Securitization of Islam: A Vicious Circle
-
Kathrin Lenz-Raymann
About this book
Diverse Islamic groups have triggered a »revival of Islam« in Central Asia in the last decades. As a result, there has been a general securitization of Islam by the governments: not only do they combat the terrorist Islamic Movement of Uzbekistan but also outlaw popular groups such as the Gülen movement. However, strong repression of religion might lead to radicalization.
Kathrin Lenz-Raymann tests this hypothesis with an agent-based computer simulation and enriches her study with interviews with international experts, leaders of political Islam and representatives of folk Islam. She concludes that ensuring religious rights is essential for national security.
Reviews
Besprochen in:
Portal für Politikwissenschaft, 21.01.2016, Christian Patz
Europe Asia Studies, 28.10.2016, Riccardo Mario Cucciolla
Supplementary Materials
Topics
-
Download PDFOpen Access
Frontmatter
1 -
Download PDFOpen Access
Content
5 -
Download PDFOpen Access
LIST OF TABLES
8 -
Download PDFOpen Access
LIST OF FIGURES
10 -
Download PDFOpen Access
LIST OF IMAGES
11 -
Download PDFOpen Access
Thanks
13 -
Download PDFOpen Access
Summary
15 -
Download PDFOpen Access
1. Introduction
17 - PART I. REVIVAL OF ISLAM: CASE STUDIES OF ISLAMIC GROUPS
-
Download PDFOpen Access
2. Features of Central Asian Folk Islam
45 -
Download PDFOpen Access
3. Salafi Islam: Social Transformation and Political Islam
69 -
Download PDFOpen Access
4. Typology of Islamic Groups
109 - PART II. POLITICS AND ISLAM: CASE STUDIES OF POLITICAL REGIMES
-
Download PDFOpen Access
5. History of Politics and Islam in Central Asia
117 -
Download PDFOpen Access
6. General Comparison of Contemporary Regimes
139 -
Download PDFOpen Access
7. Comparison of the Contemporary Role of Religion in Politics
177 -
Download PDFOpen Access
8. Comparison of Law Enforcement
209 -
Download PDFOpen Access
9. Typology of Religious and Counter-Terrorism Politics
233 - PART III. SECURITIZATION: THEORY AND SIMULATION MODEL
-
Download PDFOpen Access
10. Securitization Theory: Legitimacy in Security Politics
243 -
Download PDFOpen Access
11. Model Description
257 -
Download PDFOpen Access
12. Model Verification and Validation
279 -
Download PDFOpen Access
13. Conclusions
289 -
Download PDFOpen Access
Literature
293 -
Download PDFOpen Access
Appendix
319