CINXE.COM
Security Studies Research Papers - Academia.edu
<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Security Studies Research Papers - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "by_tag", 'action': "show_one", 'controller_action': 'by_tag#show_one', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="tuitc430IFuImUHCdJqcG62W2Vc5O2o5O2AEANsuwqjAVKTm38iydwgQR1ILkOe4V+Wt4qJlkTfVVDlnYYBG8A==" /> <link href="/Documents/in/Security_Studies?after=50%2C72071351" rel="next" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&family=Gupter:wght@400;500;700&family=IBM+Plex+Mono:wght@300;400&family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="description" content="View Security Studies Research Papers on Academia.edu for free." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'by_tag'; var $action_name = "show_one"; var $rails_env = 'production'; var $app_rev = '93b7474171e6a4b1bbf2c2315cd7570fbc58ca00'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15265,"monthly_visitors":"113 million","monthly_visitor_count":113657801,"monthly_visitor_count_in_millions":113,"user_count":277975978,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1733267921000); window.Aedu.timeDifference = new Date().getTime() - 1733267921000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-bdb9e8c097f01e611f2fc5e2f1a9dc599beede975e2ae5629983543a1726e947.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-bad3fa1257b860f4633ff1db966aa3ae7dfe1980708675f3e2488742c1a0d941.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-1c1498a5b24f10d2247f356d96ae785336598a8a91e69dfad306a1225e0ddaa3.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://www.academia.edu/Documents/in/Security_Studies" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-by_tag a-show_one logged_out u-bgColorWhite'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-by_tag a-show_one logged_out u-bgColorWhite'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&c2=26766707&cv=2.0&cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to <a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav no-sm no-md"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more <span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i> We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i> Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less <span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <div class="DesignSystem" style="margin-top:-40px"><div class="PageHeader"><div class="container"><div class="row"><style type="text/css">.sor-abstract { display: -webkit-box; overflow: hidden; text-overflow: ellipsis; -webkit-line-clamp: 3; -webkit-box-orient: vertical; }</style><div class="col-xs-12 clearfix"><div class="u-floatLeft"><h1 class="PageHeader-title u-m0x u-fs30">Security Studies</h1><div class="u-tcGrayDark">131,370 Followers</div><div class="u-tcGrayDark u-mt2x">Recent papers in <b>Security Studies</b></div></div></div></div></div></div><div class="TabbedNavigation"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><ul class="nav u-m0x u-p0x list-inline u-displayFlex"><li class="active"><a href="https://www.academia.edu/Documents/in/Security_Studies">Top Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Security_Studies/MostCited">Most Cited Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Security_Studies/MostDownloaded">Most Downloaded Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Security_Studies/MostRecent">Newest Papers</a></li><li><a class="" href="https://www.academia.edu/People/Security_Studies">People</a></li></ul></div><style type="text/css">ul.nav{flex-direction:row}@media(max-width: 567px){ul.nav{flex-direction:column}.TabbedNavigation li{max-width:100%}.TabbedNavigation li.active{background-color:var(--background-grey, #dddde2)}.TabbedNavigation li.active:before,.TabbedNavigation li.active:after{display:none}}</style></div></div></div><div class="container"><div class="row"><div class="col-xs-12"><div class="u-displayFlex"><div class="u-flexGrow1"><div class="works"><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_42154436" data-work_id="42154436" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/42154436/Securing_Judgement_Rethinking_Security_and_Online_Information_Threats">Securing Judgement: Rethinking Security and Online Information Threats</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The contemporary debate in democracies routinely describes online information threats such as misinformation, disinformation and deception as security-issues in need of urgent attention. Despite this pervasive discourse, policymakers... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_42154436" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The contemporary debate in democracies routinely describes online information threats such as misinformation, disinformation and deception as security-issues in need of urgent attention. Despite this pervasive discourse, policymakers often appear incapable of articulating what security means in this context. Turning to EU policy and previous research on cybersecurity, this dissertation empirically unpacks, critically interrogates and theoretically rethinks the meaning of security in relation to online information threats. In so doing, the articles elucidate a new ‘referent object’ implicitly guiding securitization. Contemporary interventions can be seen as grounded in assumptions about the protection of human judgement. Using Hannah Arendt’s writings on ‘political judgement’ as a point of reference for critically evaluating contemporary policy, the dissertation points to several problems with existing approaches to security in a democratic context where free debate constitutes a legitimizing element of political authority. The rethinking of security departs from this problematic and shows that treating human judgement as a ‘referent object’ – if firmly grounded in the interplay between independent human communicating subjects – can better address some problematic questions about legitimate authority and political community currently haunting security interventions in cyberspace.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/42154436" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="603811cc2bfb9427191601343064e247" rel="nofollow" data-download="{"attachment_id":62294617,"asset_id":42154436,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/62294617/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3281324" href="https://siia.academia.edu/Hedvig%C3%96rd%C3%A9n">Hedvig Ördén</a><script data-card-contents-for-user="3281324" type="text/json">{"id":3281324,"first_name":"Hedvig","last_name":"Ördén","domain_name":"siia","page_name":"HedvigÖrdén","display_name":"Hedvig Ördén","profile_url":"https://siia.academia.edu/Hedvig%C3%96rd%C3%A9n?f_ri=5523","photo":"https://0.academia-photos.com/3281324/1088628/5303618/s65_hedvig._rd_n.jpg"}</script></span></span></li><li class="js-paper-rank-work_42154436 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="42154436"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 42154436, container: ".js-paper-rank-work_42154436", }); });</script></li><li class="js-percentile-work_42154436 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 42154436; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_42154436"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_42154436 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="42154436"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 42154436; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=42154436]").text(description); $(".js-view-count-work_42154436").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_42154436").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="42154436"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1696" href="https://www.academia.edu/Documents/in/Political_Theory">Political Theory</a>, <script data-card-contents-for-ri="1696" type="text/json">{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5535" href="https://www.academia.edu/Documents/in/Critical_Security_Studies">Critical Security Studies</a>, <script data-card-contents-for-ri="5535" type="text/json">{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5954" href="https://www.academia.edu/Documents/in/European_Security_and_Defence_Policy">European Security and Defence Policy</a><script data-card-contents-for-ri="5954" type="text/json">{"id":5954,"name":"European Security and Defence Policy","url":"https://www.academia.edu/Documents/in/European_Security_and_Defence_Policy?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=42154436]'), work: {"id":42154436,"title":"Securing Judgement: Rethinking Security and Online Information Threats","created_at":"2020-03-06T07:52:26.849-08:00","url":"https://www.academia.edu/42154436/Securing_Judgement_Rethinking_Security_and_Online_Information_Threats?f_ri=5523","dom_id":"work_42154436","summary":"The contemporary debate in democracies routinely describes online information threats such as misinformation, disinformation and deception as security-issues in need of urgent attention. Despite this pervasive discourse, policymakers often appear incapable of articulating what security means in this context. Turning to EU policy and previous research on cybersecurity, this dissertation empirically unpacks, critically interrogates and theoretically rethinks the meaning of security in relation to online information threats. In so doing, the articles elucidate a new ‘referent object’ implicitly guiding securitization. Contemporary interventions can be seen as grounded in assumptions about the protection of human judgement. Using Hannah Arendt’s writings on ‘political judgement’ as a point of reference for critically evaluating contemporary policy, the dissertation points to several problems with existing approaches to security in a democratic context where free debate constitutes a legitimizing element of political authority. The rethinking of security departs from this problematic and shows that treating human judgement as a ‘referent object’ – if firmly grounded in the interplay between independent human communicating subjects – can better address some problematic questions about legitimate authority and political community currently haunting security interventions in cyberspace.","downloadable_attachments":[{"id":62294617,"asset_id":42154436,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3281324,"first_name":"Hedvig","last_name":"Ördén","domain_name":"siia","page_name":"HedvigÖrdén","display_name":"Hedvig Ördén","profile_url":"https://siia.academia.edu/Hedvig%C3%96rd%C3%A9n?f_ri=5523","photo":"https://0.academia-photos.com/3281324/1088628/5303618/s65_hedvig._rd_n.jpg"}],"research_interests":[{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=5523","nofollow":false},{"id":5954,"name":"European Security and Defence Policy","url":"https://www.academia.edu/Documents/in/European_Security_and_Defence_Policy?f_ri=5523","nofollow":false},{"id":27442,"name":"Hannah Arendt","url":"https://www.academia.edu/Documents/in/Hannah_Arendt?f_ri=5523"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523"},{"id":159919,"name":"Disinformation","url":"https://www.academia.edu/Documents/in/Disinformation?f_ri=5523"},{"id":578562,"name":"Post-foundational Political Theory","url":"https://www.academia.edu/Documents/in/Post-foundational_Political_Theory?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38371767" data-work_id="38371767" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38371767/Detecting_Radicalisation_and_Mitigating_the_Insider_Threat_in_the_Workplace_Counterintelligence_Principles_and_Security_Dilemmas">Detecting Radicalisation and Mitigating the Insider Threat in the Workplace: Counterintelligence Principles and Security Dilemmas</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Security is (or should be) an immune system: it neutralises toxic and infectious organisms. Counterintelligence techniques comprise an important part of hardening that immunity. This contribution will build upon theorised patterns of lone... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_38371767" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Security is (or should be) an immune system: it neutralises toxic and infectious organisms. Counterintelligence techniques comprise an important part of hardening that immunity. This contribution will build upon theorised patterns of lone actor radicalisation to inform ways of detecting employees potentially becoming or having been radicalised through behavioural and psychological traits, and what practical use counterintelligence principles are in establishing that kind of situational awareness as well as preventing an insider from causing harm. There will also be attention to the ethical dilemmas and HR implications posed by monitoring employees for possible suspicious behaviour in this way.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38371767" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d8377ae4366ad1e97acd0e63663376a6" rel="nofollow" data-download="{"attachment_id":58484851,"asset_id":38371767,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58484851/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2360280" href="https://antwerp.academia.edu/KennethLasoen">Kenneth Lasoen</a><script data-card-contents-for-user="2360280" type="text/json">{"id":2360280,"first_name":"Kenneth","last_name":"Lasoen","domain_name":"antwerp","page_name":"KennethLasoen","display_name":"Kenneth Lasoen","profile_url":"https://antwerp.academia.edu/KennethLasoen?f_ri=5523","photo":"https://0.academia-photos.com/2360280/743936/6644638/s65_kenneth.lasoen.jpg"}</script></span></span></li><li class="js-paper-rank-work_38371767 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38371767"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38371767, container: ".js-paper-rank-work_38371767", }); });</script></li><li class="js-percentile-work_38371767 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38371767; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38371767"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38371767 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38371767"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38371767; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38371767]").text(description); $(".js-view-count-work_38371767").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38371767").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38371767"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2674" href="https://www.academia.edu/Documents/in/Intelligence">Intelligence</a>, <script data-card-contents-for-ri="2674" type="text/json">{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4370" href="https://www.academia.edu/Documents/in/Security">Security</a>, <script data-card-contents-for-ri="4370" type="text/json">{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5847" href="https://www.academia.edu/Documents/in/Political_Extremism_Radicalism_Populism">Political Extremism/Radicalism/Populism</a><script data-card-contents-for-ri="5847" type="text/json">{"id":5847,"name":"Political Extremism/Radicalism/Populism","url":"https://www.academia.edu/Documents/in/Political_Extremism_Radicalism_Populism?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38371767]'), work: {"id":38371767,"title":"Detecting Radicalisation and Mitigating the Insider Threat in the Workplace: Counterintelligence Principles and Security Dilemmas","created_at":"2019-02-17T09:05:15.192-08:00","url":"https://www.academia.edu/38371767/Detecting_Radicalisation_and_Mitigating_the_Insider_Threat_in_the_Workplace_Counterintelligence_Principles_and_Security_Dilemmas?f_ri=5523","dom_id":"work_38371767","summary":"Security is (or should be) an immune system: it neutralises toxic and infectious organisms. Counterintelligence techniques comprise an important part of hardening that immunity. This contribution will build upon theorised patterns of lone actor radicalisation to inform ways of detecting employees potentially becoming or having been radicalised through behavioural and psychological traits, and what practical use counterintelligence principles are in establishing that kind of situational awareness as well as preventing an insider from causing harm. There will also be attention to the ethical dilemmas and HR implications posed by monitoring employees for possible suspicious behaviour in this way.","downloadable_attachments":[{"id":58484851,"asset_id":38371767,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2360280,"first_name":"Kenneth","last_name":"Lasoen","domain_name":"antwerp","page_name":"KennethLasoen","display_name":"Kenneth Lasoen","profile_url":"https://antwerp.academia.edu/KennethLasoen?f_ri=5523","photo":"https://0.academia-photos.com/2360280/743936/6644638/s65_kenneth.lasoen.jpg"}],"research_interests":[{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=5523","nofollow":false},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":5847,"name":"Political Extremism/Radicalism/Populism","url":"https://www.academia.edu/Documents/in/Political_Extremism_Radicalism_Populism?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_897915" data-work_id="897915" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/897915/Political_Culture_and_Tuareg_Mobilizations_Rebels_of_Niger">Political Culture and Tuareg Mobilizations: Rebels of Niger</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/897915" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="791d2f79dd8f613730ea0926fa8b40f6" rel="nofollow" data-download="{"attachment_id":5422506,"asset_id":897915,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/5422506/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="316291" href="https://emory.academia.edu/FredericDeycard">Frederic Deycard</a><script data-card-contents-for-user="316291" type="text/json">{"id":316291,"first_name":"Frederic","last_name":"Deycard","domain_name":"emory","page_name":"FredericDeycard","display_name":"Frederic Deycard","profile_url":"https://emory.academia.edu/FredericDeycard?f_ri=5523","photo":"https://0.academia-photos.com/316291/78156/85000/s65_frederic.deycard.jpg"}</script></span></span></li><li class="js-paper-rank-work_897915 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="897915"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 897915, container: ".js-paper-rank-work_897915", }); });</script></li><li class="js-percentile-work_897915 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 897915; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_897915"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_897915 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="897915"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 897915; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=897915]").text(description); $(".js-view-count-work_897915").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_897915").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="897915"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="379" href="https://www.academia.edu/Documents/in/African_Studies">African Studies</a>, <script data-card-contents-for-ri="379" type="text/json">{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="10342" href="https://www.academia.edu/Documents/in/Political_Violence">Political Violence</a>, <script data-card-contents-for-ri="10342" type="text/json">{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13253" href="https://www.academia.edu/Documents/in/West_Africa_politics">West Africa politics</a><script data-card-contents-for-ri="13253" type="text/json">{"id":13253,"name":"West Africa politics","url":"https://www.academia.edu/Documents/in/West_Africa_politics?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=897915]'), work: {"id":897915,"title":"Political Culture and Tuareg Mobilizations: Rebels of Niger","created_at":"2011-09-08T04:16:52.139-07:00","url":"https://www.academia.edu/897915/Political_Culture_and_Tuareg_Mobilizations_Rebels_of_Niger?f_ri=5523","dom_id":"work_897915","summary":null,"downloadable_attachments":[{"id":5422506,"asset_id":897915,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":316291,"first_name":"Frederic","last_name":"Deycard","domain_name":"emory","page_name":"FredericDeycard","display_name":"Frederic Deycard","profile_url":"https://emory.academia.edu/FredericDeycard?f_ri=5523","photo":"https://0.academia-photos.com/316291/78156/85000/s65_frederic.deycard.jpg"}],"research_interests":[{"id":379,"name":"African Studies","url":"https://www.academia.edu/Documents/in/African_Studies?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=5523","nofollow":false},{"id":13253,"name":"West Africa politics","url":"https://www.academia.edu/Documents/in/West_Africa_politics?f_ri=5523","nofollow":false},{"id":14164,"name":"Tuareg Pastoral Nomads","url":"https://www.academia.edu/Documents/in/Tuareg_Pastoral_Nomads?f_ri=5523"},{"id":28981,"name":"Ethnic Conflict and Civil War","url":"https://www.academia.edu/Documents/in/Ethnic_Conflict_and_Civil_War?f_ri=5523"},{"id":36451,"name":"Niger","url":"https://www.academia.edu/Documents/in/Niger?f_ri=5523"},{"id":49038,"name":"Political Mobilisation","url":"https://www.academia.edu/Documents/in/Political_Mobilisation?f_ri=5523"},{"id":931986,"name":"Post Conflict Issues","url":"https://www.academia.edu/Documents/in/Post_Conflict_Issues?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43409523" data-work_id="43409523" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43409523/French_Foreign_Policy_in_Libya_and_Syria_2003_2017_Strategic_Adaptability_in_Quickly_Changing_Environments">French Foreign Policy in Libya and Syria (2003–2017): Strategic Adaptability in Quickly Changing Environments</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Because of its extensive Mediterranean history, France had a particular responsibility when the Arab revolutions broke out in 2011. The strategies defined by Paris in Libya and Syria, implemented through foreign policy, have proved to be... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43409523" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Because of its extensive Mediterranean history, France had a particular responsibility when the Arab revolutions broke out in 2011. The strategies defined by Paris in Libya and Syria, implemented through foreign policy, have proved to be less effective than expected. Although distinct, both were pursuing the same aim: the expansion of friendly democratic regimes in the Southern European neighborhood bloc.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43409523" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f4f8bb0de17f1025d83d051d57e55dc2" rel="nofollow" data-download="{"attachment_id":63709266,"asset_id":43409523,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63709266/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="54079301" href="https://sciences-po.academia.edu/JulienTh%C3%A9ron">Julien Théron</a><script data-card-contents-for-user="54079301" type="text/json">{"id":54079301,"first_name":"Julien","last_name":"Théron","domain_name":"sciences-po","page_name":"JulienThéron","display_name":"Julien Théron","profile_url":"https://sciences-po.academia.edu/JulienTh%C3%A9ron?f_ri=5523","photo":"https://0.academia-photos.com/54079301/14265522/15221464/s65_julien.th_ron.jpg"}</script></span></span></li><li class="js-paper-rank-work_43409523 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43409523"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43409523, container: ".js-paper-rank-work_43409523", }); });</script></li><li class="js-percentile-work_43409523 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43409523; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43409523"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43409523 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43409523"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43409523; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43409523]").text(description); $(".js-view-count-work_43409523").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43409523").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43409523"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">20</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="579" href="https://www.academia.edu/Documents/in/Strategy_Military_Science_">Strategy (Military Science)</a>, <script data-card-contents-for-ri="579" type="text/json">{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1660" href="https://www.academia.edu/Documents/in/Terrorism">Terrorism</a>, <script data-card-contents-for-ri="1660" type="text/json">{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2990" href="https://www.academia.edu/Documents/in/Geopolitics">Geopolitics</a><script data-card-contents-for-ri="2990" type="text/json">{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43409523]'), work: {"id":43409523,"title":"French Foreign Policy in Libya and Syria (2003–2017): Strategic Adaptability in Quickly Changing Environments","created_at":"2020-06-22T14:24:33.172-07:00","url":"https://www.academia.edu/43409523/French_Foreign_Policy_in_Libya_and_Syria_2003_2017_Strategic_Adaptability_in_Quickly_Changing_Environments?f_ri=5523","dom_id":"work_43409523","summary":"Because of its extensive Mediterranean history, France had a particular responsibility when the Arab revolutions broke out in 2011. The strategies defined by Paris in Libya and Syria, implemented through foreign policy, have proved to be less effective than expected. Although distinct, both were pursuing the same aim: the expansion of friendly democratic regimes in the Southern European neighborhood bloc.","downloadable_attachments":[{"id":63709266,"asset_id":43409523,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":54079301,"first_name":"Julien","last_name":"Théron","domain_name":"sciences-po","page_name":"JulienThéron","display_name":"Julien Théron","profile_url":"https://sciences-po.academia.edu/JulienTh%C3%A9ron?f_ri=5523","photo":"https://0.academia-photos.com/54079301/14265522/15221464/s65_julien.th_ron.jpg"}],"research_interests":[{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=5523","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=5523","nofollow":false},{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":15391,"name":"Syria","url":"https://www.academia.edu/Documents/in/Syria?f_ri=5523"},{"id":49153,"name":"Libya","url":"https://www.academia.edu/Documents/in/Libya?f_ri=5523"},{"id":104174,"name":"Geostrategy","url":"https://www.academia.edu/Documents/in/Geostrategy?f_ri=5523"},{"id":125423,"name":"Jihadism","url":"https://www.academia.edu/Documents/in/Jihadism?f_ri=5523"},{"id":127515,"name":"Conflict Studies","url":"https://www.academia.edu/Documents/in/Conflict_Studies?f_ri=5523"},{"id":137744,"name":"Conflict in Libya","url":"https://www.academia.edu/Documents/in/Conflict_in_Libya?f_ri=5523"},{"id":198844,"name":"Security and Peace Studies","url":"https://www.academia.edu/Documents/in/Security_and_Peace_Studies?f_ri=5523"},{"id":233192,"name":"Syrian Revolution","url":"https://www.academia.edu/Documents/in/Syrian_Revolution?f_ri=5523"},{"id":375440,"name":"French foreign policy","url":"https://www.academia.edu/Documents/in/French_foreign_policy?f_ri=5523"},{"id":575764,"name":"Syrian Conflict","url":"https://www.academia.edu/Documents/in/Syrian_Conflict?f_ri=5523"},{"id":1001904,"name":"Non State Armed Groups","url":"https://www.academia.edu/Documents/in/Non_State_Armed_Groups?f_ri=5523"},{"id":1002946,"name":"Interventionism","url":"https://www.academia.edu/Documents/in/Interventionism?f_ri=5523"},{"id":1059087,"name":"Syrian Civil War","url":"https://www.academia.edu/Documents/in/Syrian_Civil_War?f_ri=5523"},{"id":1363262,"name":"Libyan Revolution","url":"https://www.academia.edu/Documents/in/Libyan_Revolution?f_ri=5523"},{"id":1881149,"name":"Non-State Armed Groups","url":"https://www.academia.edu/Documents/in/Non-State_Armed_Groups?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_69209201" data-work_id="69209201" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/69209201/Nurturing_the_Quad_Plus_formula_Institutional_perspective_of_Japans_FOIP">Nurturing the Quad Plus formula: Institutional perspective of Japan's FOIP</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Japan’s strategic objective of the Quad Plus is not anti-China coalition-building, but to create an ad-hoc coalition-building device that serves the maintenance and enhancement of the rules-based international order in the Indo-Pacific... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_69209201" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Japan’s strategic objective of the Quad Plus is not anti-China coalition-building, but to create an ad-hoc coalition-building device that serves the maintenance and enhancement of the rules-based international order in the Indo-Pacific region. There is no open official discussion or declaration about the “Quad Plus”, and thus, there is no clear definition or fixed membership for such a framework. Rather, it functions as a flexible strategic tool to attract like-minded states and induce their functional and strategic cooperation, depending on their needs and demands of the day. As such, the Quad Plus is an informal cooperative security and non-traditional collective self-defence mechanism, which is not exclusive to any state, including China. At the same time, Japan has two target states to be included into the Quad Plus, the United Kingdom and France, because they are residential powers in the Indo-Pacific region. To this end, Japan has steadily strengthened its bilateral ties with them.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/69209201" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3c0739e2bbb58c3a5a34b88719db08c4" rel="nofollow" data-download="{"attachment_id":79391604,"asset_id":69209201,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/79391604/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="26971" href="https://nanyang.academia.edu/KeiKoga">Kei Koga</a><script data-card-contents-for-user="26971" type="text/json">{"id":26971,"first_name":"Kei","last_name":"Koga","domain_name":"nanyang","page_name":"KeiKoga","display_name":"Kei Koga","profile_url":"https://nanyang.academia.edu/KeiKoga?f_ri=5523","photo":"https://0.academia-photos.com/26971/81173/89027/s65_kei.koga.jpg"}</script></span></span></li><li class="js-paper-rank-work_69209201 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="69209201"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 69209201, container: ".js-paper-rank-work_69209201", }); });</script></li><li class="js-percentile-work_69209201 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 69209201; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_69209201"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_69209201 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="69209201"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 69209201; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=69209201]").text(description); $(".js-view-count-work_69209201").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_69209201").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="69209201"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1031" href="https://www.academia.edu/Documents/in/Southeast_Asian_Studies">Southeast Asian Studies</a>, <script data-card-contents-for-ri="1031" type="text/json">{"id":1031,"name":"Southeast Asian Studies","url":"https://www.academia.edu/Documents/in/Southeast_Asian_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3705" href="https://www.academia.edu/Documents/in/International_Security">International Security</a>, <script data-card-contents-for-ri="3705" type="text/json">{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="8223" href="https://www.academia.edu/Documents/in/East_Asian_Studies">East Asian Studies</a><script data-card-contents-for-ri="8223" type="text/json">{"id":8223,"name":"East Asian Studies","url":"https://www.academia.edu/Documents/in/East_Asian_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=69209201]'), work: {"id":69209201,"title":"Nurturing the Quad Plus formula: Institutional perspective of Japan's FOIP","created_at":"2022-01-22T18:25:52.240-08:00","url":"https://www.academia.edu/69209201/Nurturing_the_Quad_Plus_formula_Institutional_perspective_of_Japans_FOIP?f_ri=5523","dom_id":"work_69209201","summary":"Japan’s strategic objective of the Quad Plus is not anti-China coalition-building, but to create an ad-hoc coalition-building device that serves the maintenance and enhancement of the rules-based international order in the Indo-Pacific region. There is no open official discussion or declaration about the “Quad Plus”, and thus, there is no clear definition or fixed membership for such a framework. Rather, it functions as a flexible strategic tool to attract like-minded states and induce their functional and strategic cooperation, depending on their needs and demands of the day. As such, the Quad Plus is an informal cooperative security and non-traditional collective self-defence mechanism, which is not exclusive to any state, including China. At the same time, Japan has two target states to be included into the Quad Plus, the United Kingdom and France, because they are residential powers in the Indo-Pacific region. To this end, Japan has steadily strengthened its bilateral ties with them.\n\n\n","downloadable_attachments":[{"id":79391604,"asset_id":69209201,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":26971,"first_name":"Kei","last_name":"Koga","domain_name":"nanyang","page_name":"KeiKoga","display_name":"Kei Koga","profile_url":"https://nanyang.academia.edu/KeiKoga?f_ri=5523","photo":"https://0.academia-photos.com/26971/81173/89027/s65_kei.koga.jpg"}],"research_interests":[{"id":1031,"name":"Southeast Asian Studies","url":"https://www.academia.edu/Documents/in/Southeast_Asian_Studies?f_ri=5523","nofollow":false},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":8223,"name":"East Asian Studies","url":"https://www.academia.edu/Documents/in/East_Asian_Studies?f_ri=5523","nofollow":false},{"id":17158,"name":"Japan","url":"https://www.academia.edu/Documents/in/Japan?f_ri=5523"},{"id":22067,"name":"Institutions (Political Science)","url":"https://www.academia.edu/Documents/in/Institutions_Political_Science_?f_ri=5523"},{"id":50183,"name":"International institutions","url":"https://www.academia.edu/Documents/in/International_institutions?f_ri=5523"},{"id":75328,"name":"Japanese Foreign Policy","url":"https://www.academia.edu/Documents/in/Japanese_Foreign_Policy?f_ri=5523"},{"id":2785807,"name":"Indo-Pacific Strategic Affairs","url":"https://www.academia.edu/Documents/in/Indo-Pacific_Strategic_Affairs?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36186069" data-work_id="36186069" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36186069/Een_Belgische_vergelijking_van_inlichtingen_en_veiligheid_met_Nederland">Een Belgische vergelijking van inlichtingen en veiligheid met Nederland</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Nederland en België hebben een bijzonder hechte relatie. Zeker op het vlak van defensie en nationale veiligheid, al zijn er zowel gelijkenissen als verschillen zoals in andere domeinen. In deze presentatie worden ontwikkelingen op vlak... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36186069" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Nederland en België hebben een bijzonder hechte relatie. Zeker op het vlak van defensie en nationale veiligheid, al zijn er zowel gelijkenissen als verschillen zoals in andere domeinen. In deze presentatie worden ontwikkelingen op vlak van inlichtingen en veiligheid in de twee landen door Belgische bril vergeleken. Een historisch perspectief overloopt de groeiende toenadering, na een moeilijk uit elkaar gaan, van twee kleine staten in een precaire positie tussen de oorlogvoerende Fransen en Duitsers (1870, 1914, 1940), maar ook geconfronteerd met andere gemeenschappelijke dreigingen zoals het internationale terrorisme (vanaf het einde van de 19 de eeuw), hoe dat invloed heeft gehad op de benadering van beide over veiligheid en inlichtingen, en uiteindelijk de hechte naoorlogse alliantie. Ook de verschillen en gelijkenissen inzake de hedendaagse veiligheidsuitdagingen en – maatregelen komen aan bod (relaties met de politiek, verband tussen de diensten onderling, het wettelijk kader, werkingsmiddelen, en de publiekswerking) om te zien of sterktes en zwaktes van veiligheidsdiensten typisch zijn aan de landen die ze beschermen of meer gemeenschappelijk zijn dan gedacht, en of daar ook 'veiligheidsculturele' verschillen aan verbonden zijn. Uit deze comparatieve benadering worden dan implicaties geëxtrapoleerd voor wat van elkaar geleerd kan worden en wat toekomstige internationale samenwerking betreft.