{"id":48929,"date":"2024-08-07T07:08:22","date_gmt":"2024-08-07T07:08:22","guid":{"rendered":"https:\/\/www.icip.cat\/alternatives-to-security-2\/redefinir-la-seguretat\/"},"modified":"2024-09-10T11:02:00","modified_gmt":"2024-09-10T11:02:00","slug":"redefine-security","status":"publish","type":"page","link":"https:\/\/www.icip.cat\/en\/alternatives-to-security\/redefine-security\/","title":{"rendered":"Redefine security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"48929\" class=\"elementor elementor-48929 elementor-48684\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e6e0092 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e6e0092\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-544249c\" data-id=\"544249c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12abc74 elementor-widget elementor-widget-heading\" data-id=\"12abc74\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-xl\">Redefine Security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-56adc83 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"56adc83\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-98f50b6\" data-id=\"98f50b6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0cdc5a elementor-widget elementor-widget-spacer\" data-id=\"d0cdc5a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8c402a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8c402a6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e778450\" data-id=\"e778450\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-15b0fb5 elementor-widget elementor-widget-text-editor\" data-id=\"15b0fb5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Security is one of the most discussed socio-political notions in the contemporary world<\/strong>. However, discourses on security have traditionally been linked to physical protection &#8211; in its personal dimension &#8211; and to the state&#8217;s integrity &#8211; in its political dimension. This classic idea has assumed that talking about security is mainly equivalent to &#8220;national defence&#8221; and the &#8220;presence of police and military forces&#8221; in public life. Under this framework, war and armed response, social control and repression are legitimized and assumed as inevitable.<\/p><p>We then ask ourselves: What other ways are there to understand security? <strong>Are there realistic definitions for approaching security from a peace perspective?<\/strong> What limitations do they have?<\/p><p>We analyze approaches rooted in guaranteeing the well-being of all people and territories, shifting investment and trust from punitive mechanisms to social mechanisms, exploring the root causes of violence, promoting peaceful means and dialogue, and co-responsibility and interdependence among various actors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a07e27a elementor-widget elementor-widget-spacer\" data-id=\"a07e27a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-d040213 elementor-widget elementor-widget-heading\" data-id=\"d040213\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Publications<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d4e873 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2d4e873\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21c17d1 elementor-widget elementor-widget-icip-publicationlisting\" data-id=\"21c17d1\" data-element_type=\"widget\" data-widget_type=\"icip-publicationlisting.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"block-publication-listing\"  data-view-type=\"cover\"><div class=\"list\"><article class=\"entry\"><a href=\"https:\/\/www.icip.cat\/en\/publication\/an-alternative-security-framework\/\" class=\"link\" title=\"An alternative security framework\"><div class=\"image\"><img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"570\" src=\"https:\/\/www.icip.cat\/wp-content\/uploads\/2022\/05\/Captura-152-400x570.png\" class=\"attachment-publicationlisting-thumbnail size-publicationlisting-thumbnail wp-post-image\" alt=\"\" \/><\/div><div class=\"details\"><h2 class=\"title\">An alternative security framework<\/h2><p class=\"author\">Batall\u00e9, Olga; Baker, Teddy; and Teodoro, Francesc<\/p><\/div><\/a><\/article><article class=\"entry\"><a href=\"http:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIP_RESEARCH6.pdf\" class=\"link\" title=\"La seguridad en el siglo XXI, desde lo global a lo local\"><div class=\"image\"><img decoding=\"async\" width=\"400\" height=\"570\" src=\"https:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIPresearch06-400x570.png\" class=\"attachment-publicationlisting-thumbnail size-publicationlisting-thumbnail wp-post-image\" alt=\"\" \/><\/div><div class=\"details\"><h2 class=\"title\">La seguridad en el siglo XXI, desde lo global a lo local<\/h2><p class=\"author\">ICIP Research 6<\/p><\/div><\/a><\/article><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c79cc0 elementor-widget elementor-widget-heading\" data-id=\"4c79cc0\" data-element_type=\"widget\" id=\"colombia\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Analysis and Reflection Activities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3124d00 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"3124d00\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4351bf elementor-widget elementor-widget-icip-relatedlisting\" data-id=\"f4351bf\" data-element_type=\"widget\" data-widget_type=\"icip-relatedlisting.