;<\/p>\n\n\n\n<p>\u00d8sthagen, Andreas. \u201cThe Arctic Security Region: Misconceptions and Contradictions.\u201d <em>Polar<\/em> <em>Geography<\/em> (1995)44, no. 1 (2021): 55\u201374. <a href=\"https:\/\/doi.org\/10.1080\/1088937X.2021.1881645\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/doi.org\/10.1080\/1088937X.2021.1881645<\/a>.&nbsp;<\/p>\n\n\n\n<p>Ripsman, Norrin M., Jeffrey W. Taliaferro, and Steven E. Lobell. <em>Neoclassical Realist Theory of<\/em> <em>International Politics<\/em>. New York: Oxford University Press, 2016.&nbsp;<\/p>\n\n\n\n<p>Taub, Ben. 2024. \u201cRussia\u2019s Espionage War in the Arctic.\u201d <em>The New Yorker<\/em>, September 16, 2024. <a href=\"https:\/\/www.newyorker.com\/magazine\/2024\/09\/16\/russias-espionage-war-in-the-arctic\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.newyorker.com\/magazine\/2024\/09\/16\/russias-espionage-war-<\/a> in-the-arctic.&nbsp;<\/p>\n\n\n\n<p>W\u00e6ver, Ole, Jaap de Wilde, and Barry Buzan. <em>Security\u202f: A New Framework for Analysis<\/em>. Boulder,&nbsp;Colorado: Lynne Rienner Publishers, 1997.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Regional security complex theory (RSCT) is a critical approach to International Relations, which saw one of its first applications to Arctic policy as early as 2008, when the Norwegian defense analyst Kristian Atland used it to evaluate Mikhail Gorbachev\u2019s 1987 Murmansk Speech. In his paper, Atland argues that, through his speech, Gorbachev endeavored to de-securitize [&hellip;]<\/p>\n","protected":false},"author":338,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[],"class_list":["post-1768","post","type-post","status-publish","format-standard","hentry","category-news"],"acf":{"cu_post_thumbnail":""},"_links":{"self":[{"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/posts\/1768","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/users\/338"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/comments?post=1768"}],"version-history":[{"count":5,"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/posts\/1768\/revisions"}],"predecessor-version":[{"id":1807,"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/posts\/1768\/revisions\/1807"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/media?parent=1768"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/categories?post=1768"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/carleton.ca\/eetn\/wp-json\/wp\/v2\/tags?post=1768"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}