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36186069" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4655f173d6dfec01cbb4b5d7cbeac557" rel="nofollow" data-download="{"attachment_id":56086356,"asset_id":36186069,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56086356/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2360280" href="https://antwerp.academia.edu/KennethLasoen">Kenneth Lasoen</a><script data-card-contents-for-user="2360280" type="text/json">{"id":2360280,"first_name":"Kenneth","last_name":"Lasoen","domain_name":"antwerp","page_name":"KennethLasoen","display_name":"Kenneth Lasoen","profile_url":"https://antwerp.academia.edu/KennethLasoen?f_ri=5523","photo":"https://0.academia-photos.com/2360280/743936/6644638/s65_kenneth.lasoen.jpg"}</script></span></span></li><li class="js-paper-rank-work_36186069 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36186069"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36186069, container: ".js-paper-rank-work_36186069", }); });</script></li><li class="js-percentile-work_36186069 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36186069; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36186069"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36186069 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36186069"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36186069; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36186069]").text(description); $(".js-view-count-work_36186069").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36186069").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36186069"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2052" href="https://www.academia.edu/Documents/in/Intelligence_Studies">Intelligence Studies</a>, <script data-card-contents-for-ri="2052" type="text/json">{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2674" href="https://www.academia.edu/Documents/in/Intelligence">Intelligence</a>, <script data-card-contents-for-ri="2674" type="text/json">{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3705" href="https://www.academia.edu/Documents/in/International_Security">International Security</a>, <script data-card-contents-for-ri="3705" type="text/json">{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a><script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36186069]'), work: {"id":36186069,"title":"Een Belgische vergelijking van inlichtingen en veiligheid met Nederland","created_at":"2018-03-17T09:37:26.434-07:00","url":"https://www.academia.edu/36186069/Een_Belgische_vergelijking_van_inlichtingen_en_veiligheid_met_Nederland?f_ri=5523","dom_id":"work_36186069","summary":"Nederland en België hebben een bijzonder hechte relatie. Zeker op het vlak van defensie en nationale veiligheid, al zijn er zowel gelijkenissen als verschillen zoals in andere domeinen. In deze presentatie worden ontwikkelingen op vlak van inlichtingen en veiligheid in de twee landen door Belgische bril vergeleken. Een historisch perspectief overloopt de groeiende toenadering, na een moeilijk uit elkaar gaan, van twee kleine staten in een precaire positie tussen de oorlogvoerende Fransen en Duitsers (1870, 1914, 1940), maar ook geconfronteerd met andere gemeenschappelijke dreigingen zoals het internationale terrorisme (vanaf het einde van de 19 de eeuw), hoe dat invloed heeft gehad op de benadering van beide over veiligheid en inlichtingen, en uiteindelijk de hechte naoorlogse alliantie. Ook de verschillen en gelijkenissen inzake de hedendaagse veiligheidsuitdagingen en – maatregelen komen aan bod (relaties met de politiek, verband tussen de diensten onderling, het wettelijk kader, werkingsmiddelen, en de publiekswerking) om te zien of sterktes en zwaktes van veiligheidsdiensten typisch zijn aan de landen die ze beschermen of meer gemeenschappelijk zijn dan gedacht, en of daar ook 'veiligheidsculturele' verschillen aan verbonden zijn. Uit deze comparatieve benadering worden dan implicaties geëxtrapoleerd voor wat van elkaar geleerd kan worden en wat toekomstige internationale samenwerking betreft. ","downloadable_attachments":[{"id":56086356,"asset_id":36186069,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2360280,"first_name":"Kenneth","last_name":"Lasoen","domain_name":"antwerp","page_name":"KennethLasoen","display_name":"Kenneth Lasoen","profile_url":"https://antwerp.academia.edu/KennethLasoen?f_ri=5523","photo":"https://0.academia-photos.com/2360280/743936/6644638/s65_kenneth.lasoen.jpg"}],"research_interests":[{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies?f_ri=5523","nofollow":false},{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=5523","nofollow":false},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":346639,"name":"Intelligence and security studies","url":"https://www.academia.edu/Documents/in/Intelligence_and_security_studies?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11517594" data-work_id="11517594" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/11517594/Tablighi_Jamaat_and_the_Quest_for_the_London_Mega_Mosque_Continuity_and_Change">Tablighi Jamaat and the Quest for the London Mega Mosque: Continuity and Change</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The book charts the attempts of Islam's largest missionary movement, the Tablighi Jamaat (TJ), to build Europe's biggest mosque in London – the so-called Mega Mosque. The book follows TJ from its founding in India in 1926, to its... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_11517594" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The book charts the attempts of Islam's largest missionary movement, the Tablighi Jamaat (TJ), to build Europe's biggest mosque in London – the so-called Mega Mosque. The book follows TJ from its founding in India in 1926, to its establishment in Britain during the 1940s, to its plans for construction of a controversial mosque in London. The book addresses the issues emerging at the forefront of national debates across liberal democracies: the role of Islam in the west, conceptions of changing citizenship and national identities, and how best to integrate increasingly diverse populations. What happens to illiberal and politically disengaged groups that wish to segregate themselves from what they regard as corrupt and immoral wider societies? How do these groups engage with government policy that seeks to define good citizens as those that are actively engaged in the socio-political life of the community? Zacharias Pieri provides context and insight to answer these and other important questions.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11517594" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="94264c5bf57fa384b812b62a339bb7f9" rel="nofollow" data-download="{"attachment_id":37028014,"asset_id":11517594,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/37028014/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="245784" href="https://usfsm.academia.edu/ZachariasPieri">Zacharias Pieri</a><script data-card-contents-for-user="245784" type="text/json">{"id":245784,"first_name":"Zacharias","last_name":"Pieri","domain_name":"usfsm","page_name":"ZachariasPieri","display_name":"Zacharias Pieri","profile_url":"https://usfsm.academia.edu/ZachariasPieri?f_ri=5523","photo":"https://0.academia-photos.com/245784/53236/164334/s65_zacharias.pieri.jpg"}</script></span></span></li><li class="js-paper-rank-work_11517594 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11517594"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11517594, container: ".js-paper-rank-work_11517594", }); });</script></li><li class="js-percentile-work_11517594 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11517594; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11517594"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11517594 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11517594"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11517594; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11517594]").text(description); $(".js-view-count-work_11517594").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11517594").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11517594"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">17</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="120" href="https://www.academia.edu/Documents/in/New_Religious_Movements">New Religious Movements</a>, <script data-card-contents-for-ri="120" type="text/json">{"id":120,"name":"New Religious Movements","url":"https://www.academia.edu/Documents/in/New_Religious_Movements?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="201" href="https://www.academia.edu/Documents/in/Political_Sociology">Political Sociology</a>, <script data-card-contents-for-ri="201" type="text/json">{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="208" href="https://www.academia.edu/Documents/in/Social_Movements">Social Movements</a><script data-card-contents-for-ri="208" type="text/json">{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11517594]'), work: {"id":11517594,"title":"Tablighi Jamaat and the Quest for the London Mega Mosque: Continuity and Change","created_at":"2015-03-18T20:42:23.122-07:00","url":"https://www.academia.edu/11517594/Tablighi_Jamaat_and_the_Quest_for_the_London_Mega_Mosque_Continuity_and_Change?f_ri=5523","dom_id":"work_11517594","summary":"The book charts the attempts of Islam's largest missionary movement, the Tablighi Jamaat (TJ), to build Europe's biggest mosque in London – the so-called Mega Mosque. The book follows TJ from its founding in India in 1926, to its establishment in Britain during the 1940s, to its plans for construction of a controversial mosque in London. The book addresses the issues emerging at the forefront of national debates across liberal democracies: the role of Islam in the west, conceptions of changing citizenship and national identities, and how best to integrate increasingly diverse populations. What happens to illiberal and politically disengaged groups that wish to segregate themselves from what they regard as corrupt and immoral wider societies? How do these groups engage with government policy that seeks to define good citizens as those that are actively engaged in the socio-political life of the community? Zacharias Pieri provides context and insight to answer these and other important questions.","downloadable_attachments":[{"id":37028014,"asset_id":11517594,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":245784,"first_name":"Zacharias","last_name":"Pieri","domain_name":"usfsm","page_name":"ZachariasPieri","display_name":"Zacharias Pieri","profile_url":"https://usfsm.academia.edu/ZachariasPieri?f_ri=5523","photo":"https://0.academia-photos.com/245784/53236/164334/s65_zacharias.pieri.jpg"}],"research_interests":[{"id":120,"name":"New Religious Movements","url":"https://www.academia.edu/Documents/in/New_Religious_Movements?f_ri=5523","nofollow":false},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=5523","nofollow":false},{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements?f_ri=5523","nofollow":false},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=5523"},{"id":898,"name":"Multiculturalism","url":"https://www.academia.edu/Documents/in/Multiculturalism?f_ri=5523"},{"id":2170,"name":"Ethnography","url":"https://www.academia.edu/Documents/in/Ethnography?f_ri=5523"},{"id":3472,"name":"Political Anthropology","url":"https://www.academia.edu/Documents/in/Political_Anthropology?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":11150,"name":"Islamic Studies","url":"https://www.academia.edu/Documents/in/Islamic_Studies?f_ri=5523"},{"id":11442,"name":"Community Cohesion","url":"https://www.academia.edu/Documents/in/Community_Cohesion?f_ri=5523"},{"id":14970,"name":"Muslims in Europe","url":"https://www.academia.edu/Documents/in/Muslims_in_Europe?f_ri=5523"},{"id":15866,"name":"Islam","url":"https://www.academia.edu/Documents/in/Islam?f_ri=5523"},{"id":48938,"name":"Mosque Architecture","url":"https://www.academia.edu/Documents/in/Mosque_Architecture?f_ri=5523"},{"id":72007,"name":"Polical Science","url":"https://www.academia.edu/Documents/in/Polical_Science?f_ri=5523"},{"id":82668,"name":"Muslims in Britain","url":"https://www.academia.edu/Documents/in/Muslims_in_Britain?f_ri=5523"},{"id":217432,"name":"Tablighi Jamaat","url":"https://www.academia.edu/Documents/in/Tablighi_Jamaat?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11391852" data-work_id="11391852" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/11391852/Il_Modello_Italiano_di_Gestione_dei_Conflitti_Il_Caso_Libanese">Il Modello Italiano di Gestione dei Conflitti. Il Caso Libanese</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11391852" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="140f07d84ba3e0a31d367255b5fdbe3a" rel="nofollow" data-download="{"attachment_id":36951226,"asset_id":11391852,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36951226/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="23914001" href="https://independent.academia.edu/MatteoZaupa">Matteo Zaupa</a><script data-card-contents-for-user="23914001" type="text/json">{"id":23914001,"first_name":"Matteo","last_name":"Zaupa","domain_name":"independent","page_name":"MatteoZaupa","display_name":"Matteo Zaupa","profile_url":"https://independent.academia.edu/MatteoZaupa?f_ri=5523","photo":"https://0.academia-photos.com/23914001/7872680/8820389/s65_matteo.zaupa.jpg_oh_e19886a19e3929837bf995c1b97974b1_oe_557e5d5f___gda___1433561994_8df8cb78c9ad6955669ab71760000b61"}</script></span></span></li><li class="js-paper-rank-work_11391852 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11391852"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11391852, container: ".js-paper-rank-work_11391852", }); });</script></li><li class="js-percentile-work_11391852 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11391852; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11391852"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11391852 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11391852"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11391852; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11391852]").text(description); $(".js-view-count-work_11391852").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11391852").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11391852"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="6736" href="https://www.academia.edu/Documents/in/Lebanon">Lebanon</a>, <script data-card-contents-for-ri="6736" type="text/json">{"id":6736,"name":"Lebanon","url":"https://www.academia.edu/Documents/in/Lebanon?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="13078" href="https://www.academia.edu/Documents/in/Peacekeeping">Peacekeeping</a><script data-card-contents-for-ri="13078" type="text/json">{"id":13078,"name":"Peacekeeping","url":"https://www.academia.edu/Documents/in/Peacekeeping?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11391852]'), work: {"id":11391852,"title":"Il Modello Italiano di Gestione dei Conflitti. Il Caso Libanese","created_at":"2015-03-12T07:47:47.363-07:00","url":"https://www.academia.edu/11391852/Il_Modello_Italiano_di_Gestione_dei_Conflitti_Il_Caso_Libanese?f_ri=5523","dom_id":"work_11391852","summary":null,"downloadable_attachments":[{"id":36951226,"asset_id":11391852,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":23914001,"first_name":"Matteo","last_name":"Zaupa","domain_name":"independent","page_name":"MatteoZaupa","display_name":"Matteo Zaupa","profile_url":"https://independent.academia.edu/MatteoZaupa?f_ri=5523","photo":"https://0.academia-photos.com/23914001/7872680/8820389/s65_matteo.zaupa.jpg_oh_e19886a19e3929837bf995c1b97974b1_oe_557e5d5f___gda___1433561994_8df8cb78c9ad6955669ab71760000b61"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":6736,"name":"Lebanon","url":"https://www.academia.edu/Documents/in/Lebanon?f_ri=5523","nofollow":false},{"id":13078,"name":"Peacekeeping","url":"https://www.academia.edu/Documents/in/Peacekeeping?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37504852" data-work_id="37504852" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37504852/Koncepcja_bezpiecze%C5%84stwa_Niemiec_w_Bezpiecze%C5%84stwo_mi%C4%99dzynarodowe_w_XXI_wieku_pod_red_R_Zi%C4%99by_Wydawnictwo_Poltext_Warszawa_2018_s_157_171">Koncepcja bezpieczeństwa Niemiec, w: Bezpieczeństwo międzynarodowe w XXI wieku pod red. R. Zięby, Wydawnictwo Poltext: Warszawa 2018, s. 157-171</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Nowe uwarunkowania, dokumenty programowe, reforma Bundeswehry</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37504852" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="593279175f93d690cc61d1a98114617e" rel="nofollow" data-download="{"attachment_id":57479058,"asset_id":37504852,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57479058/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5338301" href="https://uw.academia.edu/AleksandraGasztold">Aleksandra Gasztold (Zięba)</a><script data-card-contents-for-user="5338301" type="text/json">{"id":5338301,"first_name":"Aleksandra","last_name":"Gasztold (Zięba)","domain_name":"uw","page_name":"AleksandraGasztold","display_name":"Aleksandra Gasztold (Zięba)","profile_url":"https://uw.academia.edu/AleksandraGasztold?f_ri=5523","photo":"https://0.academia-photos.com/5338301/2344791/76463178/s65_aleksandra.gasztold_zi_ba_.jpg"}</script></span></span></li><li class="js-paper-rank-work_37504852 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37504852"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37504852, container: ".js-paper-rank-work_37504852", }); });</script></li><li class="js-percentile-work_37504852 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37504852; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37504852"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37504852 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37504852"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37504852; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37504852]").text(description); $(".js-view-count-work_37504852").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37504852").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37504852"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="384" href="https://www.academia.edu/Documents/in/German_Studies">German Studies</a>, <script data-card-contents-for-ri="384" type="text/json">{"id":384,"name":"German Studies","url":"https://www.academia.edu/Documents/in/German_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4370" href="https://www.academia.edu/Documents/in/Security">Security</a>, <script data-card-contents-for-ri="4370" type="text/json">{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a><script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37504852]'), work: {"id":37504852,"title":"Koncepcja bezpieczeństwa Niemiec, w: Bezpieczeństwo międzynarodowe w XXI wieku pod red. R. Zięby, Wydawnictwo Poltext: Warszawa 2018, s. 157-171","created_at":"2018-09-30T14:57:17.239-07:00","url":"https://www.academia.edu/37504852/Koncepcja_bezpiecze%C5%84stwa_Niemiec_w_Bezpiecze%C5%84stwo_mi%C4%99dzynarodowe_w_XXI_wieku_pod_red_R_Zi%C4%99by_Wydawnictwo_Poltext_Warszawa_2018_s_157_171?f_ri=5523","dom_id":"work_37504852","summary":"Nowe uwarunkowania, dokumenty programowe, reforma Bundeswehry","downloadable_attachments":[{"id":57479058,"asset_id":37504852,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5338301,"first_name":"Aleksandra","last_name":"Gasztold (Zięba)","domain_name":"uw","page_name":"AleksandraGasztold","display_name":"Aleksandra Gasztold (Zięba)","profile_url":"https://uw.academia.edu/AleksandraGasztold?f_ri=5523","photo":"https://0.academia-photos.com/5338301/2344791/76463178/s65_aleksandra.gasztold_zi_ba_.jpg"}],"research_interests":[{"id":384,"name":"German Studies","url":"https://www.academia.edu/Documents/in/German_Studies?f_ri=5523","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":172433,"name":"Poltical Science","url":"https://www.academia.edu/Documents/in/Poltical_Science?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36777479" data-work_id="36777479" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36777479/%D8%A7%D8%AA%D8%AC%D8%A7%D9%87%D8%A7%D8%AA_%D8%A7%D9%84%D8%A5%D8%B5%D9%84%D8%A7%D8%AD_%D8%A7%D9%84%D8%A3%D9%85%D9%86%D9%8A_%D8%A8%D8%A7%D9%84%D9%85%D9%86%D8%B7%D9%82%D8%A9_%D8%A7%D9%84%D8%B9%D8%B1%D8%A8%D9%8A%D8%A9_pdf">اتجاهات الإصلاح الأمني بالمنطقة العربية .pdf</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">في خضم التحولات التي عرفتها وتعرفها المنطقة العربية بعيد ما اصطلح عليه بالربيع العربي، يعاد طرح قضية إصلاح قطاعات الأمن والدفاع بالدول العربية، باعتبارها مسألة مركزية لتجاوز مراحل انتقالية صعبة يفترض بها أن تؤدي إلى إقامة نظم سياسية أكثر... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36777479" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">في خضم التحولات التي عرفتها وتعرفها المنطقة العربية بعيد ما اصطلح عليه بالربيع العربي، يعاد طرح قضية إصلاح قطاعات الأمن والدفاع بالدول العربية، باعتبارها مسألة مركزية لتجاوز مراحل انتقالية صعبة يفترض بها أن تؤدي إلى إقامة نظم سياسية أكثر ديمقراطية وانفتاحا وقربا من آمال وانتظارات المواطنين. وإذ تبدو مضامين إصلاح الهياكل والسياسات الأمنية العربية مثارا للكثير من التساؤلات المشروعة ومن الحساسيات المتنوعة، فإن ارتباطها وتعلقها بأبعاد استراتيجية وسياسية واجتماعية وثقافية ومؤسساتية وفنية... يجعل منها قضية محفوفة بالكثير من التشابك والتعقيد.<br />ففي ظل وضع جيوسياسي مضطرب، ثمة ضرورة لأن تراجع الدول العربية نظرتها إلى مصالحها الحيوية وإلى سياساتها الأمنو-عسكرية ضمن إطار يميزه الطابع القومي المشترك. كما أن تململ وتوتر الوضع السياسي والاجتماعي في كثير منها ، قد يمثل فرصة لإعادة هيكلة نظم الأمن والدفاع على أسس جديدة أكثر موضوعية وفعالية. وإلى جانب كل ذلك، ثمة حاجة ملحة لتبني حكامة جديدة في مجال الأمن والدفاع، فيما يشبه القطيعة مع أوضاع سادت في الماضي ووصمت مصالح الأمن والدفاع العربية بالجبروت والاستعلاء والقتامة والارتياب وبسوء السمعة وانتهاك حقوق الإنسان. وعليه، يفترض بالدول العربية أن تتوفر على ما يلزم من إرادة سياسية لاعتماد وإعمال ما أمكن من الممارسات الجيدة ذات الصلة، وتدعيم سبل الشفافية والرقابة المؤسساتية على الهياكل الأمنية، في إطار من ثقافة سياسية جديدة ترنو إلى التغيير نحو الأفضل. إنه أمر يبقى، بلا شك، رهين توافر الظروف الموضوعية اللازمة لتحقيقه على أرض الواقع.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36777479" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b7b530dc3b8ce02e7f9b61c90a8561c5" rel="nofollow" data-download="{"attachment_id":56725346,"asset_id":36777479,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56725346/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="48721139" href="https://ump-ma.academia.edu/LouayAbdelfettah">لؤي عبد الفتاح Louay ABDELFETTAH</a><script data-card-contents-for-user="48721139" type="text/json">{"id":48721139,"first_name":"لؤي عبد الفتاح","last_name":"Louay ABDELFETTAH","domain_name":"ump-ma","page_name":"LouayAbdelfettah","display_name":"لؤي عبد الفتاح Louay ABDELFETTAH","profile_url":"https://ump-ma.academia.edu/LouayAbdelfettah?f_ri=5523","photo":"https://0.academia-photos.com/48721139/12820709/35910967/s65__.louay_abdelfettah.jpg"}</script></span></span></li><li class="js-paper-rank-work_36777479 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36777479"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36777479, container: ".js-paper-rank-work_36777479", }); });</script></li><li class="js-percentile-work_36777479 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36777479; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36777479"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36777479 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36777479"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36777479; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36777479]").text(description); $(".js-view-count-work_36777479").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36777479").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36777479"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a><script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36777479]'), work: {"id":36777479,"title":"اتجاهات الإصلاح الأمني بالمنطقة العربية .pdf","created_at":"2018-06-04T11:10:03.187-07:00","url":"https://www.academia.edu/36777479/%D8%A7%D8%AA%D8%AC%D8%A7%D9%87%D8%A7%D8%AA_%D8%A7%D9%84%D8%A5%D8%B5%D9%84%D8%A7%D8%AD_%D8%A7%D9%84%D8%A3%D9%85%D9%86%D9%8A_%D8%A8%D8%A7%D9%84%D9%85%D9%86%D8%B7%D9%82%D8%A9_%D8%A7%D9%84%D8%B9%D8%B1%D8%A8%D9%8A%D8%A9_pdf?f_ri=5523","dom_id":"work_36777479","summary":"في خضم التحولات التي عرفتها وتعرفها المنطقة العربية بعيد ما اصطلح عليه بالربيع العربي، يعاد طرح قضية إصلاح قطاعات الأمن والدفاع بالدول العربية، باعتبارها مسألة مركزية لتجاوز مراحل انتقالية صعبة يفترض بها أن تؤدي إلى إقامة نظم سياسية أكثر ديمقراطية وانفتاحا وقربا من آمال وانتظارات المواطنين. وإذ تبدو مضامين إصلاح الهياكل والسياسات الأمنية العربية مثارا للكثير من التساؤلات المشروعة ومن الحساسيات المتنوعة، فإن ارتباطها وتعلقها بأبعاد استراتيجية وسياسية واجتماعية وثقافية ومؤسساتية وفنية... يجعل منها قضية محفوفة بالكثير من التشابك والتعقيد.\nففي ظل وضع جيوسياسي مضطرب، ثمة ضرورة لأن تراجع الدول العربية نظرتها إلى مصالحها الحيوية وإلى سياساتها الأمنو-عسكرية ضمن إطار يميزه الطابع القومي المشترك. كما أن تململ وتوتر الوضع السياسي والاجتماعي في كثير منها ، قد يمثل فرصة لإعادة هيكلة نظم الأمن والدفاع على أسس جديدة أكثر موضوعية وفعالية. وإلى جانب كل ذلك، ثمة حاجة ملحة لتبني حكامة جديدة في مجال الأمن والدفاع، فيما يشبه القطيعة مع أوضاع سادت في الماضي ووصمت مصالح الأمن والدفاع العربية بالجبروت والاستعلاء والقتامة والارتياب وبسوء السمعة وانتهاك حقوق الإنسان. وعليه، يفترض بالدول العربية أن تتوفر على ما يلزم من إرادة سياسية لاعتماد وإعمال ما أمكن من الممارسات الجيدة ذات الصلة، وتدعيم سبل الشفافية والرقابة المؤسساتية على الهياكل الأمنية، في إطار من ثقافة سياسية جديدة ترنو إلى التغيير نحو الأفضل. إنه أمر يبقى، بلا شك، رهين توافر الظروف الموضوعية اللازمة لتحقيقه على أرض الواقع.\n","downloadable_attachments":[{"id":56725346,"asset_id":36777479,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":48721139,"first_name":"لؤي عبد الفتاح","last_name":"Louay ABDELFETTAH","domain_name":"ump-ma","page_name":"LouayAbdelfettah","display_name":"لؤي عبد الفتاح Louay ABDELFETTAH","profile_url":"https://ump-ma.academia.edu/LouayAbdelfettah?f_ri=5523","photo":"https://0.academia-photos.com/48721139/12820709/35910967/s65__.louay_abdelfettah.jpg"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_16562998" data-work_id="16562998" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/16562998/Operation_Jalisco_The_Rise_of_The_Jalisco_New_Generation_Cartel_and_Pe%C3%B1a_Nieto_s_Militarised_Security_Strategy">Operation Jalisco: The Rise of The Jalisco New Generation Cartel and Peña Nieto’s Militarised Security Strategy</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">There is no one panacea to counter the violence and instability in Jalisco, and it will take time for the Operation to make an impact.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/16562998" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7b6929605edddd86f6494256731eea13" rel="nofollow" data-download="{"attachment_id":39052556,"asset_id":16562998,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39052556/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6422363" href="https://leeds.academia.edu/HannahCroft">Hannah Croft</a><script data-card-contents-for-user="6422363" type="text/json">{"id":6422363,"first_name":"Hannah","last_name":"Croft","domain_name":"leeds","page_name":"HannahCroft","display_name":"Hannah Croft","profile_url":"https://leeds.academia.edu/HannahCroft?f_ri=5523","photo":"https://0.academia-photos.com/6422363/2600149/32912039/s65_hannah.croft.jpeg"}</script></span></span></li><li class="js-paper-rank-work_16562998 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="16562998"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 16562998, container: ".js-paper-rank-work_16562998", }); });</script></li><li class="js-percentile-work_16562998 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 16562998; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_16562998"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_16562998 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="16562998"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 16562998; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=16562998]").text(description); $(".js-view-count-work_16562998").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_16562998").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="16562998"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="43881" href="https://www.academia.edu/Documents/in/Mexico">Mexico</a>, <script data-card-contents-for-ri="43881" type="text/json">{"id":43881,"name":"Mexico","url":"https://www.academia.edu/Documents/in/Mexico?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="61389" href="https://www.academia.edu/Documents/in/Militarisation">Militarisation</a>, <script data-card-contents-for-ri="61389" type="text/json">{"id":61389,"name":"Militarisation","url":"https://www.academia.edu/Documents/in/Militarisation?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="393408" href="https://www.academia.edu/Documents/in/History_of_Jalisco">History of Jalisco</a><script data-card-contents-for-ri="393408" type="text/json">{"id":393408,"name":"History of Jalisco","url":"https://www.academia.edu/Documents/in/History_of_Jalisco?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=16562998]'), work: {"id":16562998,"title":"Operation Jalisco: The Rise of The Jalisco New Generation Cartel and Peña Nieto’s Militarised Security Strategy","created_at":"2015-10-08T04:32:20.931-07:00","url":"https://www.academia.edu/16562998/Operation_Jalisco_The_Rise_of_The_Jalisco_New_Generation_Cartel_and_Pe%C3%B1a_Nieto_s_Militarised_Security_Strategy?f_ri=5523","dom_id":"work_16562998","summary":"There is no one panacea to counter the violence and instability in Jalisco, and it will take time for the Operation to make an impact.","downloadable_attachments":[{"id":39052556,"asset_id":16562998,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6422363,"first_name":"Hannah","last_name":"Croft","domain_name":"leeds","page_name":"HannahCroft","display_name":"Hannah Croft","profile_url":"https://leeds.academia.edu/HannahCroft?f_ri=5523","photo":"https://0.academia-photos.com/6422363/2600149/32912039/s65_hannah.croft.jpeg"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":43881,"name":"Mexico","url":"https://www.academia.edu/Documents/in/Mexico?f_ri=5523","nofollow":false},{"id":61389,"name":"Militarisation","url":"https://www.academia.edu/Documents/in/Militarisation?f_ri=5523","nofollow":false},{"id":393408,"name":"History of Jalisco","url":"https://www.academia.edu/Documents/in/History_of_Jalisco?f_ri=5523","nofollow":false},{"id":876564,"name":"Mexican Drug Cartels","url":"https://www.academia.edu/Documents/in/Mexican_Drug_Cartels?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_13103420" data-work_id="13103420" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/13103420/UNDERGRADUATE_PROJECT_JUNE_2013_Can_the_Environment_Speak">UNDERGRADUATE PROJECT - JUNE 2013, Can the Environment Speak?</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">This is a rough edit of my undergraduate dissertation/project. I hope to expand upon this thesis one day soon.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/13103420" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1a7bf43828bd780708b60e2838d9c449" rel="nofollow" data-download="{"attachment_id":37946083,"asset_id":13103420,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/37946083/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5840475" href="https://aber.academia.edu/RobertCooke">Robert Cooke</a><script data-card-contents-for-user="5840475" type="text/json">{"id":5840475,"first_name":"Robert","last_name":"Cooke","domain_name":"aber","page_name":"RobertCooke","display_name":"Robert Cooke","profile_url":"https://aber.academia.edu/RobertCooke?f_ri=5523","photo":"https://0.academia-photos.com/5840475/9688900/10790991/s65_robert.cooke.jpg"}</script></span></span></li><li class="js-paper-rank-work_13103420 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="13103420"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 13103420, container: ".js-paper-rank-work_13103420", }); });</script></li><li class="js-percentile-work_13103420 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 13103420; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_13103420"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_13103420 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="13103420"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 13103420; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=13103420]").text(description); $(".js-view-count-work_13103420").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_13103420").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="13103420"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3115" href="https://www.academia.edu/Documents/in/Posthumanism">Posthumanism</a>, <script data-card-contents-for-ri="3115" type="text/json">{"id":3115,"name":"Posthumanism","url":"https://www.academia.edu/Documents/in/Posthumanism?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4868" href="https://www.academia.edu/Documents/in/Deconstruction">Deconstruction</a>, <script data-card-contents-for-ri="4868" type="text/json">{"id":4868,"name":"Deconstruction","url":"https://www.academia.edu/Documents/in/Deconstruction?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a><script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=13103420]'), work: {"id":13103420,"title":"UNDERGRADUATE PROJECT - JUNE 2013, Can the Environment Speak?","created_at":"2015-06-19T07:51:56.867-07:00","url":"https://www.academia.edu/13103420/UNDERGRADUATE_PROJECT_JUNE_2013_Can_the_Environment_Speak?f_ri=5523","dom_id":"work_13103420","summary":"This is a rough edit of my undergraduate dissertation/project. I hope to expand upon this thesis one day soon.","downloadable_attachments":[{"id":37946083,"asset_id":13103420,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5840475,"first_name":"Robert","last_name":"Cooke","domain_name":"aber","page_name":"RobertCooke","display_name":"Robert Cooke","profile_url":"https://aber.academia.edu/RobertCooke?f_ri=5523","photo":"https://0.academia-photos.com/5840475/9688900/10790991/s65_robert.cooke.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":3115,"name":"Posthumanism","url":"https://www.academia.edu/Documents/in/Posthumanism?f_ri=5523","nofollow":false},{"id":4868,"name":"Deconstruction","url":"https://www.academia.edu/Documents/in/Deconstruction?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":10346,"name":"Environmental Politics","url":"https://www.academia.edu/Documents/in/Environmental_Politics?f_ri=5523"},{"id":11861,"name":"Transhumanism","url":"https://www.academia.edu/Documents/in/Transhumanism?f_ri=5523"},{"id":17754,"name":"Derridean Deconstruction","url":"https://www.academia.edu/Documents/in/Derridean_Deconstruction?f_ri=5523"},{"id":21939,"name":"Environmental Security","url":"https://www.academia.edu/Documents/in/Environmental_Security?f_ri=5523"},{"id":29367,"name":"Subaltern Studies","url":"https://www.academia.edu/Documents/in/Subaltern_Studies?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_9529463" data-work_id="9529463" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/9529463/Corporate_Security_Using_knowledge_construction_to_define_a_practising_body_of_knowledge">Corporate Security: Using knowledge construction to define a practising body of knowledge</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Security is a multidimensional concept, with many meanings, practising domains and heterogeneous occupations. Therefore it is difficult to define security as a singular, although understanding may be achieved by its applied context in... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_9529463" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Security is a multidimensional concept, with many meanings, practising domains and heterogeneous occupations. Therefore it is difficult to define security as a singular, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, business continuity, personnel and physical security, and security technology. Nevertheless, corporate security also has interrelationship with criminology, facility management, safety and law. Such a framework provides clear boundaries for the practising domain of corporate security, better reflects the security experts’ view of their practising domain, allows directed tertiary pedagogy and presents what could be considered the scholarly area of Security Science.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/9529463" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="14910a2fa57bfa77c2af85b4d411f992" rel="nofollow" data-download="{"attachment_id":35752922,"asset_id":9529463,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35752922/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="20045999" href="https://edithcowan.academia.edu/DavidBrooks">David Brooks</a><script data-card-contents-for-user="20045999" type="text/json">{"id":20045999,"first_name":"David","last_name":"Brooks","domain_name":"edithcowan","page_name":"DavidBrooks","display_name":"David Brooks","profile_url":"https://edithcowan.academia.edu/DavidBrooks?f_ri=5523","photo":"https://0.academia-photos.com/20045999/5596892/20793031/s65_david.brooks.jpg"}</script></span></span></li><li class="js-paper-rank-work_9529463 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="9529463"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 9529463, container: ".js-paper-rank-work_9529463", }); });</script></li><li class="js-percentile-work_9529463 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 9529463; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_9529463"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_9529463 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="9529463"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 9529463; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=9529463]").text(description); $(".js-view-count-work_9529463").