Search Results

You are looking at 11 - 20 of 40 items for :

  • "TECHNOLOGY" x
  • International Relations x
  • Refine by Access: All content x
  • Refine by Content Type: All x
Clear All Modify Search
Restricted access

Mirjam de Bruijn

unconsciously. How do people live such a life in duress (de Bruijn and Both, this issue)? In this article, I research the relationship between living in duress, social media and information and communication technologies (ICTs), and the political agency of

Open access

Shockwaves

Atmospheres beyond the Conflict City/Ordinary City Divide

Sara Fregonese

, translates instead into an atmospheric unsettling of micro- and intimate scales of domesticity, the body, and the emotional sphere (Hergon, this issue). In some cases, this translates into the use of technology for increased and pervasive policing and

Restricted access

Abhishek Choudhary, Rhys Machold, Ricardo Cardoso, Andreas Hackl, Martha Lagace, and Carly Machado

. The Privatization of Israeli Security also importantly challenges the official rationalizations of Israeli security policy interventions, technologies, and practices as generally successful. In all these respects, the book usefully textures and

Open access

“What about Last Time?”

Exploring Potentiality in Danish Young Women's Violent Conflicts

Ann-Karina Henriksen

phones. Social technologies are integral to the everyday lives and socialization processes of children and youth all over the world and in Western countries in particular ( Bell and Kennedy 2000 ; Weber and Dixon 2007 ). All the participants of this

Free access

Introduction

The Generative Power of Political Emotions

Mette-Louise Johansen, Therese Sandrup, and Nerina Weiss

value transgression. Nerina Weiss (in this section), for example, shows how the moral outrage expressed by pro-Kurdish activists in Norway is part of an intergenerational history of suffering, and an affective technology of diaspora politics. In the

Open access

Bernard B. Fyanka and Julaina A. Obika

, and the emergence and development of the colonial police. The third part, “The Crowd and the People,” explores the affective patterning that occurs within crowds during protests. It analyzes the crowd as political technology and also the paradox of

Open access

Introduction

Experiential Landscapes of Terror

Sunčana Laketa, Sara Fregonese, and Damien Masson

and the ever-increasing security measures are thoroughly sutured in everyday life and everyday spaces of European cities. In recent years, we have witnessed an upsurge in technologies and practices of urban security governance in the face of terrorism

Restricted access

Liminality and Missing Persons

Encountering the Missing in Postwar Bosnia-Herzegovina

Laura Huttunen

tensions between families and the state as the rightful mourners of the missing ( Sant Cassia 2005 ; see also Petrović-Šteger 2009 ), and I will follow the new technologies of identification as a practice of refixing social identity to mortal remains

Restricted access

Made in Nigeria

Duress and Upwardly Mobile Youth in the Biography of a Young Entrepreneur in Enugu

Inge Ligtvoet

, experienced life in Nigeria the way Azu has, we would often be confronted by similar constraints in our work and everyday living. We were almost the same age, young and independent workers relying heavily on modern technology for work and our personal lives

Open access

Amy Batley

victims, not perpetrators. References Adey , Peter , and Ben Anderson. 2012 . “ Anticipating emergencies: Technologies of preparedness and the matter of security .” Security Dialogue 43 : 99 – 117 . https://doi.org/10