CINXE.COM

Cuneyt Gurer | Kent State University - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Cuneyt Gurer | Kent State University - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="wtybGXu1KGBdh89p0kMZqOgZIVjGgqkKOAYP6vTXVmWB8bjWZ79YYetmN3AfhXSrhanSEt/Xnan8xmgAZ0Al2g==" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-77f7b87cb1583fc59aa8f94756ebfe913345937eb932042b4077563bebb5fb4b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-9e8218e1301001388038e3fc3427ed00d079a4760ff7745d1ec1b2d59103170a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-b2b823dd904da60a48fd1bfa1defd840610c2ff414d3f39ed3af46277ab8df3b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="author" content="cuneyt gurer" /> <meta name="description" content="Dr. Gurer is Alexander von Humboldt Foundation Fellow at the University of Siegen (Germany) and conducting research on “Conflict, Refugees and Dynamics of…" /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '9387f500ddcbb8d05c67bef28a2fe0334f1aafb8'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15267,"monthly_visitors":"113 million","monthly_visitor_count":113692424,"monthly_visitor_count_in_millions":113,"user_count":277722525,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1733023888000); window.Aedu.timeDifference = new Date().getTime() - 1733023888000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-bdb9e8c097f01e611f2fc5e2f1a9dc599beede975e2ae5629983543a1726e947.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-3e572e3b706c3ed2ec5b2c1cb44a411fadc81f62a97963cb7bd9c327a0a9d5f2.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-2e8d3f30eaaddd1debd6ce4630b3453b23a23c91ac7c823ddf8822879835b029.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://kentstate.academia.edu/CuneytGurer" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-ae3d0ee232cd83d11499343688b0160a3c7db15e95cb2d0844cae78d49ea53f1.js" defer="defer"></script><script>Aedu.rankings = { showPaperRankingsLink: false } $viewedUser = Aedu.User.set_viewed( {"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer","photo":"https://0.academia-photos.com/4622523/1932755/18260467/s65_cuneyt.gurer.jpg","has_photo":true,"department":{"id":11759,"name":"Political Science","url":"https://kentstate.academia.edu/Departments/Political_Science/Documents","university":{"id":1063,"name":"Kent State University","url":"https://kentstate.academia.edu/"}},"position":"Alumnus","position_id":8,"is_analytics_public":false,"interests":[{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology"},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations"},{"id":33005,"name":"Refugee Camps","url":"https://www.academia.edu/Documents/in/Refugee_Camps"},{"id":2835,"name":"Refugee Studies","url":"https://www.academia.edu/Documents/in/Refugee_Studies"},{"id":134693,"name":"Refugees and Forced Migration Studies","url":"https://www.academia.edu/Documents/in/Refugees_and_Forced_Migration_Studies"},{"id":39869,"name":"Refugees","url":"https://www.academia.edu/Documents/in/Refugees"},{"id":14580,"name":"Forced Migration","url":"https://www.academia.edu/Documents/in/Forced_Migration"},{"id":14730,"name":"Migration Studies","url":"https://www.academia.edu/Documents/in/Migration_Studies"},{"id":412534,"name":"Asylum Seekers and Refugees","url":"https://www.academia.edu/Documents/in/Asylum_Seekers_and_Refugees"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://kentstate.academia.edu/CuneytGurer&quot;,&quot;location&quot;:&quot;/CuneytGurer&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;kentstate.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/CuneytGurer&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-ea955777-e6a5-465b-aa0e-efd867ee3d7e"></div> <div id="ProfileCheckPaperUpdate-react-component-ea955777-e6a5-465b-aa0e-efd867ee3d7e"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="Cuneyt Gurer" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/4622523/1932755/18260467/s200_cuneyt.gurer.jpg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Cuneyt Gurer</h1><div class="affiliations-container fake-truncate js-profile-affiliations"><div><a class="u-tcGrayDarker" href="https://kentstate.academia.edu/">Kent State University</a>, <a class="u-tcGrayDarker" href="https://kentstate.academia.edu/Departments/Political_Science/Documents">Political Science</a>, <span class="u-tcGrayDarker">Alumnus</span></div></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Cuneyt" data-follow-user-id="4622523" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="4622523"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">96</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">104</p></div></a><a><div class="stat-container js-profile-coauthors" data-broccoli-component="user-info.coauthors-count" data-click-track="profile-expand-user-info-coauthors"><p class="label">Co-authors</p><p class="data">4</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="user-bio-container"><div class="profile-bio fake-truncate js-profile-about" style="margin: 0px;">Dr. Gurer is Alexander von Humboldt Foundation Fellow at the University of Siegen (Germany) and conducting research on “Conflict, Refugees and Dynamics of Integration.” He has received his Ph.D. degree from Department of Political Science at Kent State University, USA (2007). He has been also affiliated with the George C. Marshall European Center for Security Studies as an Adjunct Professor. He is a member of &quot;The German Network of Refugee Researchers&quot; and affiliated Fellow of the Euroasian Democratic Security Network. He is also working on an independent research project examining the interaction between political regime changes, democracy, and security.<br /><div class="js-profile-less-about u-linkUnstyled u-tcGrayDarker u-textDecorationUnderline u-displayNone">less</div></div></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span><a class="ri-more-link js-profile-ri-list-card" data-click-track="profile-user-info-primary-research-interest" data-has-card-for-ri-list="4622523">View All (12)</a></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="4622523" href="https://www.academia.edu/Documents/in/Education"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://kentstate.academia.edu/CuneytGurer&quot;,&quot;location&quot;:&quot;/CuneytGurer&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;kentstate.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/CuneytGurer&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Education&quot;]}" data-trace="false" data-dom-id="Pill-react-component-2d389af5-f820-4b22-be34-27d0b84071ac"></div> <div id="Pill-react-component-2d389af5-f820-4b22-be34-27d0b84071ac"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="4622523" href="https://www.academia.edu/Documents/in/Anthropology"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Anthropology&quot;]}" data-trace="false" data-dom-id="Pill-react-component-148858af-7b44-4002-9b45-a5b32ca49fbb"></div> <div id="Pill-react-component-148858af-7b44-4002-9b45-a5b32ca49fbb"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="4622523" href="https://www.academia.edu/Documents/in/Sociology"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Sociology&quot;]}" data-trace="false" data-dom-id="Pill-react-component-6711b969-90cb-4a5c-8f7f-0090757fbf81"></div> <div id="Pill-react-component-6711b969-90cb-4a5c-8f7f-0090757fbf81"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="4622523" href="https://www.academia.edu/Documents/in/Political_Science"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Political Science&quot;]}" data-trace="false" data-dom-id="Pill-react-component-869ae7f5-ed36-4e1c-a4a1-fe998f205d54"></div> <div id="Pill-react-component-869ae7f5-ed36-4e1c-a4a1-fe998f205d54"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="4622523" href="https://www.academia.edu/Documents/in/International_Relations"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;International Relations&quot;]}" data-trace="false" data-dom-id="Pill-react-component-3c27cc98-eddf-4ae9-90a3-e625a4d09152"></div> <div id="Pill-react-component-3c27cc98-eddf-4ae9-90a3-e625a4d09152"></div> </a></div></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by Cuneyt Gurer</h3></div><div class="js-work-strip profile--work_container" data-work-id="115178240"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/115178240/Gun_Control"><img alt="Research paper thumbnail of Gun Control" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/115178240/Gun_Control">Gun Control</a></div><div class="wp-workCard_item"><span>Encyclopedia of Interpersonal Violence</span><span>, Oct 5, 2012</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="115178240"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="115178240"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 115178240; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=115178240]").text(description); $(".js-view-count[data-work-id=115178240]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 115178240; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='115178240']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 115178240, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=115178240]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":115178240,"title":"Gun Control","translated_title":"","metadata":{"publication_date":{"day":5,"month":10,"year":2012,"errors":{}},"publication_name":"Encyclopedia of Interpersonal Violence"},"translated_abstract":null,"internal_url":"https://www.academia.edu/115178240/Gun_Control","translated_internal_url":"","created_at":"2024-02-20T09:41:31.091-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Gun_Control","translated_slug":"","page_count":null,"language":"cy","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[],"urls":[{"id":39642178,"url":"https://doi.org/10.4135/9781412963923.n201"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="115178224"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/115178224/Divergence_of_Discontent"><img alt="Research paper thumbnail of Divergence of Discontent" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/115178224/Divergence_of_Discontent">Divergence of Discontent</a></div><div class="wp-workCard_item"><span>VDM Verlag Dr. Müller eBooks</span><span>, Dec 4, 2008</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">One of the most significant decisions of the EU, after the Maastricht Treaty, was the decision to...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">One of the most significant decisions of the EU, after the Maastricht Treaty, was the decision to accept new members as they fulfilled economic and political criteria. Enlargement is still a working policy process for the EU, in which accession negotiations with formal candidate countries are still proceeding and further expansion to the Western Balkans are being considered as a possibility. Despite its success, EU enlargement has not been free from skepticism, especially when considering Turkey&amp;#39;s candidacy and the latest round of accession negotiations. In this framework, the study attempts to understand the dynamics of the sociopolitical structure of the European opposition to Turkish EU membership. Recent literature indicates four major issues and concerns regarding Turkey&amp;#39;s EU membership; those related to identity, future enlargement, individual economic expectations, as well as immigration and crime. The first phase of this study considers each issue area as a separate topic while the second measures the level of opposition to Turkey&amp;#39;s membership using all issue areas and other explanatory variables in a single model.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="115178224"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="115178224"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 115178224; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=115178224]").text(description); $(".js-view-count[data-work-id=115178224]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 115178224; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='115178224']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 115178224, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=115178224]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":115178224,"title":"Divergence of Discontent","translated_title":"","metadata":{"abstract":"One of the most significant decisions of the EU, after the Maastricht Treaty, was the decision to accept new members as they fulfilled economic and political criteria. Enlargement is still a working policy process for the EU, in which accession negotiations with formal candidate countries are still proceeding and further expansion to the Western Balkans are being considered as a possibility. Despite its success, EU enlargement has not been free from skepticism, especially when considering Turkey\u0026#39;s candidacy and the latest round of accession negotiations. In this framework, the study attempts to understand the dynamics of the sociopolitical structure of the European opposition to Turkish EU membership. Recent literature indicates four major issues and concerns regarding Turkey\u0026#39;s EU membership; those related to identity, future enlargement, individual economic expectations, as well as immigration and crime. The first phase of this study considers each issue area as a separate topic while the second measures the level of opposition to Turkey\u0026#39;s membership using all issue areas and other explanatory variables in a single model.","publisher":"VDM Verlag Dr. Müller","publication_date":{"day":4,"month":12,"year":2008,"errors":{}},"publication_name":"VDM Verlag Dr. Müller eBooks"},"translated_abstract":"One of the most significant decisions of the EU, after the Maastricht Treaty, was the decision to accept new members as they fulfilled economic and political criteria. Enlargement is still a working policy process for the EU, in which accession negotiations with formal candidate countries are still proceeding and further expansion to the Western Balkans are being considered as a possibility. Despite its success, EU enlargement has not been free from skepticism, especially when considering Turkey\u0026#39;s candidacy and the latest round of accession negotiations. In this framework, the study attempts to understand the dynamics of the sociopolitical structure of the European opposition to Turkish EU membership. Recent literature indicates four major issues and concerns regarding Turkey\u0026#39;s EU membership; those related to identity, future enlargement, individual economic expectations, as well as immigration and crime. The first phase of this study considers each issue area as a separate topic while the second measures the level of opposition to Turkey\u0026#39;s membership using all issue areas and other explanatory variables in a single model.","internal_url":"https://www.academia.edu/115178224/Divergence_of_Discontent","translated_internal_url":"","created_at":"2024-02-20T09:41:15.380-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Divergence_of_Discontent","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics"},{"id":10419,"name":"Negotiation","url":"https://www.academia.edu/Documents/in/Negotiation"},{"id":29711,"name":"Skepticism","url":"https://www.academia.edu/Documents/in/Skepticism"},{"id":355852,"name":"Opposition Politics","url":"https://www.academia.edu/Documents/in/Opposition_Politics"},{"id":544679,"name":"Accession","url":"https://www.academia.edu/Documents/in/Accession"},{"id":1681078,"name":"Candidacy","url":"https://www.academia.edu/Documents/in/Candidacy"},{"id":2629362,"name":"Resizing","url":"https://www.academia.edu/Documents/in/Resizing"}],"urls":[{"id":39642170,"url":"https://www.knigozal.com/store/ru/book/divergence-of-discontent/isbn/978-3-639-08275-3"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84154012"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84154012/Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal_Bi_r_%C4%B0nceleme"><img alt="Research paper thumbnail of Kamu Poli̇ti̇kalarinin Yayilimi: Kuramsal Bi̇r İnceleme" class="work-thumbnail" src="https://attachments.academia-assets.com/89275390/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84154012/Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal_Bi_r_%C4%B0nceleme">Kamu Poli̇ti̇kalarinin Yayilimi: Kuramsal Bi̇r İnceleme</a></div><div class="wp-workCard_item"><span>Uluslararası İktisadi ve İdari İncelemeler Dergisi</span><span>, 2016</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="29a72e6a2793dadf812606603b660974" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89275390,&quot;asset_id&quot;:84154012,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89275390/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84154012"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84154012"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84154012; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84154012]").text(description); $(".js-view-count[data-work-id=84154012]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84154012; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84154012']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84154012, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "29a72e6a2793dadf812606603b660974" } } $('.js-work-strip[data-work-id=84154012]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84154012,"title":"Kamu Poli̇ti̇kalarinin Yayilimi: Kuramsal Bi̇r İnceleme","translated_title":"","metadata":{"publisher":"International Journal of Economics and Administrative Studies","grobid_abstract":"ÖZ Kamu politikalarının oluşumunda en önemli etkenlerden birisi politikaların yayılımı (difüzyon) sürecidir. Politika yayılımı devletler arasında doğrudan formel yapıların etkileşimiyle olduğu gibi, uluslararası kuruluşların etkisi ve literatürde epistemik topluluklar olarak da adlandırılan resmi olmayan uzman toplulukların aracılığıyla da olabilmektedir. Yayılım süreci yalnızca devletlerarasında veya uluslararası sistem düzeyinde gerçekleşmez. Politikalar, aynı devlet içerisinde farklı kurumsal yapılar arasında çaprazlama şekilde veya aynı kurum içerisinde dikey şekilde de yayılım göstermektedir. Bu çalışma kamu politikalarının küresel yayılımı ve yerel politikaların oluşumundaki etkisini incelemektedir. İnceleme aynı zamanda uluslararası kuruluşlar aracılığıyla meydana gelen dikey, uzmanlar aracılığıyla oluşan yatay yayılım sürecinin politika oluşumuna etkisini analiz etmektedir. Ayrıca, politika yayılımı ile kamu politika analizi ilişkilendirilerek, yayılımın politika analizine olan katkısı incelenmektedir.","publication_date":{"day":null,"month":null,"year":2016,"errors":{}},"publication_name":"Uluslararası İktisadi ve İdari İncelemeler Dergisi","grobid_abstract_attachment_id":89275390},"translated_abstract":null,"internal_url":"https://www.academia.edu/84154012/Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal_Bi_r_%C4%B0nceleme","translated_internal_url":"","created_at":"2022-08-04T15:53:51.103-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89275390,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89275390/thumbnails/1.jpg","file_name":"202090.pdf","download_url":"https://www.academia.edu/attachments/89275390/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89275390/202090-libre.pdf?1659655515=\u0026response-content-disposition=attachment%3B+filename%3DKamu_Poli_ti_kalarinin_Yayilimi_Kuramsal.pdf\u0026Expires=1733027487\u0026Signature=K9udGNIsFmt22eslWUCqtuWNmKsxRi6DdSSgU2KbwZFK5fwnoqKo1jHKVBtH2uYzMXEsnocDTK8a6OSe4JsU5utRjSI1Mp0LCBf4lPVAu2SgTDvxBjJo6hq1UeFsyDvnHfT3D96NckjMnqW8mI~qsyX3-VnZeH6mEmsVQuYZFppeSCM8fWxG370ySDhoC7wIXrnK6c7zjEJDEH7sH-xgwawZIm8rO2FivsD57HG0CKs5sObEElemYndbt0g7FCWKbRQVbB3U-DdJ6JdYt2-37xlCxkgBkTYf3kH1b2le3TrOn5YoVJpH0JBq88Jcd3BBD8vIq~krDPPWCFvbzQx7Hw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal_Bi_r_İnceleme","translated_slug":"","page_count":22,"language":"tr","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":89275390,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89275390/thumbnails/1.jpg","file_name":"202090.pdf","download_url":"https://www.academia.edu/attachments/89275390/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89275390/202090-libre.pdf?1659655515=\u0026response-content-disposition=attachment%3B+filename%3DKamu_Poli_ti_kalarinin_Yayilimi_Kuramsal.pdf\u0026Expires=1733027487\u0026Signature=K9udGNIsFmt22eslWUCqtuWNmKsxRi6DdSSgU2KbwZFK5fwnoqKo1jHKVBtH2uYzMXEsnocDTK8a6OSe4JsU5utRjSI1Mp0LCBf4lPVAu2SgTDvxBjJo6hq1UeFsyDvnHfT3D96NckjMnqW8mI~qsyX3-VnZeH6mEmsVQuYZFppeSCM8fWxG370ySDhoC7wIXrnK6c7zjEJDEH7sH-xgwawZIm8rO2FivsD57HG0CKs5sObEElemYndbt0g7FCWKbRQVbB3U-DdJ6JdYt2-37xlCxkgBkTYf3kH1b2le3TrOn5YoVJpH0JBq88Jcd3BBD8vIq~krDPPWCFvbzQx7Hw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503989"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503989/Crime_and_Violence_Studies_in_the_Immigration_Field_Interactions_between_Disciplines_and_Emerging_Concepts"><img alt="Research paper thumbnail of Crime and Violence Studies in the Immigration Field: Interactions between Disciplines and Emerging Concepts" class="work-thumbnail" src="https://attachments.academia-assets.com/86863810/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503989/Crime_and_Violence_Studies_in_the_Immigration_Field_Interactions_between_Disciplines_and_Emerging_Concepts">Crime and Violence Studies in the Immigration Field: Interactions between Disciplines and Emerging Concepts</a></div><div class="wp-workCard_item"><span>Journal of Ethnic and Cultural Studies</span><span>, 2022</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This paper uses bibliometric analysis to evaluate the literature on immigration, crime, and viole...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This paper uses bibliometric analysis to evaluate the literature on immigration, crime, and violence to find out how these concepts are studied across disciplines. The paper gave specific attention to the field of Criminology to demonstrate the variation of the use of these concepts in the literature and how much it differs from other disciplines. To meet these expectations, we examined how journals are categorized based on covering how immigration and crime interact in social science disciplines. Moreover, the analysis maps how research articles interact in different journals and what types of topics receive the most attention among researchers by looking at cross-citation data and keyword selection. The findings show that, overall, the number of publications used at least one of the studied items (immigration, crime, and violence) as a keyword increased tremendously in the last two decades. The most studied concept amongst all disciplines is violence, followed by gender and crime ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="6f82a394de87f7d18ed0063f70344325" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:86863810,&quot;asset_id&quot;:80503989,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/86863810/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503989"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503989"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503989; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503989]").text(description); $(".js-view-count[data-work-id=80503989]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503989; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503989']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503989, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "6f82a394de87f7d18ed0063f70344325" } } $('.js-work-strip[data-work-id=80503989]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503989,"title":"Crime and Violence Studies in the Immigration Field: Interactions between Disciplines and Emerging Concepts","translated_title":"","metadata":{"abstract":"This paper uses bibliometric analysis to evaluate the literature on immigration, crime, and violence to find out how these concepts are studied across disciplines. The paper gave specific attention to the field of Criminology to demonstrate the variation of the use of these concepts in the literature and how much it differs from other disciplines. To meet these expectations, we examined how journals are categorized based on covering how immigration and crime interact in social science disciplines. Moreover, the analysis maps how research articles interact in different journals and what types of topics receive the most attention among researchers by looking at cross-citation data and keyword selection. The findings show that, overall, the number of publications used at least one of the studied items (immigration, crime, and violence) as a keyword increased tremendously in the last two decades. The most studied concept amongst all disciplines is violence, followed by gender and crime ...","publisher":"Modestum Publishing Ltd","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Journal of Ethnic and Cultural Studies"},"translated_abstract":"This paper uses bibliometric analysis to evaluate the literature on immigration, crime, and violence to find out how these concepts are studied across disciplines. The paper gave specific attention to the field of Criminology to demonstrate the variation of the use of these concepts in the literature and how much it differs from other disciplines. To meet these expectations, we examined how journals are categorized based on covering how immigration and crime interact in social science disciplines. Moreover, the analysis maps how research articles interact in different journals and what types of topics receive the most attention among researchers by looking at cross-citation data and keyword selection. The findings show that, overall, the number of publications used at least one of the studied items (immigration, crime, and violence) as a keyword increased tremendously in the last two decades. The most studied concept amongst all disciplines is violence, followed by gender and crime ...","internal_url":"https://www.academia.edu/80503989/Crime_and_Violence_Studies_in_the_Immigration_Field_Interactions_between_Disciplines_and_Emerging_Concepts","translated_internal_url":"","created_at":"2022-06-01T23:15:27.899-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86863810,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863810/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/86863810/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Crime_and_Violence_Studies_in_the_Immigr.