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"block-related-listing\"  data-view-type=\"list\"><div class=\"list\"><article class=\"entry\"><a href=\"https:\/\/www.icip.cat\/en\/event\/webinar-an-alternative-security-framework\/\" class=\"link icip_event\"><div class=\"icon\"><svg height='100px' width='100px'  fill=\"#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" data-name=\"Layer 1\" viewBox=\"0 0 100 100\" x=\"0px\" y=\"0px\"><title>50<\/title><path d=\"M66.81836,26.66357V20.77881H61.33984v-6h5.47852V8a3,3,0,0,1,6,0V26.66357a3,3,0,1,1-6,0Zm-12.87891,3a2.99983,2.99983,0,0,0,3-3V8a3,3,0,0,0-6,0v6.77881H45.46v6h5.47949v5.88476A2.99984,2.99984,0,0,0,53.93945,29.66357Zm-15.8789,0a2.99984,2.99984,0,0,0,3-3V8a3,3,0,0,0-6,0v6.77881H29.58008v6h5.48047v5.88476A2.99983,2.99983,0,0,0,38.06055,29.66357ZM95,72A22.9849,22.9849,0,0,1,54.58643,87H14.84961A9.86143,9.86143,0,0,1,5,77.1499V24.64014a9.86643,9.86643,0,0,1,9.84961-9.86035h4.332V8a3,3,0,0,1,6,0V26.66357a3,3,0,0,1-6,0V20.77979h-4.332A3.85924,3.85924,0,0,0,11,24.64014V36.00342H81V24.63867a3.8696,3.8696,0,0,0-3.8125-3.85986l.06445-6A9.89016,9.89016,0,0,1,87,24.63867V54.5863A22.94994,22.94994,0,0,1,95,72ZM50.83557,81A22.99691,22.99691,0,0,1,81,50.83557V42.00342H11V77.1499A3.85392,3.85392,0,0,0,14.84961,81ZM89,72A17,17,0,1,0,72,89,17.019,17.019,0,0,0,89,72ZM70.03516,74.49463l-4.10059-4.1001-4.24219,4.24219L70.03516,82.98,86.11328,66.90234l-4.24219-4.24316Z\"><\/path><\/svg><\/div><div class=\"details\"><h2 class=\"title\">Webinar: \u201cAn alternative security framework\u201d<\/h2><\/div><\/a><\/article><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7ce8567 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7ce8567\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-78b8592\" data-id=\"78b8592\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e41193 elementor-widget elementor-widget-spacer\" data-id=\"5e41193\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2daafc elementor-widget elementor-widget-video\" data-id=\"f2daafc\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?app=desktop&amp;v=XVb0rCc_Ndw&amp;t=13s&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b92ba16 elementor-widget elementor-widget-spacer\" data-id=\"b92ba16\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fe8d8d3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fe8d8d3\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-24b7903\" data-id=\"24b7903\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-af892ee elementor-widget elementor-widget-heading\" data-id=\"af892ee\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ICIP Opinion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ec9a1cc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ec9a1cc\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d9eccf elementor-widget elementor-widget-icip-relatedlisting\" data-id=\"3d9eccf\" data-element_type=\"widget\" data-widget_type=\"icip-relatedlisting.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"block-related-listing\"  data-view-type=\"list\"><div class=\"list\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc100f9 elementor-widget elementor-widget-icip-opinionlisting\" data-id=\"fc100f9\" data-element_type=\"widget\" data-widget_type=\"icip-opinionlisting.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"block-opinion-listing\"><div class=\"list\"><a class='entry' href='https:\/\/www.icip.cat\/en\/opinion\/security-in-times-of-war\/' title='Security in times of war' ><div class='image_container'><img src='https:\/\/www.icip.cat\/wp-content\/uploads\/2022\/03\/sandraweb.jpg' alt='Security in times of war' title='Security in times of war'\/><\/div><div class='content_container'><div class='author'>Sandra Mart\u00ednez<\/div><div class='opiniondate' style='font-size: 14px;'>07\/03\/2022<\/div><h3>Security in times of war<\/h3><\/div><\/a><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7e7f4fb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7e7f4fb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e8f69a\" data-id=\"4e8f69a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Redefine Security Security is one of the most discussed socio-political notions in the contemporary world. However, discourses on security have traditionally been linked to physical protection &#8211; in its personal dimension &#8211; and to the state&#8217;s integrity &#8211; in its political dimension. This classic idea has assumed that talking about security is mainly equivalent to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":48914,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-48929","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Redefine security - ICIP<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Redefine security - ICIP\" \/>\n<meta property=\"og:description\" content=\"Redefine Security Security is one of the most discussed socio-political notions in the contemporary world. However, discourses on security have traditionally been linked to physical protection &#8211; in its personal dimension &#8211; and to the state&#8217;s integrity &#8211; in its political dimension. This classic idea has assumed that talking about security is mainly equivalent to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/\" \/>\n<meta property=\"og:site_name\" content=\"ICIP\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-10T11:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIPresearch06-400x570.