Search Results

You are looking at 101 - 110 of 169 items for :

  • NATIONAL IDENTITY x
  • International Relations x
  • All content x
Clear All
Free access

Introduction

Ethnographies of Private Security

Erella Grassiani and Tessa Diphoorn

implications for state sovereignty and authority ( Avant 2004 , 2005 ; Leander 2005 , 2013 ; Singer 2003 ), the role of private security companies in the domains of humanitarian aid ( Spearin 2001 ), how companies engage in identity work and self

Open access

Philippine Prison Marriages

The Politics of Kinship and Women's Composite Agency

Sif Lehman Jensen

enfolded. There is expansive literature on how kinship and politics merge in the Philippines, which shows how local and national politics are organized around strong familial networks (see Abinales and Amoroso 2005 ; Lara 2014; McCoy 1994 ; Roces 1998

Restricted access

Departheid

The Draconian Governance of Illegalized Migrants in Western States

Barak Kalir

Law 16 ( 1 ): 53 – 90 . 10.1093/ijrl/16.1.53 Malkki , Lisa. H. 1992 . “ National Geographic: The Rooting of Peoples and the Territorialization of National Identity among Scholars and Refugees .” Cultural Anthropology 7 ( 1 ): 24 – 44

Restricted access

Guarding the Body

Private Security Work in Rio de Janeiro

Erika Robb Larkins

is important to state at the outset that this methodology is complicated by the fact that my own experiences of the labor of private security work are very different from those of the people I was studying because of my own identity as a middle

Restricted access

Recapturing the Lost

Digitalized Memories of the Rhodesian Bush War

Ane Marie Ørbø Kirkegaard

identity group seems to be forming around a representational theme on YouTube, memorizing the Rhodesian Bush War (or the Liberation War), 1 where a shift from a self-centered to a collective narrative can be seen (for a discussion of such shifts, see

Restricted access

Mirjam de Bruijn

the demonstrators. Tell those who lead the national police to read the introduction to our Constitution. Good leaders behave in a humane way toward their people. After their death, it is not only their people who remember them but the whole of Africa

Restricted access

Eliza Guyol-Meinrath Echeverry

’s national borders. Furthermore, there is currently no international legal precedent for transnational or multinational corporations to be held responsible for human rights abuses committed abroad or for their role in the production of physical or structural

Restricted access

Therese Sandrup

“truth” about what was happening. In the same line, Marc Sageman argues that consciousness, like solidarity and collective identity, does not always precede action but may arise in the process of carrying out an action (2008: 75). In this way, it is not

Restricted access

Frauke Mennes, John P. Hayes, David Kloos, Martha Lagace, Morten Koch Andersen, Somdeep Sen, Matthew Porges, and Sa’ed Atshan

of his identity, that of a Sahariya and that of a locally renowned god man. Finally, Singh critically questions himself using the daemon Yaksha in the last, entertaining chapter, which does an excellent job in restructuring and viewing the full

Free access

Introduction

Ethnographic Engagement with Bureaucratic Violence

Erin R. Eldridge and Amanda J. Reinke

Indigenous identity and acknowledging only particular narratives of violence while ignoring ongoing human rights violations. Contrary to goals of justice and reconciliation, TJ processes, in this context, are entwined with the physical and psychological