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_9529463").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="9529463"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">5</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4370" href="https://www.academia.edu/Documents/in/Security">Security</a>, <script data-card-contents-for-ri="4370" type="text/json">{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5535" href="https://www.academia.edu/Documents/in/Critical_Security_Studies">Critical Security Studies</a>, <script data-card-contents-for-ri="5535" type="text/json">{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="245110" href="https://www.academia.edu/Documents/in/Corporate_Security_Management">Corporate Security Management</a><script data-card-contents-for-ri="245110" type="text/json">{"id":245110,"name":"Corporate Security Management","url":"https://www.academia.edu/Documents/in/Corporate_Security_Management?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=9529463]'), work: {"id":9529463,"title":"Corporate Security: Using knowledge construction to define a practising body of knowledge","created_at":"2014-11-27T12:07:37.775-08:00","url":"https://www.academia.edu/9529463/Corporate_Security_Using_knowledge_construction_to_define_a_practising_body_of_knowledge?f_ri=5523","dom_id":"work_9529463","summary":"Security is a multidimensional concept, with many meanings, practising domains and heterogeneous occupations. Therefore it is difficult to define security as a singular, although understanding may be achieved by its applied context in presenting a domicile body of knowledge. There have been studies that have presented a number of corporate security bodies of knowledge; however, there is still restricted consensus. From these past body of knowledge studies and supported by multidimensional scaling knowledge mapping, a body of knowledge framework is put forward, integrating core and allied knowledge categories. The core knowledge categories include practise areas such as risk management, business continuity, personnel and physical security, and security technology. Nevertheless, corporate security also has interrelationship with criminology, facility management, safety and law. Such a framework provides clear boundaries for the practising domain of corporate security, better reflects the security experts’ view of their practising domain, allows directed tertiary pedagogy and presents what could be considered the scholarly area of Security Science.","downloadable_attachments":[{"id":35752922,"asset_id":9529463,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":20045999,"first_name":"David","last_name":"Brooks","domain_name":"edithcowan","page_name":"DavidBrooks","display_name":"David Brooks","profile_url":"https://edithcowan.academia.edu/DavidBrooks?f_ri=5523","photo":"https://0.academia-photos.com/20045999/5596892/20793031/s65_david.brooks.jpg"}],"research_interests":[{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=5523","nofollow":false},{"id":245110,"name":"Corporate Security Management","url":"https://www.academia.edu/Documents/in/Corporate_Security_Management?f_ri=5523","nofollow":false},{"id":556688,"name":"Security Science","url":"https://www.academia.edu/Documents/in/Security_Science?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25830356" data-work_id="25830356" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25830356/Avoiding_a_New_Cold_War_The_Future_of_EU_Russia_Relations_in_the_Context_of_the_Ukraine_Crisis">Avoiding a New 'Cold War' The Future of EU-Russia Relations in the Context of the Ukraine Crisis</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25830356" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="98d452294a9347f33ded8021ba71360e" rel="nofollow" data-download="{"attachment_id":46196748,"asset_id":25830356,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46196748/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="379481" href="https://lborolondon.academia.edu/CristianNitoiu">Cristian Nitoiu</a><script data-card-contents-for-user="379481" type="text/json">{"id":379481,"first_name":"Cristian","last_name":"Nitoiu","domain_name":"lborolondon","page_name":"CristianNitoiu","display_name":"Cristian Nitoiu","profile_url":"https://lborolondon.academia.edu/CristianNitoiu?f_ri=5523","photo":"https://0.academia-photos.com/379481/117637/8854838/s65_cristian.nitoiu.jpg"}</script></span></span></li><li class="js-paper-rank-work_25830356 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25830356"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25830356, container: ".js-paper-rank-work_25830356", }); });</script></li><li class="js-percentile-work_25830356 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25830356; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25830356"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25830356 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25830356"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25830356; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25830356]").text(description); $(".js-view-count-work_25830356").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25830356").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25830356"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">16</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="382" href="https://www.academia.edu/Documents/in/Eastern_European_Studies">Eastern European Studies</a>, <script data-card-contents-for-ri="382" type="text/json">{"id":382,"name":"Eastern European Studies","url":"https://www.academia.edu/Documents/in/Eastern_European_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="383" href="https://www.academia.edu/Documents/in/European_Studies">European Studies</a>, <script data-card-contents-for-ri="383" type="text/json">{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="389" href="https://www.academia.edu/Documents/in/Russian_Studies">Russian Studies</a>, <script data-card-contents-for-ri="389" type="text/json">{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1218" href="https://www.academia.edu/Documents/in/European_integration">European integration</a><script data-card-contents-for-ri="1218" type="text/json">{"id":1218,"name":"European integration","url":"https://www.academia.edu/Documents/in/European_integration?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25830356]'), work: {"id":25830356,"title":"Avoiding a New 'Cold War' The Future of EU-Russia Relations in the Context of the Ukraine Crisis","created_at":"2016-06-03T05:25:44.093-07:00","url":"https://www.academia.edu/25830356/Avoiding_a_New_Cold_War_The_Future_of_EU_Russia_Relations_in_the_Context_of_the_Ukraine_Crisis?f_ri=5523","dom_id":"work_25830356","summary":null,"downloadable_attachments":[{"id":46196748,"asset_id":25830356,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":379481,"first_name":"Cristian","last_name":"Nitoiu","domain_name":"lborolondon","page_name":"CristianNitoiu","display_name":"Cristian Nitoiu","profile_url":"https://lborolondon.academia.edu/CristianNitoiu?f_ri=5523","photo":"https://0.academia-photos.com/379481/117637/8854838/s65_cristian.nitoiu.jpg"}],"research_interests":[{"id":382,"name":"Eastern European Studies","url":"https://www.academia.edu/Documents/in/Eastern_European_Studies?f_ri=5523","nofollow":false},{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies?f_ri=5523","nofollow":false},{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=5523","nofollow":false},{"id":1218,"name":"European integration","url":"https://www.academia.edu/Documents/in/European_integration?f_ri=5523","nofollow":false},{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=5523"},{"id":5214,"name":"Cold War","url":"https://www.academia.edu/Documents/in/Cold_War?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5895,"name":"Russian Politics","url":"https://www.academia.edu/Documents/in/Russian_Politics?f_ri=5523"},{"id":7669,"name":"Russian Foreign Policy","url":"https://www.academia.edu/Documents/in/Russian_Foreign_Policy?f_ri=5523"},{"id":8539,"name":"Eurasia","url":"https://www.academia.edu/Documents/in/Eurasia?f_ri=5523"},{"id":8697,"name":"European Foreign Policy","url":"https://www.academia.edu/Documents/in/European_Foreign_Policy?f_ri=5523"},{"id":8699,"name":"European Neighbourhood Policy","url":"https://www.academia.edu/Documents/in/European_Neighbourhood_Policy?f_ri=5523"},{"id":10311,"name":"European Politics","url":"https://www.academia.edu/Documents/in/European_Politics?f_ri=5523"},{"id":10347,"name":"European Union","url":"https://www.academia.edu/Documents/in/European_Union?f_ri=5523"},{"id":33368,"name":"Eurasianism","url":"https://www.academia.edu/Documents/in/Eurasianism?f_ri=5523"},{"id":41863,"name":"Russia","url":"https://www.academia.edu/Documents/in/Russia?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_13755842" data-work_id="13755842" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/13755842/Quantitative_Analysis_of_Information_Security_Risk">Quantitative Analysis of Information Security Risk</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_13755842" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data from 36 industry types. Pattern recognition, bivariate linear regression analysis, and a one-sample t-test were performed to test the industry type and information security risk-level relationship of the selected business. Test results indicated that there is a significant predictive relationship between industry type and risk-level rates among United States businesses. Moreover, the one-sample t-test results indicated that United States businesses classified as a particular industry type are more likely to have a higher information security risk-level than the midpoint level of United States businesses.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/13755842" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6497c470c52a6f63496b5bf59b51ff38" rel="nofollow" data-download="{"attachment_id":38121161,"asset_id":13755842,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38121161/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1540422" href="https://waldenu.academia.edu/RobertEDavis">Dr. Robert E Davis</a><script data-card-contents-for-user="1540422" type="text/json">{"id":1540422,"first_name":"Dr. Robert","last_name":"Davis","domain_name":"waldenu","page_name":"RobertEDavis","display_name":"Dr. Robert E Davis","profile_url":"https://waldenu.academia.edu/RobertEDavis?f_ri=5523","photo":"https://0.academia-photos.com/1540422/544542/12889384/s65_robert_e..davis.jpg"}</script></span></span></li><li class="js-paper-rank-work_13755842 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="13755842"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 13755842, container: ".js-paper-rank-work_13755842", }); });</script></li><li class="js-percentile-work_13755842 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 13755842; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_13755842"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_13755842 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="13755842"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 13755842; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=13755842]").text(description); $(".js-view-count-work_13755842").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_13755842").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="13755842"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>, <script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3703" href="https://www.academia.edu/Documents/in/Network_Security">Network Security</a><script data-card-contents-for-ri="3703" type="text/json">{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=13755842]'), work: {"id":13755842,"title":"Quantitative Analysis of Information Security Risk","created_at":"2015-07-07T10:24:13.857-07:00","url":"https://www.academia.edu/13755842/Quantitative_Analysis_of_Information_Security_Risk?f_ri=5523","dom_id":"work_13755842","summary":"The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data from 36 industry types. Pattern recognition, bivariate linear regression analysis, and a one-sample t-test were performed to test the industry type and information security risk-level relationship of the selected business. Test results indicated that there is a significant predictive relationship between industry type and risk-level rates among United States businesses. Moreover, the one-sample t-test results indicated that United States businesses classified as a particular industry type are more likely to have a higher information security risk-level than the midpoint level of United States businesses.","downloadable_attachments":[{"id":38121161,"asset_id":13755842,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1540422,"first_name":"Dr. Robert","last_name":"Davis","domain_name":"waldenu","page_name":"RobertEDavis","display_name":"Dr. Robert E Davis","profile_url":"https://waldenu.academia.edu/RobertEDavis?f_ri=5523","photo":"https://0.academia-photos.com/1540422/544542/12889384/s65_robert_e..davis.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=5523","nofollow":false},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=5523","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=5523","nofollow":false},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":11847,"name":"Quantitative Research","url":"https://www.academia.edu/Documents/in/Quantitative_Research?f_ri=5523"},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=5523"},{"id":12620,"name":"Quantitative Methods","url":"https://www.academia.edu/Documents/in/Quantitative_Methods?f_ri=5523"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_72222135" data-work_id="72222135" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/72222135/Why_America_Still_Gets_Russia_Wrong_Self_Inflicted_PSYOPS_and_Redundant_Red_Lines_Russia_in_Global_Affairs_February_22_2022">Why America Still Gets Russia Wrong: Self-Inflicted PSYOPS and Redundant Red Lines, Russia in Global Affairs, February 22, 2022</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><a href="https://eng.globalaffairs.ru/articles/america-russia-red-lines/" rel="nofollow">https://eng.globalaffairs.ru/articles/america-russia-red-lines/</a></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/72222135" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1068190814ce2829698e72f20e71a0b1" rel="nofollow" data-download="{"attachment_id":81235997,"asset_id":72222135,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/81235997/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6901110" href="https://brown.academia.edu/DrMatthewCrosston">Dr. Matthew Crosston</a><script data-card-contents-for-user="6901110" type="text/json">{"id":6901110,"first_name":"Dr. Matthew","last_name":"Crosston","domain_name":"brown","page_name":"DrMatthewCrosston","display_name":"Dr. Matthew Crosston","profile_url":"https://brown.academia.edu/DrMatthewCrosston?f_ri=5523","photo":"https://0.academia-photos.com/6901110/2645906/36883013/s65_dr._matthew.crosston.jpg"}</script></span></span></li><li class="js-paper-rank-work_72222135 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="72222135"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 72222135, container: ".js-paper-rank-work_72222135", }); });</script></li><li class="js-percentile-work_72222135 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 72222135; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_72222135"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_72222135 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="72222135"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 72222135; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=72222135]").text(description); $(".js-view-count-work_72222135").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_72222135").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="72222135"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">20</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="128" href="https://www.academia.edu/Documents/in/History">History</a>, <script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="221" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>, <script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="389" href="https://www.academia.edu/Documents/in/Russian_Studies">Russian Studies</a>, <script data-card-contents-for-ri="389" type="text/json">{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a><script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=72222135]'), work: {"id":72222135,"title":"Why America Still Gets Russia Wrong: Self-Inflicted PSYOPS and Redundant Red Lines, Russia in Global Affairs, February 22, 2022","created_at":"2022-02-22T05:48:29.326-08:00","url":"https://www.academia.edu/72222135/Why_America_Still_Gets_Russia_Wrong_Self_Inflicted_PSYOPS_and_Redundant_Red_Lines_Russia_in_Global_Affairs_February_22_2022?f_ri=5523","dom_id":"work_72222135","summary":"https://eng.globalaffairs.ru/articles/america-russia-red-lines/","downloadable_attachments":[{"id":81235997,"asset_id":72222135,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6901110,"first_name":"Dr. Matthew","last_name":"Crosston","domain_name":"brown","page_name":"DrMatthewCrosston","display_name":"Dr. Matthew Crosston","profile_url":"https://brown.academia.edu/DrMatthewCrosston?f_ri=5523","photo":"https://0.academia-photos.com/6901110/2645906/36883013/s65_dr._matthew.crosston.jpg"}],"research_interests":[{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=5523","nofollow":false},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=5523","nofollow":false},{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=5523","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=5523"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=5523"},{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies?f_ri=5523"},{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=5523"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=5523"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=5523"},{"id":5821,"name":"Ukrainian Studies","url":"https://www.academia.edu/Documents/in/Ukrainian_Studies?f_ri=5523"},{"id":5895,"name":"Russian Politics","url":"https://www.academia.edu/Documents/in/Russian_Politics?f_ri=5523"},{"id":7669,"name":"Russian Foreign Policy","url":"https://www.academia.edu/Documents/in/Russian_Foreign_Policy?f_ri=5523"},{"id":15455,"name":"Russian History","url":"https://www.academia.edu/Documents/in/Russian_History?f_ri=5523"},{"id":60090,"name":"Russian Empire","url":"https://www.academia.edu/Documents/in/Russian_Empire?f_ri=5523"},{"id":62260,"name":"EU-Russia relations","url":"https://www.academia.edu/Documents/in/EU-Russia_relations?f_ri=5523"},{"id":313371,"name":"Diplomacy and international relations","url":"https://www.academia.edu/Documents/in/Diplomacy_and_international_relations?f_ri=5523"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_18300902" data-work_id="18300902" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/18300902/Les_alliances_politico_militaires_du_Canada_participent_elles_aux_objectifs_de_d%C3%A9fense_et_s%C3%A9curit%C3%A9_du_Canada">Les alliances politico-militaires du Canada participent-elles aux objectifs de défense et sécurité du Canada?</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/18300902" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4a36ea0c708136d04b6f4e4f0b1e8c31" rel="nofollow" data-download="{"attachment_id":39981501,"asset_id":18300902,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/39981501/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="25316718" href="https://pucminas.academia.edu/ClarissadeSouzaBorba">Clarissa de Souza Borba</a><script data-card-contents-for-user="25316718" type="text/json">{"id":25316718,"first_name":"Clarissa","last_name":"de Souza Borba","domain_name":"pucminas","page_name":"ClarissadeSouzaBorba","display_name":"Clarissa de Souza Borba","profile_url":"https://pucminas.academia.edu/ClarissadeSouzaBorba?f_ri=5523","photo":"https://0.academia-photos.com/25316718/10594288/11825164/s65_clarissa.de_souza_borba.jpg"}</script></span></span></li><li class="js-paper-rank-work_18300902 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="18300902"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 18300902, container: ".js-paper-rank-work_18300902", }); });</script></li><li class="js-percentile-work_18300902 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 18300902; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_18300902"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_18300902 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="18300902"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 18300902; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=18300902]").text(description); $(".js-view-count-work_18300902").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_18300902").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="18300902"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1483" href="https://www.academia.edu/Documents/in/Foreign_Policy_Analysis">Foreign Policy Analysis</a>, <script data-card-contents-for-ri="1483" type="text/json">{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="54114" href="https://www.academia.edu/Documents/in/Canada">Canada</a>, <script data-card-contents-for-ri="54114" type="text/json">{"id":54114,"name":"Canada","url":"https://www.academia.edu/Documents/in/Canada?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="202312" href="https://www.academia.edu/Documents/in/Canada_foreign_policy">Canada foreign policy</a><script data-card-contents-for-ri="202312" type="text/json">{"id":202312,"name":"Canada foreign policy","url":"https://www.academia.edu/Documents/in/Canada_foreign_policy?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=18300902]'), work: {"id":18300902,"title":"Les alliances politico-militaires du Canada participent-elles aux objectifs de défense et sécurité du Canada?","created_at":"2015-11-13T13:04:57.142-08:00","url":"https://www.academia.edu/18300902/Les_alliances_politico_militaires_du_Canada_participent_elles_aux_objectifs_de_d%C3%A9fense_et_s%C3%A9curit%C3%A9_du_Canada?f_ri=5523","dom_id":"work_18300902","summary":null,"downloadable_attachments":[{"id":39981501,"asset_id":18300902,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":25316718,"first_name":"Clarissa","last_name":"de Souza Borba","domain_name":"pucminas","page_name":"ClarissadeSouzaBorba","display_name":"Clarissa de Souza Borba","profile_url":"https://pucminas.academia.edu/ClarissadeSouzaBorba?f_ri=5523","photo":"https://0.academia-photos.com/25316718/10594288/11825164/s65_clarissa.de_souza_borba.jpg"}],"research_interests":[{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":54114,"name":"Canada","url":"https://www.academia.edu/Documents/in/Canada?f_ri=5523","nofollow":false},{"id":202312,"name":"Canada foreign policy","url":"https://www.academia.edu/Documents/in/Canada_foreign_policy?f_ri=5523","nofollow":false},{"id":294517,"name":"Defense and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defense_and_Strategic_Studies?f_ri=5523"},{"id":438497,"name":"Alliences","url":"https://www.academia.edu/Documents/in/Alliences?f_ri=5523"},{"id":452051,"name":"Relations Internationales Et Securite Et Defense","url":"https://www.academia.edu/Documents/in/Relations_Internationales_Et_Securite_Et_Defense?f_ri=5523"},{"id":736639,"name":"Foreign Policy of Canada","url":"https://www.academia.edu/Documents/in/Foreign_Policy_of_Canada?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11958275" data-work_id="11958275" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/11958275/Violence_and_Resistance_Beyond_P%C3%B3lemos_Foucault_and_Derrida_Between_Power_and_Unpower">Violence and Resistance Beyond Pólemos: Foucault and Derrida Between Power and Unpower</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">“Power is war, the continuation of war by other means”: Foucault’s reversal of Clausewitz’s formula has become a staple of critical theory — but it remains highly problematic on a conceptual level. Elaborated during Foucault’s 1976... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_11958275" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">“Power is war, the continuation of war by other means”: Foucault’s reversal of Clausewitz’s formula has become a staple of critical theory — but it remains highly problematic on a conceptual level. Elaborated during Foucault’s 1976 lectures (“Society Must Be Defended”), this work-hypothesis theorises “basic warfare” [la guerre fondamentale] as the teleological horizon of socio-political relations. Following Boulainvilliers, Foucault champions this polemological approach, conceived as a purely descriptive discourse on “real” politics and war, against the philosophico-juridical conceptuality attached to liberal society (Hobbes’s Leviathan being here the prime example). <br />However, in doing so, Foucault did not interrogate the conceptual validity of notions such as power and war, therefore interlinking them without questioning their ontological status. This problematic conflation was partly rectified in 1982, as Foucault proposed a more dynamic definition of power relations: “actions over potential actions”. <br />I argue, somewhat polemically, that Foucault’s hermeneutics of power still involves a teleological violence, dependent on a polemological representation of human relations as essentially instrumental: this resembles what Derrida names, in “Heidegger’s Ear”, an “anthropolemology”. However, I show that all conceptualisation of power implies its self-deconstruction. This self-deconstructive (or autoimmune) structure supposes an archi-originary unpower prior to power: power presupposes an excess within power, an excessive force, another violence making it both possible and impossible. There is something within power located “beyond the power principle” (Derrida). This (self-)excess signifies a limitless resistantiality co-extensive with power-relationality. It also allows the reversal of pólemos into its opposite, as unpower opens politics and warfare to the messianic call of a pre-political, pre-ontological disruption: the archi-originary force of différance. This force, unconditional, challenges Foucault’s conceptualisations of power, suggesting an originary performativity located before or beyond hermeneutics of power-knowledge, disrupting theoreticity as well as empiricity by pointing to their ontological complicity.<br />The bulk of this essay is dedicated to sketching the theoretical implications of this deconstructive reading of Foucault with respect to the methodology and conceptuality of political science and social theory.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11958275" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a31a524bba05d1ad6caa13a561a29fbc" rel="nofollow" data-download="{"attachment_id":63286010,"asset_id":11958275,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63286010/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2357791" href="https://uai.academia.edu/T_C_Mercier">Thomas Clément MERCIER</a><script data-card-contents-for-user="2357791" type="text/json">{"id":2357791,"first_name":"Thomas Clément","last_name":"MERCIER","domain_name":"uai","page_name":"T_C_Mercier","display_name":"Thomas Clément MERCIER","profile_url":"https://uai.academia.edu/T_C_Mercier?f_ri=5523","photo":"https://0.academia-photos.com/2357791/743316/55133078/s65_thomas_cl_ment.mercier.jpg"}</script></span></span></li><li class="js-paper-rank-work_11958275 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11958275"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11958275, container: ".js-paper-rank-work_11958275", }); });</script></li><li class="js-percentile-work_11958275 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11958275; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11958275"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11958275 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11958275"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11958275; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11958275]").text(description); $(".js-view-count-work_11958275").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11958275").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11958275"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">257</a> </div><span class="InlineList-item-text u-textTruncate u-pl11x"><a class="InlineList-item-text" data-has-card-for-ri="8" href="https://www.academia.edu/Documents/in/Critical_Theory">Critical Theory</a>, <script data-card-contents-for-ri="8" type="text/json">{"id":8,"name":"Critical Theory","url":"https://www.academia.edu/Documents/in/Critical_Theory?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="94" href="https://www.academia.edu/Documents/in/Discourse_Analysis">Discourse Analysis</a>, <script data-card-contents-for-ri="94" type="text/json">{"id":94,"name":"Discourse Analysis","url":"https://www.academia.edu/Documents/in/Discourse_Analysis?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="188" href="https://www.academia.edu/Documents/in/Cultural_Studies">Cultural Studies</a><script data-card-contents-for-ri="188" type="text/json">{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11958275]'), work: {"id":11958275,"title":"Violence and Resistance Beyond Pólemos: Foucault and Derrida Between Power and Unpower","created_at":"2015-04-15T07:32:39.552-07:00","url":"https://www.academia.edu/11958275/Violence_and_Resistance_Beyond_P%C3%B3lemos_Foucault_and_Derrida_Between_Power_and_Unpower?f_ri=5523","dom_id":"work_11958275","summary":"“Power is war, the continuation of war by other means”: Foucault’s reversal of Clausewitz’s formula has become a staple of critical theory — but it remains highly problematic on a conceptual level. Elaborated during Foucault’s 1976 lectures (“Society Must Be Defended”), this work-hypothesis theorises “basic warfare” [la guerre fondamentale] as the teleological horizon of socio-political relations. Following Boulainvilliers, Foucault champions this polemological approach, conceived as a purely descriptive discourse on “real” politics and war, against the philosophico-juridical conceptuality attached to liberal society (Hobbes’s Leviathan being here the prime example). \nHowever, in doing so, Foucault did not interrogate the conceptual validity of notions such as power and war, therefore interlinking them without questioning their ontological status. This problematic conflation was partly rectified in 1982, as Foucault proposed a more dynamic definition of power relations: “actions over potential actions”. \nI argue, somewhat polemically, that Foucault’s hermeneutics of power still involves a teleological violence, dependent on a polemological representation of human relations as essentially instrumental: this resembles what Derrida names, in “Heidegger’s Ear”, an “anthropolemology”. However, I show that all conceptualisation of power implies its self-deconstruction. This self-deconstructive (or autoimmune) structure supposes an archi-originary unpower prior to power: power presupposes an excess within power, an excessive force, another violence making it both possible and impossible. There is something within power located “beyond the power principle” (Derrida). This (self-)excess signifies a limitless resistantiality co-extensive with power-relationality. It also allows the reversal of pólemos into its opposite, as unpower opens politics and warfare to the messianic call of a pre-political, pre-ontological disruption: the archi-originary force of différance. This force, unconditional, challenges Foucault’s conceptualisations of power, suggesting an originary performativity located before or beyond hermeneutics of power-knowledge, disrupting theoreticity as well as empiricity by pointing to their ontological complicity.\nThe bulk of this essay is dedicated to sketching the theoretical implications of this deconstructive reading of Foucault with respect to the methodology and conceptuality of political science and social theory.","downloadable_attachments":[{"id":63286010,"asset_id":11958275,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2357791,"first_name":"Thomas Clément","last_name":"MERCIER","domain_name":"uai","page_name":"T_C_Mercier","display_name":"Thomas Clément MERCIER","profile_url":"https://uai.academia.edu/T_C_Mercier?f_ri=5523","photo":"https://0.academia-photos.com/2357791/743316/55133078/s65_thomas_cl_ment.mercier.jpg"}],"research_interests":[{"id":8,"name":"Critical Theory","url":"https://www.academia.edu/Documents/in/Critical_Theory?f_ri=5523","nofollow":false},{"id":94,"name":"Discourse Analysis","url":"https://www.academia.edu/Documents/in/Discourse_Analysis?f_ri=5523","nofollow":false},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false},{"id":188,"name":"Cultural Studies","url":"https://www.academia.edu/Documents/in/Cultural_Studies?f_ri=5523","nofollow":false},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=5523"},{"id":209,"name":"Social Theory","url":"https://www.academia.edu/Documents/in/Social_Theory?f_ri=5523"},{"id":244,"name":"Psychoanalysis","url":"https://www.academia.edu/Documents/in/Psychoanalysis?f_ri=5523"},{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=5523"},{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=5523"},{"id":699,"name":"Queer Studies","url":"https://www.academia.edu/Documents/in/Queer_Studies?f_ri=5523"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=5523"},{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy?f_ri=5523"},{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=5523"},{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics?f_ri=5523"},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=5523"},{"id":893,"name":"Pragmatism","url":"https://www.academia.edu/Documents/in/Pragmatism?f_ri=5523"},{"id":899,"name":"Legitimacy and Authority","url":"https://www.academia.edu/Documents/in/Legitimacy_and_Authority?f_ri=5523"},{"id":938,"name":"Critical Discourse Studies","url":"https://www.academia.edu/Documents/in/Critical_Discourse_Studies?f_ri=5523"},{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology?f_ri=5523"},{"id":972,"name":"Self and Identity","url":"https://www.academia.edu/Documents/in/Self_and_Identity?f_ri=5523"},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory?f_ri=5523"},{"id":1192,"name":"Feminist Theory","url":"https://www.academia.edu/Documents/in/Feminist_Theory?f_ri=5523"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=5523"},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=5523"},{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=5523"},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=5523"},{"id":1698,"name":"Marxism","url":"https://www.academia.edu/Documents/in/Marxism?f_ri=5523"},{"id":2089,"name":"Social Identity","url":"https://www.academia.edu/Documents/in/Social_Identity?f_ri=5523"},{"id":2238,"name":"Pragmatics","url":"https://www.academia.edu/Documents/in/Pragmatics?f_ri=5523"},{"id":2337,"name":"Performance Studies","url":"https://www.academia.edu/Documents/in/Performance_Studies?f_ri=5523"},{"id":2729,"name":"Hospitality Studies","url":"https://www.academia.edu/Documents/in/Hospitality_Studies?f_ri=5523"},{"id":2860,"name":"Postcolonial Studies","url":"https://www.academia.edu/Documents/in/Postcolonial_Studies?f_ri=5523"},{"id":2993,"name":"Sociology of Knowledge","url":"https://www.academia.edu/Documents/in/Sociology_of_Knowledge?f_ri=5523"},{"id":3064,"name":"Heterotopia","url":"https://www.academia.edu/Documents/in/Heterotopia?f_ri=5523"},{"id":3114,"name":"Queer Theory","url":"https://www.academia.edu/Documents/in/Queer_Theory?f_ri=5523"},{"id":3115,"name":"Posthumanism","url":"https://www.academia.edu/Documents/in/Posthumanism?f_ri=5523"},{"id":3200,"name":"Praxis","url":"https://www.academia.edu/Documents/in/Praxis?f_ri=5523"},{"id":3231,"name":"Governmentality","url":"https://www.academia.edu/Documents/in/Governmentality?f_ri=5523"},{"id":3233,"name":"Animal Studies","url":"https://www.academia.edu/Documents/in/Animal_Studies?f_ri=5523"},{"id":3234,"name":"Animal Ethics","url":"https://www.academia.edu/Documents/in/Animal_Ethics?f_ri=5523"},{"id":3353,"name":"Subjectivities","url":"https://www.academia.edu/Documents/in/Subjectivities?f_ri=5523"},{"id":3354,"name":"Poststructuralism","url":"https://www.academia.edu/Documents/in/Poststructuralism?f_ri=5523"},{"id":3499,"name":"Social and Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology?f_ri=5523"},{"id":3661,"name":"Sovereignty","url":"https://www.academia.edu/Documents/in/Sovereignty?f_ri=5523"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=5523"},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies?f_ri=5523"},{"id":3876,"name":"Hobbes","url":"https://www.academia.edu/Documents/in/Hobbes?f_ri=5523"},{"id":4195,"name":"Cultural Theory","url":"https://www.academia.edu/Documents/in/Cultural_Theory?f_ri=5523"},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523"},{"id":4401,"name":"Jean-Luc Nancy","url":"https://www.academia.edu/Documents/in/Jean-Luc_Nancy?f_ri=5523"},{"id":4433,"name":"Self-Determination Theory","url":"https://www.academia.edu/Documents/in/Self-Determination_Theory?f_ri=5523"},{"id":4474,"name":"Critical Thinking","url":"https://www.academia.edu/Documents/in/Critical_Thinking?f_ri=5523"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=5523"},{"id":4823,"name":"Critical Legal Theory","url":"https://www.academia.edu/Documents/in/Critical_Legal_Theory?f_ri=5523"},{"id":4868,"name":"Deconstruction","url":"https://www.academia.edu/Documents/in/Deconstruction?f_ri=5523"},{"id":4917,"name":"Gender and Sexuality","url":"https://www.academia.edu/Documents/in/Gender_and_Sexuality?f_ri=5523"},{"id":5272,"name":"Identity (Culture)","url":"https://www.academia.edu/Documents/in/Identity_Culture_?f_ri=5523"},{"id":5340,"name":"Jurgen Habermas","url":"https://www.academia.edu/Documents/in/Jurgen_Habermas?f_ri=5523"},{"id":5372,"name":"Post-Marxism","url":"https://www.academia.edu/Documents/in/Post-Marxism?