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863810/pdf-libre.pdf?1654151592=\u0026response-content-disposition=attachment%3B+filename%3DCrime_and_Violence_Studies_in_the_Immigr.pdf\u0026Expires=1733027487\u0026Signature=UFRMbxLJimsQG2Vv6L4ttieQ9TrAYZ3h5iKh67i7npV2FdssqZZfQSzzx94QeZQZ5AOps8euVJxEAYJcNpyPgb-xsNvtnUdC1t3ELAfReUm0NOzn9NAQXlhIYw4K2gz-Baq1dJtd5w3P4dkxA4jKGjPs91AG3i5ntWrfp3WLH1gGXOpmrVTERwVCwfAGuWImvBoa7e9-J9WUNRyeBGrJDk0o2NS-RD1uRCAZVzU~JS7g2dnBgWeBLBenysWROa3-rsoS6S3bIFGQ12oYzptXaESE5iiihRTRm5FKR-RLXwTddXyDvLEr4EJLKKhtzODQEywaAW20t3gnfDDG8NIVig__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Crime_and_Violence_Studies_in_the_Immigration_Field_Interactions_between_Disciplines_and_Emerging_Concepts","translated_slug":"","page_count":21,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":86863810,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863810/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/86863810/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Crime_and_Violence_Studies_in_the_Immigr.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863810/pdf-libre.pdf?1654151592=\u0026response-content-disposition=attachment%3B+filename%3DCrime_and_Violence_Studies_in_the_Immigr.pdf\u0026Expires=1733027487\u0026Signature=UFRMbxLJimsQG2Vv6L4ttieQ9TrAYZ3h5iKh67i7npV2FdssqZZfQSzzx94QeZQZ5AOps8euVJxEAYJcNpyPgb-xsNvtnUdC1t3ELAfReUm0NOzn9NAQXlhIYw4K2gz-Baq1dJtd5w3P4dkxA4jKGjPs91AG3i5ntWrfp3WLH1gGXOpmrVTERwVCwfAGuWImvBoa7e9-J9WUNRyeBGrJDk0o2NS-RD1uRCAZVzU~JS7g2dnBgWeBLBenysWROa3-rsoS6S3bIFGQ12oYzptXaESE5iiihRTRm5FKR-RLXwTddXyDvLEr4EJLKKhtzODQEywaAW20t3gnfDDG8NIVig__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology"},{"id":3843,"name":"Immigration","url":"https://www.academia.edu/Documents/in/Immigration"},{"id":31986,"name":"Multi-Ethnic/Multi-Cultural Literary Studies","url":"https://www.academia.edu/Documents/in/Multi-Ethnic_Multi-Cultural_Literary_Studies"},{"id":199319,"name":"Citation","url":"https://www.academia.edu/Documents/in/Citation"}],"urls":[{"id":21015435,"url":"http://www.ejecs.org/index.php/JECS/article/viewFile/1021/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503957"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503957/Madde_Kullan%C4%B1m%C4%B1_Ve_Su%C3%A7_%C4%B0li%C5%9Fkisi_Kesitsel_Bir_Ara%C5%9Ft%C4%B1rma"><img alt="Research paper thumbnail of Madde Kullanımı Ve Suç İlişkisi: Kesitsel Bir Araştırma" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503957/Madde_Kullan%C4%B1m%C4%B1_Ve_Su%C3%A7_%C4%B0li%C5%9Fkisi_Kesitsel_Bir_Ara%C5%9Ft%C4%B1rma">Madde Kullanımı Ve Suç İlişkisi: Kesitsel Bir Araştırma</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Amaç: Amerika ve Avrupa&amp;#x27;da yapılan birçok araştırma, madde bağımlılığı ile suç / şiddet davr...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Amaç: Amerika ve Avrupa&amp;#x27;da yapılan birçok araştırma, madde bağımlılığı ile suç / şiddet davranışı arasındaki ilişkiyi incelemiş ayrıca konuya ilişkin birçok teorik çalışma ortaya konulmuştur. Ne var ki ülkemizde söz konusu ilişkiyi inceleyen alan araştırması ve anket çalışması oldukça ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503957"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503957"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503957; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503957]").text(description); $(".js-view-count[data-work-id=80503957]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503957; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503957']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503957, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80503957]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503957,"title":"Madde Kullanımı Ve Suç İlişkisi: Kesitsel Bir Araştırma","translated_title":"","metadata":{"abstract":"Amaç: Amerika ve Avrupa\u0026#x27;da yapılan birçok araştırma, madde bağımlılığı ile suç / şiddet davranışı arasındaki ilişkiyi incelemiş ayrıca konuya ilişkin birçok teorik çalışma ortaya konulmuştur. Ne var ki ülkemizde söz konusu ilişkiyi inceleyen alan araştırması ve anket çalışması oldukça ...","publication_date":{"day":null,"month":null,"year":2009,"errors":{}}},"translated_abstract":"Amaç: Amerika ve Avrupa\u0026#x27;da yapılan birçok araştırma, madde bağımlılığı ile suç / şiddet davranışı arasındaki ilişkiyi incelemiş ayrıca konuya ilişkin birçok teorik çalışma ortaya konulmuştur. Ne var ki ülkemizde söz konusu ilişkiyi inceleyen alan araştırması ve anket çalışması oldukça ...","internal_url":"https://www.academia.edu/80503957/Madde_Kullan%C4%B1m%C4%B1_Ve_Su%C3%A7_%C4%B0li%C5%9Fkisi_Kesitsel_Bir_Ara%C5%9Ft%C4%B1rma","translated_internal_url":"","created_at":"2022-06-01T23:14:53.318-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Madde_Kullanımı_Ve_Suç_İlişkisi_Kesitsel_Bir_Araştırma","translated_slug":"","page_count":null,"language":"tr","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503896"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503896/Exploring_the_Victimization_of_Syrian_Refugees_through_the_Human_Security_Model_An_Ethnographic_Approach"><img alt="Research paper thumbnail of Exploring the Victimization of Syrian Refugees through the Human Security Model: An Ethnographic Approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503896/Exploring_the_Victimization_of_Syrian_Refugees_through_the_Human_Security_Model_An_Ethnographic_Approach">Exploring the Victimization of Syrian Refugees through the Human Security Model: An Ethnographic Approach</a></div><div class="wp-workCard_item"><span>Studies in Ethnicity and Nationalism</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The purpose of this study was to investigate the human security aspect of the Syrian refugee cris...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkish state. Consequently, Turkey&amp;amp;#39;s failure to promote the human security of the Syrian refugees contributes to their forced migration to Western countries, where &amp;amp;#39;freedom from fear&amp;amp;#39;, &amp;amp;#39;freedom from want&amp;amp;#39;, and &amp;amp;#39;freedom from indignity&amp;amp;#39; are relatively assured. K E Y W O R D S human security, migration, victimization, Syrian refugees, ethnographic research</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503896"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503896"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503896; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503896]").text(description); $(".js-view-count[data-work-id=80503896]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503896; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503896']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503896, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80503896]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503896,"title":"Exploring the Victimization of Syrian Refugees through the Human Security Model: An Ethnographic Approach","translated_title":"","metadata":{"abstract":"The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkish state. Consequently, Turkey\u0026amp;#39;s failure to promote the human security of the Syrian refugees contributes to their forced migration to Western countries, where \u0026amp;#39;freedom from fear\u0026amp;#39;, \u0026amp;#39;freedom from want\u0026amp;#39;, and \u0026amp;#39;freedom from indignity\u0026amp;#39; are relatively assured. K E Y W O R D S human security, migration, victimization, Syrian refugees, ethnographic research","publisher":"Wiley","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Studies in Ethnicity and Nationalism"},"translated_abstract":"The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkish state. Consequently, Turkey\u0026amp;#39;s failure to promote the human security of the Syrian refugees contributes to their forced migration to Western countries, where \u0026amp;#39;freedom from fear\u0026amp;#39;, \u0026amp;#39;freedom from want\u0026amp;#39;, and \u0026amp;#39;freedom from indignity\u0026amp;#39; are relatively assured. K E Y W O R D S human security, migration, victimization, Syrian refugees, ethnographic research","internal_url":"https://www.academia.edu/80503896/Exploring_the_Victimization_of_Syrian_Refugees_through_the_Human_Security_Model_An_Ethnographic_Approach","translated_internal_url":"","created_at":"2022-06-01T23:14:03.805-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Exploring_the_Victimization_of_Syrian_Refugees_through_the_Human_Security_Model_An_Ethnographic_Approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":534,"name":"Law","url":"https://www.academia.edu/Documents/in/Law"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology"},{"id":4850,"name":"Migration","url":"https://www.academia.edu/Documents/in/Migration"},{"id":10678,"name":"Human Security","url":"https://www.academia.edu/Documents/in/Human_Security"},{"id":1245071,"name":"Enthography","url":"https://www.academia.edu/Documents/in/Enthography"},{"id":2125684,"name":"Syrian Refugees in Turkey","url":"https://www.academia.edu/Documents/in/Syrian_Refugees_in_Turkey"}],"urls":[{"id":21015375,"url":"https://onlinelibrary.wiley.com/doi/pdf/10.1111/sena.12338"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503870"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503870/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism"><img alt="Research paper thumbnail of Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism" class="work-thumbnail" src="https://attachments.academia-assets.com/86863760/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503870/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism">Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism</a></div><div class="wp-workCard_item"><span>Connections: The Quarterly Journal</span><span>, 2017</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f419f331e84c0466622a7ca12d035c9e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:86863760,&quot;asset_id&quot;:80503870,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/86863760/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503870"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503870"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503870; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503870]").text(description); $(".js-view-count[data-work-id=80503870]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503870; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503870']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503870, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f419f331e84c0466622a7ca12d035c9e" } } $('.js-work-strip[data-work-id=80503870]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503870,"title":"Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism","translated_title":"","metadata":{"publisher":"Procon, Ltd.","grobid_abstract":"Understanding the nature and the extent of the future threat from ISIS has been a key question for scholars, policy makers and security professionals since ISIS started losing significant grounds in Syria and Iraq. This article analyses ISIS terrorism and its possible spillover effects from a regional security perspective by presenting a strategic model to develop options for the policy makers. A strategic understanding, supported by a model that has been designed to capture all possible variables and their interaction which each other, is necessary to understand the future direction of the threat. Many scholars agree that the threat is not only about the organizational structure of ISIS but also its ideological aspect, therefore the model presented here connects the facts and the ideology with variables at three different levels: regional political level; ISIS and its organizational structure; and individual level variables. The model was designed to capture changes with relevant data thus providing a strategic data-driven understanding of the threat. Regional political developments and how ISIS reacts to those developments are the main concerns at the first two levels of analysis. Foreign fighters and other sympathizers are the most important subjects of the study at the individual level with the assumption that the future threat will diffuse through foreign fighters and self-radicalized lone actors.","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Connections: The Quarterly Journal","grobid_abstract_attachment_id":86863760},"translated_abstract":null,"internal_url":"https://www.academia.edu/80503870/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism","translated_internal_url":"","created_at":"2022-06-01T23:13:27.287-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86863760,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863760/thumbnails/1.jpg","file_name":"1c935ea15e2e0fe84763a9bd7db4f1e5c0d6.pdf","download_url":"https://www.academia.edu/attachments/86863760/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Presenting_a_Strategic_Model_to_Understa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863760/1c935ea15e2e0fe84763a9bd7db4f1e5c0d6-libre.pdf?1654151599=\u0026response-content-disposition=attachment%3B+filename%3DPresenting_a_Strategic_Model_to_Understa.pdf\u0026Expires=1733027487\u0026Signature=PcZvWp-hDDGUCpWkx3bQWPzqP6A7z4gz1dC3i6XEMBgpYxcjYp8bdamJsNOoD50F3K47qSxnRWREOrVbo9ZKA6JDY9y1SQsYrctKTMSYFHxgoSOfF1Ety9qAIZycbS1NW7DbfoagiRHFFCrTxVcl6eEB9h8cFmDH8BkBqUWtDhTtsVWGrL7EIGQV30-6Vo7MZDDh0TqxujvgvgE5orph1MxUJlWjoW1dVXOHHjQLn2XkTUtLlwV9W4XYL0gWArFIOemTq~TkWfO2QH---3os1YWg4YR4xT5k49eyUnZSVQKVetODKP2oQSnsQuLNEo4-OtBp6geesX2iAT-Y5~BYqA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":86863760,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863760/thumbnails/1.jpg","file_name":"1c935ea15e2e0fe84763a9bd7db4f1e5c0d6.pdf","download_url":"https://www.academia.edu/attachments/86863760/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Presenting_a_Strategic_Model_to_Understa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863760/1c935ea15e2e0fe84763a9bd7db4f1e5c0d6-libre.pdf?1654151599=\u0026response-content-disposition=attachment%3B+filename%3DPresenting_a_Strategic_Model_to_Understa.pdf\u0026Expires=1733027487\u0026Signature=PcZvWp-hDDGUCpWkx3bQWPzqP6A7z4gz1dC3i6XEMBgpYxcjYp8bdamJsNOoD50F3K47qSxnRWREOrVbo9ZKA6JDY9y1SQsYrctKTMSYFHxgoSOfF1Ety9qAIZycbS1NW7DbfoagiRHFFCrTxVcl6eEB9h8cFmDH8BkBqUWtDhTtsVWGrL7EIGQV30-6Vo7MZDDh0TqxujvgvgE5orph1MxUJlWjoW1dVXOHHjQLn2XkTUtLlwV9W4XYL0gWArFIOemTq~TkWfO2QH---3os1YWg4YR4xT5k49eyUnZSVQKVetODKP2oQSnsQuLNEo4-OtBp6geesX2iAT-Y5~BYqA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism"},{"id":58349,"name":"Regional Security","url":"https://www.academia.edu/Documents/in/Regional_Security"},{"id":185157,"name":"Isis","url":"https://www.academia.edu/Documents/in/Isis"},{"id":316672,"name":"Foreign Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Fighters"},{"id":1243561,"name":"Spillover Effect","url":"https://www.academia.edu/Documents/in/Spillover_Effect"},{"id":2318124,"name":"Foreign Terrorist Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Terrorist_Fighters"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503801"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503801/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine"><img alt="Research paper thumbnail of Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine" class="work-thumbnail" src="https://attachments.academia-assets.com/86863677/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503801/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine">Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine</a></div><div class="wp-workCard_item"><span>Security and Defence Quarterly</span><span>, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fef65f94c6135d1ac1b612f9754dbc04" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:86863677,&quot;asset_id&quot;:80503801,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/86863677/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503801"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503801"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503801; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503801]").text(description); $(".js-view-count[data-work-id=80503801]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503801; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503801']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503801, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fef65f94c6135d1ac1b612f9754dbc04" } } $('.js-work-strip[data-work-id=80503801]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503801,"title":"Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine","translated_title":"","metadata":{"publisher":"War Studies University","grobid_abstract":"The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject, governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently, the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict's outcome.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Security and Defence Quarterly","grobid_abstract_attachment_id":86863677},"translated_abstract":null,"internal_url":"https://www.academia.edu/80503801/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine","translated_internal_url":"","created_at":"2022-06-01T23:12:44.610-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86863677,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863677/thumbnails/1.jpg","file_name":"pdf-131787-60586.pdf","download_url":"https://www.academia.edu/attachments/86863677/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Game_of_Proxies_Towards_a_new_model_of_w.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863677/pdf-131787-60586-libre.pdf?1654151610=\u0026response-content-disposition=attachment%3B+filename%3DGame_of_Proxies_Towards_a_new_model_of_w.pdf\u0026Expires=1733027487\u0026Signature=OL13XXzSl7Ne1atqI0FZjiqjiGrA2g9p6TwdjRaQGDZos02UzULoZkgzEN9TRMRGJYBsUQXYGEEugHQxfq6ogspazEzoePRQXQdet821tN5MI~R7J65z3Xbg2QmL~firB246wimqetpBlQc-i-Bhoc2v4bixGplEPAzGKdWZ4Uf-PZmBRY19DyFgukIffhH7qp1mrfCMcHh34b4T2JOJGyE2poCGazFwb~pbJhvnP3ZNhwqxc2~ypSP4HBgGS2UJnxop1jlYufrES7N8bis3dhBdtmCvJJ1HqPhShhThv06Rmd-Y0kvfqpUYLTb99JzAn6kF0AbxmeBQZoIgVEYBXw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine","translated_slug":"","page_count":21,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":86863677,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863677/thumbnails/1.jpg","file_name":"pdf-131787-60586.pdf","download_url":"https://www.academia.edu/attachments/86863677/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Game_of_Proxies_Towards_a_new_model_of_w.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863677/pdf-131787-60586-libre.pdf?1654151610=\u0026response-content-disposition=attachment%3B+filename%3DGame_of_Proxies_Towards_a_new_model_of_w.pdf\u0026Expires=1733027487\u0026Signature=OL13XXzSl7Ne1atqI0FZjiqjiGrA2g9p6TwdjRaQGDZos02UzULoZkgzEN9TRMRGJYBsUQXYGEEugHQxfq6ogspazEzoePRQXQdet821tN5MI~R7J65z3Xbg2QmL~firB246wimqetpBlQc-i-Bhoc2v4bixGplEPAzGKdWZ4Uf-PZmBRY19DyFgukIffhH7qp1mrfCMcHh34b4T2JOJGyE2poCGazFwb~pbJhvnP3ZNhwqxc2~ypSP4HBgGS2UJnxop1jlYufrES7N8bis3dhBdtmCvJJ1HqPhShhThv06Rmd-Y0kvfqpUYLTb99JzAn6kF0AbxmeBQZoIgVEYBXw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":559,"name":"Military Science","url":"https://www.academia.edu/Documents/in/Military_Science"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies"},{"id":12939,"name":"Armed Conflict","url":"https://www.academia.edu/Documents/in/Armed_Conflict"},{"id":319110,"name":"Peace Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_Conflict_Studies"},{"id":359314,"name":"Proxy Wars","url":"https://www.academia.edu/Documents/in/Proxy_Wars"}],"urls":[{"id":21015335,"url":"https://securityanddefence.pl/pdf-131787-60586"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503023"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503023/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance"><img alt="Research paper thumbnail of How Turkey&#39;s Initial Response to the Syria Conflict Weakened Security Governance" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503023/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance">How Turkey&#39;s Initial Response to the Syria Conflict Weakened Security Governance</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis fo...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503023"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503023"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503023; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503023]").text(description); $(".js-view-count[data-work-id=80503023]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503023; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503023']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503023, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80503023]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503023,"title":"How Turkey's Initial Response to the Syria Conflict Weakened Security Governance","translated_title":"","metadata":{"abstract":"Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.","publisher":"Center for Social Sciences","publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":"Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.","internal_url":"https://www.academia.edu/80503023/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance","translated_internal_url":"","created_at":"2022-06-01T23:01:08.831-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":10966,"name":"Turkey","url":"https://www.academia.edu/Documents/in/Turkey"},{"id":15391,"name":"Syria","url":"https://www.academia.edu/Documents/in/Syria"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="71298112"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/71298112/Book_Review_US_Policies_and_Turkey_by_Bal"><img alt="Research paper thumbnail of Book Review - US Policies and Turkey by Bal" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/71298112/Book_Review_US_Policies_and_Turkey_by_Bal">Book Review - US Policies and Turkey by Bal</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="71298112"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="71298112"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71298112; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71298112]").text(description); $(".js-view-count[data-work-id=71298112]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71298112; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='71298112']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 71298112, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=71298112]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":71298112,"title":"Book Review - US Policies and Turkey by Bal","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2008,"errors":{}}},"translated_abstract":null,"internal_url":"https://www.academia.edu/71298112/Book_Review_US_Policies_and_Turkey_by_Bal","translated_internal_url":"","created_at":"2022-02-13T00:06:01.520-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Book_Review_US_Policies_and_Turkey_by_Bal","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="71298110"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_"><img alt="Research paper thumbnail of Introduction to the Special Issue ‘Proxy forces in modern warfare’" class="work-thumbnail" src="https://attachments.academia-assets.com/80702854/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_">Introduction to the Special Issue ‘Proxy forces in modern warfare’</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the battlefield, however ancient, has been gaining momentum recently as developments in almost all contemporary conflict zones illustrate. Raging from the Central African Republic, to Libya, Syria, Ukraine, and beyond, contemporary wars are being waged more and more with or through non-state actors – proxies. Whether foreign military interventions, counter-terrorism operations, training missions, or hybrid wars, proxies have been there and, seemingly, are to remain. Therefore, it fell upon us to ensure that such an urgent and pertinent topic should not evade deeper academic scrutiny and, together with our corresponding Authors, both practitioners and academics, we hope that this Special Issue at least partially achieves this.