Search Results

You are looking at 11 - 20 of 40 items for :

  • "TECHNOLOGY" x
  • International Relations x
  • All content x
Clear All
Restricted access

Erin R. Eldridge

proactive responses from regulatory agencies, Sidney Shapiro and colleagues (2009) argue, is the result of political interference, laws or standards based on outdated studies or technologies, funding cuts, and a resulting demoralized workforce. The impacts

Restricted access

Abhishek Choudhary, Rhys Machold, Ricardo Cardoso, Andreas Hackl, Martha Lagace, and Carly Machado

. The Privatization of Israeli Security also importantly challenges the official rationalizations of Israeli security policy interventions, technologies, and practices as generally successful. In all these respects, the book usefully textures and

Open access

“What about Last Time?”

Exploring Potentiality in Danish Young Women's Violent Conflicts

Ann-Karina Henriksen

phones. Social technologies are integral to the everyday lives and socialization processes of children and youth all over the world and in Western countries in particular ( Bell and Kennedy 2000 ; Weber and Dixon 2007 ). All the participants of this

Open access

Shockwaves

Atmospheres beyond the Conflict City/Ordinary City Divide

Sara Fregonese

, translates instead into an atmospheric unsettling of micro- and intimate scales of domesticity, the body, and the emotional sphere (Hergon, this issue). In some cases, this translates into the use of technology for increased and pervasive policing and

Free access

Introduction

The Generative Power of Political Emotions

Mette-Louise Johansen, Therese Sandrup, and Nerina Weiss

value transgression. Nerina Weiss (in this section), for example, shows how the moral outrage expressed by pro-Kurdish activists in Norway is part of an intergenerational history of suffering, and an affective technology of diaspora politics. In the

Restricted access

Liminality and Missing Persons

Encountering the Missing in Postwar Bosnia-Herzegovina

Laura Huttunen

tensions between families and the state as the rightful mourners of the missing ( Sant Cassia 2005 ; see also Petrović-Šteger 2009 ), and I will follow the new technologies of identification as a practice of refixing social identity to mortal remains

Open access

Bernard B. Fyanka and Julaina A. Obika

, and the emergence and development of the colonial police. The third part, “The Crowd and the People,” explores the affective patterning that occurs within crowds during protests. It analyzes the crowd as political technology and also the paradox of

Open access

Introduction

Experiential Landscapes of Terror

Sunčana Laketa, Sara Fregonese, and Damien Masson

and the ever-increasing security measures are thoroughly sutured in everyday life and everyday spaces of European cities. In recent years, we have witnessed an upsurge in technologies and practices of urban security governance in the face of terrorism

Restricted access

Made in Nigeria

Duress and Upwardly Mobile Youth in the Biography of a Young Entrepreneur in Enugu

Inge Ligtvoet

, experienced life in Nigeria the way Azu has, we would often be confronted by similar constraints in our work and everyday living. We were almost the same age, young and independent workers relying heavily on modern technology for work and our personal lives

Open access

Amy Batley

victims, not perpetrators. References Adey , Peter , and Ben Anderson. 2012 . “ Anticipating emergencies: Technologies of preparedness and the matter of security .” Security Dialogue 43 : 99 – 117 . https://doi.org/10