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=5523"},{"id":5539,"name":"Language and Ideology","url":"https://www.academia.edu/Documents/in/Language_and_Ideology?f_ri=5523"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=5523"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=5523"},{"id":5780,"name":"Ideology","url":"https://www.academia.edu/Documents/in/Ideology?f_ri=5523"},{"id":5815,"name":"Identity politics","url":"https://www.academia.edu/Documents/in/Identity_politics?f_ri=5523"},{"id":5960,"name":"Continental Philosophy","url":"https://www.academia.edu/Documents/in/Continental_Philosophy?f_ri=5523"},{"id":6013,"name":"Performativity","url":"https://www.academia.edu/Documents/in/Performativity?f_ri=5523"},{"id":6225,"name":"Civil War","url":"https://www.academia.edu/Documents/in/Civil_War?f_ri=5523"},{"id":6463,"name":"History of Sexuality","url":"https://www.academia.edu/Documents/in/History_of_Sexuality?f_ri=5523"},{"id":6728,"name":"Philosophy Of Law","url":"https://www.academia.edu/Documents/in/Philosophy_Of_Law?f_ri=5523"},{"id":6749,"name":"Cultural Politics","url":"https://www.academia.edu/Documents/in/Cultural_Politics?f_ri=5523"},{"id":7024,"name":"Gender","url":"https://www.academia.edu/Documents/in/Gender?f_ri=5523"},{"id":7125,"name":"Culture","url":"https://www.academia.edu/Documents/in/Culture?f_ri=5523"},{"id":7229,"name":"Critical Criminology","url":"https://www.academia.edu/Documents/in/Critical_Criminology?f_ri=5523"},{"id":7982,"name":"Legitimacy","url":"https://www.academia.edu/Documents/in/Legitimacy?f_ri=5523"},{"id":8004,"name":"Resistance (Social)","url":"https://www.academia.edu/Documents/in/Resistance_Social_?f_ri=5523"},{"id":8326,"name":"Political Legitimacy","url":"https://www.academia.edu/Documents/in/Political_Legitimacy?f_ri=5523"},{"id":8411,"name":"Émmanuel Lévinas","url":"https://www.academia.edu/Documents/in/%C3%89mmanuel_L%C3%A9vinas?f_ri=5523"},{"id":8453,"name":"Maurice Blanchot","url":"https://www.academia.edu/Documents/in/Maurice_Blanchot?f_ri=5523"},{"id":8470,"name":"Empowerment","url":"https://www.academia.edu/Documents/in/Empowerment?f_ri=5523"},{"id":9405,"name":"Post-Colonialism","url":"https://www.academia.edu/Documents/in/Post-Colonialism?f_ri=5523"},{"id":9590,"name":"Self Care","url":"https://www.academia.edu/Documents/in/Self_Care?f_ri=5523"},{"id":9650,"name":"Cultural Identity","url":"https://www.academia.edu/Documents/in/Cultural_Identity?f_ri=5523"},{"id":10142,"name":"Gender Theory","url":"https://www.academia.edu/Documents/in/Gender_Theory?f_ri=5523"},{"id":10167,"name":"Hauntology","url":"https://www.academia.edu/Documents/in/Hauntology?f_ri=5523"},{"id":10256,"name":"Violence/Power","url":"https://www.academia.edu/Documents/in/Violence_Power?f_ri=5523"},{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=5523"},{"id":10348,"name":"Identity Politics (Political Science)","url":"https://www.academia.edu/Documents/in/Identity_Politics_Political_Science_?f_ri=5523"},{"id":10387,"name":"Subjectivity (Identity Politics)","url":"https://www.academia.edu/Documents/in/Subjectivity_Identity_Politics_?f_ri=5523"},{"id":10444,"name":"Postmodernism","url":"https://www.academia.edu/Documents/in/Postmodernism?f_ri=5523"},{"id":10492,"name":"Thomas Hobbes","url":"https://www.academia.edu/Documents/in/Thomas_Hobbes?f_ri=5523"},{"id":10610,"name":"Survival Analysis","url":"https://www.academia.edu/Documents/in/Survival_Analysis?f_ri=5523"},{"id":10633,"name":"Critical Discourse Analysis","url":"https://www.academia.edu/Documents/in/Critical_Discourse_Analysis?f_ri=5523"},{"id":10806,"name":"Marxist theory","url":"https://www.academia.edu/Documents/in/Marxist_theory?f_ri=5523"},{"id":10853,"name":"Activity Theory","url":"https://www.academia.edu/Documents/in/Activity_Theory?f_ri=5523"},{"id":11563,"name":"Performance and performativity","url":"https://www.academia.edu/Documents/in/Performance_and_performativity?f_ri=5523"},{"id":11848,"name":"Social Ontology","url":"https://www.academia.edu/Documents/in/Social_Ontology?f_ri=5523"},{"id":11927,"name":"Michel Foucault","url":"https://www.academia.edu/Documents/in/Michel_Foucault?f_ri=5523"},{"id":12040,"name":"Jacques Derrida","url":"https://www.academia.edu/Documents/in/Jacques_Derrida?f_ri=5523"},{"id":12320,"name":"Autoimmunity","url":"https://www.academia.edu/Documents/in/Autoimmunity?f_ri=5523"},{"id":12651,"name":"Archive Fever","url":"https://www.academia.edu/Documents/in/Archive_Fever?f_ri=5523"},{"id":12754,"name":"Language Ideology","url":"https://www.academia.edu/Documents/in/Language_Ideology?f_ri=5523"},{"id":12824,"name":"Intersubjectivity","url":"https://www.academia.edu/Documents/in/Intersubjectivity?f_ri=5523"},{"id":13197,"name":"Language and Identity","url":"https://www.academia.edu/Documents/in/Language_and_Identity?f_ri=5523"},{"id":13229,"name":"History Of Madness And Psychiatry","url":"https://www.academia.edu/Documents/in/History_Of_Madness_And_Psychiatry?f_ri=5523"},{"id":13788,"name":"Catherine Malabou","url":"https://www.academia.edu/Documents/in/Catherine_Malabou?f_ri=5523"},{"id":13995,"name":"Postcolonial Theory","url":"https://www.academia.edu/Documents/in/Postcolonial_Theory?f_ri=5523"},{"id":14105,"name":"Levinas","url":"https://www.academia.edu/Documents/in/Levinas?f_ri=5523"},{"id":14197,"name":"Autonomy","url":"https://www.academia.edu/Documents/in/Autonomy?f_ri=5523"},{"id":14256,"name":"Subjectivity In Discourse","url":"https://www.academia.edu/Documents/in/Subjectivity_In_Discourse?f_ri=5523"},{"id":14386,"name":"Agonistic Pluralism","url":"https://www.academia.edu/Documents/in/Agonistic_Pluralism?f_ri=5523"},{"id":15488,"name":"Ernesto Laclau and Chantal Mouffe","url":"https://www.academia.edu/Documents/in/Ernesto_Laclau_and_Chantal_Mouffe?f_ri=5523"},{"id":16323,"name":"Biopolitics","url":"https://www.academia.edu/Documents/in/Biopolitics?f_ri=5523"},{"id":16376,"name":"Cultural Studies (Communication)","url":"https://www.academia.edu/Documents/in/Cultural_Studies_Communication_?f_ri=5523"},{"id":17754,"name":"Derridean Deconstruction","url":"https://www.academia.edu/Documents/in/Derridean_Deconstruction?f_ri=5523"},{"id":18127,"name":"Baruch Spinoza","url":"https://www.academia.edu/Documents/in/Baruch_Spinoza?f_ri=5523"},{"id":18640,"name":"Ideology and Discourse Analysis","url":"https://www.academia.edu/Documents/in/Ideology_and_Discourse_Analysis?f_ri=5523"},{"id":18995,"name":"Critique","url":"https://www.academia.edu/Documents/in/Critique?f_ri=5523"},{"id":19087,"name":"Military and Politics","url":"https://www.academia.edu/Documents/in/Military_and_Politics?f_ri=5523"},{"id":19118,"name":"Pragmatism (Philosophy)","url":"https://www.academia.edu/Documents/in/Pragmatism_Philosophy_?f_ri=5523"},{"id":19191,"name":"Knowledge and Power","url":"https://www.academia.edu/Documents/in/Knowledge_and_Power?f_ri=5523"},{"id":19357,"name":"Individuation","url":"https://www.academia.edu/Documents/in/Individuation?f_ri=5523"},{"id":20719,"name":"Interpretation","url":"https://www.academia.edu/Documents/in/Interpretation?f_ri=5523"},{"id":20827,"name":"Politics Of Identities","url":"https://www.academia.edu/Documents/in/Politics_Of_Identities?f_ri=5523"},{"id":22120,"name":"Politics and Friendship","url":"https://www.academia.edu/Documents/in/Politics_and_Friendship?f_ri=5523"},{"id":22292,"name":"Political Ideology","url":"https://www.academia.edu/Documents/in/Political_Ideology?f_ri=5523"},{"id":22547,"name":"Social and Political Philosophy","url":"https://www.academia.edu/Documents/in/Social_and_Political_Philosophy?f_ri=5523"},{"id":22656,"name":"Hospitality","url":"https://www.academia.edu/Documents/in/Hospitality?f_ri=5523"},{"id":23342,"name":"Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Cultural_Anthropology?f_ri=5523"},{"id":24140,"name":"Biopower","url":"https://www.academia.edu/Documents/in/Biopower?f_ri=5523"},{"id":24879,"name":"Hegemony","url":"https://www.academia.edu/Documents/in/Hegemony?f_ri=5523"},{"id":25582,"name":"Social and Political Theories of Justice \u0026 Human Rights","url":"https://www.academia.edu/Documents/in/Social_and_Political_Theories_of_Justice_and_Human_Rights?f_ri=5523"},{"id":25660,"name":"Decision Theory","url":"https://www.academia.edu/Documents/in/Decision_Theory?f_ri=5523"},{"id":26321,"name":"Critical Legal Studies and Empire","url":"https://www.academia.edu/Documents/in/Critical_Legal_Studies_and_Empire?f_ri=5523"},{"id":27269,"name":"Subjectivity Studies","url":"https://www.academia.edu/Documents/in/Subjectivity_Studies?f_ri=5523"},{"id":27573,"name":"Derrida","url":"https://www.academia.edu/Documents/in/Derrida?f_ri=5523"},{"id":27982,"name":"Theories of Sovereignty","url":"https://www.academia.edu/Documents/in/Theories_of_Sovereignty?f_ri=5523"},{"id":29108,"name":"Feminist Literary Theory and Gender Studies","url":"https://www.academia.edu/Documents/in/Feminist_Literary_Theory_and_Gender_Studies?f_ri=5523"},{"id":29110,"name":"Ideology and Discourse Theory","url":"https://www.academia.edu/Documents/in/Ideology_and_Discourse_Theory?f_ri=5523"},{"id":30095,"name":"Cultural power and resistance","url":"https://www.academia.edu/Documents/in/Cultural_power_and_resistance?f_ri=5523"},{"id":30223,"name":"Antagonist politics","url":"https://www.academia.edu/Documents/in/Antagonist_politics?f_ri=5523"},{"id":30361,"name":"Foucault (Research Methodology)","url":"https://www.academia.edu/Documents/in/Foucault_Research_Methodology_?f_ri=5523"},{"id":30965,"name":"Jacques Derrida \u0026 Deconstruction","url":"https://www.academia.edu/Documents/in/Jacques_Derrida_and_Deconstruction?f_ri=5523"},{"id":31103,"name":"Performativity of Gender","url":"https://www.academia.edu/Documents/in/Performativity_of_Gender?f_ri=5523"},{"id":34292,"name":"Poststructuralist Theory","url":"https://www.academia.edu/Documents/in/Poststructuralist_Theory?f_ri=5523"},{"id":34442,"name":"Responsibility","url":"https://www.academia.edu/Documents/in/Responsibility?f_ri=5523"},{"id":36467,"name":"Language Ideologies","url":"https://www.academia.edu/Documents/in/Language_Ideologies?f_ri=5523"},{"id":36979,"name":"Use of Force","url":"https://www.academia.edu/Documents/in/Use_of_Force?f_ri=5523"},{"id":36990,"name":"Event Studies","url":"https://www.academia.edu/Documents/in/Event_Studies?f_ri=5523"},{"id":37647,"name":"Gramsci and Cultural Hegemony","url":"https://www.academia.edu/Documents/in/Gramsci_and_Cultural_Hegemony?f_ri=5523"},{"id":39525,"name":"Discipline","url":"https://www.academia.edu/Documents/in/Discipline?f_ri=5523"},{"id":39824,"name":"International Political Theory","url":"https://www.academia.edu/Documents/in/International_Political_Theory?f_ri=5523"},{"id":41213,"name":"Political Subjectivity","url":"https://www.academia.edu/Documents/in/Political_Subjectivity?f_ri=5523"},{"id":43594,"name":"Jean-François Lyotard","url":"https://www.academia.edu/Documents/in/Jean-Fran%C3%A7ois_Lyotard?f_ri=5523"},{"id":44006,"name":"Identity","url":"https://www.academia.edu/Documents/in/Identity?f_ri=5523"},{"id":44722,"name":"Power and domination","url":"https://www.academia.edu/Documents/in/Power_and_domination?f_ri=5523"},{"id":46271,"name":"Strategy","url":"https://www.academia.edu/Documents/in/Strategy?f_ri=5523"},{"id":48672,"name":"Chantal Mouffe","url":"https://www.academia.edu/Documents/in/Chantal_Mouffe?f_ri=5523"},{"id":49405,"name":"Symbolic violence","url":"https://www.academia.edu/Documents/in/Symbolic_violence?f_ri=5523"},{"id":49425,"name":"Engagement","url":"https://www.academia.edu/Documents/in/Engagement?f_ri=5523"},{"id":49663,"name":"Women and Gender Studies","url":"https://www.academia.edu/Documents/in/Women_and_Gender_Studies?f_ri=5523"},{"id":52096,"name":"Foucault power/knowledge - discourse","url":"https://www.academia.edu/Documents/in/Foucault_power_knowledge_-_discourse?f_ri=5523"},{"id":53039,"name":"Haunting and Spectrality","url":"https://www.academia.edu/Documents/in/Haunting_and_Spectrality?f_ri=5523"},{"id":53390,"name":"Power relations","url":"https://www.academia.edu/Documents/in/Power_relations?f_ri=5523"},{"id":53828,"name":"Polemology","url":"https://www.academia.edu/Documents/in/Polemology?f_ri=5523"},{"id":54236,"name":"Etienne Balibar","url":"https://www.academia.edu/Documents/in/Etienne_Balibar?f_ri=5523"},{"id":54659,"name":"Subjectivity","url":"https://www.academia.edu/Documents/in/Subjectivity?f_ri=5523"},{"id":54941,"name":"Biopolitics (in Agamben, Foucault and Negri)","url":"https://www.academia.edu/Documents/in/Biopolitics_in_Agamben_Foucault_and_Negri_?f_ri=5523"},{"id":55196,"name":"Cultural Reproduction and Social Reproduction. Knowledge, Power and Education","url":"https://www.academia.edu/Documents/in/Cultural_Reproduction_and_Social_Reproduction._Knowledge_Power_and_Education?f_ri=5523"},{"id":55577,"name":"Survival","url":"https://www.academia.edu/Documents/in/Survival?f_ri=5523"},{"id":60235,"name":"Alterity","url":"https://www.academia.edu/Documents/in/Alterity?f_ri=5523"},{"id":60903,"name":"Critical Legal Studies","url":"https://www.academia.edu/Documents/in/Critical_Legal_Studies?f_ri=5523"},{"id":61448,"name":"Power, conflict and violence","url":"https://www.academia.edu/Documents/in/Power_conflict_and_violence?f_ri=5523"},{"id":70724,"name":"Neo-Marxism","url":"https://www.academia.edu/Documents/in/Neo-Marxism?f_ri=5523"},{"id":70962,"name":"Theories of power","url":"https://www.academia.edu/Documents/in/Theories_of_power?f_ri=5523"},{"id":71526,"name":"Soft Power and International Relations","url":"https://www.academia.edu/Documents/in/Soft_Power_and_International_Relations?f_ri=5523"},{"id":77274,"name":"Symbolic Capital","url":"https://www.academia.edu/Documents/in/Symbolic_Capital?f_ri=5523"},{"id":77724,"name":"Philosophy of Praxis","url":"https://www.academia.edu/Documents/in/Philosophy_of_Praxis?f_ri=5523"},{"id":77969,"name":"Identity and Alterity","url":"https://www.academia.edu/Documents/in/Identity_and_Alterity?f_ri=5523"},{"id":91722,"name":"Philosophy of the Subject","url":"https://www.academia.edu/Documents/in/Philosophy_of_the_Subject?f_ri=5523"},{"id":94532,"name":"Immanence","url":"https://www.academia.edu/Documents/in/Immanence?f_ri=5523"},{"id":96098,"name":"Resistance","url":"https://www.academia.edu/Documents/in/Resistance?f_ri=5523"},{"id":98376,"name":"Jürgen Habermas","url":"https://www.academia.edu/Documents/in/J%C3%BCrgen_Habermas?f_ri=5523"},{"id":100218,"name":"Clausewitz","url":"https://www.academia.edu/Documents/in/Clausewitz?f_ri=5523"},{"id":102352,"name":"Heterotopias","url":"https://www.academia.edu/Documents/in/Heterotopias?f_ri=5523"},{"id":107547,"name":"Agonism","url":"https://www.academia.edu/Documents/in/Agonism?f_ri=5523"},{"id":110388,"name":"Biopower and Biopolitics","url":"https://www.academia.edu/Documents/in/Biopower_and_Biopolitics?f_ri=5523"},{"id":111931,"name":"Ethics and Politics of Friendship","url":"https://www.academia.edu/Documents/in/Ethics_and_Politics_of_Friendship?f_ri=5523"},{"id":116541,"name":"Event Study","url":"https://www.academia.edu/Documents/in/Event_Study?f_ri=5523"},{"id":123951,"name":"Political Power","url":"https://www.academia.edu/Documents/in/Political_Power?f_ri=5523"},{"id":135292,"name":"Phenomenology of Violence","url":"https://www.academia.edu/Documents/in/Phenomenology_of_Violence?f_ri=5523"},{"id":137587,"name":"International Relations, Security, Strategic Studies, Politics","url":"https://www.academia.edu/Documents/in/International_Relations_Security_Strategic_Studies_Politics?f_ri=5523"},{"id":142522,"name":"Domestication","url":"https://www.academia.edu/Documents/in/Domestication?f_ri=5523"},{"id":148419,"name":"Sociology of power and knowledge","url":"https://www.academia.edu/Documents/in/Sociology_of_power_and_knowledge?f_ri=5523"},{"id":150067,"name":"Hegemony and Counter-Hegemony","url":"https://www.academia.edu/Documents/in/Hegemony_and_Counter-Hegemony?f_ri=5523"},{"id":151313,"name":"Marxism and Hauntology","url":"https://www.academia.edu/Documents/in/Marxism_and_Hauntology?f_ri=5523"},{"id":151317,"name":"Use of force in international law and international relations","url":"https://www.academia.edu/Documents/in/Use_of_force_in_international_law_and_international_relations?f_ri=5523"},{"id":155212,"name":"Herrschaft","url":"https://www.academia.edu/Documents/in/Herrschaft?f_ri=5523"},{"id":160841,"name":"Ideologia","url":"https://www.academia.edu/Documents/in/Ideologia?f_ri=5523"},{"id":198879,"name":"Post-structuralism (especially the work of Jacques Derrida)","url":"https://www.academia.edu/Documents/in/Post-structuralism_especially_the_work_of_Jacques_Derrida_?f_ri=5523"},{"id":204255,"name":"Posthegemony","url":"https://www.academia.edu/Documents/in/Posthegemony?f_ri=5523"},{"id":220464,"name":"Politics and International relations","url":"https://www.academia.edu/Documents/in/Politics_and_International_relations?f_ri=5523"},{"id":222851,"name":"Biopolítica","url":"https://www.academia.edu/Documents/in/Biopol%C3%ADtica?f_ri=5523"},{"id":228979,"name":"Symbolic Power","url":"https://www.academia.edu/Documents/in/Symbolic_Power?f_ri=5523"},{"id":231588,"name":"Spectrality","url":"https://www.academia.edu/Documents/in/Spectrality?f_ri=5523"},{"id":257285,"name":"Social and political science","url":"https://www.academia.edu/Documents/in/Social_and_political_science?f_ri=5523"},{"id":258502,"name":"Foucault Studies","url":"https://www.academia.edu/Documents/in/Foucault_Studies?f_ri=5523"},{"id":258942,"name":"War and Peace Studies","url":"https://www.academia.edu/Documents/in/War_and_Peace_Studies?f_ri=5523"},{"id":279368,"name":"Carl von Clausewitz","url":"https://www.academia.edu/Documents/in/Carl_von_Clausewitz?f_ri=5523"},{"id":285166,"name":"Alteridad","url":"https://www.academia.edu/Documents/in/Alteridad?f_ri=5523"},{"id":298072,"name":"Ethics of Care of the Self","url":"https://www.academia.edu/Documents/in/Ethics_of_Care_of_the_Self?f_ri=5523"},{"id":339161,"name":"Politics of Identity","url":"https://www.academia.edu/Documents/in/Politics_of_Identity?f_ri=5523"},{"id":347292,"name":"State sovereignty","url":"https://www.academia.edu/Documents/in/State_sovereignty?f_ri=5523"},{"id":358581,"name":"Critical War Studies","url":"https://www.academia.edu/Documents/in/Critical_War_Studies?f_ri=5523"},{"id":366453,"name":"Subjectivation","url":"https://www.academia.edu/Documents/in/Subjectivation?f_ri=5523"},{"id":370144,"name":"Cogito and the History of Madness","url":"https://www.academia.edu/Documents/in/Cogito_and_the_History_of_Madness?f_ri=5523"},{"id":375041,"name":"Antagonism","url":"https://www.academia.edu/Documents/in/Antagonism?f_ri=5523"},{"id":378179,"name":"Institutionalization","url":"https://www.academia.edu/Documents/in/Institutionalization?f_ri=5523"},{"id":382027,"name":"Powerlessness","url":"https://www.academia.edu/Documents/in/Powerlessness?f_ri=5523"},{"id":390915,"name":"Power and Subjectivation","url":"https://www.academia.edu/Documents/in/Power_and_Subjectivation?f_ri=5523"},{"id":392820,"name":"Discipline and Punish","url":"https://www.academia.edu/Documents/in/Discipline_and_Punish?f_ri=5523"},{"id":421462,"name":"Altérité","url":"https://www.academia.edu/Documents/in/Alt%C3%A9rit%C3%A9?f_ri=5523"},{"id":444538,"name":"Linguistic violence","url":"https://www.academia.edu/Documents/in/Linguistic_violence?f_ri=5523"},{"id":488034,"name":"Critical Anthropology","url":"https://www.academia.edu/Documents/in/Critical_Anthropology?f_ri=5523"},{"id":513795,"name":"Michel Foucault and the theory of Power","url":"https://www.academia.edu/Documents/in/Michel_Foucault_and_the_theory_of_Power?f_ri=5523"},{"id":530276,"name":"Rogues","url":"https://www.academia.edu/Documents/in/Rogues?f_ri=5523"},{"id":566353,"name":"Infrapolitics","url":"https://www.academia.edu/Documents/in/Infrapolitics?f_ri=5523"},{"id":606197,"name":"Logocentrism","url":"https://www.academia.edu/Documents/in/Logocentrism?f_ri=5523"},{"id":623625,"name":"Subjectification and Intersubjectification","url":"https://www.academia.edu/Documents/in/Subjectification_and_Intersubjectification?f_ri=5523"},{"id":642869,"name":"Critical Military Studies","url":"https://www.academia.edu/Documents/in/Critical_Military_Studies?f_ri=5523"},{"id":661751,"name":"Agonistic Democracy","url":"https://www.academia.edu/Documents/in/Agonistic_Democracy?f_ri=5523"},{"id":672885,"name":"Specters of Marx","url":"https://www.academia.edu/Documents/in/Specters_of_Marx?f_ri=5523"},{"id":719990,"name":"Archive Studies","url":"https://www.academia.edu/Documents/in/Archive_Studies?f_ri=5523"},{"id":785274,"name":"Care Theory","url":"https://www.academia.edu/Documents/in/Care_Theory?f_ri=5523"},{"id":874579,"name":"Politics of Friendship","url":"https://www.academia.edu/Documents/in/Politics_of_Friendship?f_ri=5523"},{"id":882032,"name":"Legitimidad","url":"https://www.academia.edu/Documents/in/Legitimidad?f_ri=5523"},{"id":951126,"name":"Ethnicity and Identity Politics","url":"https://www.academia.edu/Documents/in/Ethnicity_and_Identity_Politics?f_ri=5523"},{"id":952730,"name":"Pouvoir Politique","url":"https://www.academia.edu/Documents/in/Pouvoir_Politique?f_ri=5523"},{"id":958273,"name":"Emmanuel Levinas","url":"https://www.academia.edu/Documents/in/Emmanuel_Levinas?f_ri=5523"},{"id":964146,"name":"Political Praxis","url":"https://www.academia.edu/Documents/in/Political_Praxis?f_ri=5523"},{"id":966833,"name":"Gewalt","url":"https://www.academia.edu/Documents/in/Gewalt?f_ri=5523"},{"id":968103,"name":"Archive Theory","url":"https://www.academia.edu/Documents/in/Archive_Theory?f_ri=5523"},{"id":972605,"name":"Power; Subjection","url":"https://www.academia.edu/Documents/in/Power_Subjection?f_ri=5523"},{"id":973140,"name":"Power and Knowledge","url":"https://www.academia.edu/Documents/in/Power_and_Knowledge?f_ri=5523"},{"id":982866,"name":"Agonistic and Tragic Modes of Political Theory","url":"https://www.academia.edu/Documents/in/Agonistic_and_Tragic_Modes_of_Political_Theory?f_ri=5523"},{"id":1005863,"name":"Linguistic Power","url":"https://www.academia.edu/Documents/in/Linguistic_Power?f_ri=5523"},{"id":1124349,"name":"Event Theory","url":"https://www.academia.edu/Documents/in/Event_Theory?f_ri=5523"},{"id":1166760,"name":"Ipseity","url":"https://www.academia.edu/Documents/in/Ipseity?f_ri=5523"},{"id":1198960,"name":"Foucault","url":"https://www.academia.edu/Documents/in/Foucault?f_ri=5523"},{"id":1230868,"name":"Phallocentricism","url":"https://www.academia.edu/Documents/in/Phallocentricism?f_ri=5523"},{"id":1249719,"name":"Emmanuel Lévinas","url":"https://www.academia.edu/Documents/in/Emmanuel_L%C3%A9vinas?f_ri=5523"},{"id":1297772,"name":"Spectralité","url":"https://www.academia.edu/Documents/in/Spectralite?f_ri=5523"},{"id":1477285,"name":"Michel Foucault: The subject and power","url":"https://www.academia.edu/Documents/in/Michel_Foucault_The_subject_and_power?f_ri=5523"},{"id":1675888,"name":"Violence and Power","url":"https://www.academia.edu/Documents/in/Violence_and_Power?f_ri=5523"},{"id":1745337,"name":"Derrida Hauntology","url":"https://www.academia.edu/Documents/in/Derrida_Hauntology?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_18822659 coauthored" data-work_id="18822659" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/18822659/New_Challenges_of_the_Atlantic_An_Approach_from_Portugal">New Challenges of the Atlantic: An Approach from Portugal</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/18822659" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="102abf02e690053382414fc14a09fcd7" rel="nofollow" data-download="{"attachment_id":40273515,"asset_id":18822659,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40273515/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="741545" href="https://lisboa.academia.edu/PedroBorgesGraca">Pedro Borges Graca</a><script data-card-contents-for-user="741545" type="text/json">{"id":741545,"first_name":"Pedro","last_name":"Borges Graca","domain_name":"lisboa","page_name":"PedroBorgesGraca","display_name":"Pedro Borges Graca","profile_url":"https://lisboa.academia.edu/PedroBorgesGraca?f_ri=5523","photo":"https://0.academia-photos.com/741545/4958358/5695498/s65_pedro.borges_graca.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-18822659">+5</span><div class="hidden js-additional-users-18822659"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://uac.academia.edu/RicardoSerr%C3%A3oSantos">Ricardo Serrão Santos</a></span></div><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://iscte-iul.academia.edu/PedroQuartinGra%C3%A7a">Pedro Quartin Graça</a></span></div><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/MiguelPacheco61">Miguel Pacheco</a></span></div><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://lisboa.academia.edu/MarisaFernandes">Marisa Fernandes</a></span></div><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://unisouthafr.academia.edu/AndreThomashausen">Andre Thomashausen</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-18822659'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-18822659').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_18822659 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="18822659"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 18822659, container: ".js-paper-rank-work_18822659", }); });</script></li><li class="js-percentile-work_18822659 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 18822659; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_18822659"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_18822659 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="18822659"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 18822659; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=18822659]").text(description); $(".js-view-count-work_18822659").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_18822659").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="18822659"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">66</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="158" href="https://www.academia.edu/Documents/in/Marine_Biology">Marine Biology</a>, <script data-card-contents-for-ri="158" type="text/json">{"id":158,"name":"Marine Biology","url":"https://www.academia.edu/Documents/in/Marine_Biology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="415" href="https://www.academia.edu/Documents/in/Oceanography">Oceanography</a>, <script data-card-contents-for-ri="415" type="text/json">{"id":415,"name":"Oceanography","url":"https://www.academia.edu/Documents/in/Oceanography?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="724" href="https://www.academia.edu/Documents/in/Economics">Economics</a>, <script data-card-contents-for-ri="724" type="text/json">{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a><script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=18822659]'), work: {"id":18822659,"title":"New Challenges of the Atlantic: An Approach from Portugal","created_at":"2015-11-22T14:17:47.280-08:00","url":"https://www.academia.edu/18822659/New_Challenges_of_the_Atlantic_An_Approach_from_Portugal?f_ri=5523","dom_id":"work_18822659","summary":null,"downloadable_attachments":[{"id":40273515,"asset_id":18822659,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":741545,"first_name":"Pedro","last_name":"Borges Graca","domain_name":"lisboa","page_name":"PedroBorgesGraca","display_name":"Pedro Borges Graca","profile_url":"https://lisboa.academia.edu/PedroBorgesGraca?f_ri=5523","photo":"https://0.academia-photos.com/741545/4958358/5695498/s65_pedro.borges_graca.jpg"},{"id":5014346,"first_name":"Ricardo","last_name":"Serrão Santos","domain_name":"uac","page_name":"RicardoSerrãoSantos","display_name":"Ricardo Serrão Santos","profile_url":"https://uac.academia.edu/RicardoSerr%C3%A3oSantos?f_ri=5523","photo":"https://0.academia-photos.com/5014346/2182052/2558159/s65_ricardo.serr_o_santos.jpg"},{"id":1575069,"first_name":"Pedro","last_name":"Quartin Graça","domain_name":"iscte-iul","page_name":"PedroQuartinGraça","display_name":"Pedro Quartin Graça","profile_url":"https://iscte-iul.academia.edu/PedroQuartinGra%C3%A7a?f_ri=5523","photo":"https://0.academia-photos.com/1575069/1169309/3979471/s65_pedro.quartin_gra_a.jpg"},{"id":2933738,"first_name":"Miguel","last_name":"Pacheco","domain_name":"independent","page_name":"MiguelPacheco61","display_name":"Miguel Pacheco","profile_url":"https://independent.academia.edu/MiguelPacheco61?f_ri=5523","photo":"https://0.academia-photos.com/2933738/8014034/8975869/s65_miguel.pacheco.jpg"},{"id":1944375,"first_name":"Marisa","last_name":"Fernandes","domain_name":"lisboa","page_name":"MarisaFernandes","display_name":"Marisa Fernandes","profile_url":"https://lisboa.academia.edu/MarisaFernandes?f_ri=5523","photo":"https://0.academia-photos.com/1944375/665722/1899354/s65_marisa.fernandes.jpg"},{"id":1733807,"first_name":"Andre","last_name":"Thomashausen","domain_name":"unisouthafr","page_name":"AndreThomashausen","display_name":"Andre Thomashausen","profile_url":"https://unisouthafr.academia.edu/AndreThomashausen?f_ri=5523","photo":"https://0.academia-photos.com/1733807/916326/1145548/s65_andre.thomashausen.jpg"}],"research_interests":[{"id":158,"name":"Marine Biology","url":"https://www.academia.edu/Documents/in/Marine_Biology?f_ri=5523","nofollow":false},{"id":415,"name":"Oceanography","url":"https://www.academia.edu/Documents/in/Oceanography?f_ri=5523","nofollow":false},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=5523","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":2222,"name":"Portuguese Studies","url":"https://www.academia.edu/Documents/in/Portuguese_Studies?f_ri=5523"},{"id":2861,"name":"Portuguese History","url":"https://www.academia.edu/Documents/in/Portuguese_History?f_ri=5523"},{"id":3110,"name":"Marine Geology","url":"https://www.academia.edu/Documents/in/Marine_Geology?f_ri=5523"},{"id":3165,"name":"Maritime History","url":"https://www.academia.edu/Documents/in/Maritime_History?f_ri=5523"},{"id":3836,"name":"Maritime Law","url":"https://www.academia.edu/Documents/in/Maritime_Law?f_ri=5523"},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies?f_ri=5523"},{"id":4035,"name":"Marine Ecology","url":"https://www.academia.edu/Documents/in/Marine_Ecology?f_ri=5523"},{"id":4121,"name":"Atlantic World","url":"https://www.academia.edu/Documents/in/Atlantic_World?f_ri=5523"},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523"},{"id":4916,"name":"Portuguese Discoveries and Expansion","url":"https://www.academia.edu/Documents/in/Portuguese_Discoveries_and_Expansion?f_ri=5523"},{"id":4925,"name":"Marine Protected Areas","url":"https://www.academia.edu/Documents/in/Marine_Protected_Areas?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":6195,"name":"Portuguese Colonialism and Decolonizaton","url":"https://www.academia.edu/Documents/in/Portuguese_Colonialism_and_Decolonizaton?f_ri=5523"},{"id":6868,"name":"Luso-Afro-Brazilian Studies","url":"https://www.academia.edu/Documents/in/Luso-Afro-Brazilian_Studies?f_ri=5523"},{"id":7805,"name":"Marine Conservation","url":"https://www.academia.edu/Documents/in/Marine_Conservation?f_ri=5523"},{"id":7948,"name":"The Lusophone World","url":"https://www.academia.edu/Documents/in/The_Lusophone_World?f_ri=5523"},{"id":7949,"name":"Luso-African Studies","url":"https://www.academia.edu/Documents/in/Luso-African_Studies?f_ri=5523"},{"id":9513,"name":"MARINE POLLUTION","url":"https://www.academia.edu/Documents/in/MARINE_POLLUTION?f_ri=5523"},{"id":16441,"name":"Marine Science","url":"https://www.academia.edu/Documents/in/Marine_Science?f_ri=5523"},{"id":17635,"name":"Marine biodiversity","url":"https://www.academia.edu/Documents/in/Marine_biodiversity?f_ri=5523"},{"id":20433,"name":"History of the Portuguese Empire","url":"https://www.academia.edu/Documents/in/History_of_the_Portuguese_Empire?f_ri=5523"},{"id":27510,"name":"Black Atlantic","url":"https://www.academia.edu/Documents/in/Black_Atlantic?f_ri=5523"},{"id":27533,"name":"Atlantic history","url":"https://www.academia.edu/Documents/in/Atlantic_history?f_ri=5523"},{"id":30441,"name":"North Atlantic Ocean","url":"https://www.academia.edu/Documents/in/North_Atlantic_Ocean?f_ri=5523"},{"id":30782,"name":"Fish and Marine Ecology","url":"https://www.academia.edu/Documents/in/Fish_and_Marine_Ecology?f_ri=5523"},{"id":30924,"name":"Luso-Brazilian Studies","url":"https://www.academia.edu/Documents/in/Luso-Brazilian_Studies?f_ri=5523"},{"id":35160,"name":"Maritime and Oceanic History","url":"https://www.academia.edu/Documents/in/Maritime_and_Oceanic_History?f_ri=5523"},{"id":35457,"name":"14th and 15th centuries Portugal","url":"https://www.academia.edu/Documents/in/14th_and_15th_centuries_Portugal?f_ri=5523"},{"id":37681,"name":"Portugal (History)","url":"https://www.academia.edu/Documents/in/Portugal_History_?f_ri=5523"},{"id":39472,"name":"Atlantic Studies","url":"https://www.academia.edu/Documents/in/Atlantic_Studies?f_ri=5523"},{"id":44510,"name":"Portugal","url":"https://www.academia.edu/Documents/in/Portugal?f_ri=5523"},{"id":46271,"name":"Strategy","url":"https://www.academia.edu/Documents/in/Strategy?f_ri=5523"},{"id":48532,"name":"Maritime Security","url":"https://www.academia.edu/Documents/in/Maritime_Security?f_ri=5523"},{"id":48927,"name":"Lusofonia","url":"https://www.academia.edu/Documents/in/Lusofonia?f_ri=5523"},{"id":60807,"name":"Maritime","url":"https://www.academia.edu/Documents/in/Maritime?f_ri=5523"},{"id":69822,"name":"History of Lusophone Africa","url":"https://www.academia.edu/Documents/in/History_of_Lusophone_Africa?f_ri=5523"},{"id":71565,"name":"Marine Insurance Law","url":"https://www.academia.edu/Documents/in/Marine_Insurance_Law?f_ri=5523"},{"id":76621,"name":"Marine BioTechnology","url":"https://www.academia.edu/Documents/in/Marine_BioTechnology?f_ri=5523"},{"id":77900,"name":"Marine","url":"https://www.academia.edu/Documents/in/Marine?f_ri=5523"},{"id":81995,"name":"Marine geology and geophysics","url":"https://www.academia.edu/Documents/in/Marine_geology_and_geophysics?f_ri=5523"},{"id":88526,"name":"Marine Technology","url":"https://www.academia.edu/Documents/in/Marine_Technology?f_ri=5523"},{"id":100055,"name":"Geografia de Portugal","url":"https://www.academia.edu/Documents/in/Geografia_de_Portugal?f_ri=5523"},{"id":117855,"name":"Maritime Studies","url":"https://www.academia.edu/Documents/in/Maritime_Studies?f_ri=5523"},{"id":152176,"name":"North Atlantic Studies","url":"https://www.academia.edu/Documents/in/North_Atlantic_Studies?f_ri=5523"},{"id":189028,"name":"Marine Sciences","url":"https://www.academia.edu/Documents/in/Marine_Sciences?f_ri=5523"},{"id":214332,"name":"Lusophone Studies","url":"https://www.academia.edu/Documents/in/Lusophone_Studies?f_ri=5523"},{"id":254762,"name":"Marine Biology and Oceanography","url":"https://www.academia.edu/Documents/in/Marine_Biology_and_Oceanography?f_ri=5523"},{"id":333973,"name":"História do Atlântico","url":"https://www.academia.edu/Documents/in/Historia_do_Atlantico?f_ri=5523"},{"id":401644,"name":"Lusophony","url":"https://www.academia.edu/Documents/in/Lusophony?f_ri=5523"},{"id":413606,"name":"Geografia Humana (Portugal)","url":"https://www.academia.edu/Documents/in/Geografia_Humana_Portugal_?f_ri=5523"},{"id":495135,"name":"Lusophone Africa","url":"https://www.academia.edu/Documents/in/Lusophone_Africa?f_ri=5523"},{"id":533587,"name":"South Atlantic Defense and Security","url":"https://www.academia.edu/Documents/in/South_Atlantic_Defense_and_Security?f_ri=5523"},{"id":553098,"name":"South Western Atlantic Ocean","url":"https://www.academia.edu/Documents/in/South_Western_Atlantic_Ocean?f_ri=5523"},{"id":563938,"name":"História de Portugal","url":"https://www.academia.edu/Documents/in/Hist%C3%B3ria_de_Portugal?f_ri=5523"},{"id":644259,"name":"South Atlantic Relations","url":"https://www.academia.edu/Documents/in/South_Atlantic_Relations?f_ri=5523"},{"id":749143,"name":"Mundo Atlántico","url":"https://www.academia.edu/Documents/in/Mundo_Atlantico?f_ri=5523"},{"id":977404,"name":"Atlântico Sul","url":"https://www.academia.edu/Documents/in/Atlantico_Sul?f_ri=5523"},{"id":991237,"name":"South Atlantic Quarterly","url":"https://www.academia.edu/Documents/in/South_Atlantic_Quarterly?f_ri=5523"},{"id":992337,"name":"Oceano Atlantico","url":"https://www.academia.edu/Documents/in/Oceano_Atlantico?f_ri=5523"},{"id":1019287,"name":"Marine Conservation Planning","url":"https://www.academia.edu/Documents/in/Marine_Conservation_Planning?f_ri=5523"},{"id":1139409,"name":"Atlántico Sur","url":"https://www.academia.edu/Documents/in/Atlantico_Sur?f_ri=5523"},{"id":1342538,"name":"Atlântico Negro","url":"https://www.academia.edu/Documents/in/Atlantico_Negro?