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="2c6860350aad226ac4786f7493ef189f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:80702854,&quot;asset_id&quot;:71298110,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/80702854/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="71298110"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="71298110"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71298110; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71298110]").text(description); $(".js-view-count[data-work-id=71298110]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71298110; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='71298110']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 71298110, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "2c6860350aad226ac4786f7493ef189f" } } $('.js-work-strip[data-work-id=71298110]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":71298110,"title":"Introduction to the Special Issue ‘Proxy forces in modern warfare’","translated_title":"","metadata":{"abstract":"As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the battlefield, however ancient, has been gaining momentum recently as developments in almost all contemporary conflict zones illustrate. Raging from the Central African Republic, to Libya, Syria, Ukraine, and beyond, contemporary wars are being waged more and more with or through non-state actors – proxies. Whether foreign military interventions, counter-terrorism operations, training missions, or hybrid wars, proxies have been there and, seemingly, are to remain. Therefore, it fell upon us to ensure that such an urgent and pertinent topic should not evade deeper academic scrutiny and, together with our corresponding Authors, both practitioners and academics, we hope that this Special Issue at least partially achieves this.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}}},"translated_abstract":"As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the battlefield, however ancient, has been gaining momentum recently as developments in almost all contemporary conflict zones illustrate. Raging from the Central African Republic, to Libya, Syria, Ukraine, and beyond, contemporary wars are being waged more and more with or through non-state actors – proxies. Whether foreign military interventions, counter-terrorism operations, training missions, or hybrid wars, proxies have been there and, seemingly, are to remain. Therefore, it fell upon us to ensure that such an urgent and pertinent topic should not evade deeper academic scrutiny and, together with our corresponding Authors, both practitioners and academics, we hope that this Special Issue at least partially achieves this.","internal_url":"https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_","translated_internal_url":"","created_at":"2022-02-13T00:06:01.373-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":80702854,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/80702854/thumbnails/1.jpg","file_name":"pdf-132287-61113.pdf","download_url":"https://www.academia.edu/attachments/80702854/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Introduction_to_the_Special_Issue_Proxy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/80702854/pdf-132287-61113-libre.pdf?1644739613=\u0026response-content-disposition=attachment%3B+filename%3DIntroduction_to_the_Special_Issue_Proxy.pdf\u0026Expires=1733027487\u0026Signature=VEa7yxKBJXsQDbhoU7VQfiu2Qp1Aj6w3AnMIeHIQ499goKMDrRZk~upJyJSYDOywf62A83Phg2-12R0o69y3SGKTMgxWohDqsfztczpnMYPc3wCwI1CUTKgOJTosuC-FHSTbSRUI59aDegVQO6eyyL~BeJiSRKjpitSPjvf3Qvu1-gdMWCpX6TtVVBQBNZIOkmH4QVNlC0cilH8DZ8FAiMVqeATCx~Nc6WvK03BzT-P8tKG5uRIoxo276fJNCpmF8QSEEQ-jCtmHsZmz5wfnReYS~SdcJ7O4xrZ0ieCCWnbTGAYatmfnS-NDKS1DMHhLjkchYPV8TvGCHEXeg13ZhQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":80702854,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/80702854/thumbnails/1.jpg","file_name":"pdf-132287-61113.pdf","download_url":"https://www.academia.edu/attachments/80702854/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Introduction_to_the_Special_Issue_Proxy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/80702854/pdf-132287-61113-libre.pdf?1644739613=\u0026response-content-disposition=attachment%3B+filename%3DIntroduction_to_the_Special_Issue_Proxy.pdf\u0026Expires=1733027487\u0026Signature=VEa7yxKBJXsQDbhoU7VQfiu2Qp1Aj6w3AnMIeHIQ499goKMDrRZk~upJyJSYDOywf62A83Phg2-12R0o69y3SGKTMgxWohDqsfztczpnMYPc3wCwI1CUTKgOJTosuC-FHSTbSRUI59aDegVQO6eyyL~BeJiSRKjpitSPjvf3Qvu1-gdMWCpX6TtVVBQBNZIOkmH4QVNlC0cilH8DZ8FAiMVqeATCx~Nc6WvK03BzT-P8tKG5uRIoxo276fJNCpmF8QSEEQ-jCtmHsZmz5wfnReYS~SdcJ7O4xrZ0ieCCWnbTGAYatmfnS-NDKS1DMHhLjkchYPV8TvGCHEXeg13ZhQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":80702855,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/80702855/thumbnails/1.jpg","file_name":"pdf-132287-61113.pdf","download_url":"https://www.academia.edu/attachments/80702855/download_file","bulk_download_file_name":"Introduction_to_the_Special_Issue_Proxy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/80702855/pdf-132287-61113-libre.pdf?1644739614=\u0026response-content-disposition=attachment%3B+filename%3DIntroduction_to_the_Special_Issue_Proxy.pdf\u0026Expires=1733027487\u0026Signature=CPpMdA-Z0ael0og-YElDZQIMDAFecY7-VVHM~~BDH~PDJhDTYuxDTuAPgU6LqtS7GrtlcSRzQvHsaqG6Kks8X84QyupB8MEprSF6Si674ITpETSlOZUL34Wf~dc8uVLAXIuULMAFT1EjzxOll~GhOk8IYzz~2LF56kdeooe28eoTH4caIh3Ej5WpCm6pYFFqF5dc4XH-b2omHbZ5N5aacdr0Lu9lzDaZShZCvJ~W5xIsr~I8ZQbgqAfPk9ZxGca~lvSx8frGKQCGq4DSPN4c8xL6BuFT5VhlLBjw5OkKvRGZZ-dxeEqvnj4a09g~VjdMUPYhGRaZ-iClB3mDvfs~PA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":17593670,"url":"https://securityanddefence.pl/pdf-132287-61113?filename=Introduction+to+the.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="71298109"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/71298109/Exploring_the_victimization_of_Syrian_refugees_through_the_human_security_model_An_ethnographic_approach"><img alt="Research paper thumbnail of Exploring the victimization of Syrian refugees through the human security model: An ethnographic approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/71298109/Exploring_the_victimization_of_Syrian_refugees_through_the_human_security_model_An_ethnographic_approach">Exploring the victimization of Syrian refugees through the human security model: An ethnographic approach</a></div><div class="wp-workCard_item"><span>Studies of Ethnicity and Nationalism `</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The purpose of this study was to investigate the human security aspect of the Syrian refugee cris...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkis...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="71298109"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="71298109"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71298109; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71298109]").text(description); $(".js-view-count[data-work-id=71298109]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71298109; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='71298109']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 71298109, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=71298109]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":71298109,"title":"Exploring the victimization of Syrian refugees through the human security model: An ethnographic approach","translated_title":"","metadata":{"abstract":"The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkis...","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Studies of Ethnicity and Nationalism `"},"translated_abstract":"The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkis...","internal_url":"https://www.academia.edu/71298109/Exploring_the_victimization_of_Syrian_refugees_through_the_human_security_model_An_ethnographic_approach","translated_internal_url":"","created_at":"2022-02-13T00:06:01.281-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Exploring_the_victimization_of_Syrian_refugees_through_the_human_security_model_An_ethnographic_approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":534,"name":"Law","url":"https://www.academia.edu/Documents/in/Law"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology"},{"id":4850,"name":"Migration","url":"https://www.academia.edu/Documents/in/Migration"},{"id":10678,"name":"Human Security","url":"https://www.academia.edu/Documents/in/Human_Security"},{"id":1245071,"name":"Enthography","url":"https://www.academia.edu/Documents/in/Enthography"},{"id":2125684,"name":"Syrian Refugees in Turkey","url":"https://www.academia.edu/Documents/in/Syrian_Refugees_in_Turkey"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="71298056"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/71298056/DIVERGENCE_OF_DISCONTENT_Sociopolitical_Analysis_of_Turkoskepticism_in_the_European_Union_Enlargement"><img alt="Research paper thumbnail of DIVERGENCE OF DISCONTENT: Sociopolitical Analysis of Turkoskepticism in the European Union Enlargement" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/71298056/DIVERGENCE_OF_DISCONTENT_Sociopolitical_Analysis_of_Turkoskepticism_in_the_European_Union_Enlargement">DIVERGENCE OF DISCONTENT: Sociopolitical Analysis of Turkoskepticism in the European Union Enlargement</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">... Many people deserved to be acknowledged here! Nonetheless My wife Pınar and my kids Serdar, A...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">... Many people deserved to be acknowledged here! Nonetheless My wife Pınar and my kids Serdar, Ayse Betul and Bahar should be mentioned firstly, because it was mostly their time that I used to finish this study. Dr. Nawal Ammar and Dr. David Kessler are ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="71298056"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="71298056"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71298056; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71298056]").text(description); $(".js-view-count[data-work-id=71298056]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71298056; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='71298056']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 71298056, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=71298056]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":71298056,"title":"DIVERGENCE OF DISCONTENT: Sociopolitical Analysis of Turkoskepticism in the European Union Enlargement","translated_title":"","metadata":{"abstract":"... Many people deserved to be acknowledged here! Nonetheless My wife Pınar and my kids Serdar, Ayse Betul and Bahar should be mentioned firstly, because it was mostly their time that I used to finish this study. Dr. Nawal Ammar and Dr. David Kessler are ...","publication_date":{"day":null,"month":null,"year":2008,"errors":{}}},"translated_abstract":"... Many people deserved to be acknowledged here! Nonetheless My wife Pınar and my kids Serdar, Ayse Betul and Bahar should be mentioned firstly, because it was mostly their time that I used to finish this study. Dr. Nawal Ammar and Dr. David Kessler are ...","internal_url":"https://www.academia.edu/71298056/DIVERGENCE_OF_DISCONTENT_Sociopolitical_Analysis_of_Turkoskepticism_in_the_European_Union_Enlargement","translated_internal_url":"","created_at":"2022-02-13T00:05:31.965-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"DIVERGENCE_OF_DISCONTENT_Sociopolitical_Analysis_of_Turkoskepticism_in_the_European_Union_Enlargement","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="55834625"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/55834625/Conflict_Human_Displacement_and_Integration"><img alt="Research paper thumbnail of Conflict, Human Displacement, and Integration" class="work-thumbnail" src="https://attachments.academia-assets.com/71516703/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/55834625/Conflict_Human_Displacement_and_Integration">Conflict, Human Displacement, and Integration</a></div><div class="wp-workCard_item"><span>Globalization and Its Impact on Violence Against Vulnerable Groups</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">International and regional conflicts have been the most significant source of forced displacement...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">International and regional conflicts have been the most significant source of forced displacement and mass migration for decades. In a globalized world, human displacement reached its highest numbers and conflict became the number one reason for people to leave their home countries. This chapter analyzes the relationship between conflict and human displacement in a globalized context and demonstrates different stages of displacement. Each stage is connected with relevant levels of analysis (international, state, society, and individual) and the chapter argues that refugees become subjects of different risks at international, state, and societal levels during and after the displacement process. At each level, the nature of vulnerability changes and refugees are mostly affected by several external conditions, of which they have very limited control. By looking at the human (forced) displacement as a phenomenon from global to regional than local will help us to understand how the displ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="35f79dd32b2fff869940c3ba5d4eb3b9" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:71516703,&quot;asset_id&quot;:55834625,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/71516703/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="55834625"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="55834625"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 55834625; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=55834625]").text(description); $(".js-view-count[data-work-id=55834625]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 55834625; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='55834625']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 55834625, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "35f79dd32b2fff869940c3ba5d4eb3b9" } } $('.js-work-strip[data-work-id=55834625]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":55834625,"title":"Conflict, Human Displacement, and Integration","translated_title":"","metadata":{"abstract":"International and regional conflicts have been the most significant source of forced displacement and mass migration for decades. In a globalized world, human displacement reached its highest numbers and conflict became the number one reason for people to leave their home countries. This chapter analyzes the relationship between conflict and human displacement in a globalized context and demonstrates different stages of displacement. Each stage is connected with relevant levels of analysis (international, state, society, and individual) and the chapter argues that refugees become subjects of different risks at international, state, and societal levels during and after the displacement process. At each level, the nature of vulnerability changes and refugees are mostly affected by several external conditions, of which they have very limited control. By looking at the human (forced) displacement as a phenomenon from global to regional than local will help us to understand how the displ...","publisher":"IGI Global","publication_name":"Globalization and Its Impact on Violence Against Vulnerable Groups"},"translated_abstract":"International and regional conflicts have been the most significant source of forced displacement and mass migration for decades. In a globalized world, human displacement reached its highest numbers and conflict became the number one reason for people to leave their home countries. This chapter analyzes the relationship between conflict and human displacement in a globalized context and demonstrates different stages of displacement. Each stage is connected with relevant levels of analysis (international, state, society, and individual) and the chapter argues that refugees become subjects of different risks at international, state, and societal levels during and after the displacement process. At each level, the nature of vulnerability changes and refugees are mostly affected by several external conditions, of which they have very limited control. By looking at the human (forced) displacement as a phenomenon from global to regional than local will help us to understand how the displ...","internal_url":"https://www.academia.edu/55834625/Conflict_Human_Displacement_and_Integration","translated_internal_url":"","created_at":"2021-10-05T23:55:25.475-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":71516703,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/71516703/thumbnails/1.jpg","file_name":"8f468b5d16fc30cbbe6043f1139c3f9c5e94.pdf","download_url":"https://www.academia.edu/attachments/71516703/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Conflict_Human_Displacement_and_Integrat.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/71516703/8f468b5d16fc30cbbe6043f1139c3f9c5e94-libre.pdf?1635326435=\u0026response-content-disposition=attachment%3B+filename%3DConflict_Human_Displacement_and_Integrat.pdf\u0026Expires=1733027487\u0026Signature=QT06SuCgxbmshn6KT2y2nb0x9mWSKcHZOz4fEb7Ok6bVEHiAAzIznVTlNLPvZVSs~RRwzFuxcBw6cLwA16xCTR6UCkkfJFRcVcAlIeGwY6rz5SDXauqyjRS6cswm-VYOi9duWae3ba5X9Mbz6vvH-Vx7wkoKkZWZ2s5xqGTyQ7QsoVE5Es1niYDwy4fIUYXpNBhf9PtiM7tKdYEIjvNO7I79tOke5avHMtO-YYOub8rUmRrdIb5k9l29P3-pTGxUXBeL5HcCEKYk6mrBPxiX2iE-LBljJjYTUYTR3~mTUfk-l~MtMLH-FhpCcGd8KF76a5BzYupSnmdD75an60frqA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Conflict_Human_Displacement_and_Integration","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":71516703,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/71516703/thumbnails/1.jpg","file_name":"8f468b5d16fc30cbbe6043f1139c3f9c5e94.pdf","download_url":"https://www.academia.edu/attachments/71516703/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Conflict_Human_Displacement_and_Integrat.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/71516703/8f468b5d16fc30cbbe6043f1139c3f9c5e94-libre.pdf?1635326435=\u0026response-content-disposition=attachment%3B+filename%3DConflict_Human_Displacement_and_Integrat.pdf\u0026Expires=1733027487\u0026Signature=QT06SuCgxbmshn6KT2y2nb0x9mWSKcHZOz4fEb7Ok6bVEHiAAzIznVTlNLPvZVSs~RRwzFuxcBw6cLwA16xCTR6UCkkfJFRcVcAlIeGwY6rz5SDXauqyjRS6cswm-VYOi9duWae3ba5X9Mbz6vvH-Vx7wkoKkZWZ2s5xqGTyQ7QsoVE5Es1niYDwy4fIUYXpNBhf9PtiM7tKdYEIjvNO7I79tOke5avHMtO-YYOub8rUmRrdIb5k9l29P3-pTGxUXBeL5HcCEKYk6mrBPxiX2iE-LBljJjYTUYTR3~mTUfk-l~MtMLH-FhpCcGd8KF76a5BzYupSnmdD75an60frqA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":619004,"name":"Religious and Cross-Cultural Studies","url":"https://www.academia.edu/Documents/in/Religious_and_Cross-Cultural_Studies"}],"urls":[{"id":12335226,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=235066"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="46018648"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/46018648/Refugee_Perspectives_on_Integration_in_Germany"><img alt="Research paper thumbnail of Refugee Perspectives on Integration in Germany" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/46018648/Refugee_Perspectives_on_Integration_in_Germany">Refugee Perspectives on Integration in Germany</a></div><div class="wp-workCard_item"><span>American Journal of Qualitative Research</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="46018648"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="46018648"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 46018648; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=46018648]").text(description); $(".js-view-count[data-work-id=46018648]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 46018648; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='46018648']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 46018648, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=46018648]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":46018648,"title":"Refugee Perspectives on Integration in Germany","translated_title":"","metadata":{"publisher":"Modestum Limited","publication_name":"American Journal of Qualitative Research"},"translated_abstract":null,"internal_url":"https://www.academia.edu/46018648/Refugee_Perspectives_on_Integration_in_Germany","translated_internal_url":"","created_at":"2021-04-08T08:23:56.634-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Refugee_Perspectives_on_Integration_in_Germany","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[],"urls":[{"id":9426171,"url":"https://www.ajqr.org/download/refugee-perspectives-on-integration-in-germany-6433.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="45068106"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/45068106/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine"><img alt="Research paper thumbnail of Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine" class="work-thumbnail" src="https://attachments.academia-assets.com/65624067/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/45068106/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine">Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://rwu.academia.edu/MehmetAlperS%C3%96ZER">Mehmet Alper SÖZER</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/CyprianKozera">Cyprian Kozera</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://kentstate.academia.edu/CuneytGurer">Cuneyt Gurer</a>, and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/BlazejPoplawski">Blazej Poplawski</a></span></div><div class="wp-workCard_item"><span>Security and Defense Quarterly</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The objective of the study is to carry out a meaningful comparison that demonstrates the similari...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject , governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently , the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict&#39;s outcome.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="39e83d2c5634f80defeeac4bea9b6f78" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:65624067,&quot;asset_id&quot;:45068106,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/65624067/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="45068106"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="45068106"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 45068106; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=45068106]").text(description); $(".js-view-count[data-work-id=45068106]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 45068106; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='45068106']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 45068106, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "39e83d2c5634f80defeeac4bea9b6f78" } } $('.js-work-strip[data-work-id=45068106]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":45068106,"title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine","translated_title":"","metadata":{"doi":"10.35467/sdq/131787","abstract":"The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject , governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently , the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict's outcome.","ai_title_tag":"Proxy Warfare: Insights from Global Conflict Case Studies","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Security and Defense Quarterly"},"translated_abstract":"The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject , governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently , the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict's outcome.","internal_url":"https://www.academia.edu/45068106/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine","translated_internal_url":"","created_at":"2021-02-06T13:36:31.463-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":39497328,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":36238577,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":56324293,"co_author_invite_id":null,"email":"k***n@gmail.com","display_order":1,"name":"Cyprian Kozera","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"},{"id":36238578,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":4622523,"co_author_invite_id":null,"email":"c***r@gmail.com","affiliation":"Kent State University","display_order":2,"name":"Cuneyt Gurer","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"},{"id":36238579,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":null,"co_author_invite_id":7189580,"email":"p***p@gmail.com","display_order":3,"name":"Błażej Popławski","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"},{"id":36238580,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":null,"co_author_invite_id":6891256,"email":"p***t@law.mil.pl","display_order":5,"name":"Paweł Bernat","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"},{"id":36238581,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":6009796,"co_author_invite_id":7169676,"email":"b***i@gmail.com","display_order":6,"name":"Blazej Poplawski","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"}],"downloadable_attachments":[{"id":65624067,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/65624067/thumbnails/1.jpg","file_name":"Game_of_Proxies_Yayimlanmis_Hali.pdf","download_url":"https://www.academia.edu/attachments/65624067/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Game_of_Proxies_Towards_a_new_model_of_w.