Search Results

You are looking at 1 - 10 of 29 items for :

  • Anthropology x
  • International Relations x
  • All content x
Clear All
Restricted access

Kathleen M. Blee

Interpretive and ethical frameworks circumscribe how we study the perpetrators of politically motivated violence against civilian populations. This article revisits the author’s studies of two eras of white supremacism in the United States, the 1920s and 1980s–1990s, to examine how these were affected by four frameworks of inquiry: the assumption of agency, the allure of the extraordinary, the tendency to categorical analysis, and the presumption of net benefit. It concludes with suggestions on how scholars can avoid the limitations of these frameworks.

Restricted access

Achieving the Ordinary

Everyday Peace and the Other in Bosnian Mixed-Ethnicity Families

Keziah Conrad

Porter (2012), like many others, suggest that the costs of this containment are borne unequally by women. 4 Das responds to Levinas's “grand vision” of ethics, in which the face of the other claims infinite responsibility from me. She asks, “What does

Free access


The Generative Power of Political Emotions

Mette-Louise Johansen, Therese Sandrup, and Nerina Weiss

.1017/CBO9780511818462 Lambek , M. , ed. 2010 . Ordinary Ethics: Anthropology, Language and Action . New York : Fordham University Press . Lutz , C. 2017 . “ What Matters ” Cultural Anthropology 32 ( 2 ): 181 – 191 . 10.14506/ca32.2.02 Mazzarella

Free access


The Digital Age Opens Up New Terrains for Peace and Conflict Research

Josepha Ivanka Wessels

Information Age, Volumes 1–3: Economy, Society and Culture . Oxford : Wiley-Blackwell . Chouliaraki , Lilie , and Orgad Shani . 2011 . “ Mediation, Ethics and Otherness .” International Journal of Cultural Studies 14 ( 4 ): 341 – 345 . 10

Restricted access

Navigating the Politics of Anxiety

Moral Outrage, Responsiveness, and State Accountability in Denmark

Mette-Louise Johansen

, Organization, Ethics . London : Sage . Du Gay , Paul . 2005 . “ Bureaucracy and Liberty: State, Authority and Freedom .” In The Values of Bureaucracy , ed. Paul Du Gay 41 – 62 . Oxford : Oxford University Press . De Koning , Anouk . 2016

Restricted access

Frauke Mennes, John P. Hayes, David Kloos, Martha Lagace, Morten Koch Andersen, Somdeep Sen, Matthew Porges, and Sa’ed Atshan

( varuna ). The book is divided in two large parts: power and ethics. Both concepts are given a different reading through what Singh has termed mitra-varuna and “agonistic intimacy.” Both aspects are well integrated to make us understand how concepts like

Free access


War Veterans and the Construction of Citizenship Categories

Nikkie Wiegink, Ralph Sprenkels, and Birgitte Refslund Sørensen

: Zed Books . Kelly , Tobias , and Sharika Thiranagama . 2010 . “ Introduction: Specters of Treason .” In Traitors: Suspicion, Intimacy, and the Ethics of State-Building , ed. Sharika Thiranagama and Tobias Kelly , 1 – 23

Restricted access

Moral Thresholds of Outrage

The March for Hrant Dink and New Ways of Mobilization in Turkey

Lorenzo D’Orsi

, and nowadays use the memories of their suffered violence to reenact an ethics of honor and martyrdom, which reinforces certain political identity claims ( Bozarslan 2008 ; D’Orsi 2016 ). Hence, although Dink’s public memorializing and that of the

Restricted access

Unbecoming Veteranship

Convicted Military Officers in Post-authoritarian Argentina

Eva van Roekel and Valentina Salvi

. Veterans often remain anchored in troubled discursive ethics and practices around exclusion, prohibition, and marginalization ( Shirlow 2019 ). This is not left unnoticed in post-conflict societies. Multiple ways to undo the precarious position of veterans

Restricted access

Shadow Soldiering

Shifting Constellations and Permeable Boundaries in “Private” Security Contracting

Maya Mynster Christensen

: Risk, Law and Ethics . Oxford : Routledge . 10.4324/9780203856895 Chisholm , Amanda . 2014 . “ Marketing the Security Package: Colonial Histories and Neoliberal Economies of Private Security .” Security Dialogue 45 ( 4 ): 349 – 372 . doi:10