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_27395101" data-work_id="27395101" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/27395101/FET%C3%96_Darbe_Giri%C5%9Fiminin_Asker%C3%AE_Analizi">FETÖ Darbe Girişiminin Askerî Analizi</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/27395101" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1242e196a660769c5d9eb5be0c889119" rel="nofollow" data-download="{"attachment_id":47649332,"asset_id":27395101,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/47649332/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="930416" href="https://arel.academia.edu/OktayBing%C3%B6l">Oktay Bingöl</a><script data-card-contents-for-user="930416" type="text/json">{"id":930416,"first_name":"Oktay","last_name":"Bingöl","domain_name":"arel","page_name":"OktayBingöl","display_name":"Oktay Bingöl","profile_url":"https://arel.academia.edu/OktayBing%C3%B6l?f_ri=5523","photo":"https://0.academia-photos.com/930416/349364/3535731/s65_oktay.bing_l.jpg"}</script></span></span></li><li class="js-paper-rank-work_27395101 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="27395101"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 27395101, container: ".js-paper-rank-work_27395101", }); });</script></li><li class="js-percentile-work_27395101 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 27395101; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_27395101"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_27395101 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="27395101"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 27395101; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=27395101]").text(description); $(".js-view-count-work_27395101").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_27395101").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="27395101"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3872" href="https://www.academia.edu/Documents/in/War_Studies">War Studies</a>, <script data-card-contents-for-ri="3872" type="text/json">{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>, <script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a><script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=27395101]'), work: {"id":27395101,"title":"FETÖ Darbe Girişiminin Askerî Analizi","created_at":"2016-07-30T09:09:22.392-07:00","url":"https://www.academia.edu/27395101/FET%C3%96_Darbe_Giri%C5%9Fiminin_Asker%C3%AE_Analizi?f_ri=5523","dom_id":"work_27395101","summary":null,"downloadable_attachments":[{"id":47649332,"asset_id":27395101,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":930416,"first_name":"Oktay","last_name":"Bingöl","domain_name":"arel","page_name":"OktayBingöl","display_name":"Oktay Bingöl","profile_url":"https://arel.academia.edu/OktayBing%C3%B6l?f_ri=5523","photo":"https://0.academia-photos.com/930416/349364/3535731/s65_oktay.bing_l.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=5523","nofollow":false},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38847275" data-work_id="38847275" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38847275/The_Theory_of_Regional_Security_Complexes_in_the_Middle_Eastern_Dimension">The Theory of Regional Security Complexes in the Middle Eastern Dimension</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Á e theory of regional security complexes developed by B. Buzan and O.Weaver describes the Middle Eastern regional security complex as astandard one, with apolarity determined by regional powers. It is also considered to be... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_38847275" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Á e theory of regional security complexes developed by B. Buzan and O.Weaver <br />describes the Middle Eastern regional security complex as astandard one, with <br />apolarity determined by regional powers. It is also considered to be atypical <br />con´ ict formation in terms of amity and enmity, where the politics of security is <br />shaped mainly by interrelations between the regional powers1. At the same time, <br />because of its global importance as aworld leading oil and gas supplier as well as <br />its geostrategic location, Middle East constantly draws great attention from main <br />international actors including all of the global and great powers. Á e security of <br />the region is also characterized by much greater, than in most other regions, dy-<br />namics and variability of the main issues of con´ ict.<br />Á is is clearly seen when one looks at the main sources of instability in the <br />region and reasons for con´ icts in the Middle Eastern states during last few de-<br />cades. Since the end of the Second World War and during an era of decoloni-<br />zation the Israeli-Arab con´ ict rose as acentral security issue. In the following <br />years, it has to acertain degree absorbed and overshadowed all the other secu-<br />rity issues. Since the decade of 1970. it became, however, less intense and impor-<br />tant. Á e Israeli-Arab con´ ict has been substituted by the Israeli-Palestinian one, <br />which has acompletely diÄ erent character and its actual position in the hierarchy <br />of regional security issues is incomparably lower. Much greater importance shall <br />now be paid to such problems and threats as the Islamic fundamentalism and <br />extremism as well as agrowing activity of armed and terrorist groups that base <br />those ideologies. Other central issues include sectarian and ethnic violence, in-<br />stability of political regimes and weakness of state structures, internal economic <br />and social problems in numerous countries, the regional arms race, or growing <br />con´ icts for resources and raw materials.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38847275" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b3f70af192b49b9994008fb0e8884056" rel="nofollow" data-download="{"attachment_id":58941799,"asset_id":38847275,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58941799/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="66979586" href="https://wroc.academia.edu/JaroslawJarzabek">Jaroslaw Jarzabek</a><script data-card-contents-for-user="66979586" type="text/json">{"id":66979586,"first_name":"Jaroslaw","last_name":"Jarzabek","domain_name":"wroc","page_name":"JaroslawJarzabek","display_name":"Jaroslaw Jarzabek","profile_url":"https://wroc.academia.edu/JaroslawJarzabek?f_ri=5523","photo":"https://0.academia-photos.com/66979586/17432319/17518235/s65_jaroslaw.jarzabek.jpg"}</script></span></span></li><li class="js-paper-rank-work_38847275 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38847275"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38847275, container: ".js-paper-rank-work_38847275", }); });</script></li><li class="js-percentile-work_38847275 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38847275; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38847275"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38847275 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38847275"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38847275; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38847275]").text(description); $(".js-view-count-work_38847275").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38847275").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38847275"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2015" href="https://www.academia.edu/Documents/in/Middle_East_Studies">Middle East Studies</a>, <script data-card-contents-for-ri="2015" type="text/json">{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a><script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38847275]'), work: {"id":38847275,"title":"The Theory of Regional Security Complexes in the Middle Eastern Dimension","created_at":"2019-04-18T00:26:53.419-07:00","url":"https://www.academia.edu/38847275/The_Theory_of_Regional_Security_Complexes_in_the_Middle_Eastern_Dimension?f_ri=5523","dom_id":"work_38847275","summary":"Á e theory of regional security complexes developed by B. Buzan and O.Weaver \ndescribes the Middle Eastern regional security complex as astandard one, with \napolarity determined by regional powers. It is also considered to be atypical \ncon´ ict formation in terms of amity and enmity, where the politics of security is \nshaped mainly by interrelations between the regional powers1. At the same time, \nbecause of its global importance as aworld leading oil and gas supplier as well as \nits geostrategic location, Middle East constantly draws great attention from main \ninternational actors including all of the global and great powers. Á e security of \nthe region is also characterized by much greater, than in most other regions, dy-\nnamics and variability of the main issues of con´ ict.\nÁ is is clearly seen when one looks at the main sources of instability in the \nregion and reasons for con´ icts in the Middle Eastern states during last few de-\ncades. Since the end of the Second World War and during an era of decoloni-\nzation the Israeli-Arab con´ ict rose as acentral security issue. In the following \nyears, it has to acertain degree absorbed and overshadowed all the other secu-\nrity issues. Since the decade of 1970. it became, however, less intense and impor-\ntant. Á e Israeli-Arab con´ ict has been substituted by the Israeli-Palestinian one, \nwhich has acompletely diÄ erent character and its actual position in the hierarchy \nof regional security issues is incomparably lower. Much greater importance shall \nnow be paid to such problems and threats as the Islamic fundamentalism and \nextremism as well as agrowing activity of armed and terrorist groups that base \nthose ideologies. Other central issues include sectarian and ethnic violence, in-\nstability of political regimes and weakness of state structures, internal economic \nand social problems in numerous countries, the regional arms race, or growing \ncon´ icts for resources and raw materials.","downloadable_attachments":[{"id":58941799,"asset_id":38847275,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":66979586,"first_name":"Jaroslaw","last_name":"Jarzabek","domain_name":"wroc","page_name":"JaroslawJarzabek","display_name":"Jaroslaw Jarzabek","profile_url":"https://wroc.academia.edu/JaroslawJarzabek?f_ri=5523","photo":"https://0.academia-photos.com/66979586/17432319/17518235/s65_jaroslaw.jarzabek.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34997591 coauthored" data-work_id="34997591" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34997591/Comparative_Kurdish_Politics_in_the_Middle_East_Actors_Ideas_and_Interests">Comparative Kurdish Politics in the Middle East: Actors, Ideas, and Interests</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This edited volume introduces the political, social and economic intra-Kurdish dynamics in the Middle East by comparatively analyzing the main actors, their ideas, and political interests. As an ethnic group and a nation in the making,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34997591" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This edited volume introduces the political, social and economic intra-Kurdish dynamics in the Middle East by comparatively analyzing the main actors, their ideas, and political interests. As an ethnic group and a nation in the making, Kurds are not homogeneous and united but rather the Kurdish Middle East is home to various competing political groups, leaderships, ideologies, and interests. Although many existing studies focus on the Kurds and their relations with the nation-states that they populate, few studies analyze the Kurdish Middle East within its own debates, conflicts and interests from a comparative perspective across Iran, Iraq, Turkey, and Syria. This book analyzes the intra-Kurdish dynamics with historically-grounded, theoretically-informed, and conceptually-relevant scholarship that prioritizes comparative politics over international relations.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34997591" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="45fe2a44cbe538cb007cb113c820ecf7" rel="nofollow" data-download="{"attachment_id":54862098,"asset_id":34997591,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54862098/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="120451" href="https://iue.academia.edu/SerhunAl">Serhun Al</a><script data-card-contents-for-user="120451" type="text/json">{"id":120451,"first_name":"Serhun","last_name":"Al","domain_name":"iue","page_name":"SerhunAl","display_name":"Serhun Al","profile_url":"https://iue.academia.edu/SerhunAl?f_ri=5523","photo":"https://0.academia-photos.com/120451/32344/104962071/s65_serhun.al.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-34997591">+1</span><div class="hidden js-additional-users-34997591"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://harvard.academia.edu/EmelElifTugdar">Emel Elif Tugdar</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-34997591'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-34997591').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_34997591 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34997591"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34997591, container: ".js-paper-rank-work_34997591", }); });</script></li><li class="js-percentile-work_34997591 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34997591; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34997591"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34997591 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34997591"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34997591; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34997591]").text(description); $(".js-view-count-work_34997591").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34997591").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34997591"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">27</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="796" href="https://www.academia.edu/Documents/in/Comparative_Politics">Comparative Politics</a>, <script data-card-contents-for-ri="796" type="text/json">{"id":796,"name":"Comparative Politics","url":"https://www.academia.edu/Documents/in/Comparative_Politics?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="802" href="https://www.academia.edu/Documents/in/Political_Economy">Political Economy</a>, <script data-card-contents-for-ri="802" type="text/json">{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1697" href="https://www.academia.edu/Documents/in/Violence">Violence</a><script data-card-contents-for-ri="1697" type="text/json">{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34997591]'), work: {"id":34997591,"title":"Comparative Kurdish Politics in the Middle East: Actors, Ideas, and Interests","created_at":"2017-10-30T05:05:01.631-07:00","url":"https://www.academia.edu/34997591/Comparative_Kurdish_Politics_in_the_Middle_East_Actors_Ideas_and_Interests?f_ri=5523","dom_id":"work_34997591","summary":"This edited volume introduces the political, social and economic intra-Kurdish dynamics in the Middle East by comparatively analyzing the main actors, their ideas, and political interests. As an ethnic group and a nation in the making, Kurds are not homogeneous and united but rather the Kurdish Middle East is home to various competing political groups, leaderships, ideologies, and interests. Although many existing studies focus on the Kurds and their relations with the nation-states that they populate, few studies analyze the Kurdish Middle East within its own debates, conflicts and interests from a comparative perspective across Iran, Iraq, Turkey, and Syria. This book analyzes the intra-Kurdish dynamics with historically-grounded, theoretically-informed, and conceptually-relevant scholarship that prioritizes comparative politics over international relations. ","downloadable_attachments":[{"id":54862098,"asset_id":34997591,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":120451,"first_name":"Serhun","last_name":"Al","domain_name":"iue","page_name":"SerhunAl","display_name":"Serhun Al","profile_url":"https://iue.academia.edu/SerhunAl?f_ri=5523","photo":"https://0.academia-photos.com/120451/32344/104962071/s65_serhun.al.jpg"},{"id":7824009,"first_name":"Emel Elif","last_name":"Tugdar","domain_name":"harvard","page_name":"EmelElifTugdar","display_name":"Emel Elif Tugdar","profile_url":"https://harvard.academia.edu/EmelElifTugdar?f_ri=5523","photo":"https://0.academia-photos.com/7824009/2827145/92811709/s65_emel_elif.tugdar.jpeg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false},{"id":796,"name":"Comparative Politics","url":"https://www.academia.edu/Documents/in/Comparative_Politics?f_ri=5523","nofollow":false},{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy?f_ri=5523","nofollow":false},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=5523","nofollow":false},{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=5523"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=5523"},{"id":5218,"name":"Iranian Studies","url":"https://www.academia.edu/Documents/in/Iranian_Studies?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5548,"name":"Kurdish Studies","url":"https://www.academia.edu/Documents/in/Kurdish_Studies?f_ri=5523"},{"id":5878,"name":"Nationalism","url":"https://www.academia.edu/Documents/in/Nationalism?f_ri=5523"},{"id":6117,"name":"History of Iran","url":"https://www.academia.edu/Documents/in/History_of_Iran?f_ri=5523"},{"id":8700,"name":"Turkish and Middle East Studies","url":"https://www.academia.edu/Documents/in/Turkish_and_Middle_East_Studies?f_ri=5523"},{"id":10678,"name":"Human Security","url":"https://www.academia.edu/Documents/in/Human_Security?f_ri=5523"},{"id":10966,"name":"Turkey","url":"https://www.academia.edu/Documents/in/Turkey?f_ri=5523"},{"id":11358,"name":"Secession","url":"https://www.academia.edu/Documents/in/Secession?f_ri=5523"},{"id":12029,"name":"Modern Middle East History","url":"https://www.academia.edu/Documents/in/Modern_Middle_East_History?f_ri=5523"},{"id":15391,"name":"Syria","url":"https://www.academia.edu/Documents/in/Syria?f_ri=5523"},{"id":15866,"name":"Islam","url":"https://www.academia.edu/Documents/in/Islam?f_ri=5523"},{"id":15899,"name":"Kurdish Question in Turkey","url":"https://www.academia.edu/Documents/in/Kurdish_Question_in_Turkey?f_ri=5523"},{"id":18623,"name":"Middle East Politics","url":"https://www.academia.edu/Documents/in/Middle_East_Politics?f_ri=5523"},{"id":24748,"name":"Ethnicity","url":"https://www.academia.edu/Documents/in/Ethnicity?f_ri=5523"},{"id":28981,"name":"Ethnic Conflict and Civil War","url":"https://www.academia.edu/Documents/in/Ethnic_Conflict_and_Civil_War?f_ri=5523"},{"id":30614,"name":"Kurdish Nationalism","url":"https://www.academia.edu/Documents/in/Kurdish_Nationalism?f_ri=5523"},{"id":39474,"name":"Kurdistan","url":"https://www.academia.edu/Documents/in/Kurdistan?f_ri=5523"},{"id":43520,"name":"Middle East","url":"https://www.academia.edu/Documents/in/Middle_East?f_ri=5523"},{"id":49550,"name":"Arab world","url":"https://www.academia.edu/Documents/in/Arab_world?f_ri=5523"},{"id":117970,"name":"Kurdish history","url":"https://www.academia.edu/Documents/in/Kurdish_history?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11866203" data-work_id="11866203" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/11866203/ESTUDOS_DE_INTELLIGENCE">ESTUDOS DE INTELLIGENCE</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">(Publicado com capa diferente em 2011: Pedro Borges Graça (Coord.) Estudos de Intelligence, Lisboa, Centro de Administração e Políticas Públicas do Instituto Superior de Ciências Sociais e Políticas da Universidade Técnica de Lisboa)</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11866203" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="0bb839a8cc21950064201f2224b5d6d8" rel="nofollow" data-download="{"attachment_id":37257116,"asset_id":11866203,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/37257116/download_file?st=MTczMzI2NzkyMCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="741545" href="https://lisboa.academia.edu/PedroBorgesGraca">Pedro Borges Graca</a><script data-card-contents-for-user="741545" type="text/json">{"id":741545,"first_name":"Pedro","last_name":"Borges Graca","domain_name":"lisboa","page_name":"PedroBorgesGraca","display_name":"Pedro Borges Graca","profile_url":"https://lisboa.academia.edu/PedroBorgesGraca?f_ri=5523","photo":"https://0.academia-photos.com/741545/4958358/5695498/s65_pedro.borges_graca.jpg"}</script></span></span></li><li class="js-paper-rank-work_11866203 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11866203"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11866203, container: ".js-paper-rank-work_11866203", }); });</script></li><li class="js-percentile-work_11866203 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11866203; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11866203"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11866203 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11866203"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11866203; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11866203]").text(description); $(".js-view-count-work_11866203").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11866203").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11866203"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">33</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1911" href="https://www.academia.edu/Documents/in/International_Studies">International Studies</a>, <script data-card-contents-for-ri="1911" type="text/json">{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2052" href="https://www.academia.edu/Documents/in/Intelligence_Studies">Intelligence Studies</a>, <script data-card-contents-for-ri="2052" type="text/json">{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2674" href="https://www.academia.edu/Documents/in/Intelligence">Intelligence</a><script data-card-contents-for-ri="2674" type="text/json">{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11866203]'), work: {"id":11866203,"title":"ESTUDOS DE INTELLIGENCE","created_at":"2015-04-09T05:53:58.525-07:00","url":"https://www.academia.edu/11866203/ESTUDOS_DE_INTELLIGENCE?f_ri=5523","dom_id":"work_11866203","summary":"(Publicado com capa diferente em 2011: Pedro Borges Graça (Coord.) Estudos de Intelligence, Lisboa, Centro de Administração e Políticas Públicas do Instituto Superior de Ciências Sociais e Políticas da Universidade Técnica de Lisboa)","downloadable_attachments":[{"id":37257116,"asset_id":11866203,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":741545,"first_name":"Pedro","last_name":"Borges Graca","domain_name":"lisboa","page_name":"PedroBorgesGraca","display_name":"Pedro Borges Graca","profile_url":"https://lisboa.academia.edu/PedroBorgesGraca?f_ri=5523","photo":"https://0.academia-photos.com/741545/4958358/5695498/s65_pedro.borges_graca.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=5523","nofollow":false},{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies?f_ri=5523","nofollow":false},{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=5523","nofollow":false},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523"},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":12628,"name":"Intelligence and Espionage","url":"https://www.academia.edu/Documents/in/Intelligence_and_Espionage?f_ri=5523"},{"id":37359,"name":"National Security (Intelligence)","url":"https://www.academia.edu/Documents/in/National_Security_Intelligence_?f_ri=5523"},{"id":49837,"name":"Historia","url":"https://www.academia.edu/Documents/in/Historia?f_ri=5523"},{"id":57845,"name":"Defence and Security","url":"https://www.academia.edu/Documents/in/Defence_and_Security?f_ri=5523"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=5523"},{"id":90307,"name":"Strategic Intelligence","url":"https://www.academia.edu/Documents/in/Strategic_Intelligence?f_ri=5523"},{"id":104788,"name":"História","url":"https://www.academia.edu/Documents/in/Hist%C3%B3ria?f_ri=5523"},{"id":116324,"name":"Strategic and Security Studies","url":"https://www.academia.edu/Documents/in/Strategic_and_Security_Studies?f_ri=5523"},{"id":119358,"name":"Defense and National Security","url":"https://www.academia.edu/Documents/in/Defense_and_National_Security?f_ri=5523"},{"id":126752,"name":"Inteligencia","url":"https://www.academia.edu/Documents/in/Inteligencia?f_ri=5523"},{"id":137587,"name":"International Relations, Security, Strategic Studies, Politics","url":"https://www.academia.edu/Documents/in/International_Relations_Security_Strategic_Studies_Politics?f_ri=5523"},{"id":152436,"name":"Segurança Internacional","url":"https://www.academia.edu/Documents/in/Seguranca_Internacional?f_ri=5523"},{"id":174704,"name":"Defence and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defence_and_Strategic_Studies?f_ri=5523"},{"id":214384,"name":"Serviços De Informações Portugueses","url":"https://www.academia.edu/Documents/in/Servicos_De_Informacoes_Portugueses?f_ri=5523"},{"id":249231,"name":"Historia Contemporánea de España","url":"https://www.academia.edu/Documents/in/Historia_Contempor%C3%A1nea_de_Espa%C3%B1a?f_ri=5523"},{"id":263099,"name":"History and Strategic Studies","url":"https://www.academia.edu/Documents/in/History_and_Strategic_Studies?f_ri=5523"},{"id":270026,"name":"International Studies and Politics","url":"https://www.academia.edu/Documents/in/International_Studies_and_Politics?f_ri=5523"},{"id":294517,"name":"Defense and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defense_and_Strategic_Studies?f_ri=5523"},{"id":304036,"name":"Estudos de Defesa, Defesa Estratégica, Segurança Estratégica, Segurança Externa, Segurança Interna, Segurança Pública, Gestão Estratégica Internacional, Sistema Interestatal, Guerras e Conflitos, Poder, Ciência Política, Sociologia, Antropologia.","url":"https://www.academia.edu/Documents/in/Estudos_de_Defesa_Defesa_Estrategica_Seguranca_Estrategica_Seguranca_Externa_Seguranca_Interna_?f_ri=5523"},{"id":346639,"name":"Intelligence and security studies","url":"https://www.academia.edu/Documents/in/Intelligence_and_security_studies?f_ri=5523"},{"id":408442,"name":"Intelligence Services","url":"https://www.academia.edu/Documents/in/Intelligence_Services?f_ri=5523"},{"id":413624,"name":"Security Inteligence Analysis","url":"https://www.academia.edu/Documents/in/Security_Inteligence_Analysis?f_ri=5523"},{"id":426762,"name":"Segurança","url":"https://www.academia.edu/Documents/in/Seguran%C3%A7a?f_ri=5523"},{"id":1033868,"name":"Intelligence and Strategic Studies","url":"https://www.academia.edu/Documents/in/Intelligence_and_Strategic_Studies?f_ri=5523"},{"id":1249599,"name":"Serviço de inteligência","url":"https://www.academia.edu/Documents/in/Servico_de_inteligencia?f_ri=5523"},{"id":1249601,"name":"Segurança interna","url":"https://www.academia.edu/Documents/in/Seguranca_interna?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34952092 coauthored" data-work_id="34952092" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34952092/From_Cyber_Threats_to_Cyber_Risks">From Cyber Threats to Cyber Risks</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Chapter 2 in Friis and Ringsmose eds.: Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, London: Routledge, 2016.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34952092" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e272626d164a0f69b617363b5cc2c378" rel="nofollow" data-download="{"attachment_id":54814207,"asset_id":34952092,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54814207/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="14008429" href="https://nupi.academia.edu/KarstenFriis">Karsten Friis</a><script data-card-contents-for-user="14008429" type="text/json">{"id":14008429,"first_name":"Karsten","last_name":"Friis","domain_name":"nupi","page_name":"KarstenFriis","display_name":"Karsten Friis","profile_url":"https://nupi.academia.edu/KarstenFriis?f_ri=5523","photo":"https://0.academia-photos.com/14008429/21638314/20974868/s65_karsten.friis.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-34952092">+1</span><div class="hidden js-additional-users-34952092"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://nupi.academia.edu/ErikReichborn">Erik Reichborn</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-34952092'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-34952092').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_34952092 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34952092"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34952092, container: ".js-paper-rank-work_34952092", }); });</script></li><li class="js-percentile-work_34952092 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34952092; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34952092"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34952092 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34952092"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34952092; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34952092]").text(description); $(".js-view-count-work_34952092").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34952092").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34952092"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34952092]'), work: {"id":34952092,"title":"From Cyber Threats to Cyber Risks","created_at":"2017-10-25T00:45:57.405-07:00","url":"https://www.academia.edu/34952092/From_Cyber_Threats_to_Cyber_Risks?f_ri=5523","dom_id":"work_34952092","summary":"Chapter 2 in Friis and Ringsmose eds.: Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, London: Routledge, 2016.","downloadable_attachments":[{"id":54814207,"asset_id":34952092,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":14008429,"first_name":"Karsten","last_name":"Friis","domain_name":"nupi","page_name":"KarstenFriis","display_name":"Karsten Friis","profile_url":"https://nupi.academia.edu/KarstenFriis?f_ri=5523","photo":"https://0.academia-photos.com/14008429/21638314/20974868/s65_karsten.friis.jpg"},{"id":3275669,"first_name":"Erik","last_name":"Reichborn","domain_name":"nupi","page_name":"ErikReichborn","display_name":"Erik Reichborn","profile_url":"https://nupi.academia.edu/ErikReichborn?f_ri=5523","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37292170" data-work_id="37292170" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37292170/Biotechnologies_and_Human_Dignity">Biotechnologies and Human Dignity</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Modern biotechnologies are among the reasons explaining the new focus on the idea of human dignity in public, political and scientific discourses. Topics being debated range from assisted reproduction, cloning, genetic diagnostics and... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37292170" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Modern biotechnologies are among the reasons explaining the new focus on the idea of human dignity in public, political and scientific discourses. Topics being debated range from assisted reproduction, cloning, genetic diagnostics and genetic intervention, neuroprosthetics, cyborgs or artificial life all the way to visions of 'transhumanism' or 'posthumanity'. With their potential for bringing about radical transformations, advanced biotechnologies are forcing the notion and boundaries of what is human to be revisited. The biological foundations of humankind are more and more accessible , can be modified in a targeted way, and thus become the object of decisions. Naturalistic self-descriptions are being questioned and replaced by forms of description which are explicitly culturally constructed. We have to rethink the very question of what it means to be human and how we are to construct human boundaries or the difference between human beings and their environment. This creates a new background for the nor-mative concepts of human rights, rights of the individual and human dignity. Through reference to the dignity of a human being and to the idea of dignity, the concept of human dignity implies notions attached to what constitutes being human. This fundamental meaning is supported by the multifarious traditions of human dignity, by its function as a key concept in interdisciplinary debates and not least by its prominent status in legal texts and discourses. Views of the role of human dignity, though, could not be more divergent. The conviction that dignity is an essential norma-tive concept is juxtaposed with criticism that it is useless, nebulous, incoherent or even reactionary.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37292170" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="545d5a4ca1a7620146f8c2d20ec2d799" rel="nofollow" data-download="{"attachment_id":57247453,"asset_id":37292170,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57247453/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="89403567" href="https://uni-hamburg.academia.edu/MarionAlbers">Marion Albers</a><script data-card-contents-for-user="89403567" type="text/json">{"id":89403567,"first_name":"Marion","last_name":"Albers","domain_name":"uni-hamburg","page_name":"MarionAlbers","display_name":"Marion Albers","profile_url":"https://uni-hamburg.academia.edu/MarionAlbers?f_ri=5523","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_37292170 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37292170"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37292170, container: ".js-paper-rank-work_37292170", }); });</script></li><li class="js-percentile-work_37292170 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37292170; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37292170"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37292170 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37292170"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37292170; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37292170]").text(description); $(".js-view-count-work_37292170").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37292170").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37292170"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1759" href="https://www.academia.edu/Documents/in/Internet_Studies">Internet Studies</a>, <script data-card-contents-for-ri="1759" type="text/json">{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3660" href="https://www.academia.edu/Documents/in/Global_Governance">Global Governance</a>, <script data-card-contents-for-ri="3660" type="text/json">{"id":3660,"name":"Global Governance","url":"https://www.academia.edu/Documents/in/Global_Governance?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="12834" href="https://www.academia.edu/Documents/in/Health_Law">Health Law</a><script data-card-contents-for-ri="12834" type="text/json">{"id":12834,"name":"Health Law","url":"https://www.academia.edu/Documents/in/Health_Law?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37292170]'), work: {"id":37292170,"title":"Biotechnologies and Human Dignity","created_at":"2018-08-26T00:53:55.165-07:00","url":"https://www.academia.edu/37292170/Biotechnologies_and_Human_Dignity?f_ri=5523","dom_id":"work_37292170","summary":"Modern biotechnologies are among the reasons explaining the new focus on the idea of human dignity in public, political and scientific discourses. Topics being debated range from assisted reproduction, cloning, genetic diagnostics and genetic intervention, neuroprosthetics, cyborgs or artificial life all the way to visions of 'transhumanism' or 'posthumanity'. With their potential for bringing about radical transformations, advanced biotechnologies are forcing the notion and boundaries of what is human to be revisited. The biological foundations of humankind are more and more accessible , can be modified in a targeted way, and thus become the object of decisions. Naturalistic self-descriptions are being questioned and replaced by forms of description which are explicitly culturally constructed. We have to rethink the very question of what it means to be human and how we are to construct human boundaries or the difference between human beings and their environment. This creates a new background for the nor-mative concepts of human rights, rights of the individual and human dignity. Through reference to the dignity of a human being and to the idea of dignity, the concept of human dignity implies notions attached to what constitutes being human. This fundamental meaning is supported by the multifarious traditions of human dignity, by its function as a key concept in interdisciplinary debates and not least by its prominent status in legal texts and discourses. Views of the role of human dignity, though, could not be more divergent. The conviction that dignity is an essential norma-tive concept is juxtaposed with criticism that it is useless, nebulous, incoherent or even reactionary.","downloadable_attachments":[{"id":57247453,"asset_id":37292170,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":89403567,"first_name":"Marion","last_name":"Albers","domain_name":"uni-hamburg","page_name":"MarionAlbers","display_name":"Marion Albers","profile_url":"https://uni-hamburg.academia.edu/MarionAlbers?f_ri=5523","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1759,"name":"Internet Studies","url":"https://www.academia.edu/Documents/in/Internet_Studies?f_ri=5523","nofollow":false},{"id":3660,"name":"Global Governance","url":"https://www.academia.edu/Documents/in/Global_Governance?