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/65624067/Game_of_Proxies_Yayimlanmis_Hali-libre.pdf?1612654729=\u0026response-content-disposition=attachment%3B+filename%3DGame_of_Proxies_Towards_a_new_model_of_w.pdf\u0026Expires=1733027487\u0026Signature=ad7Bl2mh7Kz5jtS~65UnJSav~LkKXoukny7k7v72uBZATwK6vH6jf4d2H1YclMBcTOW2QrAyc5KyuMfkJjUfEpGsG9XpXyjQ0nSDAD4xiKFm6YgU-6ar-JueftQ0hNwvc8Sej-Te89dvP3jMTvYFFDz3nofVePo47M5TbcIx1MSlIC0wl0~zRuOV3zuym2tODRDFAdg7-AMB2~W1Ir70mJ~CmAh-U-L3cGbOoXtjedqiBctgzYJG~pB9dv8fb4CX8lhdga3i5iNPAC1~OeKniGsJ-EI3xj2vJKkO2W8v7550bbqCF3zLwRxyDZsz~YUE9bJYvzyy07sVYgY6eLOQBA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine","translated_slug":"","page_count":21,"language":"en","content_type":"Work","owner":{"id":39497328,"first_name":"Mehmet Alper","middle_initials":null,"last_name":"SÖZER","page_name":"MehmetAlperSÖZER","domain_name":"rwu","created_at":"2015-11-30T14:45:43.486-08:00","display_name":"Mehmet Alper SÖZER","url":"https://rwu.academia.edu/MehmetAlperS%C3%96ZER"},"attachments":[{"id":65624067,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/65624067/thumbnails/1.jpg","file_name":"Game_of_Proxies_Yayimlanmis_Hali.pdf","download_url":"https://www.academia.edu/attachments/65624067/download_file?st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Game_of_Proxies_Towards_a_new_model_of_w.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/65624067/Game_of_Proxies_Yayimlanmis_Hali-libre.pdf?1612654729=\u0026response-content-disposition=attachment%3B+filename%3DGame_of_Proxies_Towards_a_new_model_of_w.pdf\u0026Expires=1733027487\u0026Signature=ad7Bl2mh7Kz5jtS~65UnJSav~LkKXoukny7k7v72uBZATwK6vH6jf4d2H1YclMBcTOW2QrAyc5KyuMfkJjUfEpGsG9XpXyjQ0nSDAD4xiKFm6YgU-6ar-JueftQ0hNwvc8Sej-Te89dvP3jMTvYFFDz3nofVePo47M5TbcIx1MSlIC0wl0~zRuOV3zuym2tODRDFAdg7-AMB2~W1Ir70mJ~CmAh-U-L3cGbOoXtjedqiBctgzYJG~pB9dv8fb4CX8lhdga3i5iNPAC1~OeKniGsJ-EI3xj2vJKkO2W8v7550bbqCF3zLwRxyDZsz~YUE9bJYvzyy07sVYgY6eLOQBA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies"},{"id":20520,"name":"Peace \u0026 Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies-3"},{"id":359314,"name":"Proxy Wars","url":"https://www.academia.edu/Documents/in/Proxy_Wars"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="44361420"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/44361420/Eine_Partnerschaft_in_Turbulenzen_oder_eine_Allianz_zum_gegenseitigen_Nutzen"><img alt="Research paper thumbnail of Eine Partnerschaft in Turbulenzen oder eine Allianz zum gegenseitigen Nutzen?" class="work-thumbnail" src="https://attachments.academia-assets.com/64757426/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/44361420/Eine_Partnerschaft_in_Turbulenzen_oder_eine_Allianz_zum_gegenseitigen_Nutzen">Eine Partnerschaft in Turbulenzen oder eine Allianz zum gegenseitigen Nutzen?</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://rwu.academia.edu/MehmetAlperS%C3%96ZER">Mehmet Alper SÖZER</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://kentstate.academia.edu/CuneytGurer">Cuneyt Gurer</a></span></div><div class="wp-workCard_item"><span>Friedens Forum</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Die Beziehungen zwischen der NATO und der Türkei können auf eine fast 70-jährige Geschichte zurüc...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Die Beziehungen zwischen der NATO und der Türkei können auf eine fast 70-jährige Geschichte zurückblicken. Diese ist nicht immer reibungslos und harmonisch verlaufen, vielmehr kann dieses Bündnis als die meiste Zeit bestenfalls problematisch beschrieben werden. Das bedeutet nicht unbedingt, dass beide Seiten nicht gegenseitig voneinander profitiert haben. Historisch am offensichtlichsten ist, dass die Türkei Schutz vor<br />sowjetischer Aggression, beträchtliche militärische Unterstützung sowie wirtschaftliche Erleichterungen innerhalb des Marshallplans und Zugang türkischer Arbeiter*innen nach Westeuropa und insbesondere in Deutschland erhielt. Außerdem bedeutete die Mitgliedschaft der neugeborenen Republik im Bündnis, zumindest symbolisch, dass die Richtung des Landes in Richtung Westen ging. Im Gegenzug entsandte die NATO Truppen, errichtete Militärstützpunkte und Plattformen zur Sammlung nachrichtendienstlicher Erkenntnisse, kontrollierte den sowjetischen Zugang zum Mittelmeer, moderierte und managte die<br />lang anhaltenden Streitigkeiten in der Ägäis zwischen Griechenland und der Türkei.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c1d582c52d0ba3f909673dfb6393ec46" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:64757426,&quot;asset_id&quot;:44361420,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/64757426/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="44361420"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="44361420"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44361420; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44361420]").text(description); $(".js-view-count[data-work-id=44361420]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44361420; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='44361420']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 44361420, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c1d582c52d0ba3f909673dfb6393ec46" } } $('.js-work-strip[data-work-id=44361420]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":44361420,"title":"Eine Partnerschaft in Turbulenzen oder eine Allianz zum gegenseitigen Nutzen?","translated_title":"","metadata":{"abstract":"Die Beziehungen zwischen der NATO und der Türkei können auf eine fast 70-jährige Geschichte zurückblicken. Diese ist nicht immer reibungslos und harmonisch verlaufen, vielmehr kann dieses Bündnis als die meiste Zeit bestenfalls problematisch beschrieben werden. Das bedeutet nicht unbedingt, dass beide Seiten nicht gegenseitig voneinander profitiert haben. Historisch am offensichtlichsten ist, dass die Türkei Schutz vor\nsowjetischer Aggression, beträchtliche militärische Unterstützung sowie wirtschaftliche Erleichterungen innerhalb des Marshallplans und Zugang türkischer Arbeiter*innen nach Westeuropa und insbesondere in Deutschland erhielt. Außerdem bedeutete die Mitgliedschaft der neugeborenen Republik im Bündnis, zumindest symbolisch, dass die Richtung des Landes in Richtung Westen ging. Im Gegenzug entsandte die NATO Truppen, errichtete Militärstützpunkte und Plattformen zur Sammlung nachrichtendienstlicher Erkenntnisse, kontrollierte den sowjetischen Zugang zum Mittelmeer, moderierte und managte die\nlang anhaltenden Streitigkeiten in der Ägäis zwischen Griechenland und der Türkei.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Friedens Forum"},"translated_abstract":"Die Beziehungen zwischen der NATO und der Türkei können auf eine fast 70-jährige Geschichte zurückblicken. Diese ist nicht immer reibungslos und harmonisch verlaufen, vielmehr kann dieses Bündnis als die meiste Zeit bestenfalls problematisch beschrieben werden. Das bedeutet nicht unbedingt, dass beide Seiten nicht gegenseitig voneinander profitiert haben. Historisch am offensichtlichsten ist, dass die Türkei Schutz vor\nsowjetischer Aggression, beträchtliche militärische Unterstützung sowie wirtschaftliche Erleichterungen innerhalb des Marshallplans und Zugang türkischer Arbeiter*innen nach Westeuropa und insbesondere in Deutschland erhielt. Außerdem bedeutete die Mitgliedschaft der neugeborenen Republik im Bündnis, zumindest symbolisch, dass die Richtung des Landes in Richtung Westen ging. Im Gegenzug entsandte die NATO Truppen, errichtete Militärstützpunkte und Plattformen zur Sammlung nachrichtendienstlicher Erkenntnisse, kontrollierte den sowjetischen Zugang zum Mittelmeer, moderierte und managte die\nlang anhaltenden Streitigkeiten in der Ägäis zwischen Griechenland und der Türkei.","internal_url":"https://www.academia.edu/44361420/Eine_Partnerschaft_in_Turbulenzen_oder_eine_Allianz_zum_gegenseitigen_Nutzen","translated_internal_url":"","created_at":"2020-10-24T03:35:05.476-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":39497328,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":35869353,"work_id":44361420,"tagging_user_id":39497328,"tagged_user_id":4622523,"co_author_invite_id":null,"email":"c***r@gmail.com","affiliation":"Kent State University","display_order":1,"name":"Cuneyt Gurer","title":"Eine Partnerschaft in Turbulenzen oder eine Allianz zum gegenseitigen Nutzen?"}],"downloadable_attachments":[{"id":64757426,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/64757426/thumbnails/1.jpg","file_name":"fforum6_2019_web_sayfalar_1_2_41_42.pdf","download_url":"https://www.academia.edu/attachments/64757426/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Eine_Partnerschaft_in_Turbulenzen_oder_e.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/64757426/fforum6_2019_web_sayfalar_1_2_41_42-libre.pdf?1603545657=\u0026response-content-disposition=attachment%3B+filename%3DEine_Partnerschaft_in_Turbulenzen_oder_e.pdf\u0026Expires=1733027488\u0026Signature=XEwrrQWy7Vgym3sjmkTRjWpYuGFi5lsqeFivQ3UozN3KeDbJKD-saQZYd0ilqMPeSxcIWgRhp7MWFcCEbtFardUzHtF1OD-yeC~uvznWNmTG1lIvyNvxJ6cNJA0qeI0l3gZb1Mx-8gq3XlcL~TXSO9fn~ZwA9qt-OUymermubXiPpMd2FJKh0XjQBFC3kMwn1joXeCrFdyUYmlOsFw5-QzmeRyz5aDuQtk5Aj6BZFVxjp-CEpaHW0fvy8R3VFTRiEcd~g9iUCoX7LC-~FydP4Qk4rMhA6bSPMwdotMqnwD6AzIs9TXtBEWd-E9unqjHBwzMw5x-XsdjXt29iBPUktQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Eine_Partnerschaft_in_Turbulenzen_oder_eine_Allianz_zum_gegenseitigen_Nutzen","translated_slug":"","page_count":4,"language":"de","content_type":"Work","owner":{"id":39497328,"first_name":"Mehmet Alper","middle_initials":null,"last_name":"SÖZER","page_name":"MehmetAlperSÖZER","domain_name":"rwu","created_at":"2015-11-30T14:45:43.486-08:00","display_name":"Mehmet Alper SÖZER","url":"https://rwu.academia.edu/MehmetAlperS%C3%96ZER"},"attachments":[{"id":64757426,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/64757426/thumbnails/1.jpg","file_name":"fforum6_2019_web_sayfalar_1_2_41_42.pdf","download_url":"https://www.academia.edu/attachments/64757426/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Eine_Partnerschaft_in_Turbulenzen_oder_e.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/64757426/fforum6_2019_web_sayfalar_1_2_41_42-libre.pdf?1603545657=\u0026response-content-disposition=attachment%3B+filename%3DEine_Partnerschaft_in_Turbulenzen_oder_e.pdf\u0026Expires=1733027488\u0026Signature=XEwrrQWy7Vgym3sjmkTRjWpYuGFi5lsqeFivQ3UozN3KeDbJKD-saQZYd0ilqMPeSxcIWgRhp7MWFcCEbtFardUzHtF1OD-yeC~uvznWNmTG1lIvyNvxJ6cNJA0qeI0l3gZb1Mx-8gq3XlcL~TXSO9fn~ZwA9qt-OUymermubXiPpMd2FJKh0XjQBFC3kMwn1joXeCrFdyUYmlOsFw5-QzmeRyz5aDuQtk5Aj6BZFVxjp-CEpaHW0fvy8R3VFTRiEcd~g9iUCoX7LC-~FydP4Qk4rMhA6bSPMwdotMqnwD6AzIs9TXtBEWd-E9unqjHBwzMw5x-XsdjXt29iBPUktQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":228414,"name":"International Organization","url":"https://www.academia.edu/Documents/in/International_Organization"},{"id":458790,"name":"International Security and Strategic affairs","url":"https://www.academia.edu/Documents/in/International_Security_and_Strategic_affairs"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="38556203"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/38556203/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance"><img alt="Research paper thumbnail of How Turkey&#39;s Initial Response to the Syria Conflict Weakened Security Governance" class="work-thumbnail" src="https://attachments.academia-assets.com/58628193/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/38556203/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance">How Turkey&#39;s Initial Response to the Syria Conflict Weakened Security Governance</a></div><div class="wp-workCard_item"><span>POLICY BRIEFING</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis fo...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f61e1de105991081b13ad3924ad21b20" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:58628193,&quot;asset_id&quot;:38556203,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/58628193/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="38556203"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="38556203"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38556203; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38556203]").text(description); $(".js-view-count[data-work-id=38556203]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38556203; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='38556203']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 38556203, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f61e1de105991081b13ad3924ad21b20" } } $('.js-work-strip[data-work-id=38556203]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":38556203,"title":"How Turkey's Initial Response to the Syria Conflict Weakened Security Governance","translated_title":"","metadata":{"doi":"10.13140/RG.2.2.36765.97760","abstract":"Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"POLICY BRIEFING"},"translated_abstract":"Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.","internal_url":"https://www.academia.edu/38556203/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance","translated_internal_url":"","created_at":"2019-03-15T03:03:00.489-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":58628193,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58628193/thumbnails/1.jpg","file_name":"Turkey-Security-Governance.pdf","download_url":"https://www.academia.edu/attachments/58628193/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"How_Turkeys_Initial_Response_to_the_Syri.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58628193/Turkey-Security-Governance-libre.pdf?1552652341=\u0026response-content-disposition=attachment%3B+filename%3DHow_Turkeys_Initial_Response_to_the_Syri.pdf\u0026Expires=1733027488\u0026Signature=KsRrvx~wB9V5bxd3c~XLkKBLwf6MCpEnz6G2KEeGkqyHWqpBnsJNtrX1RQ7YhAv0uBi2dlMWCSUvDQDDdy1GztHfh1bcqPzQTtcGV8lLkQe5Roik312FHV93bnPXIH4xb1NGY~40~hypcRssx-jhgsG-fWQqePFuetG1JUY7x9-Mvsz~40bIiaqQ2TK~6YEpSvKLRdHiIy7dO-xw85pkH5bmJX7NLOcz6s3PCvUmgqfK3oM6KPoZUHLZvlPDGLmI4YeDvwT6RPpm-wgZVJOEn5txDZEVI4UqWnBruTjXKht7PTrHnMicyQ7~2IRjVnE7NlNVyo9UwAKKCxb~Hc3nLw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":58628193,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58628193/thumbnails/1.jpg","file_name":"Turkey-Security-Governance.pdf","download_url":"https://www.academia.edu/attachments/58628193/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"How_Turkeys_Initial_Response_to_the_Syri.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58628193/Turkey-Security-Governance-libre.pdf?1552652341=\u0026response-content-disposition=attachment%3B+filename%3DHow_Turkeys_Initial_Response_to_the_Syri.pdf\u0026Expires=1733027488\u0026Signature=KsRrvx~wB9V5bxd3c~XLkKBLwf6MCpEnz6G2KEeGkqyHWqpBnsJNtrX1RQ7YhAv0uBi2dlMWCSUvDQDDdy1GztHfh1bcqPzQTtcGV8lLkQe5Roik312FHV93bnPXIH4xb1NGY~40~hypcRssx-jhgsG-fWQqePFuetG1JUY7x9-Mvsz~40bIiaqQ2TK~6YEpSvKLRdHiIy7dO-xw85pkH5bmJX7NLOcz6s3PCvUmgqfK3oM6KPoZUHLZvlPDGLmI4YeDvwT6RPpm-wgZVJOEn5txDZEVI4UqWnBruTjXKht7PTrHnMicyQ7~2IRjVnE7NlNVyo9UwAKKCxb~Hc3nLw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":10966,"name":"Turkey","url":"https://www.academia.edu/Documents/in/Turkey"},{"id":15391,"name":"Syria","url":"https://www.academia.edu/Documents/in/Syria"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="35132166"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/35132166/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism"><img alt="Research paper thumbnail of Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism" class="work-thumbnail" src="https://attachments.academia-assets.com/54993435/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/35132166/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism">Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Understanding the nature and the extent of the future threat from ISIS has been a key question fo...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Understanding the nature and the extent of the future threat from ISIS has been a key question for scholars, policy makers and security professionals since ISIS started losing significant grounds in Syria and Iraq. This article analyses ISIS terrorism and its possible spillover effects from a regional security perspective by presenting a strategic model to develop options for the policy makers. A strategic understanding, supported by a model that has been designed to capture all possible variables and their interaction which each other, is necessary to understand the future direction of the threat. Many scholars agree that the threat is not only about the organizational structure of ISIS but also its ideological aspect, therefore the model presented here connects the facts and the ideology with variables at three different levels: regional political level; ISIS and its organizational structure; and individual level variables. The model was designed to capture changes with relevant data thus providing a strategic data-driven understanding of the threat. Regional political developments and how ISIS reacts to those developments are the main concerns at the first two levels of analysis. Foreign fighters and other sympathizers are the most important subjects of the study at the individual level with the assumption that the future threat will diffuse through foreign fighters and self-radicalized lone actors.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="90e3b10861cbfd0bd2587ad7716cb8ee" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:54993435,&quot;asset_id&quot;:35132166,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/54993435/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="35132166"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="35132166"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35132166; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35132166]").text(description); $(".js-view-count[data-work-id=35132166]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35132166; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='35132166']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 35132166, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "90e3b10861cbfd0bd2587ad7716cb8ee" } } $('.js-work-strip[data-work-id=35132166]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":35132166,"title":"Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism","translated_title":"","metadata":{"abstract":"Understanding the nature and the extent of the future threat from ISIS has been a key question for scholars, policy makers and security professionals since ISIS started losing significant grounds in Syria and Iraq. This article analyses ISIS terrorism and its possible spillover effects from a regional security perspective by presenting a strategic model to develop options for the policy makers. A strategic understanding, supported by a model that has been designed to capture all possible variables and their interaction which each other, is necessary to understand the future direction of the threat. Many scholars agree that the threat is not only about the organizational structure of ISIS but also its ideological aspect, therefore the model presented here connects the facts and the ideology with variables at three different levels: regional political level; ISIS and its organizational structure; and individual level variables. The model was designed to capture changes with relevant data thus providing a strategic data-driven understanding of the threat. Regional political developments and how ISIS reacts to those developments are the main concerns at the first two levels of analysis. Foreign fighters and other sympathizers are the most important subjects of the study at the individual level with the assumption that the future threat will diffuse through foreign fighters and self-radicalized lone actors."},"translated_abstract":"Understanding the nature and the extent of the future threat from ISIS has been a key question for scholars, policy makers and security professionals since ISIS started losing significant grounds in Syria and Iraq. This article analyses ISIS terrorism and its possible spillover effects from a regional security perspective by presenting a strategic model to develop options for the policy makers. A strategic understanding, supported by a model that has been designed to capture all possible variables and their interaction which each other, is necessary to understand the future direction of the threat. Many scholars agree that the threat is not only about the organizational structure of ISIS but also its ideological aspect, therefore the model presented here connects the facts and the ideology with variables at three different levels: regional political level; ISIS and its organizational structure; and individual level variables. The model was designed to capture changes with relevant data thus providing a strategic data-driven understanding of the threat. Regional political developments and how ISIS reacts to those developments are the main concerns at the first two levels of analysis. Foreign fighters and other sympathizers are the most important subjects of the study at the individual level with the assumption that the future threat will diffuse through foreign fighters and self-radicalized lone actors.","internal_url":"https://www.academia.edu/35132166/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism","translated_internal_url":"","created_at":"2017-11-13T04:00:25.682-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":54993435,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/54993435/thumbnails/1.jpg","file_name":"16.2.03_gurer.pdf","download_url":"https://www.academia.edu/attachments/54993435/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Presenting_a_Strategic_Model_to_Understa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/54993435/16.2.03_gurer-libre.pdf?1510579306=\u0026response-content-disposition=attachment%3B+filename%3DPresenting_a_Strategic_Model_to_Understa.pdf\u0026Expires=1733027488\u0026Signature=cdcI3tHIZ1u1fXyvueZ9Kn6vVtT9HCKgjArzSpCoMAG16~nPKNd5JiiV2lV5f7-Rf6iLm9hyIvYEpmC3dDqE6dsruWOenYFu9UZ4a9NqKTQi6APPCZOqpYXSo7IkqTAZZDvQ39nHekVnJfI0y3sP6HBwQS9AtW2-wGNZFcJvoZWYgtfMjLcIYIbQAFzlQuCOYBWqJmKmghAaYTxriOSl-RgCWLtVKVMUqObcoBcyyO~Sex~IeF8vnnRJhVfSJUZTCp-SVS33N8NSi3BKg9fS3pt39Uu-ERZJ9nkDuRIHzZGohaGSxkukMcQVvLw7u1HnHqFabx3Bpl35AsFB0YjR3g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":54993435,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/54993435/thumbnails/1.jpg","file_name":"16.2.03_gurer.pdf","download_url":"https://www.academia.edu/attachments/54993435/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Presenting_a_Strategic_Model_to_Understa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/54993435/16.2.03_gurer-libre.pdf?1510579306=\u0026response-content-disposition=attachment%3B+filename%3DPresenting_a_Strategic_Model_to_Understa.pdf\u0026Expires=1733027488\u0026Signature=cdcI3tHIZ1u1fXyvueZ9Kn6vVtT9HCKgjArzSpCoMAG16~nPKNd5JiiV2lV5f7-Rf6iLm9hyIvYEpmC3dDqE6dsruWOenYFu9UZ4a9NqKTQi6APPCZOqpYXSo7IkqTAZZDvQ39nHekVnJfI0y3sP6HBwQS9AtW2-wGNZFcJvoZWYgtfMjLcIYIbQAFzlQuCOYBWqJmKmghAaYTxriOSl-RgCWLtVKVMUqObcoBcyyO~Sex~IeF8vnnRJhVfSJUZTCp-SVS33N8NSi3BKg9fS3pt39Uu-ERZJ9nkDuRIHzZGohaGSxkukMcQVvLw7u1HnHqFabx3Bpl35AsFB0YjR3g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism"},{"id":58349,"name":"Regional Security","url":"https://www.academia.edu/Documents/in/Regional_Security"},{"id":185157,"name":"Isis","url":"https://www.academia.edu/Documents/in/Isis"},{"id":316672,"name":"Foreign Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Fighters"},{"id":1243561,"name":"Spillover Effect","url":"https://www.academia.edu/Documents/in/Spillover_Effect"},{"id":2318124,"name":"Foreign Terrorist Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Terrorist_Fighters"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="28348197"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/28348197/The_effects_of_crime_analysis_use_on_crime_and_clearance_rates_an_analyisis_sic_of_national_crime_and_administrative_data_"><img alt="Research paper thumbnail of The effects of crime analysis use on crime and clearance rates : an analyisis [sic] of national crime and administrative data /" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/28348197/The_effects_of_crime_analysis_use_on_crime_and_clearance_rates_an_analyisis_sic_of_national_crime_and_administrative_data_">The effects of crime analysis use on crime and clearance rates : an analyisis [sic] of national crime and administrative data /</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Thesis (M.A.)