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/\",\"url\":\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/\",\"name\":\"Redefine security - ICIP\",\"isPartOf\":{\"@id\":\"https:\/\/www.icip.cat\/ca\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIPresearch06-400x570.png\",\"datePublished\":\"2024-08-07T07:08:22+00:00\",\"dateModified\":\"2024-09-10T11:02:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#primaryimage\",\"url\":\"https:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIPresearch06-400x570.png\",\"contentUrl\":\"https:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIPresearch06-400x570.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Alternatives to security\",\"item\":\"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Redefine security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.icip.cat\/ca\/#website\",\"url\":\"https:\/\/www.icip.cat\/ca\/\",\"name\":\"ICIP\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.icip.cat\/ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.icip.cat\/ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.icip.cat\/ca\/#organization\",\"name\":\"ICIP\",\"url\":\"https:\/\/www.icip.cat\/ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.icip.cat\/ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.icip.cat\/wp-content\/uploads\/2021\/02\/logo-2.png\",\"contentUrl\":\"https:\/\/www.icip.cat\/wp-content\/uploads\/2021\/02\/logo-2.png\",\"width\":562,\"height\":391,\"caption\":\"ICIP\"},\"image\":{\"@id\":\"https:\/\/www.icip.cat\/ca\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Redefine security - ICIP","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/","og_locale":"en_US","og_type":"article","og_title":"Redefine security - ICIP","og_description":"Redefine Security Security is one of the most discussed socio-political notions in the contemporary world. However, discourses on security have traditionally been linked to physical protection &#8211; in its personal dimension &#8211; and to the state&#8217;s integrity &#8211; in its political dimension. This classic idea has assumed that talking about security is mainly equivalent to [&hellip;]","og_url":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/","og_site_name":"ICIP","article_modified_time":"2024-09-10T11:02:00+00:00","og_image":[{"url":"https:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIPresearch06-400x570.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/","url":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/","name":"Redefine security - ICIP","isPartOf":{"@id":"https:\/\/www.icip.cat\/ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#primaryimage"},"image":{"@id":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIPresearch06-400x570.png","datePublished":"2024-08-07T07:08:22+00:00","dateModified":"2024-09-10T11:02:00+00:00","breadcrumb":{"@id":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#primaryimage","url":"https:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIPresearch06-400x570.png","contentUrl":"https:\/\/www.icip.cat\/wp-content\/uploads\/2020\/11\/ICIPresearch06-400x570.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/redefinir-la-seguretat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Alternatives to security","item":"https:\/\/www.icip.cat\/ca\/alternatives-de-seguretat\/"},{"@type":"ListItem","position":2,"name":"Redefine security"}]},{"@type":"WebSite","@id":"https:\/\/www.icip.cat\/ca\/#website","url":"https:\/\/www.icip.cat\/ca\/","name":"ICIP","description":"","publisher":{"@id":"https:\/\/www.icip.cat\/ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.icip.cat\/ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.icip.cat\/ca\/#organization","name":"ICIP","url":"https:\/\/www.icip.cat\/ca\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.icip.cat\/ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.icip.cat\/wp-content\/uploads\/2021\/02\/logo-2.png","contentUrl":"https:\/\/www.icip.cat\/wp-content\/uploads\/2021\/02\/logo-2.png","width":562,"height":391,"caption":"ICIP"},"image":{"@id":"https:\/\/www.icip.cat\/ca\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.icip.cat\/en\/wp-json\/wp\/v2\/pages\/48929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.icip.cat\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.icip.cat\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.icip.cat\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.icip.cat\/en\/wp-json\/wp\/v2\/comments?post=48929"}],"version-history":[{"count":10,"href":"https:\/\/www.icip.cat\/en\/wp-json\/wp\/v2\/pages\/48929\/revisions"}],"predecessor-version":[{"id":49285,"href":"https:\/\/www.icip.cat\/en\/wp-json\/wp\/v2\/pages\/48929\/revisions\/49285"}],"up":[{"embeddable":true,"href":"https:\/\/www.icip.cat\/en\/wp-json\/wp\/v2\/pages\/48914"}],"wp:attachment":[{"href":"https:\/\/www.icip.cat\/en\/wp-json\/wp\/v2\/media?parent=48929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}