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":12834,"name":"Health Law","url":"https://www.academia.edu/Documents/in/Health_Law?f_ri=5523","nofollow":false},{"id":92007,"name":"Privacy and data protection","url":"https://www.academia.edu/Documents/in/Privacy_and_data_protection?f_ri=5523"},{"id":1795258,"name":"International biolaw","url":"https://www.academia.edu/Documents/in/International_biolaw?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_7277407" data-work_id="7277407" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/7277407/Physical_Security_Historical_perspectives_and_operations">Physical Security: Historical perspectives and operations</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_7277407" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers for security protection because the evolution of human beings has not changed since the beginning of time. Applicable lessons are applied to all aspects of security to include physical, technical, personnel, information and operational security. The article provides examples of the original concept of access controls, vaulted areas, chemical warfare, and the origins of physical security.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/7277407" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="30b9a3e26556e886acf6f0e998ebceea" rel="nofollow" data-download="{"attachment_id":33887710,"asset_id":7277407,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/33887710/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2813554" href="https://csus.academia.edu/DrCraigJohnson">Dr. Craig T . Johnson</a><script data-card-contents-for-user="2813554" type="text/json">{"id":2813554,"first_name":"Dr. Craig","last_name":"Johnson","domain_name":"csus","page_name":"DrCraigJohnson","display_name":"Dr. Craig T . Johnson","profile_url":"https://csus.academia.edu/DrCraigJohnson?f_ri=5523","photo":"https://0.academia-photos.com/2813554/918236/1150182/s65_dr._craig_t..johnson.jpg"}</script></span></span></li><li class="js-paper-rank-work_7277407 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="7277407"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 7277407, container: ".js-paper-rank-work_7277407", }); });</script></li><li class="js-percentile-work_7277407 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7277407; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_7277407"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_7277407 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="7277407"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7277407; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7277407]").text(description); $(".js-view-count-work_7277407").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_7277407").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="7277407"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">22</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="491" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>, <script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>, <script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4370" href="https://www.academia.edu/Documents/in/Security">Security</a>, <script data-card-contents-for-ri="4370" type="text/json">{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5282" href="https://www.academia.edu/Documents/in/Design_Research">Design Research</a><script data-card-contents-for-ri="5282" type="text/json">{"id":5282,"name":"Design Research","url":"https://www.academia.edu/Documents/in/Design_Research?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=7277407]'), work: {"id":7277407,"title":"Physical Security: Historical perspectives and operations","created_at":"2014-06-06T09:54:53.811-07:00","url":"https://www.academia.edu/7277407/Physical_Security_Historical_perspectives_and_operations?f_ri=5523","dom_id":"work_7277407","summary":"This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers for security protection because the evolution of human beings has not changed since the beginning of time. Applicable lessons are applied to all aspects of security to include physical, technical, personnel, information and operational security. The article provides examples of the original concept of access controls, vaulted areas, chemical warfare, and the origins of physical security. ","downloadable_attachments":[{"id":33887710,"asset_id":7277407,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2813554,"first_name":"Dr. Craig","last_name":"Johnson","domain_name":"csus","page_name":"DrCraigJohnson","display_name":"Dr. Craig T . Johnson","profile_url":"https://csus.academia.edu/DrCraigJohnson?f_ri=5523","photo":"https://0.academia-photos.com/2813554/918236/1150182/s65_dr._craig_t..johnson.jpg"}],"research_interests":[{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=5523","nofollow":false},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=5523","nofollow":false},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false},{"id":5282,"name":"Design Research","url":"https://www.academia.edu/Documents/in/Design_Research?f_ri=5523","nofollow":false},{"id":5380,"name":"Homeland Security","url":"https://www.academia.edu/Documents/in/Homeland_Security?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":10678,"name":"Human Security","url":"https://www.academia.edu/Documents/in/Human_Security?f_ri=5523"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=5523"},{"id":21939,"name":"Environmental Security","url":"https://www.academia.edu/Documents/in/Environmental_Security?f_ri=5523"},{"id":38360,"name":"Food Security","url":"https://www.academia.edu/Documents/in/Food_Security?f_ri=5523"},{"id":44778,"name":"Common Security and Defense Policy","url":"https://www.academia.edu/Documents/in/Common_Security_and_Defense_Policy?f_ri=5523"},{"id":57256,"name":"Common Security and Defence Policy","url":"https://www.academia.edu/Documents/in/Common_Security_and_Defence_Policy?f_ri=5523"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=5523"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523"},{"id":127895,"name":"Non-Traditional Security","url":"https://www.academia.edu/Documents/in/Non-Traditional_Security?f_ri=5523"},{"id":188414,"name":"Information Security Management","url":"https://www.academia.edu/Documents/in/Information_Security_Management?f_ri=5523"},{"id":214586,"name":"Physical security","url":"https://www.academia.edu/Documents/in/Physical_security?f_ri=5523"},{"id":215782,"name":"Security and Defence Studies","url":"https://www.academia.edu/Documents/in/Security_and_Defence_Studies?f_ri=5523"},{"id":221987,"name":"Physical layer security","url":"https://www.academia.edu/Documents/in/Physical_layer_security?f_ri=5523"},{"id":556750,"name":"Physical security, risk management, security management","url":"https://www.academia.edu/Documents/in/Physical_security_risk_management_security_management?f_ri=5523"},{"id":876053,"name":"Physical Security Systems","url":"https://www.academia.edu/Documents/in/Physical_Security_Systems?f_ri=5523"},{"id":913309,"name":"Physical Security Technology","url":"https://www.academia.edu/Documents/in/Physical_Security_Technology?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_45599963" data-work_id="45599963" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/45599963/T%C3%9CRK_KAMU_SEKT%C3%96R%C3%9CNDE_B%C4%B0LG%C4%B0_VE_B%C4%B0L%C4%B0%C5%9E%C4%B0M_G%C3%9CVENL%C4%B0%C4%9E%C4%B0">TÜRK KAMU SEKTÖRÜNDE BİLGİ VE BİLİŞİM GÜVENLİĞİ</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">TÜRK KAMU SEKTÖRÜNDE BİLGİ VE BİLİŞİM GÜVENLİĞİ ÖZ Bu çalışmanın ana amacı, Türk kamu sektöründe bilgi ve bilişim güvenliğinin mevcut durum tespitini yaparak, buradan hareketle birtakım analiz, değerlendirme ve önerilerde bulunmaktır.... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_45599963" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">TÜRK KAMU SEKTÖRÜNDE BİLGİ VE BİLİŞİM GÜVENLİĞİ<br />ÖZ<br /><br />Bu çalışmanın ana amacı, Türk kamu sektöründe bilgi ve bilişim güvenliğinin mevcut durum tespitini yaparak, buradan hareketle birtakım analiz, değerlendirme ve önerilerde bulunmaktır. Belirtilen amaca varmak için öncelikle siber güvenlik kavramı başta olmak üzere, Türkiye’de bilgi ve bilişim güvenliğiyle ilintili kurum ve kuruluşlara yer verilmiştir. Aynı zamanda bu kurum ve kuruluşların sorumlulukları ve görev alanları değerlendirilmiştir. Daha sonra içeriden ve dışarıdan, rekabete ve saldırılara karşı koyabilecek bir bilgi ve bilişim sektörüne sahip olmamız için neler yapılması gerektiği açıklanmıştır. Çalışmanın verileri, ikincil kaynaklara ve ilgili güncel literatüre dayanmaktadır. Diğer bir deyişle, çalışma için gereksinim duyulan veriler, özellikle alanda faaliyet gösteren yetkili ve sorumlu kamu kurumlarından -Ulaştırma ve Altyapı Bakanlığı (UAB), Bilişim Teknolojileri ve İletişim Kurumu (BTK), Siber Güvenlik Kurulu (SGK), Ulusal Siber Olaylara Müdahale Merkezi (USOM), Ulusal Kamu Entegre Veri Merkezi (KEVM), Cumhurbaşkanlığı Dijital Dönüşüm Ofisi (CB-DDO) vb.- web sayfaları, yasal mevzuat, raporlar ile alanda yapılmış akademik yayınlardan derlenmiş ve daha sonra çalışmanın amaçları doğrultusunda analiz edilerek kullanılmıştır. Çalışma, bu alanda ülkemizde önemli adımlar atılmış olmakla birlikte, özellikle ileri düzeyde karşı koymalara hazırlıklı olunması gerektiğini tespit etmiş ve bu konuda hem ilgili profesyonellerde ve hem de toplumda bir farkındalık yaratmanın gerekliliği sonucuna varmıştır.<br /><br />Anahtar Kelimeler: Bilgi, Bilişim, Güvenlik, Bilgi ve Bilişim Güvenliği, Siber Güvenlik, Türkiye<br /><br /> ABSTRACT<br /><br />The aim of this paper is to determine the current situation of information and informatics security in the Turkish public sector. In order to achieve the aim, firstly, starting with the concept of cyber security, the main institutions which are in charge of information and informatics security are defined and explained. Later, it is discussed that how Turkey can challenge and confront the cyber competitions and attacks come from both inside and outside. The data needed were gathered from the secondary data related to these intsitutions, mainly the institutions which are in charge of the information and informatics security, i.e., Ministry of Transportation and Infra-structure (UAB), The Institution of Informatics Technologies and Communication (BTK), Cyber Security Board (SGK), National Center for Counteracting to Security Attacks (USOM), National Public Data Integrated Center (KEVM), Presidency Digital Transformation Office (CB-DDO) and their web sites, and reports. The collected data are evaluated and analysed in order to achieve the aims of study. The study is concluded that although there are important improvements, the informatics security in Turkey still does need further and counter works to be done, and also to create an awareness for both institutional professionals and citizens in society.<br /><br />Keywords: Information, Informatics, Security, Information and Informatics Security, Cyber Security, Turkey.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/45599963" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3040bf2a5d2296a3cdf8e1c2b3ac4ad6" rel="nofollow" data-download="{"attachment_id":66083265,"asset_id":45599963,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/66083265/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="57337242" href="https://hacettepe.academia.edu/ACaglar">Ali Caglar</a><script data-card-contents-for-user="57337242" type="text/json">{"id":57337242,"first_name":"Ali","last_name":"Caglar","domain_name":"hacettepe","page_name":"ACaglar","display_name":"Ali Caglar","profile_url":"https://hacettepe.academia.edu/ACaglar?f_ri=5523","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_45599963 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="45599963"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 45599963, container: ".js-paper-rank-work_45599963", }); });</script></li><li class="js-percentile-work_45599963 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 45599963; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_45599963"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_45599963 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="45599963"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 45599963; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=45599963]").text(description); $(".js-view-count-work_45599963").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_45599963").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="45599963"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1230" href="https://www.academia.edu/Documents/in/Social_Research_Methods_and_Methodology">Social Research Methods and Methodology</a>, <script data-card-contents-for-ri="1230" type="text/json">{"id":1230,"name":"Social Research Methods and Methodology","url":"https://www.academia.edu/Documents/in/Social_Research_Methods_and_Methodology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7369" href="https://www.academia.edu/Documents/in/Political_communication">Political communication</a>, <script data-card-contents-for-ri="7369" type="text/json">{"id":7369,"name":"Political communication","url":"https://www.academia.edu/Documents/in/Political_communication?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="14730" href="https://www.academia.edu/Documents/in/Migration_Studies">Migration Studies</a><script data-card-contents-for-ri="14730" type="text/json">{"id":14730,"name":"Migration Studies","url":"https://www.academia.edu/Documents/in/Migration_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=45599963]'), work: {"id":45599963,"title":"TÜRK KAMU SEKTÖRÜNDE BİLGİ VE BİLİŞİM GÜVENLİĞİ","created_at":"2021-03-23T04:14:04.477-07:00","url":"https://www.academia.edu/45599963/T%C3%9CRK_KAMU_SEKT%C3%96R%C3%9CNDE_B%C4%B0LG%C4%B0_VE_B%C4%B0L%C4%B0%C5%9E%C4%B0M_G%C3%9CVENL%C4%B0%C4%9E%C4%B0?f_ri=5523","dom_id":"work_45599963","summary":"TÜRK KAMU SEKTÖRÜNDE BİLGİ VE BİLİŞİM GÜVENLİĞİ\nÖZ\n\nBu çalışmanın ana amacı, Türk kamu sektöründe bilgi ve bilişim güvenliğinin mevcut durum tespitini yaparak, buradan hareketle birtakım analiz, değerlendirme ve önerilerde bulunmaktır. Belirtilen amaca varmak için öncelikle siber güvenlik kavramı başta olmak üzere, Türkiye’de bilgi ve bilişim güvenliğiyle ilintili kurum ve kuruluşlara yer verilmiştir. Aynı zamanda bu kurum ve kuruluşların sorumlulukları ve görev alanları değerlendirilmiştir. Daha sonra içeriden ve dışarıdan, rekabete ve saldırılara karşı koyabilecek bir bilgi ve bilişim sektörüne sahip olmamız için neler yapılması gerektiği açıklanmıştır. Çalışmanın verileri, ikincil kaynaklara ve ilgili güncel literatüre dayanmaktadır. Diğer bir deyişle, çalışma için gereksinim duyulan veriler, özellikle alanda faaliyet gösteren yetkili ve sorumlu kamu kurumlarından -Ulaştırma ve Altyapı Bakanlığı (UAB), Bilişim Teknolojileri ve İletişim Kurumu (BTK), Siber Güvenlik Kurulu (SGK), Ulusal Siber Olaylara Müdahale Merkezi (USOM), Ulusal Kamu Entegre Veri Merkezi (KEVM), Cumhurbaşkanlığı Dijital Dönüşüm Ofisi (CB-DDO) vb.- web sayfaları, yasal mevzuat, raporlar ile alanda yapılmış akademik yayınlardan derlenmiş ve daha sonra çalışmanın amaçları doğrultusunda analiz edilerek kullanılmıştır. Çalışma, bu alanda ülkemizde önemli adımlar atılmış olmakla birlikte, özellikle ileri düzeyde karşı koymalara hazırlıklı olunması gerektiğini tespit etmiş ve bu konuda hem ilgili profesyonellerde ve hem de toplumda bir farkındalık yaratmanın gerekliliği sonucuna varmıştır.\n\nAnahtar Kelimeler: Bilgi, Bilişim, Güvenlik, Bilgi ve Bilişim Güvenliği, Siber Güvenlik, Türkiye\n\n\tABSTRACT\n\nThe aim of this paper is to determine the current situation of information and informatics security in the Turkish public sector. In order to achieve the aim, firstly, starting with the concept of cyber security, the main institutions which are in charge of information and informatics security are defined and explained. Later, it is discussed that how Turkey can challenge and confront the cyber competitions and attacks come from both inside and outside. The data needed were gathered from the secondary data related to these intsitutions, mainly the institutions which are in charge of the information and informatics security, i.e., Ministry of Transportation and Infra-structure (UAB), The Institution of Informatics Technologies and Communication (BTK), Cyber Security Board (SGK), National Center for Counteracting to Security Attacks (USOM), National Public Data Integrated Center (KEVM), Presidency Digital Transformation Office (CB-DDO) and their web sites, and reports. The collected data are evaluated and analysed in order to achieve the aims of study. The study is concluded that although there are important improvements, the informatics security in Turkey still does need further and counter works to be done, and also to create an awareness for both institutional professionals and citizens in society.\n\nKeywords: Information, Informatics, Security, Information and Informatics Security, Cyber Security, Turkey.\n","downloadable_attachments":[{"id":66083265,"asset_id":45599963,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":57337242,"first_name":"Ali","last_name":"Caglar","domain_name":"hacettepe","page_name":"ACaglar","display_name":"Ali Caglar","profile_url":"https://hacettepe.academia.edu/ACaglar?f_ri=5523","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":1230,"name":"Social Research Methods and Methodology","url":"https://www.academia.edu/Documents/in/Social_Research_Methods_and_Methodology?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":7369,"name":"Political communication","url":"https://www.academia.edu/Documents/in/Political_communication?f_ri=5523","nofollow":false},{"id":14730,"name":"Migration Studies","url":"https://www.academia.edu/Documents/in/Migration_Studies?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_32065942" data-work_id="32065942" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/32065942/Floyd_Extraordinary_or_ordinary_measures_for_PURE_docx_draft_of_paper_published_in_Cambridge_Review_of_International_Affairs_2016_">Floyd Extraordinary or ordinary measures for PURE.docx (draft of paper published in Cambridge Review of International Affairs, 2016)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This paper is concerned with two interrelated problems in the Copenhagen School’s (CS) securitization theory. The first is the challenge non-exceptional security polices pose to the theory, which starts from the assumption that... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_32065942" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This paper is concerned with two interrelated problems in the Copenhagen School’s (CS) securitization theory. The first is the challenge non-exceptional security polices pose to the theory, which starts from the assumption that securitization is ‘successful’ only when extraordinary emergency measures are adopted. The second arises not from what factors define securitization’s ‘success’, but rather from who does so. Securitization theory suffers from a constructivist deficit because the criterion for the ‘success’ of securitization is set by scholars, when a more ‘radically constructivist [theory] regarding security’ (Buzan et al., 1998: 204) would require practitioners to be in charge of defining the ‘success’ of securitization. The paper offers a solution to both of these problems by suggesting that securitization is ‘successful’ only when (1) the identification of a threat that justifies a response (securitizing move) is followed by (2) a change of behaviour (action) by a relevant agent (that is, the securitizing actor or someone instructed by the same), and also (3) the action taken is justified by the securitizing actor with reference to the threat he/she identified and declared in the securitizing move. It goes on to reject the ideas of a sanctioning audience and of the insistence on existential threats as also set by the CS.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/32065942" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5c2364251a1d013814324dbf04baf37e" rel="nofollow" data-download="{"attachment_id":52324123,"asset_id":32065942,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/52324123/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="13409608" href="https://bham.academia.edu/RitaFloyd">Rita Floyd</a><script data-card-contents-for-user="13409608" type="text/json">{"id":13409608,"first_name":"Rita","last_name":"Floyd","domain_name":"bham","page_name":"RitaFloyd","display_name":"Rita Floyd","profile_url":"https://bham.academia.edu/RitaFloyd?f_ri=5523","photo":"https://0.academia-photos.com/13409608/10382283/35178834/s65_rita.floyd.jpg"}</script></span></span></li><li class="js-paper-rank-work_32065942 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="32065942"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 32065942, container: ".js-paper-rank-work_32065942", }); });</script></li><li class="js-percentile-work_32065942 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 32065942; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_32065942"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_32065942 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="32065942"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 32065942; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=32065942]").text(description); $(".js-view-count-work_32065942").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_32065942").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="32065942"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a><script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=32065942]'), work: {"id":32065942,"title":"Floyd Extraordinary or ordinary measures for PURE.docx (draft of paper published in Cambridge Review of International Affairs, 2016)","created_at":"2017-03-27T04:37:23.012-07:00","url":"https://www.academia.edu/32065942/Floyd_Extraordinary_or_ordinary_measures_for_PURE_docx_draft_of_paper_published_in_Cambridge_Review_of_International_Affairs_2016_?f_ri=5523","dom_id":"work_32065942","summary":"This paper is concerned with two interrelated problems in the Copenhagen School’s (CS) securitization theory. The first is the challenge non-exceptional security polices pose to the theory, which starts from the assumption that securitization is ‘successful’ only when extraordinary emergency measures are adopted. The second arises not from what factors define securitization’s ‘success’, but rather from who does so. Securitization theory suffers from a constructivist deficit because the criterion for the ‘success’ of securitization is set by scholars, when a more ‘radically constructivist [theory] regarding security’ (Buzan et al., 1998: 204) would require practitioners to be in charge of defining the ‘success’ of securitization. The paper offers a solution to both of these problems by suggesting that securitization is ‘successful’ only when (1) the identification of a threat that justifies a response (securitizing move) is followed by (2) a change of behaviour (action) by a relevant agent (that is, the securitizing actor or someone instructed by the same), and also (3) the action taken is justified by the securitizing actor with reference to the threat he/she identified and declared in the securitizing move. It goes on to reject the ideas of a sanctioning audience and of the insistence on existential threats as also set by the CS.","downloadable_attachments":[{"id":52324123,"asset_id":32065942,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":13409608,"first_name":"Rita","last_name":"Floyd","domain_name":"bham","page_name":"RitaFloyd","display_name":"Rita Floyd","profile_url":"https://bham.academia.edu/RitaFloyd?f_ri=5523","photo":"https://0.academia-photos.com/13409608/10382283/35178834/s65_rita.floyd.jpg"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25462174" data-work_id="25462174" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25462174/The_Routledge_Handbook_of_Ethnic_Conflict_2_nd_edition_edited_28_CHAPTER_A_GRADUALLY_ESCALATING_CONFLICT_Ukraine_from_the_Euromaidan_to_the_war_with_Russia">The Routledge Handbook of Ethnic Conflict: 2 nd edition; edited 28 CHAPTER 'A GRADUALLY ESCALATING CONFLICT: Ukraine from the Euromaidan to the war with Russia'</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In this chapter I identify and explain the critical junctures at which events in Ukraine could have taken a different turn depending on the choices (actions and reactions) of the main conflict parties. I argue that at the very beginning... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_25462174" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In this chapter I identify and explain the critical junctures at which events in Ukraine could have taken a different turn depending on the choices (actions and reactions) of the main conflict parties. I argue that at the very beginning of the conflict escalation all sides made incorrect assumptions about one another’s intentions, resources and potential. As a result, competition between Ukrainian elite groups has transformed into full-scale war. Due to the ‘zero-sum’ strategy to which every side adheres, the confrontation has evolved from peaceful protest through violent protest and low-intensity conflict to open warfare with the employment of tanks, heavy artillery, multiple rocket systems, and airpower. This chapter demonstrates that we have witnessed the employment by Russia of a novel form of warfare that combines destabilisation with ‘creeping’ indirect occupation (hard power) and effective propaganda (soft power). In the meantime, the crisis in Ukraine has been moving along a scenario of protracted conflict. Any delay in its settlement favours the continuation of tensions.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25462174" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5320d4080eafc4abce7708b1f6cebc0c" rel="nofollow" data-download="{"attachment_id":45778801,"asset_id":25462174,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/45778801/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4037866" href="https://johnshopkins.academia.edu/TatyanaMalyarenko">Tatyana Malyarenko</a><script data-card-contents-for-user="4037866" type="text/json">{"id":4037866,"first_name":"Tatyana","last_name":"Malyarenko","domain_name":"johnshopkins","page_name":"TatyanaMalyarenko","display_name":"Tatyana Malyarenko","profile_url":"https://johnshopkins.academia.edu/TatyanaMalyarenko?f_ri=5523","photo":"https://0.academia-photos.com/4037866/1539715/6950954/s65_tatyana.malyarenko.jpg"}</script></span></span></li><li class="js-paper-rank-work_25462174 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25462174"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25462174, container: ".js-paper-rank-work_25462174", }); });</script></li><li class="js-percentile-work_25462174 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25462174; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25462174"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25462174 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25462174"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25462174; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25462174]").text(description); $(".js-view-count-work_25462174").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25462174").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25462174"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="389" href="https://www.academia.edu/Documents/in/Russian_Studies">Russian Studies</a>, <script data-card-contents-for-ri="389" type="text/json">{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1198" href="https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies">Peace and Conflict Studies</a>, <script data-card-contents-for-ri="1198" type="text/json">{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1483" href="https://www.academia.edu/Documents/in/Foreign_Policy_Analysis">Foreign Policy Analysis</a>, <script data-card-contents-for-ri="1483" type="text/json">{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3872" href="https://www.academia.edu/Documents/in/War_Studies">War Studies</a><script data-card-contents-for-ri="3872" type="text/json">{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25462174]'), work: {"id":25462174,"title":"The Routledge Handbook of Ethnic Conflict: 2 nd edition; edited 28 CHAPTER 'A GRADUALLY ESCALATING CONFLICT: Ukraine from the Euromaidan to the war with Russia'","created_at":"2016-05-19T09:15:19.362-07:00","url":"https://www.academia.edu/25462174/The_Routledge_Handbook_of_Ethnic_Conflict_2_nd_edition_edited_28_CHAPTER_A_GRADUALLY_ESCALATING_CONFLICT_Ukraine_from_the_Euromaidan_to_the_war_with_Russia?f_ri=5523","dom_id":"work_25462174","summary":"In this chapter I identify and explain the critical junctures at which events in Ukraine could have taken a different turn depending on the choices (actions and reactions) of the main conflict parties. I argue that at the very beginning of the conflict escalation all sides made incorrect assumptions about one another’s intentions, resources and potential. As a result, competition between Ukrainian elite groups has transformed into full-scale war. Due to the ‘zero-sum’ strategy to which every side adheres, the confrontation has evolved from peaceful protest through violent protest and low-intensity conflict to open warfare with the employment of tanks, heavy artillery, multiple rocket systems, and airpower. This chapter demonstrates that we have witnessed the employment by Russia of a novel form of warfare that combines destabilisation with ‘creeping’ indirect occupation (hard power) and effective propaganda (soft power). In the meantime, the crisis in Ukraine has been moving along a scenario of protracted conflict. Any delay in its settlement favours the continuation of tensions.","downloadable_attachments":[{"id":45778801,"asset_id":25462174,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4037866,"first_name":"Tatyana","last_name":"Malyarenko","domain_name":"johnshopkins","page_name":"TatyanaMalyarenko","display_name":"Tatyana Malyarenko","profile_url":"https://johnshopkins.academia.edu/TatyanaMalyarenko?f_ri=5523","photo":"https://0.academia-photos.com/4037866/1539715/6950954/s65_tatyana.malyarenko.jpg"}],"research_interests":[{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=5523","nofollow":false},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=5523","nofollow":false},{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=5523","nofollow":false},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5821,"name":"Ukrainian Studies","url":"https://www.academia.edu/Documents/in/Ukrainian_Studies?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_2491914" data-work_id="2491914" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/2491914/Teoriler_I%C5%9F%C4%B1%C4%9F%C4%B1nda_G%C3%BCvenlik_Sava%C5%9F_Bar%C4%B1%C5%9F_ve_%C3%87at%C4%B1%C5%9Fma_%C3%87%C3%B6z%C3%BCmleri_Theories_of_Security_War_Peace_and_Conflict_Resolution_">Teoriler Işığında Güvenlik, Savaş, Barış ve Çatışma Çözümleri (Theories of Security, War, Peace and Conflict Resolution)</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/2491914" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8f2aa20ebe72f37b41d1dbe145211cb2" rel="nofollow" data-download="{"attachment_id":30883744,"asset_id":2491914,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/30883744/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3246956" href="https://independent.academia.edu/Bilgesam">Wise Men Center for Strategic Studies BILGESAM</a><script data-card-contents-for-user="3246956" type="text/json">{"id":3246956,"first_name":"Wise Men Center for Strategic Studies","last_name":"BILGESAM","domain_name":"independent","page_name":"Bilgesam","display_name":"Wise Men Center for Strategic Studies BILGESAM","profile_url":"https://independent.academia.edu/Bilgesam?f_ri=5523","photo":"https://0.academia-photos.com/3246956/1071336/1337153/s65_bilgesam.stratejik_ara_t_rmalar_merkezi.jpg"}</script></span></span></li><li class="js-paper-rank-work_2491914 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="2491914"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 2491914, container: ".js-paper-rank-work_2491914", }); });</script></li><li class="js-percentile-work_2491914 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 2491914; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_2491914"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_2491914 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="2491914"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 2491914; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=2491914]").text(description); $(".js-view-count-work_2491914").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_2491914").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="2491914"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">42</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="261" href="https://www.academia.edu/Documents/in/Geography">Geography</a>, <script data-card-contents-for-ri="261" type="text/json">{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="268" href="https://www.academia.edu/Documents/in/Political_Geography_and_Geopolitics">Political Geography and Geopolitics</a>, <script data-card-contents-for-ri="268" type="text/json">{"id":268,"name":"Political Geography and Geopolitics","url":"https://www.academia.edu/Documents/in/Political_Geography_and_Geopolitics?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="898" href="https://www.academia.edu/Documents/in/Multiculturalism">Multiculturalism</a><script data-card-contents-for-ri="898" type="text/json">{"id":898,"name":"Multiculturalism","url":"https://www.academia.edu/Documents/in/Multiculturalism?