--Kent State University, 2002. Includes bibliographical references (leaves 91-95).</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="28348197"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="28348197"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 28348197; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=28348197]").text(description); $(".js-view-count[data-work-id=28348197]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 28348197; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='28348197']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 28348197, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=28348197]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":28348197,"title":"The effects of crime analysis use on crime and clearance rates : an analyisis [sic] of national crime and administrative data /","translated_title":"","metadata":{"abstract":"Thesis (M.A.)--Kent State University, 2002. Includes bibliographical references (leaves 91-95)."},"translated_abstract":"Thesis (M.A.)--Kent State University, 2002. Includes bibliographical references (leaves 91-95).","internal_url":"https://www.academia.edu/28348197/The_effects_of_crime_analysis_use_on_crime_and_clearance_rates_an_analyisis_sic_of_national_crime_and_administrative_data_","translated_internal_url":"","created_at":"2016-09-08T12:39:03.381-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"The_effects_of_crime_analysis_use_on_crime_and_clearance_rates_an_analyisis_sic_of_national_crime_and_administrative_data_","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="1971274" id="papers"><div class="js-work-strip profile--work_container" data-work-id="115178240"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/115178240/Gun_Control"><img alt="Research paper thumbnail of Gun Control" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/115178240/Gun_Control">Gun Control</a></div><div class="wp-workCard_item"><span>Encyclopedia of Interpersonal Violence</span><span>, Oct 5, 2012</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="115178240"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="115178240"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 115178240; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=115178240]").text(description); $(".js-view-count[data-work-id=115178240]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 115178240; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='115178240']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 115178240, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=115178240]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":115178240,"title":"Gun Control","translated_title":"","metadata":{"publication_date":{"day":5,"month":10,"year":2012,"errors":{}},"publication_name":"Encyclopedia of Interpersonal Violence"},"translated_abstract":null,"internal_url":"https://www.academia.edu/115178240/Gun_Control","translated_internal_url":"","created_at":"2024-02-20T09:41:31.091-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Gun_Control","translated_slug":"","page_count":null,"language":"cy","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[],"urls":[{"id":39642178,"url":"https://doi.org/10.4135/9781412963923.n201"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="115178224"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/115178224/Divergence_of_Discontent"><img alt="Research paper thumbnail of Divergence of Discontent" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/115178224/Divergence_of_Discontent">Divergence of Discontent</a></div><div class="wp-workCard_item"><span>VDM Verlag Dr. Müller eBooks</span><span>, Dec 4, 2008</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">One of the most significant decisions of the EU, after the Maastricht Treaty, was the decision to...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">One of the most significant decisions of the EU, after the Maastricht Treaty, was the decision to accept new members as they fulfilled economic and political criteria. Enlargement is still a working policy process for the EU, in which accession negotiations with formal candidate countries are still proceeding and further expansion to the Western Balkans are being considered as a possibility. Despite its success, EU enlargement has not been free from skepticism, especially when considering Turkey&amp;#39;s candidacy and the latest round of accession negotiations. In this framework, the study attempts to understand the dynamics of the sociopolitical structure of the European opposition to Turkish EU membership. Recent literature indicates four major issues and concerns regarding Turkey&amp;#39;s EU membership; those related to identity, future enlargement, individual economic expectations, as well as immigration and crime. The first phase of this study considers each issue area as a separate topic while the second measures the level of opposition to Turkey&amp;#39;s membership using all issue areas and other explanatory variables in a single model.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="115178224"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="115178224"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 115178224; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=115178224]").text(description); $(".js-view-count[data-work-id=115178224]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 115178224; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='115178224']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 115178224, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=115178224]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":115178224,"title":"Divergence of Discontent","translated_title":"","metadata":{"abstract":"One of the most significant decisions of the EU, after the Maastricht Treaty, was the decision to accept new members as they fulfilled economic and political criteria. Enlargement is still a working policy process for the EU, in which accession negotiations with formal candidate countries are still proceeding and further expansion to the Western Balkans are being considered as a possibility. Despite its success, EU enlargement has not been free from skepticism, especially when considering Turkey\u0026#39;s candidacy and the latest round of accession negotiations. In this framework, the study attempts to understand the dynamics of the sociopolitical structure of the European opposition to Turkish EU membership. Recent literature indicates four major issues and concerns regarding Turkey\u0026#39;s EU membership; those related to identity, future enlargement, individual economic expectations, as well as immigration and crime. The first phase of this study considers each issue area as a separate topic while the second measures the level of opposition to Turkey\u0026#39;s membership using all issue areas and other explanatory variables in a single model.","publisher":"VDM Verlag Dr. Müller","publication_date":{"day":4,"month":12,"year":2008,"errors":{}},"publication_name":"VDM Verlag Dr. Müller eBooks"},"translated_abstract":"One of the most significant decisions of the EU, after the Maastricht Treaty, was the decision to accept new members as they fulfilled economic and political criteria. Enlargement is still a working policy process for the EU, in which accession negotiations with formal candidate countries are still proceeding and further expansion to the Western Balkans are being considered as a possibility. Despite its success, EU enlargement has not been free from skepticism, especially when considering Turkey\u0026#39;s candidacy and the latest round of accession negotiations. In this framework, the study attempts to understand the dynamics of the sociopolitical structure of the European opposition to Turkish EU membership. Recent literature indicates four major issues and concerns regarding Turkey\u0026#39;s EU membership; those related to identity, future enlargement, individual economic expectations, as well as immigration and crime. The first phase of this study considers each issue area as a separate topic while the second measures the level of opposition to Turkey\u0026#39;s membership using all issue areas and other explanatory variables in a single model.","internal_url":"https://www.academia.edu/115178224/Divergence_of_Discontent","translated_internal_url":"","created_at":"2024-02-20T09:41:15.380-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Divergence_of_Discontent","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics"},{"id":10419,"name":"Negotiation","url":"https://www.academia.edu/Documents/in/Negotiation"},{"id":29711,"name":"Skepticism","url":"https://www.academia.edu/Documents/in/Skepticism"},{"id":355852,"name":"Opposition Politics","url":"https://www.academia.edu/Documents/in/Opposition_Politics"},{"id":544679,"name":"Accession","url":"https://www.academia.edu/Documents/in/Accession"},{"id":1681078,"name":"Candidacy","url":"https://www.academia.edu/Documents/in/Candidacy"},{"id":2629362,"name":"Resizing","url":"https://www.academia.edu/Documents/in/Resizing"}],"urls":[{"id":39642170,"url":"https://www.knigozal.com/store/ru/book/divergence-of-discontent/isbn/978-3-639-08275-3"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="84154012"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/84154012/Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal_Bi_r_%C4%B0nceleme"><img alt="Research paper thumbnail of Kamu Poli̇ti̇kalarinin Yayilimi: Kuramsal Bi̇r İnceleme" class="work-thumbnail" src="https://attachments.academia-assets.com/89275390/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/84154012/Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal_Bi_r_%C4%B0nceleme">Kamu Poli̇ti̇kalarinin Yayilimi: Kuramsal Bi̇r İnceleme</a></div><div class="wp-workCard_item"><span>Uluslararası İktisadi ve İdari İncelemeler Dergisi</span><span>, 2016</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="29a72e6a2793dadf812606603b660974" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:89275390,&quot;asset_id&quot;:84154012,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/89275390/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="84154012"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="84154012"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 84154012; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=84154012]").text(description); $(".js-view-count[data-work-id=84154012]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 84154012; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='84154012']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 84154012, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "29a72e6a2793dadf812606603b660974" } } $('.js-work-strip[data-work-id=84154012]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":84154012,"title":"Kamu Poli̇ti̇kalarinin Yayilimi: Kuramsal Bi̇r İnceleme","translated_title":"","metadata":{"publisher":"International Journal of Economics and Administrative Studies","grobid_abstract":"ÖZ Kamu politikalarının oluşumunda en önemli etkenlerden birisi politikaların yayılımı (difüzyon) sürecidir. Politika yayılımı devletler arasında doğrudan formel yapıların etkileşimiyle olduğu gibi, uluslararası kuruluşların etkisi ve literatürde epistemik topluluklar olarak da adlandırılan resmi olmayan uzman toplulukların aracılığıyla da olabilmektedir. Yayılım süreci yalnızca devletlerarasında veya uluslararası sistem düzeyinde gerçekleşmez. Politikalar, aynı devlet içerisinde farklı kurumsal yapılar arasında çaprazlama şekilde veya aynı kurum içerisinde dikey şekilde de yayılım göstermektedir. Bu çalışma kamu politikalarının küresel yayılımı ve yerel politikaların oluşumundaki etkisini incelemektedir. İnceleme aynı zamanda uluslararası kuruluşlar aracılığıyla meydana gelen dikey, uzmanlar aracılığıyla oluşan yatay yayılım sürecinin politika oluşumuna etkisini analiz etmektedir. Ayrıca, politika yayılımı ile kamu politika analizi ilişkilendirilerek, yayılımın politika analizine olan katkısı incelenmektedir.","publication_date":{"day":null,"month":null,"year":2016,"errors":{}},"publication_name":"Uluslararası İktisadi ve İdari İncelemeler Dergisi","grobid_abstract_attachment_id":89275390},"translated_abstract":null,"internal_url":"https://www.academia.edu/84154012/Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal_Bi_r_%C4%B0nceleme","translated_internal_url":"","created_at":"2022-08-04T15:53:51.103-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":89275390,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89275390/thumbnails/1.jpg","file_name":"202090.pdf","download_url":"https://www.academia.edu/attachments/89275390/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89275390/202090-libre.pdf?1659655515=\u0026response-content-disposition=attachment%3B+filename%3DKamu_Poli_ti_kalarinin_Yayilimi_Kuramsal.pdf\u0026Expires=1733027487\u0026Signature=K9udGNIsFmt22eslWUCqtuWNmKsxRi6DdSSgU2KbwZFK5fwnoqKo1jHKVBtH2uYzMXEsnocDTK8a6OSe4JsU5utRjSI1Mp0LCBf4lPVAu2SgTDvxBjJo6hq1UeFsyDvnHfT3D96NckjMnqW8mI~qsyX3-VnZeH6mEmsVQuYZFppeSCM8fWxG370ySDhoC7wIXrnK6c7zjEJDEH7sH-xgwawZIm8rO2FivsD57HG0CKs5sObEElemYndbt0g7FCWKbRQVbB3U-DdJ6JdYt2-37xlCxkgBkTYf3kH1b2le3TrOn5YoVJpH0JBq88Jcd3BBD8vIq~krDPPWCFvbzQx7Hw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal_Bi_r_İnceleme","translated_slug":"","page_count":22,"language":"tr","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":89275390,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/89275390/thumbnails/1.jpg","file_name":"202090.pdf","download_url":"https://www.academia.edu/attachments/89275390/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Kamu_Poli_ti_kalarinin_Yayilimi_Kuramsal.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/89275390/202090-libre.pdf?1659655515=\u0026response-content-disposition=attachment%3B+filename%3DKamu_Poli_ti_kalarinin_Yayilimi_Kuramsal.pdf\u0026Expires=1733027487\u0026Signature=K9udGNIsFmt22eslWUCqtuWNmKsxRi6DdSSgU2KbwZFK5fwnoqKo1jHKVBtH2uYzMXEsnocDTK8a6OSe4JsU5utRjSI1Mp0LCBf4lPVAu2SgTDvxBjJo6hq1UeFsyDvnHfT3D96NckjMnqW8mI~qsyX3-VnZeH6mEmsVQuYZFppeSCM8fWxG370ySDhoC7wIXrnK6c7zjEJDEH7sH-xgwawZIm8rO2FivsD57HG0CKs5sObEElemYndbt0g7FCWKbRQVbB3U-DdJ6JdYt2-37xlCxkgBkTYf3kH1b2le3TrOn5YoVJpH0JBq88Jcd3BBD8vIq~krDPPWCFvbzQx7Hw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503989"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503989/Crime_and_Violence_Studies_in_the_Immigration_Field_Interactions_between_Disciplines_and_Emerging_Concepts"><img alt="Research paper thumbnail of Crime and Violence Studies in the Immigration Field: Interactions between Disciplines and Emerging Concepts" class="work-thumbnail" src="https://attachments.academia-assets.com/86863810/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503989/Crime_and_Violence_Studies_in_the_Immigration_Field_Interactions_between_Disciplines_and_Emerging_Concepts">Crime and Violence Studies in the Immigration Field: Interactions between Disciplines and Emerging Concepts</a></div><div class="wp-workCard_item"><span>Journal of Ethnic and Cultural Studies</span><span>, 2022</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This paper uses bibliometric analysis to evaluate the literature on immigration, crime, and viole...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This paper uses bibliometric analysis to evaluate the literature on immigration, crime, and violence to find out how these concepts are studied across disciplines. The paper gave specific attention to the field of Criminology to demonstrate the variation of the use of these concepts in the literature and how much it differs from other disciplines. To meet these expectations, we examined how journals are categorized based on covering how immigration and crime interact in social science disciplines. Moreover, the analysis maps how research articles interact in different journals and what types of topics receive the most attention among researchers by looking at cross-citation data and keyword selection. The findings show that, overall, the number of publications used at least one of the studied items (immigration, crime, and violence) as a keyword increased tremendously in the last two decades. The most studied concept amongst all disciplines is violence, followed by gender and crime ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="6f82a394de87f7d18ed0063f70344325" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:86863810,&quot;asset_id&quot;:80503989,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/86863810/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503989"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503989"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503989; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503989]").text(description); $(".js-view-count[data-work-id=80503989]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503989; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503989']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503989, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "6f82a394de87f7d18ed0063f70344325" } } $('.js-work-strip[data-work-id=80503989]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503989,"title":"Crime and Violence Studies in the Immigration Field: Interactions between Disciplines and Emerging Concepts","translated_title":"","metadata":{"abstract":"This paper uses bibliometric analysis to evaluate the literature on immigration, crime, and violence to find out how these concepts are studied across disciplines. The paper gave specific attention to the field of Criminology to demonstrate the variation of the use of these concepts in the literature and how much it differs from other disciplines. To meet these expectations, we examined how journals are categorized based on covering how immigration and crime interact in social science disciplines. Moreover, the analysis maps how research articles interact in different journals and what types of topics receive the most attention among researchers by looking at cross-citation data and keyword selection. The findings show that, overall, the number of publications used at least one of the studied items (immigration, crime, and violence) as a keyword increased tremendously in the last two decades. The most studied concept amongst all disciplines is violence, followed by gender and crime ...","publisher":"Modestum Publishing Ltd","publication_date":{"day":null,"month":null,"year":2022,"errors":{}},"publication_name":"Journal of Ethnic and Cultural Studies"},"translated_abstract":"This paper uses bibliometric analysis to evaluate the literature on immigration, crime, and violence to find out how these concepts are studied across disciplines. The paper gave specific attention to the field of Criminology to demonstrate the variation of the use of these concepts in the literature and how much it differs from other disciplines. To meet these expectations, we examined how journals are categorized based on covering how immigration and crime interact in social science disciplines. Moreover, the analysis maps how research articles interact in different journals and what types of topics receive the most attention among researchers by looking at cross-citation data and keyword selection. The findings show that, overall, the number of publications used at least one of the studied items (immigration, crime, and violence) as a keyword increased tremendously in the last two decades. The most studied concept amongst all disciplines is violence, followed by gender and crime ...","internal_url":"https://www.academia.edu/80503989/Crime_and_Violence_Studies_in_the_Immigration_Field_Interactions_between_Disciplines_and_Emerging_Concepts","translated_internal_url":"","created_at":"2022-06-01T23:15:27.899-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86863810,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863810/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/86863810/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Crime_and_Violence_Studies_in_the_Immigr.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863810/pdf-libre.pdf?1654151592=\u0026response-content-disposition=attachment%3B+filename%3DCrime_and_Violence_Studies_in_the_Immigr.pdf\u0026Expires=1733027487\u0026Signature=UFRMbxLJimsQG2Vv6L4ttieQ9TrAYZ3h5iKh67i7npV2FdssqZZfQSzzx94QeZQZ5AOps8euVJxEAYJcNpyPgb-xsNvtnUdC1t3ELAfReUm0NOzn9NAQXlhIYw4K2gz-Baq1dJtd5w3P4dkxA4jKGjPs91AG3i5ntWrfp3WLH1gGXOpmrVTERwVCwfAGuWImvBoa7e9-J9WUNRyeBGrJDk0o2NS-RD1uRCAZVzU~JS7g2dnBgWeBLBenysWROa3-rsoS6S3bIFGQ12oYzptXaESE5iiihRTRm5FKR-RLXwTddXyDvLEr4EJLKKhtzODQEywaAW20t3gnfDDG8NIVig__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Crime_and_Violence_Studies_in_the_Immigration_Field_Interactions_between_Disciplines_and_Emerging_Concepts","translated_slug":"","page_count":21,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":86863810,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863810/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/86863810/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Crime_and_Violence_Studies_in_the_Immigr.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863810/pdf-libre.pdf?1654151592=\u0026response-content-disposition=attachment%3B+filename%3DCrime_and_Violence_Studies_in_the_Immigr.pdf\u0026Expires=1733027487\u0026Signature=UFRMbxLJimsQG2Vv6L4ttieQ9TrAYZ3h5iKh67i7npV2FdssqZZfQSzzx94QeZQZ5AOps8euVJxEAYJcNpyPgb-xsNvtnUdC1t3ELAfReUm0NOzn9NAQXlhIYw4K2gz-Baq1dJtd5w3P4dkxA4jKGjPs91AG3i5ntWrfp3WLH1gGXOpmrVTERwVCwfAGuWImvBoa7e9-J9WUNRyeBGrJDk0o2NS-RD1uRCAZVzU~JS7g2dnBgWeBLBenysWROa3-rsoS6S3bIFGQ12oYzptXaESE5iiihRTRm5FKR-RLXwTddXyDvLEr4EJLKKhtzODQEywaAW20t3gnfDDG8NIVig__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology"},{"id":3843,"name":"Immigration","url":"https://www.academia.edu/Documents/in/Immigration"},{"id":31986,"name":"Multi-Ethnic/Multi-Cultural Literary Studies","url":"https://www.academia.edu/Documents/in/Multi-Ethnic_Multi-Cultural_Literary_Studies"},{"id":199319,"name":"Citation","url":"https://www.academia.edu/Documents/in/Citation"}],"urls":[{"id":21015435,"url":"http://www.ejecs.org/index.php/JECS/article/viewFile/1021/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503957"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503957/Madde_Kullan%C4%B1m%C4%B1_Ve_Su%C3%A7_%C4%B0li%C5%9Fkisi_Kesitsel_Bir_Ara%C5%9Ft%C4%B1rma"><img alt="Research paper thumbnail of Madde Kullanımı Ve Suç İlişkisi: Kesitsel Bir Araştırma" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503957/Madde_Kullan%C4%B1m%C4%B1_Ve_Su%C3%A7_%C4%B0li%C5%9Fkisi_Kesitsel_Bir_Ara%C5%9Ft%C4%B1rma">Madde Kullanımı Ve Suç İlişkisi: Kesitsel Bir Araştırma</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Amaç: Amerika ve Avrupa&amp;#x27;da yapılan birçok araştırma, madde bağımlılığı ile suç / şiddet davr...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Amaç: Amerika ve Avrupa&amp;#x27;da yapılan birçok araştırma, madde bağımlılığı ile suç / şiddet davranışı arasındaki ilişkiyi incelemiş ayrıca konuya ilişkin birçok teorik çalışma ortaya konulmuştur. Ne var ki ülkemizde söz konusu ilişkiyi inceleyen alan araştırması ve anket çalışması oldukça ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503957"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503957"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503957; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503957]").text(description); $(".js-view-count[data-work-id=80503957]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503957; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503957']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503957, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80503957]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503957,"title":"Madde Kullanımı Ve Suç İlişkisi: Kesitsel Bir Araştırma","translated_title":"","metadata":{"abstract":"Amaç: Amerika ve Avrupa\u0026#x27;da yapılan birçok araştırma, madde bağımlılığı ile suç / şiddet davranışı arasındaki ilişkiyi incelemiş ayrıca konuya ilişkin birçok teorik çalışma ortaya konulmuştur. Ne var ki ülkemizde söz konusu ilişkiyi inceleyen alan araştırması ve anket çalışması oldukça ...","publication_date":{"day":null,"month":null,"year":2009,"errors":{}}},"translated_abstract":"Amaç: Amerika ve Avrupa\u0026#x27;da yapılan birçok araştırma, madde bağımlılığı ile suç / şiddet davranışı arasındaki ilişkiyi incelemiş ayrıca konuya ilişkin birçok teorik çalışma ortaya konulmuştur. Ne var ki ülkemizde söz konusu ilişkiyi inceleyen alan araştırması ve anket çalışması oldukça ...","internal_url":"https://www.academia.edu/80503957/Madde_Kullan%C4%B1m%C4%B1_Ve_Su%C3%A7_%C4%B0li%C5%9Fkisi_Kesitsel_Bir_Ara%C5%9Ft%C4%B1rma","translated_internal_url":"","created_at":"2022-06-01T23:14:53.318-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Madde_Kullanımı_Ve_Suç_İlişkisi_Kesitsel_Bir_Araştırma","translated_slug":"","page_count":null,"language":"tr","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503896"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503896/Exploring_the_Victimization_of_Syrian_Refugees_through_the_Human_Security_Model_An_Ethnographic_Approach"><img alt="Research paper thumbnail of Exploring the Victimization of Syrian Refugees through the Human Security Model: An Ethnographic Approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503896/Exploring_the_Victimization_of_Syrian_Refugees_through_the_Human_Security_Model_An_Ethnographic_Approach">Exploring the Victimization of Syrian Refugees through the Human Security Model: An Ethnographic Approach</a></div><div class="wp-workCard_item"><span>Studies in Ethnicity and Nationalism</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The purpose of this study was to investigate the human security aspect of the Syrian refugee cris...