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=2491914]'), work: {"id":2491914,"title":"Teoriler Işığında Güvenlik, Savaş, Barış ve Çatışma Çözümleri (Theories of Security, War, Peace and Conflict Resolution)","created_at":"2013-01-30T20:08:15.803-08:00","url":"https://www.academia.edu/2491914/Teoriler_I%C5%9F%C4%B1%C4%9F%C4%B1nda_G%C3%BCvenlik_Sava%C5%9F_Bar%C4%B1%C5%9F_ve_%C3%87at%C4%B1%C5%9Fma_%C3%87%C3%B6z%C3%BCmleri_Theories_of_Security_War_Peace_and_Conflict_Resolution_?f_ri=5523","dom_id":"work_2491914","summary":null,"downloadable_attachments":[{"id":30883744,"asset_id":2491914,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3246956,"first_name":"Wise Men Center for Strategic Studies","last_name":"BILGESAM","domain_name":"independent","page_name":"Bilgesam","display_name":"Wise Men Center for Strategic Studies BILGESAM","profile_url":"https://independent.academia.edu/Bilgesam?f_ri=5523","photo":"https://0.academia-photos.com/3246956/1071336/1337153/s65_bilgesam.stratejik_ara_t_rmalar_merkezi.jpg"}],"research_interests":[{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=5523","nofollow":false},{"id":268,"name":"Political Geography and Geopolitics","url":"https://www.academia.edu/Documents/in/Political_Geography_and_Geopolitics?f_ri=5523","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":898,"name":"Multiculturalism","url":"https://www.academia.edu/Documents/in/Multiculturalism?f_ri=5523","nofollow":false},{"id":977,"name":"Development Studies","url":"https://www.academia.edu/Documents/in/Development_Studies?f_ri=5523"},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory?f_ri=5523"},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=5523"},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=5523"},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=5523"},{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies?f_ri=5523"},{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=5523"},{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=5523"},{"id":3345,"name":"International organizations","url":"https://www.academia.edu/Documents/in/International_organizations?f_ri=5523"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523"},{"id":3849,"name":"Conflict","url":"https://www.academia.edu/Documents/in/Conflict?f_ri=5523"},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5878,"name":"Nationalism","url":"https://www.academia.edu/Documents/in/Nationalism?f_ri=5523"},{"id":9707,"name":"Diplomacy","url":"https://www.academia.edu/Documents/in/Diplomacy?f_ri=5523"},{"id":12626,"name":"Electoral Systems","url":"https://www.academia.edu/Documents/in/Electoral_Systems?f_ri=5523"},{"id":13078,"name":"Peacekeeping","url":"https://www.academia.edu/Documents/in/Peacekeeping?f_ri=5523"},{"id":13614,"name":"Conflict Resolution","url":"https://www.academia.edu/Documents/in/Conflict_Resolution?f_ri=5523"},{"id":20520,"name":"Peace \u0026 Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies-3?f_ri=5523"},{"id":24048,"name":"Peace Studies","url":"https://www.academia.edu/Documents/in/Peace_Studies?f_ri=5523"},{"id":24748,"name":"Ethnicity","url":"https://www.academia.edu/Documents/in/Ethnicity?f_ri=5523"},{"id":30160,"name":"Minority Rights","url":"https://www.academia.edu/Documents/in/Minority_Rights?f_ri=5523"},{"id":45559,"name":"Peace","url":"https://www.academia.edu/Documents/in/Peace?f_ri=5523"},{"id":45578,"name":"Peacebuilding","url":"https://www.academia.edu/Documents/in/Peacebuilding?f_ri=5523"},{"id":55966,"name":"Good Governance","url":"https://www.academia.edu/Documents/in/Good_Governance?f_ri=5523"},{"id":58054,"name":"Environmental Sciences","url":"https://www.academia.edu/Documents/in/Environmental_Sciences?f_ri=5523"},{"id":63859,"name":"Uluslararası Güvenlik","url":"https://www.academia.edu/Documents/in/Uluslararasi_Guvenlik?f_ri=5523"},{"id":63861,"name":"Uluslararası İlişkiler","url":"https://www.academia.edu/Documents/in/Uluslararas%C4%B1_%C4%B0li%C5%9Fkiler?f_ri=5523"},{"id":92257,"name":"Freedom","url":"https://www.academia.edu/Documents/in/Freedom?f_ri=5523"},{"id":183540,"name":"Humanitarian Assistance and Disaster Relief","url":"https://www.academia.edu/Documents/in/Humanitarian_Assistance_and_Disaster_Relief?f_ri=5523"},{"id":195078,"name":"Çatışma Yönetimi","url":"https://www.academia.edu/Documents/in/Catisma_Yonetimi?f_ri=5523"},{"id":202719,"name":"// HISTORY AND POLITICS // Tarih ve Siyaset// Türk Dış Politikası,Türkiye Cumhuriyeti Tarihi, Afriavrasya Stratejileri, Ortak Barış ve Ortak Güvenlik Siyaseti.","url":"https://www.academia.edu/Documents/in/_HISTORY_AND_POLITICS_Tarih_ve_Siyaset_Turk_Dis_Politikasi_Turkiye_Cumhuriyeti_Tarihi_Afriav?f_ri=5523"},{"id":347323,"name":"Türkiye'nin güvenlik algılamaları","url":"https://www.academia.edu/Documents/in/Turkiyenin_guvenlik_algilamalari?f_ri=5523"},{"id":470540,"name":"Soğuk Savaş Sonrası Süreçte Uluslararası Sistemin Yorumlanması : Değişenler ve Değişmeyenler","url":"https://www.academia.edu/Documents/in/Soguk_Savas_Sonrasi_Surecte_Uluslararasi_Sistemin_Yorumlanmasi_Degisenler_ve_Degismeyenler?f_ri=5523"},{"id":537676,"name":"Stabilization and Reconstruction","url":"https://www.academia.edu/Documents/in/Stabilization_and_Reconstruction?f_ri=5523"},{"id":609104,"name":"Peace and Conflicts Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflicts_Studies?f_ri=5523"},{"id":923190,"name":"Land Planning","url":"https://www.academia.edu/Documents/in/Land_Planning?f_ri=5523"},{"id":931986,"name":"Post Conflict Issues","url":"https://www.academia.edu/Documents/in/Post_Conflict_Issues?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_67809058" data-work_id="67809058" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/67809058/Security_in_the_Balkans_After_the_Cold_War_Bosnia_and_Kosovo_Interventions">Security in the Balkans After the Cold War Bosnia and Kosovo Interventions</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The Balkans have become an important region with historical and geopolitical factors. Both the ethnic and religion-based problems inherited in the region, and the strategies of global and regional actors in the area have always made... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_67809058" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The Balkans have become an important region <br />with historical and geopolitical factors. Both the <br />ethnic and religion-based problems inherited <br />in the region, and the strategies of global and <br />regional actors in the area have always made the <br />Balkans remarkable in terms of security issues. The <br />Balkans were the actual area of two major wars in <br />the 20th Century, and a region that experienced <br />the effects of inter-block competitions in the <br />Cold War period. After the Cold War, although <br />the international community dreamed of “global <br />security” and “global peace” because of the end of <br />the long-lasting bipolarity, the disintegration of <br />Yugoslavia brought the Balkans back to war. The <br />international community was sometimes silent <br />and sometimes had to intervene in these conflicts, <br />which dated back to the genocide, sometimes with <br />controversial legitimacy, in the Balkans towards the <br />end of 20th Century.<br />The Balkans has a sociological structure <br />with a very strong social and historical memory <br />and formed by different ethnic and religious <br />communities. Therefore, countries have uniquely <br />different security problems and interests. In today’s <br />globalization process where inter-communal <br />interactions and interdependence are increasing, <br />there is no institutional mechanism by which <br />Balkan countries can ensure their common <br />security interests. However, even in times when <br />globalization and mutual interactions were not as <br />intense as today, institutional cooperation among <br />Balkan countries was possible. The 1934 Balkan <br />Pact, established in line with the security interests <br />of the countries in the region, and the 1954 <br />Balkan Alliance, which was established under the <br />containment policy of the USA (The United States <br />of America), are historical examples of institutional <br />mechanisms</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/67809058" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="5d765cf6b717f18ce8ea9033bfd10872" rel="nofollow" data-download="{"attachment_id":78534579,"asset_id":67809058,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/78534579/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="74404995" href="https://inonu.academia.edu/ABDULLAHTORUN">Doç. Dr A B D U L L A H TORUN</a><script data-card-contents-for-user="74404995" type="text/json">{"id":74404995,"first_name":"Doç. Dr","last_name":"TORUN","domain_name":"inonu","page_name":"ABDULLAHTORUN","display_name":"Doç. Dr A B D U L L A H TORUN","profile_url":"https://inonu.academia.edu/ABDULLAHTORUN?f_ri=5523","photo":"https://0.academia-photos.com/74404995/18840233/18798962/s65_abdullah.torun.png"}</script></span></span></li><li class="js-paper-rank-work_67809058 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="67809058"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 67809058, container: ".js-paper-rank-work_67809058", }); });</script></li><li class="js-percentile-work_67809058 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 67809058; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_67809058"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_67809058 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="67809058"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 67809058; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=67809058]").text(description); $(".js-view-count-work_67809058").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_67809058").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="67809058"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="49250" href="https://www.academia.edu/Documents/in/Balkans">Balkans</a>, <script data-card-contents-for-ri="49250" type="text/json">{"id":49250,"name":"Balkans","url":"https://www.academia.edu/Documents/in/Balkans?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="89536" href="https://www.academia.edu/Documents/in/Western_Balkans">Western Balkans</a>, <script data-card-contents-for-ri="89536" type="text/json">{"id":89536,"name":"Western Balkans","url":"https://www.academia.edu/Documents/in/Western_Balkans?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3756222" href="https://www.academia.edu/Documents/in/Security_of_the_Western_Balkans">Security of the Western Balkans</a><script data-card-contents-for-ri="3756222" type="text/json">{"id":3756222,"name":"Security of the Western Balkans","url":"https://www.academia.edu/Documents/in/Security_of_the_Western_Balkans?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=67809058]'), work: {"id":67809058,"title":"Security in the Balkans After the Cold War Bosnia and Kosovo Interventions","created_at":"2022-01-11T04:34:47.157-08:00","url":"https://www.academia.edu/67809058/Security_in_the_Balkans_After_the_Cold_War_Bosnia_and_Kosovo_Interventions?f_ri=5523","dom_id":"work_67809058","summary":"The Balkans have become an important region \nwith historical and geopolitical factors. Both the \nethnic and religion-based problems inherited \nin the region, and the strategies of global and \nregional actors in the area have always made the \nBalkans remarkable in terms of security issues. The \nBalkans were the actual area of two major wars in \nthe 20th Century, and a region that experienced \nthe effects of inter-block competitions in the \nCold War period. After the Cold War, although \nthe international community dreamed of “global \nsecurity” and “global peace” because of the end of \nthe long-lasting bipolarity, the disintegration of \nYugoslavia brought the Balkans back to war. The \ninternational community was sometimes silent \nand sometimes had to intervene in these conflicts, \nwhich dated back to the genocide, sometimes with \ncontroversial legitimacy, in the Balkans towards the \nend of 20th Century.\nThe Balkans has a sociological structure \nwith a very strong social and historical memory \nand formed by different ethnic and religious \ncommunities. Therefore, countries have uniquely \ndifferent security problems and interests. In today’s \nglobalization process where inter-communal \ninteractions and interdependence are increasing, \nthere is no institutional mechanism by which \nBalkan countries can ensure their common \nsecurity interests. However, even in times when \nglobalization and mutual interactions were not as \nintense as today, institutional cooperation among \nBalkan countries was possible. The 1934 Balkan \nPact, established in line with the security interests \nof the countries in the region, and the 1954 \nBalkan Alliance, which was established under the \ncontainment policy of the USA (The United States \nof America), are historical examples of institutional \nmechanisms","downloadable_attachments":[{"id":78534579,"asset_id":67809058,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":74404995,"first_name":"Doç. Dr","last_name":"TORUN","domain_name":"inonu","page_name":"ABDULLAHTORUN","display_name":"Doç. Dr A B D U L L A H TORUN","profile_url":"https://inonu.academia.edu/ABDULLAHTORUN?f_ri=5523","photo":"https://0.academia-photos.com/74404995/18840233/18798962/s65_abdullah.torun.png"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":49250,"name":"Balkans","url":"https://www.academia.edu/Documents/in/Balkans?f_ri=5523","nofollow":false},{"id":89536,"name":"Western Balkans","url":"https://www.academia.edu/Documents/in/Western_Balkans?f_ri=5523","nofollow":false},{"id":3756222,"name":"Security of the Western Balkans","url":"https://www.academia.edu/Documents/in/Security_of_the_Western_Balkans?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_462492" data-work_id="462492" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/462492/Cyber_Security_and_Threat_Politics_US_Efforts_to_Secure_the_Information_Age">Cyber-Security and Threat Politics: US Efforts to Secure the Information Age</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_462492" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US.<br /><br />Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/462492" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e1189ab902acac3604676b1497856458" rel="nofollow" data-download="{"attachment_id":26493216,"asset_id":462492,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/26493216/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="350006" href="https://ethz.academia.edu/MyriamCavelty">Myriam Dunn Cavelty</a><script data-card-contents-for-user="350006" type="text/json">{"id":350006,"first_name":"Myriam","last_name":"Dunn Cavelty","domain_name":"ethz","page_name":"MyriamCavelty","display_name":"Myriam Dunn Cavelty","profile_url":"https://ethz.academia.edu/MyriamCavelty?f_ri=5523","photo":"https://0.academia-photos.com/350006/94486/302631/s65_myriam.dunn_cavelty.jpg"}</script></span></span></li><li class="js-paper-rank-work_462492 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="462492"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 462492, container: ".js-paper-rank-work_462492", }); });</script></li><li class="js-percentile-work_462492 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 462492; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_462492"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_462492 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="462492"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 462492; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=462492]").text(description); $(".js-view-count-work_462492").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_462492").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="462492"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">8</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4810" href="https://www.academia.edu/Documents/in/Information_Warfare">Information Warfare</a>, <script data-card-contents-for-ri="4810" type="text/json">{"id":4810,"name":"Information Warfare","url":"https://www.academia.edu/Documents/in/Information_Warfare?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="6748" href="https://www.academia.edu/Documents/in/Sociology_of_Risk">Sociology of Risk</a>, <script data-card-contents-for-ri="6748" type="text/json">{"id":6748,"name":"Sociology of Risk","url":"https://www.academia.edu/Documents/in/Sociology_of_Risk?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="12061" href="https://www.academia.edu/Documents/in/Risk_Management">Risk Management</a><script data-card-contents-for-ri="12061" type="text/json">{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=462492]'), work: {"id":462492,"title":"Cyber-Security and Threat Politics: US Efforts to Secure the Information Age","created_at":"2011-03-03T18:03:12.151-08:00","url":"https://www.academia.edu/462492/Cyber_Security_and_Threat_Politics_US_Efforts_to_Secure_the_Information_Age?f_ri=5523","dom_id":"work_462492","summary":"This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US.\n\nMyriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.","downloadable_attachments":[{"id":26493216,"asset_id":462492,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":350006,"first_name":"Myriam","last_name":"Dunn Cavelty","domain_name":"ethz","page_name":"MyriamCavelty","display_name":"Myriam Dunn Cavelty","profile_url":"https://ethz.academia.edu/MyriamCavelty?f_ri=5523","photo":"https://0.academia-photos.com/350006/94486/302631/s65_myriam.dunn_cavelty.jpg"}],"research_interests":[{"id":4810,"name":"Information Warfare","url":"https://www.academia.edu/Documents/in/Information_Warfare?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":6748,"name":"Sociology of Risk","url":"https://www.academia.edu/Documents/in/Sociology_of_Risk?f_ri=5523","nofollow":false},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=5523","nofollow":false},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization?f_ri=5523"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=5523"},{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=5523"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_10511600 coauthored" data-work_id="10511600" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/10511600/Three_Controversies_on_Cyberwar_a_Critical_Perspective">Three Controversies on Cyberwar: a Critical Perspective</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">CANABARRO, D. R. ; BORNE, T. ; CEPIK, M. A. C. . Three Controversies on Cyberwar: a Critical Perspective. In: MPSA Annual Conference, 2013, Chicago - IL - Estados Unidos. MPSA Conference Paper Archive, 2013, on line. The spread of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_10511600" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">CANABARRO, D. R. ; BORNE, T. ; CEPIK, M. A. C. . Three Controversies on Cyberwar: a Critical Perspective. In: MPSA Annual Conference, 2013, Chicago - IL - Estados Unidos. MPSA Conference Paper Archive, 2013, on line. <br /> <br />The spread of contemporary information and communication technologies among state and non-state actors adds new dimensions to the study of diffusion in global politics. The Digital Era brings about different challenges for national and international security policymaking, heating up academic and political debate surrounding the scope and the implications of the term cyberwar. This paper surveys the evolution of academic and technical production on cyberwar with the intention of providing background for the critical evaluation of the Brazilian case. Finally, it details the prospective research agenda that follows from the evaluation of the Brazilian case.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/10511600" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ae95e2d86b5e477926cae011688ce6e9" rel="nofollow" data-download="{"attachment_id":36515523,"asset_id":10511600,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36515523/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="7057100" href="https://independent.academia.edu/DiegoCanabarro">Diego Canabarro</a><script data-card-contents-for-user="7057100" type="text/json">{"id":7057100,"first_name":"Diego","last_name":"Canabarro","domain_name":"independent","page_name":"DiegoCanabarro","display_name":"Diego Canabarro","profile_url":"https://independent.academia.edu/DiegoCanabarro?f_ri=5523","photo":"https://0.academia-photos.com/7057100/2662669/3099510/s65_diego.canabarro.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-10511600">+1</span><div class="hidden js-additional-users-10511600"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://ufrgs.academia.edu/ThiagoBorne">Thiago Borne</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-10511600'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-10511600').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_10511600 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="10511600"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 10511600, container: ".js-paper-rank-work_10511600", }); });</script></li><li class="js-percentile-work_10511600 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 10511600; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_10511600"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_10511600 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="10511600"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 10511600; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=10511600]").text(description); $(".js-view-count-work_10511600").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_10511600").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="10511600"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">3</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7822" href="https://www.academia.edu/Documents/in/Internet_Governance">Internet Governance</a>, <script data-card-contents-for-ri="7822" type="text/json">{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=10511600]'), work: {"id":10511600,"title":"Three Controversies on Cyberwar: a Critical Perspective","created_at":"2015-02-04T08:23:37.583-08:00","url":"https://www.academia.edu/10511600/Three_Controversies_on_Cyberwar_a_Critical_Perspective?f_ri=5523","dom_id":"work_10511600","summary":"CANABARRO, D. R. ; BORNE, T. ; CEPIK, M. A. C. . Three Controversies on Cyberwar: a Critical Perspective. In: MPSA Annual Conference, 2013, Chicago - IL - Estados Unidos. MPSA Conference Paper Archive, 2013, on line.\r\n\r\nThe spread of contemporary information and communication technologies among state and non-state actors adds new dimensions to the study of diffusion in global politics. The Digital Era brings about different challenges for national and international security policymaking, heating up academic and political debate surrounding the scope and the implications of the term cyberwar. This paper surveys the evolution of academic and technical production on cyberwar with the intention of providing background for the critical evaluation of the Brazilian case. Finally, it details the prospective research agenda that follows from the evaluation of the Brazilian case.","downloadable_attachments":[{"id":36515523,"asset_id":10511600,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":7057100,"first_name":"Diego","last_name":"Canabarro","domain_name":"independent","page_name":"DiegoCanabarro","display_name":"Diego Canabarro","profile_url":"https://independent.academia.edu/DiegoCanabarro?f_ri=5523","photo":"https://0.academia-photos.com/7057100/2662669/3099510/s65_diego.canabarro.jpg"},{"id":4513567,"first_name":"Thiago","last_name":"Borne","domain_name":"ufrgs","page_name":"ThiagoBorne","display_name":"Thiago Borne","profile_url":"https://ufrgs.academia.edu/ThiagoBorne?f_ri=5523","photo":"https://0.academia-photos.com/4513567/1860726/14931858/s65_thiago.borne.jpg"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=5523","nofollow":false},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_2070669" data-work_id="2070669" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/2070669/Cyber_security_3rd_edition_2013_">Cyber-security (3rd edition, 2013)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This chapter looks at why cyber-security is considered one of the key national security issues of our times. The first section provides the necessary technical background information. The second unravels three different, but interrelated... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_2070669" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This chapter looks at why cyber-security is considered one of the key national security issues of our times. The first section provides the necessary technical background information. The second unravels three different, but interrelated ways to look at cyber-security: the first discourse has a technical focus and is about viruses and worms. The second looks at the interrelationship between the phenomenon of cyber-crime and cyber-espionage. The third turns to a military and civil defence-driven discourse about the double-edged sword of fighting wars in the information domain and the need for critical infrastructure protection. Based on this, the third section looks at selected protection concepts from each of the three discourses. The final section sets the threat into perspective: despite heightened media attention and a general feeling of impending cyber-doom in some government circles, the level of cyber-risk is generally overstated</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/2070669" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="9c8840c9d005c9a9d11e2a13f22113f4" rel="nofollow" data-download="{"attachment_id":29758666,"asset_id":2070669,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/29758666/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="350006" href="https://ethz.academia.edu/MyriamCavelty">Myriam Dunn Cavelty</a><script data-card-contents-for-user="350006" type="text/json">{"id":350006,"first_name":"Myriam","last_name":"Dunn Cavelty","domain_name":"ethz","page_name":"MyriamCavelty","display_name":"Myriam Dunn Cavelty","profile_url":"https://ethz.academia.edu/MyriamCavelty?f_ri=5523","photo":"https://0.academia-photos.com/350006/94486/302631/s65_myriam.dunn_cavelty.jpg"}</script></span></span></li><li class="js-paper-rank-work_2070669 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="2070669"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 2070669, container: ".js-paper-rank-work_2070669", }); });</script></li><li class="js-percentile-work_2070669 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 2070669; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_2070669"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_2070669 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="2070669"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 2070669; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=2070669]").text(description); $(".js-view-count-work_2070669").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_2070669").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="2070669"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">7</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3705" href="https://www.academia.edu/Documents/in/International_Security">International Security</a>, <script data-card-contents-for-ri="3705" type="text/json">{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5535" href="https://www.academia.edu/Documents/in/Critical_Security_Studies">Critical Security Studies</a><script data-card-contents-for-ri="5535" type="text/json">{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=2070669]'), work: {"id":2070669,"title":"Cyber-security (3rd edition, 2013)","created_at":"2012-10-30T23:36:34.683-07:00","url":"https://www.academia.edu/2070669/Cyber_security_3rd_edition_2013_?f_ri=5523","dom_id":"work_2070669","summary":"This chapter looks at why cyber-security is considered one of the key national security issues of our times. The first section provides the necessary technical background information. The second unravels three different, but interrelated ways to look at cyber-security: the first discourse has a technical focus and is about viruses and worms. The second looks at the interrelationship between the phenomenon of cyber-crime and cyber-espionage. The third turns to a military and civil defence-driven discourse about the double-edged sword of fighting wars in the information domain and the need for critical infrastructure protection. Based on this, the third section looks at selected protection concepts from each of the three discourses. The final section sets the threat into perspective: despite heightened media attention and a general feeling of impending cyber-doom in some government circles, the level of cyber-risk is generally overstated","downloadable_attachments":[{"id":29758666,"asset_id":2070669,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":350006,"first_name":"Myriam","last_name":"Dunn Cavelty","domain_name":"ethz","page_name":"MyriamCavelty","display_name":"Myriam Dunn Cavelty","profile_url":"https://ethz.academia.edu/MyriamCavelty?f_ri=5523","photo":"https://0.academia-photos.com/350006/94486/302631/s65_myriam.dunn_cavelty.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=5523","nofollow":false},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=5523"},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=5523"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38189204" data-work_id="38189204" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38189204/Patterns_of_Nationhood_and_Saving_the_State_in_Turkey_Ottomanism_Nationalism_and_Multiculturalism_Routledge_2019_">Patterns of Nationhood and Saving the State in Turkey: Ottomanism, Nationalism and Multiculturalism (Routledge 2019)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Patterns of Nationhood and Saving the State in Turkey tackles a theoretical puzzle in understanding the state policy changes toward minorities and nationhood, first by placing the state in the historical context of the international... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_38189204" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Patterns of Nationhood and Saving the State in Turkey tackles a theoretical puzzle in understanding the state policy changes toward minorities and nationhood, first by placing the state in the historical context of the international system and second by unpacking the state through analysis of intra-elite competition in relation to the counter-discourses by minority groups within the context of the Ottoman Empire and Turkey. <br />What explains the persistence and change in state policies toward minorities and nationhood? Under what conditions do states change their policies toward minorities? Why do the state elites reconsider the state- minority relations and change government policies toward nationhood? Adopting a comparative-historical analysis, the book unpacks these research questions and builds a theoretical framework by looking at three paradigmatic policy changes: Ottomanism in the mid-19th century, Turkish nationalism in the early 1920s, and multiculturalism in Turkey in the early 2000s. While the book reveals the role of international context, intrastate elite competition, and non-state actors in such policy changes, it argues that state elites adopt either exclusionary or inclusionary policies based on the idea of “survival of the state.”</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38189204" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c0452dc5fce36cd796a937bd244e5941" rel="nofollow" data-download="{"attachment_id":58226331,"asset_id":38189204,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58226331/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="120451" href="https://iue.academia.edu/SerhunAl">Serhun Al</a><script data-card-contents-for-user="120451" type="text/json">{"id":120451,"first_name":"Serhun","last_name":"Al","domain_name":"iue","page_name":"SerhunAl","display_name":"Serhun Al","profile_url":"https://iue.academia.edu/SerhunAl?f_ri=5523","photo":"https://0.academia-photos.com/120451/32344/104962071/s65_serhun.al.jpg"}</script></span></span></li><li class="js-paper-rank-work_38189204 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38189204"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38189204, container: ".js-paper-rank-work_38189204", }); });</script></li><li class="js-percentile-work_38189204 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38189204; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38189204"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38189204 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38189204"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38189204; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38189204]").text(description); $(".js-view-count-work_38189204").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38189204").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38189204"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">20</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="796" href="https://www.academia.edu/Documents/in/Comparative_Politics">Comparative Politics</a>, <script data-card-contents-for-ri="796" type="text/json">{"id":796,"name":"Comparative Politics","url":"https://www.academia.edu/Documents/in/Comparative_Politics?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1187" href="https://www.academia.edu/Documents/in/Ottoman_History">Ottoman History</a><script data-card-contents-for-ri="1187" type="text/json">{"id":1187,"name":"Ottoman History","url":"https://www.academia.edu/Documents/in/Ottoman_History?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38189204]'), work: {"id":38189204,"title":"Patterns of Nationhood and Saving the State in Turkey: Ottomanism, Nationalism and Multiculturalism (Routledge 2019)","created_at":"2019-01-21T01:53:30.919-08:00","url":"https://www.academia.edu/38189204/Patterns_of_Nationhood_and_Saving_the_State_in_Turkey_Ottomanism_Nationalism_and_Multiculturalism_Routledge_2019_?f_ri=5523","dom_id":"work_38189204","summary":"Patterns of Nationhood and Saving the State in Turkey tackles a theoretical puzzle in understanding the state policy changes toward minorities and nationhood, first by placing the state in the historical context of the international system and second by unpacking the state through analysis of intra-elite competition in relation to the counter-discourses by minority groups within the context of the Ottoman Empire and Turkey. \nWhat explains the persistence and change in state policies toward minorities and nationhood? Under what conditions do states change their policies toward minorities? Why do the state elites reconsider the state- minority relations and change government policies toward nationhood? Adopting a comparative-historical analysis, the book unpacks these research questions and builds a theoretical framework by looking at three paradigmatic policy changes: Ottomanism in the mid-19th century, Turkish nationalism in the early 1920s, and multiculturalism in Turkey in the early 2000s. While the book reveals the role of international context, intrastate elite competition, and non-state actors in such policy changes, it argues that state elites adopt either exclusionary or inclusionary policies based on the idea of “survival of the state.”","downloadable_attachments":[{"id":58226331,"asset_id":38189204,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":120451,"first_name":"Serhun","last_name":"Al","domain_name":"iue","page_name":"SerhunAl","display_name":"Serhun Al","profile_url":"https://iue.academia.edu/SerhunAl?f_ri=5523","photo":"https://0.academia-photos.com/120451/32344/104962071/s65_serhun.al.jpg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false},{"id":796,"name":"Comparative Politics","url":"https://www.academia.edu/Documents/in/Comparative_Politics?f_ri=5523","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":1187,"name":"Ottoman History","url":"https://www.academia.edu/Documents/in/Ottoman_History?f_ri=5523","nofollow":false},{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=5523"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=5523"},{"id":5453,"name":"Race and Ethnicity","url":"https://www.academia.edu/Documents/in/Race_and_Ethnicity?f_ri=5523"},{"id":5548,"name":"Kurdish Studies","url":"https://www.academia.edu/Documents/in/Kurdish_Studies?f_ri=5523"},{"id":5878,"name":"Nationalism","url":"https://www.academia.edu/Documents/in/Nationalism?f_ri=5523"},{"id":6610,"name":"Turkish Nationalism","url":"https://www.academia.edu/Documents/in/Turkish_Nationalism?f_ri=5523"},{"id":8700,"name":"Turkish and Middle East Studies","url":"https://www.academia.edu/Documents/in/Turkish_and_Middle_East_Studies?f_ri=5523"},{"id":11208,"name":"Ottoman Empire","url":"https://www.academia.edu/Documents/in/Ottoman_Empire?f_ri=5523"},{"id":15899,"name":"Kurdish Question in Turkey","url":"https://www.academia.edu/Documents/in/Kurdish_Question_in_Turkey?f_ri=5523"},{"id":18623,"name":"Middle East Politics","url":"https://www.academia.edu/Documents/in/Middle_East_Politics?f_ri=5523"},{"id":19675,"name":"Modern Turkey","url":"https://www.academia.edu/Documents/in/Modern_Turkey?f_ri=5523"},{"id":24748,"name":"Ethnicity","url":"https://www.academia.edu/Documents/in/Ethnicity?f_ri=5523"},{"id":30160,"name":"Minority Rights","url":"https://www.academia.edu/Documents/in/Minority_Rights?f_ri=5523"},{"id":33180,"name":"Political Islam","url":"https://www.academia.edu/Documents/in/Political_Islam?f_ri=5523"},{"id":116356,"name":"Milliyetçilik","url":"https://www.academia.edu/Documents/in/Milliyet%C3%A7ilik?f_ri=5523"},{"id":328831,"name":"Türk Siyasi Tarihi","url":"https://www.academia.edu/Documents/in/Turk_Siyasi_Tarihi?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8086735" data-work_id="8086735" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8086735/Desecurity_Will_Not_Save_Us_Securitization_Studies_the_Problem_of_Normal_Democratic_Politics_and_the_Limits_of_Desecuritization_as_Normative_Political_Panacea">Desecurity Will Not Save Us: Securitization Studies, the Problem of 'Normal / Democratic' Politics, and the Limits of Desecuritization as Normative-Political Panacea</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This dissertation seeks to map, compare, and interrogate the concept of desecuritization, as it has been developed in normative-political and empirical literatures, both within and beyond the Copenhagen School. Departing from the ordering... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8086735" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This dissertation seeks to map, compare, and interrogate the concept of desecuritization, as it has been developed in normative-political and empirical literatures, both within and beyond the Copenhagen School. Departing from the ordering question: “Why has ‘desecuritization’ been theorised in such diverse and inconsistent ways, how does it operate politically, and does it warrant the Copenhagen School’s political-ethical preference for it as a generally positive solution to the ‘problem’ of securitization?”, this argument will engage with a range of past and present debates, synthesizing the political-theoretical- and empirical literatures in order to re-read the political-normative implications, merits and problems of a number of proposed desecuritizing strategies. On this basis it will seek to<br />interrogate the theoretical limits of these strategies as it attempts to explore the move’s analytical complexity, in order to ultimately reflect on what this reveals about three critical, unarticulated tensions—theoretical, political, normative— in the inconsistent ways ‘normal politics’ has been understood and used; between two opposed normative-political principles underpinning the Copenhagen School’s normative program; and between the way de-securitization works in general, and its general preference for desecuritization in particular.