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkish state. Consequently, Turkey&amp;amp;#39;s failure to promote the human security of the Syrian refugees contributes to their forced migration to Western countries, where &amp;amp;#39;freedom from fear&amp;amp;#39;, &amp;amp;#39;freedom from want&amp;amp;#39;, and &amp;amp;#39;freedom from indignity&amp;amp;#39; are relatively assured. K E Y W O R D S human security, migration, victimization, Syrian refugees, ethnographic research</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503896"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503896"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503896; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503896]").text(description); $(".js-view-count[data-work-id=80503896]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503896; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503896']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503896, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80503896]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503896,"title":"Exploring the Victimization of Syrian Refugees through the Human Security Model: An Ethnographic Approach","translated_title":"","metadata":{"abstract":"The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkish state. Consequently, Turkey\u0026amp;#39;s failure to promote the human security of the Syrian refugees contributes to their forced migration to Western countries, where \u0026amp;#39;freedom from fear\u0026amp;#39;, \u0026amp;#39;freedom from want\u0026amp;#39;, and \u0026amp;#39;freedom from indignity\u0026amp;#39; are relatively assured. K E Y W O R D S human security, migration, victimization, Syrian refugees, ethnographic research","publisher":"Wiley","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Studies in Ethnicity and Nationalism"},"translated_abstract":"The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkish state. Consequently, Turkey\u0026amp;#39;s failure to promote the human security of the Syrian refugees contributes to their forced migration to Western countries, where \u0026amp;#39;freedom from fear\u0026amp;#39;, \u0026amp;#39;freedom from want\u0026amp;#39;, and \u0026amp;#39;freedom from indignity\u0026amp;#39; are relatively assured. K E Y W O R D S human security, migration, victimization, Syrian refugees, ethnographic research","internal_url":"https://www.academia.edu/80503896/Exploring_the_Victimization_of_Syrian_Refugees_through_the_Human_Security_Model_An_Ethnographic_Approach","translated_internal_url":"","created_at":"2022-06-01T23:14:03.805-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Exploring_the_Victimization_of_Syrian_Refugees_through_the_Human_Security_Model_An_Ethnographic_Approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":534,"name":"Law","url":"https://www.academia.edu/Documents/in/Law"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology"},{"id":4850,"name":"Migration","url":"https://www.academia.edu/Documents/in/Migration"},{"id":10678,"name":"Human Security","url":"https://www.academia.edu/Documents/in/Human_Security"},{"id":1245071,"name":"Enthography","url":"https://www.academia.edu/Documents/in/Enthography"},{"id":2125684,"name":"Syrian Refugees in Turkey","url":"https://www.academia.edu/Documents/in/Syrian_Refugees_in_Turkey"}],"urls":[{"id":21015375,"url":"https://onlinelibrary.wiley.com/doi/pdf/10.1111/sena.12338"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503870"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503870/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism"><img alt="Research paper thumbnail of Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism" class="work-thumbnail" src="https://attachments.academia-assets.com/86863760/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503870/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism">Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism</a></div><div class="wp-workCard_item"><span>Connections: The Quarterly Journal</span><span>, 2017</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f419f331e84c0466622a7ca12d035c9e" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:86863760,&quot;asset_id&quot;:80503870,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/86863760/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503870"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503870"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503870; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503870]").text(description); $(".js-view-count[data-work-id=80503870]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503870; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503870']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503870, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f419f331e84c0466622a7ca12d035c9e" } } $('.js-work-strip[data-work-id=80503870]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503870,"title":"Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism","translated_title":"","metadata":{"publisher":"Procon, Ltd.","grobid_abstract":"Understanding the nature and the extent of the future threat from ISIS has been a key question for scholars, policy makers and security professionals since ISIS started losing significant grounds in Syria and Iraq. This article analyses ISIS terrorism and its possible spillover effects from a regional security perspective by presenting a strategic model to develop options for the policy makers. A strategic understanding, supported by a model that has been designed to capture all possible variables and their interaction which each other, is necessary to understand the future direction of the threat. Many scholars agree that the threat is not only about the organizational structure of ISIS but also its ideological aspect, therefore the model presented here connects the facts and the ideology with variables at three different levels: regional political level; ISIS and its organizational structure; and individual level variables. The model was designed to capture changes with relevant data thus providing a strategic data-driven understanding of the threat. Regional political developments and how ISIS reacts to those developments are the main concerns at the first two levels of analysis. Foreign fighters and other sympathizers are the most important subjects of the study at the individual level with the assumption that the future threat will diffuse through foreign fighters and self-radicalized lone actors.","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"Connections: The Quarterly Journal","grobid_abstract_attachment_id":86863760},"translated_abstract":null,"internal_url":"https://www.academia.edu/80503870/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism","translated_internal_url":"","created_at":"2022-06-01T23:13:27.287-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86863760,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863760/thumbnails/1.jpg","file_name":"1c935ea15e2e0fe84763a9bd7db4f1e5c0d6.pdf","download_url":"https://www.academia.edu/attachments/86863760/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Presenting_a_Strategic_Model_to_Understa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863760/1c935ea15e2e0fe84763a9bd7db4f1e5c0d6-libre.pdf?1654151599=\u0026response-content-disposition=attachment%3B+filename%3DPresenting_a_Strategic_Model_to_Understa.pdf\u0026Expires=1733027487\u0026Signature=PcZvWp-hDDGUCpWkx3bQWPzqP6A7z4gz1dC3i6XEMBgpYxcjYp8bdamJsNOoD50F3K47qSxnRWREOrVbo9ZKA6JDY9y1SQsYrctKTMSYFHxgoSOfF1Ety9qAIZycbS1NW7DbfoagiRHFFCrTxVcl6eEB9h8cFmDH8BkBqUWtDhTtsVWGrL7EIGQV30-6Vo7MZDDh0TqxujvgvgE5orph1MxUJlWjoW1dVXOHHjQLn2XkTUtLlwV9W4XYL0gWArFIOemTq~TkWfO2QH---3os1YWg4YR4xT5k49eyUnZSVQKVetODKP2oQSnsQuLNEo4-OtBp6geesX2iAT-Y5~BYqA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":86863760,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863760/thumbnails/1.jpg","file_name":"1c935ea15e2e0fe84763a9bd7db4f1e5c0d6.pdf","download_url":"https://www.academia.edu/attachments/86863760/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Presenting_a_Strategic_Model_to_Understa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863760/1c935ea15e2e0fe84763a9bd7db4f1e5c0d6-libre.pdf?1654151599=\u0026response-content-disposition=attachment%3B+filename%3DPresenting_a_Strategic_Model_to_Understa.pdf\u0026Expires=1733027487\u0026Signature=PcZvWp-hDDGUCpWkx3bQWPzqP6A7z4gz1dC3i6XEMBgpYxcjYp8bdamJsNOoD50F3K47qSxnRWREOrVbo9ZKA6JDY9y1SQsYrctKTMSYFHxgoSOfF1Ety9qAIZycbS1NW7DbfoagiRHFFCrTxVcl6eEB9h8cFmDH8BkBqUWtDhTtsVWGrL7EIGQV30-6Vo7MZDDh0TqxujvgvgE5orph1MxUJlWjoW1dVXOHHjQLn2XkTUtLlwV9W4XYL0gWArFIOemTq~TkWfO2QH---3os1YWg4YR4xT5k49eyUnZSVQKVetODKP2oQSnsQuLNEo4-OtBp6geesX2iAT-Y5~BYqA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism"},{"id":58349,"name":"Regional Security","url":"https://www.academia.edu/Documents/in/Regional_Security"},{"id":185157,"name":"Isis","url":"https://www.academia.edu/Documents/in/Isis"},{"id":316672,"name":"Foreign Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Fighters"},{"id":1243561,"name":"Spillover Effect","url":"https://www.academia.edu/Documents/in/Spillover_Effect"},{"id":2318124,"name":"Foreign Terrorist Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Terrorist_Fighters"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503801"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503801/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine"><img alt="Research paper thumbnail of Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine" class="work-thumbnail" src="https://attachments.academia-assets.com/86863677/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503801/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine">Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine</a></div><div class="wp-workCard_item"><span>Security and Defence Quarterly</span><span>, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="fef65f94c6135d1ac1b612f9754dbc04" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:86863677,&quot;asset_id&quot;:80503801,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/86863677/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503801"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503801"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503801; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503801]").text(description); $(".js-view-count[data-work-id=80503801]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503801; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503801']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503801, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "fef65f94c6135d1ac1b612f9754dbc04" } } $('.js-work-strip[data-work-id=80503801]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503801,"title":"Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine","translated_title":"","metadata":{"publisher":"War Studies University","grobid_abstract":"The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject, governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently, the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict's outcome.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Security and Defence Quarterly","grobid_abstract_attachment_id":86863677},"translated_abstract":null,"internal_url":"https://www.academia.edu/80503801/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine","translated_internal_url":"","created_at":"2022-06-01T23:12:44.610-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":86863677,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863677/thumbnails/1.jpg","file_name":"pdf-131787-60586.pdf","download_url":"https://www.academia.edu/attachments/86863677/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Game_of_Proxies_Towards_a_new_model_of_w.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863677/pdf-131787-60586-libre.pdf?1654151610=\u0026response-content-disposition=attachment%3B+filename%3DGame_of_Proxies_Towards_a_new_model_of_w.pdf\u0026Expires=1733027487\u0026Signature=OL13XXzSl7Ne1atqI0FZjiqjiGrA2g9p6TwdjRaQGDZos02UzULoZkgzEN9TRMRGJYBsUQXYGEEugHQxfq6ogspazEzoePRQXQdet821tN5MI~R7J65z3Xbg2QmL~firB246wimqetpBlQc-i-Bhoc2v4bixGplEPAzGKdWZ4Uf-PZmBRY19DyFgukIffhH7qp1mrfCMcHh34b4T2JOJGyE2poCGazFwb~pbJhvnP3ZNhwqxc2~ypSP4HBgGS2UJnxop1jlYufrES7N8bis3dhBdtmCvJJ1HqPhShhThv06Rmd-Y0kvfqpUYLTb99JzAn6kF0AbxmeBQZoIgVEYBXw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine","translated_slug":"","page_count":21,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":86863677,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/86863677/thumbnails/1.jpg","file_name":"pdf-131787-60586.pdf","download_url":"https://www.academia.edu/attachments/86863677/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Game_of_Proxies_Towards_a_new_model_of_w.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/86863677/pdf-131787-60586-libre.pdf?1654151610=\u0026response-content-disposition=attachment%3B+filename%3DGame_of_Proxies_Towards_a_new_model_of_w.pdf\u0026Expires=1733027487\u0026Signature=OL13XXzSl7Ne1atqI0FZjiqjiGrA2g9p6TwdjRaQGDZos02UzULoZkgzEN9TRMRGJYBsUQXYGEEugHQxfq6ogspazEzoePRQXQdet821tN5MI~R7J65z3Xbg2QmL~firB246wimqetpBlQc-i-Bhoc2v4bixGplEPAzGKdWZ4Uf-PZmBRY19DyFgukIffhH7qp1mrfCMcHh34b4T2JOJGyE2poCGazFwb~pbJhvnP3ZNhwqxc2~ypSP4HBgGS2UJnxop1jlYufrES7N8bis3dhBdtmCvJJ1HqPhShhThv06Rmd-Y0kvfqpUYLTb99JzAn6kF0AbxmeBQZoIgVEYBXw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":559,"name":"Military Science","url":"https://www.academia.edu/Documents/in/Military_Science"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies"},{"id":12939,"name":"Armed Conflict","url":"https://www.academia.edu/Documents/in/Armed_Conflict"},{"id":319110,"name":"Peace Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_Conflict_Studies"},{"id":359314,"name":"Proxy Wars","url":"https://www.academia.edu/Documents/in/Proxy_Wars"}],"urls":[{"id":21015335,"url":"https://securityanddefence.pl/pdf-131787-60586"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="80503023"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/80503023/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance"><img alt="Research paper thumbnail of How Turkey&#39;s Initial Response to the Syria Conflict Weakened Security Governance" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/80503023/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance">How Turkey&#39;s Initial Response to the Syria Conflict Weakened Security Governance</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis fo...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="80503023"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="80503023"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 80503023; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=80503023]").text(description); $(".js-view-count[data-work-id=80503023]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 80503023; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='80503023']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 80503023, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=80503023]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":80503023,"title":"How Turkey's Initial Response to the Syria Conflict Weakened Security Governance","translated_title":"","metadata":{"abstract":"Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.","publisher":"Center for Social Sciences","publication_date":{"day":null,"month":null,"year":2019,"errors":{}}},"translated_abstract":"Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.","internal_url":"https://www.academia.edu/80503023/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance","translated_internal_url":"","created_at":"2022-06-01T23:01:08.831-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":10966,"name":"Turkey","url":"https://www.academia.edu/Documents/in/Turkey"},{"id":15391,"name":"Syria","url":"https://www.academia.edu/Documents/in/Syria"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="71298112"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/71298112/Book_Review_US_Policies_and_Turkey_by_Bal"><img alt="Research paper thumbnail of Book Review - US Policies and Turkey by Bal" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/71298112/Book_Review_US_Policies_and_Turkey_by_Bal">Book Review - US Policies and Turkey by Bal</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="71298112"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="71298112"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71298112; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71298112]").text(description); $(".js-view-count[data-work-id=71298112]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71298112; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='71298112']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 71298112, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=71298112]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":71298112,"title":"Book Review - US Policies and Turkey by Bal","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2008,"errors":{}}},"translated_abstract":null,"internal_url":"https://www.academia.edu/71298112/Book_Review_US_Policies_and_Turkey_by_Bal","translated_internal_url":"","created_at":"2022-02-13T00:06:01.520-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Book_Review_US_Policies_and_Turkey_by_Bal","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="71298110"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_"><img alt="Research paper thumbnail of Introduction to the Special Issue ‘Proxy forces in modern warfare’" class="work-thumbnail" src="https://attachments.academia-assets.com/80702854/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_">Introduction to the Special Issue ‘Proxy forces in modern warfare’</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the battlefield, however ancient, has been gaining momentum recently as developments in almost all contemporary conflict zones illustrate. Raging from the Central African Republic, to Libya, Syria, Ukraine, and beyond, contemporary wars are being waged more and more with or through non-state actors – proxies. Whether foreign military interventions, counter-terrorism operations, training missions, or hybrid wars, proxies have been there and, seemingly, are to remain. Therefore, it fell upon us to ensure that such an urgent and pertinent topic should not evade deeper academic scrutiny and, together with our corresponding Authors, both practitioners and academics, we hope that this Special Issue at least partially achieves this.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="2c6860350aad226ac4786f7493ef189f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:80702854,&quot;asset_id&quot;:71298110,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/80702854/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="71298110"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="71298110"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71298110; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71298110]").text(description); $(".js-view-count[data-work-id=71298110]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71298110; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='71298110']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 71298110, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "2c6860350aad226ac4786f7493ef189f" } } $('.js-work-strip[data-work-id=71298110]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":71298110,"title":"Introduction to the Special Issue ‘Proxy forces in modern warfare’","translated_title":"","metadata":{"abstract":"As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the battlefield, however ancient, has been gaining momentum recently as developments in almost all contemporary conflict zones illustrate. Raging from the Central African Republic, to Libya, Syria, Ukraine, and beyond, contemporary wars are being waged more and more with or through non-state actors – proxies. Whether foreign military interventions, counter-terrorism operations, training missions, or hybrid wars, proxies have been there and, seemingly, are to remain. Therefore, it fell upon us to ensure that such an urgent and pertinent topic should not evade deeper academic scrutiny and, together with our corresponding Authors, both practitioners and academics, we hope that this Special Issue at least partially achieves this.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}}},"translated_abstract":"As the guest editors of the Security and Defence Quarterly, we are delighted to present a Special Issue devoted to the use of proxy forces in modern warfare. This phenomenon, the outsourcing of war and employment of non-state actors on the battlefield, however ancient, has been gaining momentum recently as developments in almost all contemporary conflict zones illustrate. Raging from the Central African Republic, to Libya, Syria, Ukraine, and beyond, contemporary wars are being waged more and more with or through non-state actors – proxies. Whether foreign military interventions, counter-terrorism operations, training missions, or hybrid wars, proxies have been there and, seemingly, are to remain. Therefore, it fell upon us to ensure that such an urgent and pertinent topic should not evade deeper academic scrutiny and, together with our corresponding Authors, both practitioners and academics, we hope that this Special Issue at least partially achieves this.","internal_url":"https://www.academia.edu/71298110/Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_","translated_internal_url":"","created_at":"2022-02-13T00:06:01.373-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":80702854,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/80702854/thumbnails/1.jpg","file_name":"pdf-132287-61113.pdf","download_url":"https://www.academia.edu/attachments/80702854/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Introduction_to_the_Special_Issue_Proxy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/80702854/pdf-132287-61113-libre.pdf?1644739613=\u0026response-content-disposition=attachment%3B+filename%3DIntroduction_to_the_Special_Issue_Proxy.pdf\u0026Expires=1733027487\u0026Signature=VEa7yxKBJXsQDbhoU7VQfiu2Qp1Aj6w3AnMIeHIQ499goKMDrRZk~upJyJSYDOywf62A83Phg2-12R0o69y3SGKTMgxWohDqsfztczpnMYPc3wCwI1CUTKgOJTosuC-FHSTbSRUI59aDegVQO6eyyL~BeJiSRKjpitSPjvf3Qvu1-gdMWCpX6TtVVBQBNZIOkmH4QVNlC0cilH8DZ8FAiMVqeATCx~Nc6WvK03BzT-P8tKG5uRIoxo276fJNCpmF8QSEEQ-jCtmHsZmz5wfnReYS~SdcJ7O4xrZ0ieCCWnbTGAYatmfnS-NDKS1DMHhLjkchYPV8TvGCHEXeg13ZhQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Introduction_to_the_Special_Issue_Proxy_forces_in_modern_warfare_","translated_slug":"","page_count":5,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":80702854,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/80702854/thumbnails/1.jpg","file_name":"pdf-132287-61113.pdf","download_url":"https://www.academia.edu/attachments/80702854/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Introduction_to_the_Special_Issue_Proxy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/80702854/pdf-132287-61113-libre.pdf?1644739613=\u0026response-content-disposition=attachment%3B+filename%3DIntroduction_to_the_Special_Issue_Proxy.pdf\u0026Expires=1733027487\u0026Signature=VEa7yxKBJXsQDbhoU7VQfiu2Qp1Aj6w3AnMIeHIQ499goKMDrRZk~upJyJSYDOywf62A83Phg2-12R0o69y3SGKTMgxWohDqsfztczpnMYPc3wCwI1CUTKgOJTosuC-FHSTbSRUI59aDegVQO6eyyL~BeJiSRKjpitSPjvf3Qvu1-gdMWCpX6TtVVBQBNZIOkmH4QVNlC0cilH8DZ8FAiMVqeATCx~Nc6WvK03BzT-P8tKG5uRIoxo276fJNCpmF8QSEEQ-jCtmHsZmz5wfnReYS~SdcJ7O4xrZ0ieCCWnbTGAYatmfnS-NDKS1DMHhLjkchYPV8TvGCHEXeg13ZhQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":80702855,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/80702855/thumbnails/1.jpg","file_name":"pdf-132287-61113.pdf","download_url":"https://www.academia.edu/attachments/80702855/download_file","bulk_download_file_name":"Introduction_to_the_Special_Issue_Proxy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/80702855/pdf-132287-61113-libre.pdf?1644739614=\u0026response-content-disposition=attachment%3B+filename%3DIntroduction_to_the_Special_Issue_Proxy.pdf\u0026Expires=1733027487\u0026Signature=CPpMdA-Z0ael0og-YElDZQIMDAFecY7-VVHM~~BDH~PDJhDTYuxDTuAPgU6LqtS7GrtlcSRzQvHsaqG6Kks8X84QyupB8MEprSF6Si674ITpETSlOZUL34Wf~dc8uVLAXIuULMAFT1EjzxOll~GhOk8IYzz~2LF56kdeooe28eoTH4caIh3Ej5WpCm6pYFFqF5dc4XH-b2omHbZ5N5aacdr0Lu9lzDaZShZCvJ~W5xIsr~I8ZQbgqAfPk9ZxGca~lvSx8frGKQCGq4DSPN4c8xL6BuFT5VhlLBjw5OkKvRGZZ-dxeEqvnj4a09g~VjdMUPYhGRaZ-iClB3mDvfs~PA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":17593670,"url":"https://securityanddefence.pl/pdf-132287-61113?filename=Introduction+to+the.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="71298109"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/71298109/Exploring_the_victimization_of_Syrian_refugees_through_the_human_security_model_An_ethnographic_approach"><img alt="Research paper thumbnail of Exploring the victimization of Syrian refugees through the human security model: An ethnographic approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/71298109/Exploring_the_victimization_of_Syrian_refugees_through_the_human_security_model_An_ethnographic_approach">Exploring the victimization of Syrian refugees through the human security model: An ethnographic approach</a></div><div class="wp-workCard_item"><span>Studies of Ethnicity and Nationalism `</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The purpose of this study was to investigate the human security aspect of the Syrian refugee cris...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkis...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="71298109"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="71298109"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71298109; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71298109]").text(description); $(".js-view-count[data-work-id=71298109]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71298109; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='71298109']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 71298109, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=71298109]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":71298109,"title":"Exploring the victimization of Syrian refugees through the human security model: An ethnographic approach","translated_title":"","metadata":{"abstract":"The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkis...","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Studies of Ethnicity and Nationalism `"},"translated_abstract":"The purpose of this study was to investigate the human security aspect of the Syrian refugee crisis and to analyse the vulnerability and victimization of Syrian refugees in Turkey. Among the several categories within the human security model (i.e. economic, food, health, environmental, personal, community, and political) as conceptualized by the United Nations Development Programme (UNDP), the study analysed the personal (i.e. individual) security of Syrian refugees in Turkey. A qualitative research design was employed with an applied ethnographic approach which included semi-structured interviews, observations, document analysis, and field notes. Five main themes were identified regarding the personal security of Syrians: violence, homelessness, prostitution and early marriage, child labour, and deadly journeys. The results of the study indicate that Syrian refugees are exposed to several human insecurity parameters at the individual level, which are largely neglected by the Turkis...","internal_url":"https://www.academia.edu/71298109/Exploring_the_victimization_of_Syrian_refugees_through_the_human_security_model_An_ethnographic_approach","translated_internal_url":"","created_at":"2022-02-13T00:06:01.281-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Exploring_the_victimization_of_Syrian_refugees_through_the_human_security_model_An_ethnographic_approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":534,"name":"Law","url":"https://www.academia.edu/Documents/in/Law"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology"},{"id":4850,"name":"Migration","url":"https://www.academia.edu/Documents/in/Migration"},{"id":10678,"name":"Human Security","url":"https://www.academia.edu/Documents/in/Human_Security"},{"id":1245071,"name":"Enthography","url":"https://www.academia.edu/Documents/in/Enthography"},{"id":2125684,"name":"Syrian Refugees in Turkey","url":"https://www.academia.edu/Documents/in/Syrian_Refugees_in_Turkey"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="71298056"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/71298056/DIVERGENCE_OF_DISCONTENT_Sociopolitical_Analysis_of_Turkoskepticism_in_the_European_Union_Enlargement"><img alt="Research paper thumbnail of DIVERGENCE OF DISCONTENT: Sociopolitical Analysis of Turkoskepticism in the European Union Enlargement" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/71298056/DIVERGENCE_OF_DISCONTENT_Sociopolitical_Analysis_of_Turkoskepticism_in_the_European_Union_Enlargement">DIVERGENCE OF DISCONTENT: Sociopolitical Analysis of Turkoskepticism in the European Union Enlargement</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">... Many people deserved to be acknowledged here! Nonetheless My wife Pınar and my kids Serdar, A...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">... Many people deserved to be acknowledged here! Nonetheless My wife Pınar and my kids Serdar, Ayse Betul and Bahar should be mentioned firstly, because it was mostly their time that I used to finish this study. Dr. Nawal Ammar and Dr. David Kessler are ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="71298056"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="71298056"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 71298056; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=71298056]").text(description); $(".js-view-count[data-work-id=71298056]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 71298056; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='71298056']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 71298056, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=71298056]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":71298056,"title":"DIVERGENCE OF DISCONTENT: Sociopolitical Analysis of Turkoskepticism in the European Union Enlargement","translated_title":"","metadata":{"abstract":"... Many people deserved to be acknowledged here! Nonetheless My wife Pınar and my kids Serdar, Ayse Betul and Bahar should be mentioned firstly, because it was mostly their time that I used to finish this study. Dr. Nawal Ammar and Dr. David Kessler are ...","publication_date":{"day":null,"month":null,"year":2008,"errors":{}}},"translated_abstract":"... Many people deserved to be acknowledged here! Nonetheless My wife Pınar and my kids Serdar, Ayse Betul and Bahar should be mentioned firstly, because it was mostly their time that I used to finish this study. Dr. Nawal Ammar and Dr. David Kessler are ...","internal_url":"https://www.academia.edu/71298056/DIVERGENCE_OF_DISCONTENT_Sociopolitical_Analysis_of_Turkoskepticism_in_the_European_Union_Enlargement","translated_internal_url":"","created_at":"2022-02-13T00:05:31.965-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"DIVERGENCE_OF_DISCONTENT_Sociopolitical_Analysis_of_Turkoskepticism_in_the_European_Union_Enlargement","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="55834625"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/55834625/Conflict_Human_Displacement_and_Integration"><img alt="Research paper thumbnail of Conflict, Human Displacement, and Integration" class="work-thumbnail" src="https://attachments.academia-assets.com/71516703/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/55834625/Conflict_Human_Displacement_and_Integration">Conflict, Human Displacement, and Integration</a></div><div class="wp-workCard_item"><span>Globalization and Its Impact on Violence Against Vulnerable Groups</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">International and regional conflicts have been the most significant source of forced displacement...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">International and regional conflicts have been the most significant source of forced displacement and mass migration for decades. In a globalized world, human displacement reached its highest numbers and conflict became the number one reason for people to leave their home countries. This chapter analyzes the relationship between conflict and human displacement in a globalized context and demonstrates different stages of displacement. Each stage is connected with relevant levels of analysis (international, state, society, and individual) and the chapter argues that refugees become subjects of different risks at international, state, and societal levels during and after the displacement process. At each level, the nature of vulnerability changes and refugees are mostly affected by several external conditions, of which they have very limited control. By looking at the human (forced) displacement as a phenomenon from global to regional than local will help us to understand how the displ...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="35f79dd32b2fff869940c3ba5d4eb3b9" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:71516703,&quot;asset_id&quot;:55834625,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/71516703/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="55834625"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="55834625"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 55834625; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=55834625]").text(description); $(".js-view-count[data-work-id=55834625]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 55834625; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='55834625']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 55834625, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "35f79dd32b2fff869940c3ba5d4eb3b9" } } $('.js-work-strip[data-work-id=55834625]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":55834625,"title":"Conflict, Human Displacement, and Integration","translated_title":"","metadata":{"abstract":"International and regional conflicts have been the most significant source of forced displacement and mass migration for decades. In a globalized world, human displacement reached its highest numbers and conflict became the number one reason for people to leave their home countries. This chapter analyzes the relationship between conflict and human displacement in a globalized context and demonstrates different stages of displacement. Each stage is connected with relevant levels of analysis (international, state, society, and individual) and the chapter argues that refugees become subjects of different risks at international, state, and societal levels during and after the displacement process. At each level, the nature of vulnerability changes and refugees are mostly affected by several external conditions, of which they have very limited control. By looking at the human (forced) displacement as a phenomenon from global to regional than local will help us to understand how the displ...","publisher":"IGI Global","publication_name":"Globalization and Its Impact on Violence Against Vulnerable Groups"},"translated_abstract":"International and regional conflicts have been the most significant source of forced displacement and mass migration for decades. In a globalized world, human displacement reached its highest numbers and conflict became the number one reason for people to leave their home countries. This chapter analyzes the relationship between conflict and human displacement in a globalized context and demonstrates different stages of displacement. Each stage is connected with relevant levels of analysis (international, state, society, and individual) and the chapter argues that refugees become subjects of different risks at international, state, and societal levels during and after the displacement process. At each level, the nature of vulnerability changes and refugees are mostly affected by several external conditions, of which they have very limited control. By looking at the human (forced) displacement as a phenomenon from global to regional than local will help us to understand how the displ...","internal_url":"https://www.academia.edu/55834625/Conflict_Human_Displacement_and_Integration","translated_internal_url":"","created_at":"2021-10-05T23:55:25.475-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":71516703,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/71516703/thumbnails/1.jpg","file_name":"8f468b5d16fc30cbbe6043f1139c3f9c5e94.pdf","download_url":"https://www.academia.edu/attachments/71516703/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Conflict_Human_Displacement_and_Integrat.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/71516703/8f468b5d16fc30cbbe6043f1139c3f9c5e94-libre.pdf?1635326435=\u0026response-content-disposition=attachment%3B+filename%3DConflict_Human_Displacement_and_Integrat.pdf\u0026Expires=1733027487\u0026Signature=QT06SuCgxbmshn6KT2y2nb0x9mWSKcHZOz4fEb7Ok6bVEHiAAzIznVTlNLPvZVSs~RRwzFuxcBw6cLwA16xCTR6UCkkfJFRcVcAlIeGwY6rz5SDXauqyjRS6cswm-VYOi9duWae3ba5X9Mbz6vvH-Vx7wkoKkZWZ2s5xqGTyQ7QsoVE5Es1niYDwy4fIUYXpNBhf9PtiM7tKdYEIjvNO7I79tOke5avHMtO-YYOub8rUmRrdIb5k9l29P3-pTGxUXBeL5HcCEKYk6mrBPxiX2iE-LBljJjYTUYTR3~mTUfk-l~MtMLH-FhpCcGd8KF76a5BzYupSnmdD75an60frqA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Conflict_Human_Displacement_and_Integration","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":71516703,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/71516703/thumbnails/1.jpg","file_name":"8f468b5d16fc30cbbe6043f1139c3f9c5e94.pdf","download_url":"https://www.academia.edu/attachments/71516703/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Conflict_Human_Displacement_and_Integrat.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/71516703/8f468b5d16fc30cbbe6043f1139c3f9c5e94-libre.pdf?1635326435=\u0026response-content-disposition=attachment%3B+filename%3DConflict_Human_Displacement_and_Integrat.pdf\u0026Expires=1733027487\u0026Signature=QT06SuCgxbmshn6KT2y2nb0x9mWSKcHZOz4fEb7Ok6bVEHiAAzIznVTlNLPvZVSs~RRwzFuxcBw6cLwA16xCTR6UCkkfJFRcVcAlIeGwY6rz5SDXauqyjRS6cswm-VYOi9duWae3ba5X9Mbz6vvH-Vx7wkoKkZWZ2s5xqGTyQ7QsoVE5Es1niYDwy4fIUYXpNBhf9PtiM7tKdYEIjvNO7I79tOke5avHMtO-YYOub8rUmRrdIb5k9l29P3-pTGxUXBeL5HcCEKYk6mrBPxiX2iE-LBljJjYTUYTR3~mTUfk-l~MtMLH-FhpCcGd8KF76a5BzYupSnmdD75an60frqA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":619004,"name":"Religious and Cross-Cultural Studies","url":"https://www.academia.edu/Documents/in/Religious_and_Cross-Cultural_Studies"}],"urls":[{"id":12335226,"url":"https://www.igi-global.com/viewtitle.aspx?TitleId=235066"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="46018648"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/46018648/Refugee_Perspectives_on_Integration_in_Germany"><img alt="Research paper thumbnail of Refugee Perspectives on Integration in Germany" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/46018648/Refugee_Perspectives_on_Integration_in_Germany">Refugee Perspectives on Integration in Germany</a></div><div class="wp-workCard_item"><span>American Journal of Qualitative Research</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="46018648"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="46018648"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 46018648; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=46018648]").text(description); $(".js-view-count[data-work-id=46018648]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 46018648; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='46018648']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 46018648, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=46018648]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":46018648,"title":"Refugee Perspectives on Integration in Germany","translated_title":"","metadata":{"publisher":"Modestum Limited","publication_name":"American Journal of Qualitative Research"},"translated_abstract":null,"internal_url":"https://www.academia.edu/46018648/Refugee_Perspectives_on_Integration_in_Germany","translated_internal_url":"","created_at":"2021-04-08T08:23:56.634-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Refugee_Perspectives_on_Integration_in_Germany","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[],"urls":[{"id":9426171,"url":"https://www.ajqr.org/download/refugee-perspectives-on-integration-in-germany-6433.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="45068106"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/45068106/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine"><img alt="Research paper thumbnail of Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine" class="work-thumbnail" src="https://attachments.academia-assets.com/65624067/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/45068106/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine">Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://rwu.academia.edu/MehmetAlperS%C3%96ZER">Mehmet Alper SÖZER</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/CyprianKozera">Cyprian Kozera</a>, <a class="" data-click-track="profile-work-strip-authors" href="https://kentstate.academia.edu/CuneytGurer">Cuneyt Gurer</a>, and <a class="" data-click-track="profile-work-strip-authors" href="https://independent.academia.edu/BlazejPoplawski">Blazej Poplawski</a></span></div><div class="wp-workCard_item"><span>Security and Defense Quarterly</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The objective of the study is to carry out a meaningful comparison that demonstrates the similari...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject , governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently , the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict&#39;s outcome.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="39e83d2c5634f80defeeac4bea9b6f78" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:65624067,&quot;asset_id&quot;:45068106,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/65624067/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="45068106"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="45068106"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 45068106; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=45068106]").text(description); $(".js-view-count[data-work-id=45068106]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 45068106; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='45068106']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 45068106, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "39e83d2c5634f80defeeac4bea9b6f78" } } $('.js-work-strip[data-work-id=45068106]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":45068106,"title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine","translated_title":"","metadata":{"doi":"10.35467/sdq/131787","abstract":"The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject , governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently , the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict's outcome.","ai_title_tag":"Proxy Warfare: Insights from Global Conflict Case Studies","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Security and Defense Quarterly"},"translated_abstract":"The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject , governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently , the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict's outcome.","internal_url":"https://www.academia.edu/45068106/Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine","translated_internal_url":"","created_at":"2021-02-06T13:36:31.463-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":39497328,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":36238577,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":56324293,"co_author_invite_id":null,"email":"k***n@gmail.com","display_order":1,"name":"Cyprian Kozera","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"},{"id":36238578,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":4622523,"co_author_invite_id":null,"email":"c***r@gmail.com","affiliation":"Kent State University","display_order":2,"name":"Cuneyt Gurer","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"},{"id":36238579,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":null,"co_author_invite_id":7189580,"email":"p***p@gmail.com","display_order":3,"name":"Błażej Popławski","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"},{"id":36238580,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":null,"co_author_invite_id":6891256,"email":"p***t@law.mil.pl","display_order":5,"name":"Paweł Bernat","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"},{"id":36238581,"work_id":45068106,"tagging_user_id":39497328,"tagged_user_id":6009796,"co_author_invite_id":7169676,"email":"b***i@gmail.com","display_order":6,"name":"Blazej Poplawski","title":"Game of Proxies -Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine"}],"downloadable_attachments":[{"id":65624067,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/65624067/thumbnails/1.jpg","file_name":"Game_of_Proxies_Yayimlanmis_Hali.pdf","download_url":"https://www.academia.edu/attachments/65624067/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Game_of_Proxies_Towards_a_new_model_of_w.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/65624067/Game_of_Proxies_Yayimlanmis_Hali-libre.pdf?1612654729=\u0026response-content-disposition=attachment%3B+filename%3DGame_of_Proxies_Towards_a_new_model_of_w.pdf\u0026Expires=1733027487\u0026Signature=ad7Bl2mh7Kz5jtS~65UnJSav~LkKXoukny7k7v72uBZATwK6vH6jf4d2H1YclMBcTOW2QrAyc5KyuMfkJjUfEpGsG9XpXyjQ0nSDAD4xiKFm6YgU-6ar-JueftQ0hNwvc8Sej-Te89dvP3jMTvYFFDz3nofVePo47M5TbcIx1MSlIC0wl0~zRuOV3zuym2tODRDFAdg7-AMB2~W1Ir70mJ~CmAh-U-L3cGbOoXtjedqiBctgzYJG~pB9dv8fb4CX8lhdga3i5iNPAC1~OeKniGsJ-EI3xj2vJKkO2W8v7550bbqCF3zLwRxyDZsz~YUE9bJYvzyy07sVYgY6eLOQBA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Game_of_Proxies_Towards_a_new_model_of_warfare_Experiences_from_the_CAR_Libya_Mali_Syria_and_Ukraine","translated_slug":"","page_count":21,"language":"en","content_type":"Work","owner":{"id":39497328,"first_name":"Mehmet Alper","middle_initials":null,"last_name":"SÖZER","page_name":"MehmetAlperSÖZER","domain_name":"rwu","created_at":"2015-11-30T14:45:43.486-08:00","display_name":"Mehmet Alper SÖZER","url":"https://rwu.academia.edu/MehmetAlperS%C3%96ZER"},"attachments":[{"id":65624067,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/65624067/thumbnails/1.jpg","file_name":"Game_of_Proxies_Yayimlanmis_Hali.pdf","download_url":"https://www.academia.edu/attachments/65624067/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4Nyw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Game_of_Proxies_Towards_a_new_model_of_w.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/65624067/Game_of_Proxies_Yayimlanmis_Hali-libre.pdf?1612654729=\u0026response-content-disposition=attachment%3B+filename%3DGame_of_Proxies_Towards_a_new_model_of_w.pdf\u0026Expires=1733027487\u0026Signature=ad7Bl2mh7Kz5jtS~65UnJSav~LkKXoukny7k7v72uBZATwK6vH6jf4d2H1YclMBcTOW2QrAyc5KyuMfkJjUfEpGsG9XpXyjQ0nSDAD4xiKFm6YgU-6ar-JueftQ0hNwvc8Sej-Te89dvP3jMTvYFFDz3nofVePo47M5TbcIx1MSlIC0wl0~zRuOV3zuym2tODRDFAdg7-AMB2~W1Ir70mJ~CmAh-U-L3cGbOoXtjedqiBctgzYJG~pB9dv8fb4CX8lhdga3i5iNPAC1~OeKniGsJ-EI3xj2vJKkO2W8v7550bbqCF3zLwRxyDZsz~YUE9bJYvzyy07sVYgY6eLOQBA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies"},{"id":20520,"name":"Peace \u0026 Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies-3"},{"id":359314,"name":"Proxy Wars","url":"https://www.academia.edu/Documents/in/Proxy_Wars"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="44361420"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/44361420/Eine_Partnerschaft_in_Turbulenzen_oder_eine_Allianz_zum_gegenseitigen_Nutzen"><img alt="Research paper thumbnail of Eine Partnerschaft in Turbulenzen oder eine Allianz zum gegenseitigen Nutzen?" class="work-thumbnail" src="https://attachments.academia-assets.com/64757426/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/44361420/Eine_Partnerschaft_in_Turbulenzen_oder_eine_Allianz_zum_gegenseitigen_Nutzen">Eine Partnerschaft in Turbulenzen oder eine Allianz zum gegenseitigen Nutzen?</a></div><div class="wp-workCard_item wp-workCard--coauthors"><span>by </span><span><a class="" data-click-track="profile-work-strip-authors" href="https://rwu.academia.edu/MehmetAlperS%C3%96ZER">Mehmet Alper SÖZER</a> and <a class="" data-click-track="profile-work-strip-authors" href="https://kentstate.academia.edu/CuneytGurer">Cuneyt Gurer</a></span></div><div class="wp-workCard_item"><span>Friedens Forum</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Die Beziehungen zwischen der NATO und der Türkei können auf eine fast 70-jährige Geschichte zurüc...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Die Beziehungen zwischen der NATO und der Türkei können auf eine fast 70-jährige Geschichte zurückblicken. Diese ist nicht immer reibungslos und harmonisch verlaufen, vielmehr kann dieses Bündnis als die meiste Zeit bestenfalls problematisch beschrieben werden. Das bedeutet nicht unbedingt, dass beide Seiten nicht gegenseitig voneinander profitiert haben. Historisch am offensichtlichsten ist, dass die Türkei Schutz vor<br />sowjetischer Aggression, beträchtliche militärische Unterstützung sowie wirtschaftliche Erleichterungen innerhalb des Marshallplans und Zugang türkischer Arbeiter*innen nach Westeuropa und insbesondere in Deutschland erhielt. Außerdem bedeutete die Mitgliedschaft der neugeborenen Republik im Bündnis, zumindest symbolisch, dass die Richtung des Landes in Richtung Westen ging. Im Gegenzug entsandte die NATO Truppen, errichtete Militärstützpunkte und Plattformen zur Sammlung nachrichtendienstlicher Erkenntnisse, kontrollierte den sowjetischen Zugang zum Mittelmeer, moderierte und managte die<br />lang anhaltenden Streitigkeiten in der Ägäis zwischen Griechenland und der Türkei.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c1d582c52d0ba3f909673dfb6393ec46" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:64757426,&quot;asset_id&quot;:44361420,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/64757426/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="44361420"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="44361420"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44361420; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44361420]").text(description); $(".js-view-count[data-work-id=44361420]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44361420; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='44361420']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 44361420, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c1d582c52d0ba3f909673dfb6393ec46" } } $('.js-work-strip[data-work-id=44361420]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":44361420,"title":"Eine Partnerschaft in Turbulenzen oder eine Allianz zum gegenseitigen Nutzen?","translated_title":"","metadata":{"abstract":"Die Beziehungen zwischen der NATO und der Türkei können auf eine fast 70-jährige Geschichte zurückblicken. Diese ist nicht immer reibungslos und harmonisch verlaufen, vielmehr kann dieses Bündnis als die meiste Zeit bestenfalls problematisch beschrieben werden. Das bedeutet nicht unbedingt, dass beide Seiten nicht gegenseitig voneinander profitiert haben. Historisch am offensichtlichsten ist, dass die Türkei Schutz vor\nsowjetischer Aggression, beträchtliche militärische Unterstützung sowie wirtschaftliche Erleichterungen innerhalb des Marshallplans und Zugang türkischer Arbeiter*innen nach Westeuropa und insbesondere in Deutschland erhielt. Außerdem bedeutete die Mitgliedschaft der neugeborenen Republik im Bündnis, zumindest symbolisch, dass die Richtung des Landes in Richtung Westen ging. Im Gegenzug entsandte die NATO Truppen, errichtete Militärstützpunkte und Plattformen zur Sammlung nachrichtendienstlicher Erkenntnisse, kontrollierte den sowjetischen Zugang zum Mittelmeer, moderierte und managte die\nlang anhaltenden Streitigkeiten in der Ägäis zwischen Griechenland und der Türkei.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Friedens Forum"},"translated_abstract":"Die Beziehungen zwischen der NATO und der Türkei können auf eine fast 70-jährige Geschichte zurückblicken. Diese ist nicht immer reibungslos und harmonisch verlaufen, vielmehr kann dieses Bündnis als die meiste Zeit bestenfalls problematisch beschrieben werden. Das bedeutet nicht unbedingt, dass beide Seiten nicht gegenseitig voneinander profitiert haben. Historisch am offensichtlichsten ist, dass die Türkei Schutz vor\nsowjetischer Aggression, beträchtliche militärische Unterstützung sowie wirtschaftliche Erleichterungen innerhalb des Marshallplans und Zugang türkischer Arbeiter*innen nach Westeuropa und insbesondere in Deutschland erhielt. Außerdem bedeutete die Mitgliedschaft der neugeborenen Republik im Bündnis, zumindest symbolisch, dass die Richtung des Landes in Richtung Westen ging. Im Gegenzug entsandte die NATO Truppen, errichtete Militärstützpunkte und Plattformen zur Sammlung nachrichtendienstlicher Erkenntnisse, kontrollierte den sowjetischen Zugang zum Mittelmeer, moderierte und managte die\nlang anhaltenden Streitigkeiten in der Ägäis zwischen Griechenland und der Türkei.","internal_url":"https://www.academia.edu/44361420/Eine_Partnerschaft_in_Turbulenzen_oder_eine_Allianz_zum_gegenseitigen_Nutzen","translated_internal_url":"","created_at":"2020-10-24T03:35:05.476-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":39497328,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":35869353,"work_id":44361420,"tagging_user_id":39497328,"tagged_user_id":4622523,"co_author_invite_id":null,"email":"c***r@gmail.com","affiliation":"Kent State University","display_order":1,"name":"Cuneyt Gurer","title":"Eine Partnerschaft in Turbulenzen oder eine Allianz zum gegenseitigen Nutzen?"}],"downloadable_attachments":[{"id":64757426,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/64757426/thumbnails/1.jpg","file_name":"fforum6_2019_web_sayfalar_1_2_41_42.pdf","download_url":"https://www.academia.edu/attachments/64757426/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Eine_Partnerschaft_in_Turbulenzen_oder_e.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/64757426/fforum6_2019_web_sayfalar_1_2_41_42-libre.pdf?1603545657=\u0026response-content-disposition=attachment%3B+filename%3DEine_Partnerschaft_in_Turbulenzen_oder_e.pdf\u0026Expires=1733027488\u0026Signature=XEwrrQWy7Vgym3sjmkTRjWpYuGFi5lsqeFivQ3UozN3KeDbJKD-saQZYd0ilqMPeSxcIWgRhp7MWFcCEbtFardUzHtF1OD-yeC~uvznWNmTG1lIvyNvxJ6cNJA0qeI0l3gZb1Mx-8gq3XlcL~TXSO9fn~ZwA9qt-OUymermubXiPpMd2FJKh0XjQBFC3kMwn1joXeCrFdyUYmlOsFw5-QzmeRyz5aDuQtk5Aj6BZFVxjp-CEpaHW0fvy8R3VFTRiEcd~g9iUCoX7LC-~FydP4Qk4rMhA6bSPMwdotMqnwD6AzIs9TXtBEWd-E9unqjHBwzMw5x-XsdjXt29iBPUktQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Eine_Partnerschaft_in_Turbulenzen_oder_eine_Allianz_zum_gegenseitigen_Nutzen","translated_slug":"","page_count":4,"language":"de","content_type":"Work","owner":{"id":39497328,"first_name":"Mehmet Alper","middle_initials":null,"last_name":"SÖZER","page_name":"MehmetAlperSÖZER","domain_name":"rwu","created_at":"2015-11-30T14:45:43.486-08:00","display_name":"Mehmet Alper SÖZER","url":"https://rwu.academia.edu/MehmetAlperS%C3%96ZER"},"attachments":[{"id":64757426,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/64757426/thumbnails/1.jpg","file_name":"fforum6_2019_web_sayfalar_1_2_41_42.pdf","download_url":"https://www.academia.edu/attachments/64757426/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Eine_Partnerschaft_in_Turbulenzen_oder_e.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/64757426/fforum6_2019_web_sayfalar_1_2_41_42-libre.pdf?1603545657=\u0026response-content-disposition=attachment%3B+filename%3DEine_Partnerschaft_in_Turbulenzen_oder_e.pdf\u0026Expires=1733027488\u0026Signature=XEwrrQWy7Vgym3sjmkTRjWpYuGFi5lsqeFivQ3UozN3KeDbJKD-saQZYd0ilqMPeSxcIWgRhp7MWFcCEbtFardUzHtF1OD-yeC~uvznWNmTG1lIvyNvxJ6cNJA0qeI0l3gZb1Mx-8gq3XlcL~TXSO9fn~ZwA9qt-OUymermubXiPpMd2FJKh0XjQBFC3kMwn1joXeCrFdyUYmlOsFw5-QzmeRyz5aDuQtk5Aj6BZFVxjp-CEpaHW0fvy8R3VFTRiEcd~g9iUCoX7LC-~FydP4Qk4rMhA6bSPMwdotMqnwD6AzIs9TXtBEWd-E9unqjHBwzMw5x-XsdjXt29iBPUktQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":228414,"name":"International Organization","url":"https://www.academia.edu/Documents/in/International_Organization"},{"id":458790,"name":"International Security and Strategic affairs","url":"https://www.academia.edu/Documents/in/International_Security_and_Strategic_affairs"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="38556203"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/38556203/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance"><img alt="Research paper thumbnail of How Turkey&#39;s Initial Response to the Syria Conflict Weakened Security Governance" class="work-thumbnail" src="https://attachments.academia-assets.com/58628193/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/38556203/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance">How Turkey&#39;s Initial Response to the Syria Conflict Weakened Security Governance</a></div><div class="wp-workCard_item"><span>POLICY BRIEFING</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis fo...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="f61e1de105991081b13ad3924ad21b20" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:58628193,&quot;asset_id&quot;:38556203,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/58628193/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="38556203"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="38556203"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38556203; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38556203]").text(description); $(".js-view-count[data-work-id=38556203]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38556203; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='38556203']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 38556203, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "f61e1de105991081b13ad3924ad21b20" } } $('.js-work-strip[data-work-id=38556203]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":38556203,"title":"How Turkey's Initial Response to the Syria Conflict Weakened Security Governance","translated_title":"","metadata":{"doi":"10.13140/RG.2.2.36765.97760","abstract":"Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"POLICY BRIEFING"},"translated_abstract":"Turkey’s foreign and regional security policies have been deeply affected by the Syrian crisis for at least the past seven years. Different dimensions of the crisis and the spillover effects in Turkey (refugees, terrorist attacks, foreign terrorist fighters, etc.) have raised questions and concerns about the country’s approach to regional security. For years, Turkey’s Syria policy has been dominated by the idea of playing an active role in Middle East politics.","internal_url":"https://www.academia.edu/38556203/How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance","translated_internal_url":"","created_at":"2019-03-15T03:03:00.489-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":58628193,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58628193/thumbnails/1.jpg","file_name":"Turkey-Security-Governance.pdf","download_url":"https://www.academia.edu/attachments/58628193/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"How_Turkeys_Initial_Response_to_the_Syri.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58628193/Turkey-Security-Governance-libre.pdf?1552652341=\u0026response-content-disposition=attachment%3B+filename%3DHow_Turkeys_Initial_Response_to_the_Syri.pdf\u0026Expires=1733027488\u0026Signature=KsRrvx~wB9V5bxd3c~XLkKBLwf6MCpEnz6G2KEeGkqyHWqpBnsJNtrX1RQ7YhAv0uBi2dlMWCSUvDQDDdy1GztHfh1bcqPzQTtcGV8lLkQe5Roik312FHV93bnPXIH4xb1NGY~40~hypcRssx-jhgsG-fWQqePFuetG1JUY7x9-Mvsz~40bIiaqQ2TK~6YEpSvKLRdHiIy7dO-xw85pkH5bmJX7NLOcz6s3PCvUmgqfK3oM6KPoZUHLZvlPDGLmI4YeDvwT6RPpm-wgZVJOEn5txDZEVI4UqWnBruTjXKht7PTrHnMicyQ7~2IRjVnE7NlNVyo9UwAKKCxb~Hc3nLw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"How_Turkeys_Initial_Response_to_the_Syria_Conflict_Weakened_Security_Governance","translated_slug":"","page_count":6,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":58628193,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/58628193/thumbnails/1.jpg","file_name":"Turkey-Security-Governance.pdf","download_url":"https://www.academia.edu/attachments/58628193/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"How_Turkeys_Initial_Response_to_the_Syri.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/58628193/Turkey-Security-Governance-libre.pdf?1552652341=\u0026response-content-disposition=attachment%3B+filename%3DHow_Turkeys_Initial_Response_to_the_Syri.pdf\u0026Expires=1733027488\u0026Signature=KsRrvx~wB9V5bxd3c~XLkKBLwf6MCpEnz6G2KEeGkqyHWqpBnsJNtrX1RQ7YhAv0uBi2dlMWCSUvDQDDdy1GztHfh1bcqPzQTtcGV8lLkQe5Roik312FHV93bnPXIH4xb1NGY~40~hypcRssx-jhgsG-fWQqePFuetG1JUY7x9-Mvsz~40bIiaqQ2TK~6YEpSvKLRdHiIy7dO-xw85pkH5bmJX7NLOcz6s3PCvUmgqfK3oM6KPoZUHLZvlPDGLmI4YeDvwT6RPpm-wgZVJOEn5txDZEVI4UqWnBruTjXKht7PTrHnMicyQ7~2IRjVnE7NlNVyo9UwAKKCxb~Hc3nLw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies"},{"id":10966,"name":"Turkey","url":"https://www.academia.edu/Documents/in/Turkey"},{"id":15391,"name":"Syria","url":"https://www.academia.edu/Documents/in/Syria"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="35132166"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/35132166/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism"><img alt="Research paper thumbnail of Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism" class="work-thumbnail" src="https://attachments.academia-assets.com/54993435/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/35132166/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism">Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Understanding the nature and the extent of the future threat from ISIS has been a key question fo...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Understanding the nature and the extent of the future threat from ISIS has been a key question for scholars, policy makers and security professionals since ISIS started losing significant grounds in Syria and Iraq. This article analyses ISIS terrorism and its possible spillover effects from a regional security perspective by presenting a strategic model to develop options for the policy makers. A strategic understanding, supported by a model that has been designed to capture all possible variables and their interaction which each other, is necessary to understand the future direction of the threat. Many scholars agree that the threat is not only about the organizational structure of ISIS but also its ideological aspect, therefore the model presented here connects the facts and the ideology with variables at three different levels: regional political level; ISIS and its organizational structure; and individual level variables. The model was designed to capture changes with relevant data thus providing a strategic data-driven understanding of the threat. Regional political developments and how ISIS reacts to those developments are the main concerns at the first two levels of analysis. Foreign fighters and other sympathizers are the most important subjects of the study at the individual level with the assumption that the future threat will diffuse through foreign fighters and self-radicalized lone actors.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="90e3b10861cbfd0bd2587ad7716cb8ee" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:54993435,&quot;asset_id&quot;:35132166,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/54993435/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="35132166"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="35132166"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35132166; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35132166]").text(description); $(".js-view-count[data-work-id=35132166]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35132166; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='35132166']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 35132166, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "90e3b10861cbfd0bd2587ad7716cb8ee" } } $('.js-work-strip[data-work-id=35132166]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":35132166,"title":"Presenting a Strategic Model to Understand Spillover Effects of ISIS Terrorism","translated_title":"","metadata":{"abstract":"Understanding the nature and the extent of the future threat from ISIS has been a key question for scholars, policy makers and security professionals since ISIS started losing significant grounds in Syria and Iraq. This article analyses ISIS terrorism and its possible spillover effects from a regional security perspective by presenting a strategic model to develop options for the policy makers. A strategic understanding, supported by a model that has been designed to capture all possible variables and their interaction which each other, is necessary to understand the future direction of the threat. Many scholars agree that the threat is not only about the organizational structure of ISIS but also its ideological aspect, therefore the model presented here connects the facts and the ideology with variables at three different levels: regional political level; ISIS and its organizational structure; and individual level variables. The model was designed to capture changes with relevant data thus providing a strategic data-driven understanding of the threat. Regional political developments and how ISIS reacts to those developments are the main concerns at the first two levels of analysis. Foreign fighters and other sympathizers are the most important subjects of the study at the individual level with the assumption that the future threat will diffuse through foreign fighters and self-radicalized lone actors."},"translated_abstract":"Understanding the nature and the extent of the future threat from ISIS has been a key question for scholars, policy makers and security professionals since ISIS started losing significant grounds in Syria and Iraq. This article analyses ISIS terrorism and its possible spillover effects from a regional security perspective by presenting a strategic model to develop options for the policy makers. A strategic understanding, supported by a model that has been designed to capture all possible variables and their interaction which each other, is necessary to understand the future direction of the threat. Many scholars agree that the threat is not only about the organizational structure of ISIS but also its ideological aspect, therefore the model presented here connects the facts and the ideology with variables at three different levels: regional political level; ISIS and its organizational structure; and individual level variables. The model was designed to capture changes with relevant data thus providing a strategic data-driven understanding of the threat. Regional political developments and how ISIS reacts to those developments are the main concerns at the first two levels of analysis. Foreign fighters and other sympathizers are the most important subjects of the study at the individual level with the assumption that the future threat will diffuse through foreign fighters and self-radicalized lone actors.","internal_url":"https://www.academia.edu/35132166/Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism","translated_internal_url":"","created_at":"2017-11-13T04:00:25.682-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":54993435,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/54993435/thumbnails/1.jpg","file_name":"16.2.03_gurer.pdf","download_url":"https://www.academia.edu/attachments/54993435/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Presenting_a_Strategic_Model_to_Understa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/54993435/16.2.03_gurer-libre.pdf?1510579306=\u0026response-content-disposition=attachment%3B+filename%3DPresenting_a_Strategic_Model_to_Understa.pdf\u0026Expires=1733027488\u0026Signature=cdcI3tHIZ1u1fXyvueZ9Kn6vVtT9HCKgjArzSpCoMAG16~nPKNd5JiiV2lV5f7-Rf6iLm9hyIvYEpmC3dDqE6dsruWOenYFu9UZ4a9NqKTQi6APPCZOqpYXSo7IkqTAZZDvQ39nHekVnJfI0y3sP6HBwQS9AtW2-wGNZFcJvoZWYgtfMjLcIYIbQAFzlQuCOYBWqJmKmghAaYTxriOSl-RgCWLtVKVMUqObcoBcyyO~Sex~IeF8vnnRJhVfSJUZTCp-SVS33N8NSi3BKg9fS3pt39Uu-ERZJ9nkDuRIHzZGohaGSxkukMcQVvLw7u1HnHqFabx3Bpl35AsFB0YjR3g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Presenting_a_Strategic_Model_to_Understand_Spillover_Effects_of_ISIS_Terrorism","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[{"id":54993435,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/54993435/thumbnails/1.jpg","file_name":"16.2.03_gurer.pdf","download_url":"https://www.academia.edu/attachments/54993435/download_file?st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&st=MTczMzAyMzg4OCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Presenting_a_Strategic_Model_to_Understa.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/54993435/16.2.03_gurer-libre.pdf?1510579306=\u0026response-content-disposition=attachment%3B+filename%3DPresenting_a_Strategic_Model_to_Understa.pdf\u0026Expires=1733027488\u0026Signature=cdcI3tHIZ1u1fXyvueZ9Kn6vVtT9HCKgjArzSpCoMAG16~nPKNd5JiiV2lV5f7-Rf6iLm9hyIvYEpmC3dDqE6dsruWOenYFu9UZ4a9NqKTQi6APPCZOqpYXSo7IkqTAZZDvQ39nHekVnJfI0y3sP6HBwQS9AtW2-wGNZFcJvoZWYgtfMjLcIYIbQAFzlQuCOYBWqJmKmghAaYTxriOSl-RgCWLtVKVMUqObcoBcyyO~Sex~IeF8vnnRJhVfSJUZTCp-SVS33N8NSi3BKg9fS3pt39Uu-ERZJ9nkDuRIHzZGohaGSxkukMcQVvLw7u1HnHqFabx3Bpl35AsFB0YjR3g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism"},{"id":58349,"name":"Regional Security","url":"https://www.academia.edu/Documents/in/Regional_Security"},{"id":185157,"name":"Isis","url":"https://www.academia.edu/Documents/in/Isis"},{"id":316672,"name":"Foreign Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Fighters"},{"id":1243561,"name":"Spillover Effect","url":"https://www.academia.edu/Documents/in/Spillover_Effect"},{"id":2318124,"name":"Foreign Terrorist Fighters","url":"https://www.academia.edu/Documents/in/Foreign_Terrorist_Fighters"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="28348197"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/28348197/The_effects_of_crime_analysis_use_on_crime_and_clearance_rates_an_analyisis_sic_of_national_crime_and_administrative_data_"><img alt="Research paper thumbnail of The effects of crime analysis use on crime and clearance rates : an analyisis [sic] of national crime and administrative data /" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/28348197/The_effects_of_crime_analysis_use_on_crime_and_clearance_rates_an_analyisis_sic_of_national_crime_and_administrative_data_">The effects of crime analysis use on crime and clearance rates : an analyisis [sic] of national crime and administrative data /</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Thesis (M.A.)--Kent State University, 2002. Includes bibliographical references (leaves 91-95).</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="28348197"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="28348197"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 28348197; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=28348197]").text(description); $(".js-view-count[data-work-id=28348197]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 28348197; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='28348197']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 28348197, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=28348197]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":28348197,"title":"The effects of crime analysis use on crime and clearance rates : an analyisis [sic] of national crime and administrative data /","translated_title":"","metadata":{"abstract":"Thesis (M.A.)--Kent State University, 2002. Includes bibliographical references (leaves 91-95)."},"translated_abstract":"Thesis (M.A.)--Kent State University, 2002. Includes bibliographical references (leaves 91-95).","internal_url":"https://www.academia.edu/28348197/The_effects_of_crime_analysis_use_on_crime_and_clearance_rates_an_analyisis_sic_of_national_crime_and_administrative_data_","translated_internal_url":"","created_at":"2016-09-08T12:39:03.381-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":4622523,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"The_effects_of_crime_analysis_use_on_crime_and_clearance_rates_an_analyisis_sic_of_national_crime_and_administrative_data_","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":4622523,"first_name":"Cuneyt","middle_initials":null,"last_name":"Gurer","page_name":"CuneytGurer","domain_name":"kentstate","created_at":"2013-06-22T06:22:24.279-07:00","display_name":"Cuneyt Gurer","url":"https://kentstate.academia.edu/CuneytGurer"},"attachments":[],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "a3bbce8b546c3f523833927e98b91167f899053ce1df682d13095cb2382eabcd", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="FdzIsVK+MGc9NcIcXG5r9PxjHryDUNMIdnuhd2FZeOVW8et+TrRAZovUOgWRqAb3kdPt9poF56uyu8ad8s4LWg==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://kentstate.academia.edu/CuneytGurer" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="tSlWnFSYsWjA049D+86OwzIZQIJoDiAdtb9hPG3x2Dv2BHVTSJLBaXYyd1o2COPAX6mzyHFbFL5xfwbW/marhA==" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10