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8086735" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3ec424ad8505e5ac0de01bbea60c43e8" rel="nofollow" data-download="{"attachment_id":34537857,"asset_id":8086735,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/34537857/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="8066579" href="https://cambridge.academia.edu/MatthijsMaas">Matthijs Maas</a><script data-card-contents-for-user="8066579" type="text/json">{"id":8066579,"first_name":"Matthijs","last_name":"Maas","domain_name":"cambridge","page_name":"MatthijsMaas","display_name":"Matthijs Maas","profile_url":"https://cambridge.academia.edu/MatthijsMaas?f_ri=5523","photo":"https://0.academia-photos.com/8066579/3360689/28592581/s65_matthijs.maas.jpg"}</script></span></span></li><li class="js-paper-rank-work_8086735 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8086735"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8086735, container: ".js-paper-rank-work_8086735", }); });</script></li><li class="js-percentile-work_8086735 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8086735; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8086735"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8086735 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8086735"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8086735; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8086735]").text(description); $(".js-view-count-work_8086735").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8086735").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8086735"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">15</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="904" href="https://www.academia.edu/Documents/in/Normative_Ethics">Normative Ethics</a>, <script data-card-contents-for-ri="904" type="text/json">{"id":904,"name":"Normative Ethics","url":"https://www.academia.edu/Documents/in/Normative_Ethics?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1696" href="https://www.academia.edu/Documents/in/Political_Theory">Political Theory</a>, <script data-card-contents-for-ri="1696" type="text/json">{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2933" href="https://www.academia.edu/Documents/in/Democratic_Theory">Democratic Theory</a>, <script data-card-contents-for-ri="2933" type="text/json">{"id":2933,"name":"Democratic Theory","url":"https://www.academia.edu/Documents/in/Democratic_Theory?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4370" href="https://www.academia.edu/Documents/in/Security">Security</a><script data-card-contents-for-ri="4370" type="text/json">{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8086735]'), work: {"id":8086735,"title":"Desecurity Will Not Save Us: Securitization Studies, the Problem of 'Normal / Democratic' Politics, and the Limits of Desecuritization as Normative-Political Panacea","created_at":"2014-08-25T21:27:49.563-07:00","url":"https://www.academia.edu/8086735/Desecurity_Will_Not_Save_Us_Securitization_Studies_the_Problem_of_Normal_Democratic_Politics_and_the_Limits_of_Desecuritization_as_Normative_Political_Panacea?f_ri=5523","dom_id":"work_8086735","summary":"This dissertation seeks to map, compare, and interrogate the concept of desecuritization, as it has been developed in normative-political and empirical literatures, both within and beyond the Copenhagen School. Departing from the ordering question: “Why has ‘desecuritization’ been theorised in such diverse and inconsistent ways, how does it operate politically, and does it warrant the Copenhagen School’s political-ethical preference for it as a generally positive solution to the ‘problem’ of securitization?”, this argument will engage with a range of past and present debates, synthesizing the political-theoretical- and empirical literatures in order to re-read the political-normative implications, merits and problems of a number of proposed desecuritizing strategies. On this basis it will seek to\ninterrogate the theoretical limits of these strategies as it attempts to explore the move’s analytical complexity, in order to ultimately reflect on what this reveals about three critical, unarticulated tensions—theoretical, political, normative— in the inconsistent ways ‘normal politics’ has been understood and used; between two opposed normative-political principles underpinning the Copenhagen School’s normative program; and between the way de-securitization works in general, and its general preference for desecuritization in particular.","downloadable_attachments":[{"id":34537857,"asset_id":8086735,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":8066579,"first_name":"Matthijs","last_name":"Maas","domain_name":"cambridge","page_name":"MatthijsMaas","display_name":"Matthijs Maas","profile_url":"https://cambridge.academia.edu/MatthijsMaas?f_ri=5523","photo":"https://0.academia-photos.com/8066579/3360689/28592581/s65_matthijs.maas.jpg"}],"research_interests":[{"id":904,"name":"Normative Ethics","url":"https://www.academia.edu/Documents/in/Normative_Ethics?f_ri=5523","nofollow":false},{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=5523","nofollow":false},{"id":2933,"name":"Democratic Theory","url":"https://www.academia.edu/Documents/in/Democratic_Theory?f_ri=5523","nofollow":false},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=5523"},{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization?f_ri=5523"},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization?f_ri=5523"},{"id":16211,"name":"Ethnic Conflict","url":"https://www.academia.edu/Documents/in/Ethnic_Conflict?f_ri=5523"},{"id":73507,"name":"Political Ethics","url":"https://www.academia.edu/Documents/in/Political_Ethics?f_ri=5523"},{"id":148696,"name":"Normative Political Theory","url":"https://www.academia.edu/Documents/in/Normative_Political_Theory?f_ri=5523"},{"id":281970,"name":"Ole Waever","url":"https://www.academia.edu/Documents/in/Ole_Waever?f_ri=5523"},{"id":298068,"name":"Immigration and Border Security","url":"https://www.academia.edu/Documents/in/Immigration_and_Border_Security?f_ri=5523"},{"id":337423,"name":"Securitization Theory Copenhagen School","url":"https://www.academia.edu/Documents/in/Securitization_Theory_Copenhagen_School?f_ri=5523"},{"id":453945,"name":"Desecuritization","url":"https://www.academia.edu/Documents/in/Desecuritization?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_19644188" data-work_id="19644188" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/19644188/Institu%C8%9Bii_din_cadrul_sistemului_de_securitate_Na%C8%9Bional%C4%83">Instituții din cadrul sistemului de securitate Națională</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Sistemul național de securitate este un ansamblu de instituții cu caracter legislativ, executiv și judecătoresc și organizații ce contribuie la realizarea, protejarea ori afirmarea valorilor și intereselor de securitate . Securitatea „în... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_19644188" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Sistemul național de securitate este un ansamblu de instituții cu caracter legislativ, executiv și judecătoresc și organizații ce contribuie la realizarea, protejarea ori afirmarea valorilor și intereselor de securitate . Securitatea „în sens obiectiv, măsoară absenţa ameninţărilor la adresa valorilor dobândite, iar într-un sens subiectiv, absenţa temerii că asemenea valori vor fi atacate” (Arnold Wolfers); Securitatea naţională reprezintă ansamblul măsurilor politico-diplomatice, economice, militare, ecologice şi de altă natură care asigură statului independenţa şi suveranitatea naţională, integritatea teritorială, ordinea internă constituţională şi propriul sistem de valori. <br />Din punct de vedere strategic, întreaga activitate de asigurare a securității naționale este coordonată de către Consiliul Suprem de Apărare a Țării (CSAT)</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/19644188" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a5ad9294dc699d4820dfcaed94452c59" rel="nofollow" data-download="{"attachment_id":40755348,"asset_id":19644188,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40755348/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="7770448" href="https://independent.academia.edu/EllaNica">Ella Nica</a><script data-card-contents-for-user="7770448" type="text/json">{"id":7770448,"first_name":"Ella","last_name":"Nica","domain_name":"independent","page_name":"EllaNica","display_name":"Ella Nica","profile_url":"https://independent.academia.edu/EllaNica?f_ri=5523","photo":"https://0.academia-photos.com/7770448/3293230/3875309/s65_ella.nica.jpg"}</script></span></span></li><li class="js-paper-rank-work_19644188 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="19644188"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 19644188, container: ".js-paper-rank-work_19644188", }); });</script></li><li class="js-percentile-work_19644188 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 19644188; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_19644188"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_19644188 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="19644188"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 19644188; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=19644188]").text(description); $(".js-view-count-work_19644188").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_19644188").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="19644188"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">2</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3703" href="https://www.academia.edu/Documents/in/Network_Security">Network Security</a>, <script data-card-contents-for-ri="3703" type="text/json">{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a><script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=19644188]'), work: {"id":19644188,"title":"Instituții din cadrul sistemului de securitate Națională","created_at":"2015-12-14T02:16:23.877-08:00","url":"https://www.academia.edu/19644188/Institu%C8%9Bii_din_cadrul_sistemului_de_securitate_Na%C8%9Bional%C4%83?f_ri=5523","dom_id":"work_19644188","summary":"Sistemul național de securitate este un ansamblu de instituții cu caracter legislativ, executiv și judecătoresc și organizații ce contribuie la realizarea, protejarea ori afirmarea valorilor și intereselor de securitate . Securitatea „în sens obiectiv, măsoară absenţa ameninţărilor la adresa valorilor dobândite, iar într-un sens subiectiv, absenţa temerii că asemenea valori vor fi atacate” (Arnold Wolfers); Securitatea naţională reprezintă ansamblul măsurilor politico-diplomatice, economice, militare, ecologice şi de altă natură care asigură statului independenţa şi suveranitatea naţională, integritatea teritorială, ordinea internă constituţională şi propriul sistem de valori. \nDin punct de vedere strategic, întreaga activitate de asigurare a securității naționale este coordonată de către Consiliul Suprem de Apărare a Țării (CSAT) \n","downloadable_attachments":[{"id":40755348,"asset_id":19644188,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":7770448,"first_name":"Ella","last_name":"Nica","domain_name":"independent","page_name":"EllaNica","display_name":"Ella Nica","profile_url":"https://independent.academia.edu/EllaNica?f_ri=5523","photo":"https://0.academia-photos.com/7770448/3293230/3875309/s65_ella.nica.jpg"}],"research_interests":[{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_1014965" data-work_id="1014965" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/1014965/%CE%94%CE%99%CE%A0%CE%9B%CE%A9%CE%9C%CE%91%CE%A4%CE%99%CE%9A%CE%97_%CE%95%CE%A1%CE%93%CE%91%CE%A3%CE%99%CE%91_%CE%9F_%CF%81%CF%8C%CE%BB%CE%BF%CF%82_%CF%84%CF%89%CE%BD_%CE%B4%CE%B9%CE%B5%CE%B8%CE%BD%CF%8E%CE%BD_%CF%80%CE%B5%CF%81%CE%B9%CF%86%CE%B5%CF%81%CE%B5%CE%B9%CE%B1%CE%BA%CF%8E%CE%BD_%CE%BF%CF%81%CE%B3%CE%B1%CE%BD%CE%B9%CF%83%CE%BC%CF%8E%CE%BD_%CF%83%CF%84%CE%B7%CE%BD_%CE%B5%CF%80%CE%AF%CE%BB%CF%85%CF%83%CE%B7_%CF%83%CF%85%CE%B3%CE%BA%CF%81%CE%BF%CF%8D%CF%83%CE%B5%CF%89%CE%BD_%CE%BF_%CE%9F%CF%81%CE%B3%CE%B1%CE%BD%CE%B9%CF%83%CE%BC%CF%8C%CF%82_%CF%84%CE%BF%CF%85_%CE%92%CF%8C%CF%81%CE%B5%CE%B9%CE%BF_%CE%91%CF%84%CE%BB%CE%B1%CE%BD%CF%84%CE%B9%CE%BA%CE%BF%CF%8D_%CE%A3%CF%85%CE%BC%CF%86%CF%8E%CE%BD%CE%BF%CF%85_%CE%9D%CE%91%CE%A4%CE%9F_">ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ: Ο ρόλος των διεθνών περιφερειακών οργανισμών στην επίλυση συγκρούσεων: ο Οργανισμός του Βόρειο-Ατλαντικού Συμφώνου (ΝΑΤΟ)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Επιβλέπουσα Καθηγήτρια: ΝΑΣΚΟΥ-ΠΕΡΡΑΚΗ Παρασκευή Τηλ.: 2310 891499 Email: <a href="mailto:perraki@uom.gr" rel="nofollow">perraki@uom.gr</a> Β΄ Μέλος Εξεταστικής Επιτροπής: ΜΠΕΛΛΟΥ ΦωτεινήΤηλ.: 2310 891479 Email: <a href="mailto:fbellou@uom.gr" rel="nofollow">fbellou@uom.gr</a> ------------------------------------- <a rel="license"... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_1014965" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Επιβλέπουσα Καθηγήτρια: ΝΑΣΚΟΥ-ΠΕΡΡΑΚΗ Παρασκευή Τηλ.: 2310 891499 Email: <a href="mailto:perraki@uom.gr" rel="nofollow">perraki@uom.gr</a> Β΄ Μέλος Εξεταστικής Επιτροπής: ΜΠΕΛΛΟΥ ΦωτεινήΤηλ.: 2310 891479 Email: <a href="mailto:fbellou@uom.gr" rel="nofollow">fbellou@uom.gr</a> <br />------------------------------------- <br /><a rel="license" href="<a href="http://creativecommons.org/licenses/by-nc-nd/3.0/gr/"><img" rel="nofollow">http://creativecommons.org/licenses/by-nc-nd/3.0/gr/"><img</a> alt="Άδεια Creative Commons" style="border-width:0" src="<a href="http://i.creativecommons.org/l/by-nc-nd/3.0/gr/88x31.png" rel="nofollow">http://i.creativecommons.org/l/by-nc-nd/3.0/gr/88x31.png</a>" /></a><br />Αυτό το εργασία χορηγείται με άδεια <a rel="license" href="<a href="http://creativecommons.org/licenses/by-nc-nd/3.0/gr/">Creative" rel="nofollow">http://creativecommons.org/licenses/by-nc-nd/3.0/gr/">Creative</a> Commons Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ελλάδα </a>." <br /> <br />Λέξεις Κλειδιά: <br /> <br />ασφάλεια, ειρήνη, τάξη, σταθερότητα, ισχύς, συνεργασία, συγκρούσεις, περιπτωσιολογικές μελέτες, φάσμα, εκκρεμές, πλαίσιο, πρίσμα, νομιμότητα, νομιμοποίηση, δόγμα, στρατηγική αντίληψη, σύστημα, ηγεμονία, αρχή, επέμβαση, ευθύνη, προστασία" <br /> <br />Συμπέρανα ότι, το ΝΑΤΟ μετεξελίσσεται σε οργανισμό που έχει τα χαρακτηριστικά ενός διεθνούς περιφερειακού οργανισμού, σε παγκόσμια όμως διάσταση, όπου με βάση το δόγμα "Ευθύνη Προστασίας" (Responsibility to Protect), αναλαμβάνει ρόλο χωροφύλακα, που επιδιώκει τη διασφάλιση της διεθνούς ασφάλειας και του εσωτερικού τομέα ασφαλείας, σε οριακές συγκρούσεις ανά την υφήλιο, πχ Βοσνία, Κόσσοβο, Λιβύη και προσεχώς Συρία."</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/1014965" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6f12072f3d343f459a073dc5d8a625bd" rel="nofollow" data-download="{"attachment_id":7010712,"asset_id":1014965,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/7010712/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="264491" href="https://uom-gr.academia.edu/VasilisKILIARIS">Vasilis KILIARIS</a><script data-card-contents-for-user="264491" type="text/json">{"id":264491,"first_name":"Vasilis","last_name":"KILIARIS","domain_name":"uom-gr","page_name":"VasilisKILIARIS","display_name":"Vasilis KILIARIS","profile_url":"https://uom-gr.academia.edu/VasilisKILIARIS?f_ri=5523","photo":"https://0.academia-photos.com/264491/55468/21856750/s65_vasilis.kiliaris.jpg"}</script></span></span></li><li class="js-paper-rank-work_1014965 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="1014965"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 1014965, container: ".js-paper-rank-work_1014965", }); });</script></li><li class="js-percentile-work_1014965 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 1014965; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_1014965"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_1014965 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="1014965"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 1014965; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=1014965]").text(description); $(".js-view-count-work_1014965").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_1014965").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="1014965"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">12</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="3849" href="https://www.academia.edu/Documents/in/Conflict">Conflict</a>, <script data-card-contents-for-ri="3849" type="text/json">{"id":3849,"name":"Conflict","url":"https://www.academia.edu/Documents/in/Conflict?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7099" href="https://www.academia.edu/Documents/in/Case_Studies">Case Studies</a>, <script data-card-contents-for-ri="7099" type="text/json">{"id":7099,"name":"Case Studies","url":"https://www.academia.edu/Documents/in/Case_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="9818" href="https://www.academia.edu/Documents/in/Responsibility_to_Protect">Responsibility to Protect</a><script data-card-contents-for-ri="9818" type="text/json">{"id":9818,"name":"Responsibility to Protect","url":"https://www.academia.edu/Documents/in/Responsibility_to_Protect?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=1014965]'), work: {"id":1014965,"title":"ΔΙΠΛΩΜΑΤΙΚΗ ΕΡΓΑΣΙΑ: Ο ρόλος των διεθνών περιφερειακών οργανισμών στην επίλυση συγκρούσεων: ο Οργανισμός του Βόρειο-Ατλαντικού Συμφώνου (ΝΑΤΟ)","created_at":"2011-10-15T16:14:30.338-07:00","url":"https://www.academia.edu/1014965/%CE%94%CE%99%CE%A0%CE%9B%CE%A9%CE%9C%CE%91%CE%A4%CE%99%CE%9A%CE%97_%CE%95%CE%A1%CE%93%CE%91%CE%A3%CE%99%CE%91_%CE%9F_%CF%81%CF%8C%CE%BB%CE%BF%CF%82_%CF%84%CF%89%CE%BD_%CE%B4%CE%B9%CE%B5%CE%B8%CE%BD%CF%8E%CE%BD_%CF%80%CE%B5%CF%81%CE%B9%CF%86%CE%B5%CF%81%CE%B5%CE%B9%CE%B1%CE%BA%CF%8E%CE%BD_%CE%BF%CF%81%CE%B3%CE%B1%CE%BD%CE%B9%CF%83%CE%BC%CF%8E%CE%BD_%CF%83%CF%84%CE%B7%CE%BD_%CE%B5%CF%80%CE%AF%CE%BB%CF%85%CF%83%CE%B7_%CF%83%CF%85%CE%B3%CE%BA%CF%81%CE%BF%CF%8D%CF%83%CE%B5%CF%89%CE%BD_%CE%BF_%CE%9F%CF%81%CE%B3%CE%B1%CE%BD%CE%B9%CF%83%CE%BC%CF%8C%CF%82_%CF%84%CE%BF%CF%85_%CE%92%CF%8C%CF%81%CE%B5%CE%B9%CE%BF_%CE%91%CF%84%CE%BB%CE%B1%CE%BD%CF%84%CE%B9%CE%BA%CE%BF%CF%8D_%CE%A3%CF%85%CE%BC%CF%86%CF%8E%CE%BD%CE%BF%CF%85_%CE%9D%CE%91%CE%A4%CE%9F_?f_ri=5523","dom_id":"work_1014965","summary":" Επιβλέπουσα Καθηγήτρια: ΝΑΣΚΟΥ-ΠΕΡΡΑΚΗ Παρασκευή Τηλ.: 2310 891499\tEmail:\tperraki@uom.gr Β΄ Μέλος Εξεταστικής Επιτροπής: ΜΠΕΛΛΟΥ ΦωτεινήΤηλ.: 2310 891479\tEmail: fbellou@uom.gr \r\n-------------------------------------\r\n\u003ca rel=\"license\" href=\"http://creativecommons.org/licenses/by-nc-nd/3.0/gr/\"\u003e\u003cimg alt=\"Άδεια Creative Commons\" style=\"border-width:0\" src=\"http://i.creativecommons.org/l/by-nc-nd/3.0/gr/88x31.png\" /\u003e\u003c/a\u003e\u003cbr /\u003eΑυτό το εργασία χορηγείται με άδεια \u003ca rel=\"license\" href=\"http://creativecommons.org/licenses/by-nc-nd/3.0/gr/\"\u003eCreative Commons Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ελλάδα \u003c/a\u003e.\"\r\n\r\nΛέξεις Κλειδιά:\t\r\n\r\nασφάλεια, ειρήνη, τάξη, σταθερότητα, ισχύς, συνεργασία, συγκρούσεις, περιπτωσιολογικές μελέτες, φάσμα, εκκρεμές, πλαίσιο, πρίσμα, νομιμότητα, νομιμοποίηση, δόγμα, στρατηγική αντίληψη, σύστημα, ηγεμονία, αρχή, επέμβαση, ευθύνη, προστασία\"\r\n\r\nΣυμπέρανα ότι, το ΝΑΤΟ μετεξελίσσεται σε οργανισμό που έχει τα χαρακτηριστικά ενός διεθνούς περιφερειακού οργανισμού, σε παγκόσμια όμως διάσταση, όπου με βάση το δόγμα \"Ευθύνη Προστασίας\" (Responsibility to Protect), αναλαμβάνει ρόλο χωροφύλακα, που επιδιώκει τη διασφάλιση της διεθνούς ασφάλειας και του εσωτερικού τομέα ασφαλείας, σε οριακές συγκρούσεις ανά την υφήλιο, πχ Βοσνία, Κόσσοβο, Λιβύη και προσεχώς Συρία.\"","downloadable_attachments":[{"id":7010712,"asset_id":1014965,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":264491,"first_name":"Vasilis","last_name":"KILIARIS","domain_name":"uom-gr","page_name":"VasilisKILIARIS","display_name":"Vasilis KILIARIS","profile_url":"https://uom-gr.academia.edu/VasilisKILIARIS?f_ri=5523","photo":"https://0.academia-photos.com/264491/55468/21856750/s65_vasilis.kiliaris.jpg"}],"research_interests":[{"id":3849,"name":"Conflict","url":"https://www.academia.edu/Documents/in/Conflict?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":7099,"name":"Case Studies","url":"https://www.academia.edu/Documents/in/Case_Studies?f_ri=5523","nofollow":false},{"id":9818,"name":"Responsibility to Protect","url":"https://www.academia.edu/Documents/in/Responsibility_to_Protect?f_ri=5523","nofollow":false},{"id":15427,"name":"Legality","url":"https://www.academia.edu/Documents/in/Legality?f_ri=5523"},{"id":24048,"name":"Peace Studies","url":"https://www.academia.edu/Documents/in/Peace_Studies?f_ri=5523"},{"id":24879,"name":"Hegemony","url":"https://www.academia.edu/Documents/in/Hegemony?f_ri=5523"},{"id":25600,"name":"Stability","url":"https://www.academia.edu/Documents/in/Stability?f_ri=5523"},{"id":43968,"name":"Cooperation","url":"https://www.academia.edu/Documents/in/Cooperation?f_ri=5523"},{"id":97450,"name":"Intervention","url":"https://www.academia.edu/Documents/in/Intervention?f_ri=5523"},{"id":183513,"name":"Order","url":"https://www.academia.edu/Documents/in/Order?f_ri=5523"},{"id":536898,"name":"Legalization","url":"https://www.academia.edu/Documents/in/Legalization?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37621781" data-work_id="37621781" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37621781/G%C3%96%C4%9E%C3%9CS_G%C3%96%C4%9E%C3%9CSE_MUHAREBE_VE_G%C3%9CVENL%C4%B0K_UYGULAMALARINDAK%C4%B0_YER%C4%B0">GÖĞÜS GÖĞÜSE MUHAREBE VE GÜVENLİK UYGULAMALARINDAKİ YERİ</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37621781" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37621781" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="18df396404626a4dd7fff92a3e2226bf" rel="nofollow" data-download="{"attachment_id":57605484,"asset_id":37621781,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57605484/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="95615525" href="https://ugr.academia.edu/MKubilayAkman">M. Kubilay Akman</a><script data-card-contents-for-user="95615525" type="text/json">{"id":95615525,"first_name":"M. Kubilay","last_name":"Akman","domain_name":"ugr","page_name":"MKubilayAkman","display_name":"M. Kubilay Akman","profile_url":"https://ugr.academia.edu/MKubilayAkman?f_ri=5523","photo":"https://0.academia-photos.com/95615525/20901319/37671456/s65_m._kubilay.akman.jpg"}</script></span></span></li><li class="js-paper-rank-work_37621781 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37621781"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37621781, container: ".js-paper-rank-work_37621781", }); });</script></li><li class="js-percentile-work_37621781 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37621781; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37621781"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37621781 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37621781"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37621781; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37621781]").text(description); $(".js-view-count-work_37621781").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37621781").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37621781"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">4</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="5179" href="https://www.academia.edu/Documents/in/Martial_Arts">Martial Arts</a>, <script data-card-contents-for-ri="5179" type="text/json">{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="521198" href="https://www.academia.edu/Documents/in/Self_Defense">Self Defense</a>, <script data-card-contents-for-ri="521198" type="text/json">{"id":521198,"name":"Self Defense","url":"https://www.academia.edu/Documents/in/Self_Defense?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1710242" href="https://www.academia.edu/Documents/in/Close_Quarters_Combat">Close Quarters Combat</a><script data-card-contents-for-ri="1710242" type="text/json">{"id":1710242,"name":"Close Quarters Combat","url":"https://www.academia.edu/Documents/in/Close_Quarters_Combat?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37621781]'), work: {"id":37621781,"title":"GÖĞÜS GÖĞÜSE MUHAREBE VE GÜVENLİK UYGULAMALARINDAKİ YERİ","created_at":"2018-10-21T10:06:59.115-07:00","url":"https://www.academia.edu/37621781/G%C3%96%C4%9E%C3%9CS_G%C3%96%C4%9E%C3%9CSE_MUHAREBE_VE_G%C3%9CVENL%C4%B0K_UYGULAMALARINDAK%C4%B0_YER%C4%B0?f_ri=5523","dom_id":"work_37621781","summary":"Göğüs Göğüse Muharebe (GGM) ya da Yakın Dövüş (YD) askeri ve kurumsal-resmi güvenlik alanında tarihsel kökleri bulunan bir savunma disiplini olmakla beraber çağdaş kent ortamının gerektirdiği önlemler üzerine sivil alanda da farklı versiyonlarıyla yayılmıştır. Batı’daki askeri çalışmalar kapsamında bugün devam eden Göğüs Göğüse Muharebe’nin 20. Yüzyıldaki kökleri 2. Dünya Savaşı’na ve William E. Fairbairn, Rex Applegate, Bill Underwood gibi isimlere dayanır. Avrupa’da bir savunma sistemi olarak geliştirilen Krav Maga ve Rusya’nın hala kullanılmaya devam eden kişisel savunma disiplini Sistema da GGM modelleri arasında kaydedilebilir. 21. Yüzyıla gelindiğinde farklı ülkelerin ve kültürlerin askeri, polis ve güvenlik ekollerinden gelen Yakın Dövüş modelleri, geleneksel savaş sanatları ya da modern savunma sistemleriyle harmanlanarak çağdaş güvenlik uygulamalarında çok geniş bir çeşitlilik yelpazesi sunmaktadır.","downloadable_attachments":[{"id":57605484,"asset_id":37621781,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":95615525,"first_name":"M. Kubilay","last_name":"Akman","domain_name":"ugr","page_name":"MKubilayAkman","display_name":"M. Kubilay Akman","profile_url":"https://ugr.academia.edu/MKubilayAkman?f_ri=5523","photo":"https://0.academia-photos.com/95615525/20901319/37671456/s65_m._kubilay.akman.jpg"}],"research_interests":[{"id":5179,"name":"Martial Arts","url":"https://www.academia.edu/Documents/in/Martial_Arts?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":521198,"name":"Self Defense","url":"https://www.academia.edu/Documents/in/Self_Defense?f_ri=5523","nofollow":false},{"id":1710242,"name":"Close Quarters Combat","url":"https://www.academia.edu/Documents/in/Close_Quarters_Combat?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_23908958" data-work_id="23908958" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/23908958/Fuck_Neoliberalism">Fuck Neoliberalism</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Yep, fuck it. Neoliberalism sucks. We don't need it.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/23908958" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e0022252ca5c043f11cf4422a80a43b6" rel="nofollow" data-download="{"attachment_id":61271804,"asset_id":23908958,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/61271804/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="271934" href="https://newcastle-au.academia.edu/SimonSpringer">Simon Springer</a><script data-card-contents-for-user="271934" type="text/json">{"id":271934,"first_name":"Simon","last_name":"Springer","domain_name":"newcastle-au","page_name":"SimonSpringer","display_name":"Simon Springer","profile_url":"https://newcastle-au.academia.edu/SimonSpringer?f_ri=5523","photo":"https://0.academia-photos.com/271934/56494/36120073/s65_simon.springer.jpg"}</script></span></span></li><li class="js-paper-rank-work_23908958 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="23908958"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 23908958, container: ".js-paper-rank-work_23908958", }); });</script></li><li class="js-percentile-work_23908958 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 23908958; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_23908958"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_23908958 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="23908958"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 23908958; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=23908958]").text(description); $(".js-view-count-work_23908958").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_23908958").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="23908958"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">180</a> </div><span class="InlineList-item-text u-textTruncate u-pl11x"><a class="InlineList-item-text" data-has-card-for-ri="8" href="https://www.academia.edu/Documents/in/Critical_Theory">Critical Theory</a>, <script data-card-contents-for-ri="8" type="text/json">{"id":8,"name":"Critical Theory","url":"https://www.academia.edu/Documents/in/Critical_Theory?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="38" href="https://www.academia.edu/Documents/in/Management">Management</a>, <script data-card-contents-for-ri="38" type="text/json">{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="39" href="https://www.academia.edu/Documents/in/Marketing">Marketing</a>, <script data-card-contents-for-ri="39" type="text/json">{"id":39,"name":"Marketing","url":"https://www.academia.edu/Documents/in/Marketing?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="128" href="https://www.academia.edu/Documents/in/History">History</a><script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=23908958]'), work: {"id":23908958,"title":"Fuck Neoliberalism","created_at":"2016-04-01T07:33:34.667-07:00","url":"https://www.academia.edu/23908958/Fuck_Neoliberalism?f_ri=5523","dom_id":"work_23908958","summary":"Yep, fuck it. Neoliberalism sucks. We don't need it.","downloadable_attachments":[{"id":61271804,"asset_id":23908958,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":271934,"first_name":"Simon","last_name":"Springer","domain_name":"newcastle-au","page_name":"SimonSpringer","display_name":"Simon Springer","profile_url":"https://newcastle-au.academia.edu/SimonSpringer?f_ri=5523","photo":"https://0.academia-photos.com/271934/56494/36120073/s65_simon.springer.jpg"}],"research_interests":[{"id":8,"name":"Critical Theory","url":"https://www.academia.edu/Documents/in/Critical_Theory?f_ri=5523","nofollow":false},{"id":38,"name":"Management","url":"https://www.academia.edu/Documents/in/Management?f_ri=5523","nofollow":false},{"id":39,"name":"Marketing","url":"https://www.academia.edu/Documents/in/Marketing?f_ri=5523","nofollow":false},{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=5523","nofollow":false},{"id":136,"name":"Cultural History","url":"https://www.academia.edu/Documents/in/Cultural_History?f_ri=5523"},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523"},{"id":193,"name":"Economic Sociology","url":"https://www.academia.edu/Documents/in/Economic_Sociology?f_ri=5523"},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=5523"},{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements?f_ri=5523"},{"id":209,"name":"Social Theory","url":"https://www.academia.edu/Documents/in/Social_Theory?f_ri=5523"},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=5523"},{"id":248,"name":"Social Psychology","url":"https://www.academia.edu/Documents/in/Social_Psychology?f_ri=5523"},{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=5523"},{"id":262,"name":"Human Geography","url":"https://www.academia.edu/Documents/in/Human_Geography?f_ri=5523"},{"id":263,"name":"Cultural Geography","url":"https://www.academia.edu/Documents/in/Cultural_Geography?f_ri=5523"},{"id":266,"name":"Historical Geography","url":"https://www.academia.edu/Documents/in/Historical_Geography?f_ri=5523"},{"id":268,"name":"Political Geography and Geopolitics","url":"https://www.academia.edu/Documents/in/Political_Geography_and_Geopolitics?f_ri=5523"},{"id":272,"name":"Social Geography","url":"https://www.academia.edu/Documents/in/Social_Geography?f_ri=5523"},{"id":277,"name":"Urban Geography","url":"https://www.academia.edu/Documents/in/Urban_Geography?f_ri=5523"},{"id":278,"name":"Environmental Geography","url":"https://www.academia.edu/Documents/in/Environmental_Geography?f_ri=5523"},{"id":279,"name":"Regional Geography","url":"https://www.academia.edu/Documents/in/Regional_Geography?f_ri=5523"},{"id":378,"name":"Area Studies","url":"https://www.academia.edu/Documents/in/Area_Studies?f_ri=5523"},{"id":380,"name":"Asian Studies","url":"https://www.academia.edu/Documents/in/Asian_Studies?f_ri=5523"},{"id":392,"name":"Archaeology","url":"https://www.academia.edu/Documents/in/Archaeology?f_ri=5523"},{"id":586,"name":"Health Sciences","url":"https://www.academia.edu/Documents/in/Health_Sciences?f_ri=5523"},{"id":588,"name":"Nursing","url":"https://www.academia.edu/Documents/in/Nursing?f_ri=5523"},{"id":696,"name":"Gender Studies","url":"https://www.academia.edu/Documents/in/Gender_Studies?f_ri=5523"},{"id":699,"name":"Queer Studies","url":"https://www.academia.edu/Documents/in/Queer_Studies?f_ri=5523"},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=5523"},{"id":727,"name":"Development Economics","url":"https://www.academia.edu/Documents/in/Development_Economics?f_ri=5523"},{"id":728,"name":"Economic Geography","url":"https://www.academia.edu/Documents/in/Economic_Geography?f_ri=5523"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=5523"},{"id":796,"name":"Comparative Politics","url":"https://www.academia.edu/Documents/in/Comparative_Politics?f_ri=5523"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523"},{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy?f_ri=5523"},{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy?f_ri=5523"},{"id":807,"name":"Philosophy Of Language","url":"https://www.academia.edu/Documents/in/Philosophy_Of_Language?f_ri=5523"},{"id":808,"name":"Aesthetics","url":"https://www.academia.edu/Documents/in/Aesthetics?f_ri=5523"},{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=5523"},{"id":814,"name":"Ethics","url":"https://www.academia.edu/Documents/in/Ethics?f_ri=5523"},{"id":815,"name":"Epistemology","url":"https://www.academia.edu/Documents/in/Epistemology?f_ri=5523"},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=5523"},{"id":909,"name":"Tourism Studies","url":"https://www.academia.edu/Documents/in/Tourism_Studies?f_ri=5523"},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=5523"},{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=5523"},{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=5523"},{"id":940,"name":"Social Work","url":"https://www.academia.edu/Documents/in/Social_Work?f_ri=5523"},{"id":941,"name":"Social Policy","url":"https://www.academia.edu/Documents/in/Social_Policy?f_ri=5523"},{"id":951,"name":"Humanities","url":"https://www.academia.edu/Documents/in/Humanities?f_ri=5523"},{"id":954,"name":"Social Anthropology","url":"https://www.academia.edu/Documents/in/Social_Anthropology?f_ri=5523"},{"id":957,"name":"Cultural Sociology","url":"https://www.academia.edu/Documents/in/Cultural_Sociology?f_ri=5523"},{"id":974,"name":"Sociology of Education","url":"https://www.academia.edu/Documents/in/Sociology_of_Education?f_ri=5523"},{"id":975,"name":"Sex and Gender","url":"https://www.academia.edu/Documents/in/Sex_and_Gender?f_ri=5523"},{"id":977,"name":"Development Studies","url":"https://www.academia.edu/Documents/in/Development_Studies?f_ri=5523"},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory?f_ri=5523"},{"id":1192,"name":"Feminist Theory","url":"https://www.academia.edu/Documents/in/Feminist_Theory?f_ri=5523"},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=5523"},{"id":1200,"name":"Languages and Linguistics","url":"https://www.academia.edu/Documents/in/Languages_and_Linguistics?f_ri=5523"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=5523"},{"id":1292,"name":"Health Economics","url":"https://www.academia.edu/Documents/in/Health_Economics?f_ri=5523"},{"id":1321,"name":"Sociology of Violence","url":"https://www.academia.edu/Documents/in/Sociology_of_Violence?f_ri=5523"},{"id":1372,"name":"Architecture","url":"https://www.academia.edu/Documents/in/Architecture?f_ri=5523"},{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=5523"},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=5523"},{"id":1698,"name":"Marxism","url":"https://www.academia.edu/Documents/in/Marxism?f_ri=5523"},{"id":2421,"name":"Radical Geography","url":"https://www.academia.edu/Documents/in/Radical_Geography?f_ri=5523"},{"id":2432,"name":"Critical Race Studies","url":"https://www.academia.edu/Documents/in/Critical_Race_Studies?f_ri=5523"},{"id":2524,"name":"Sociolinguistics","url":"https://www.academia.edu/Documents/in/Sociolinguistics?f_ri=5523"},{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=5523"},{"id":2585,"name":"International Development","url":"https://www.academia.edu/Documents/in/International_Development?f_ri=5523"},{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=5523"},{"id":2621,"name":"Higher Education","url":"https://www.academia.edu/Documents/in/Higher_Education?f_ri=5523"},{"id":2718,"name":"Linguistic Anthropology","url":"https://www.academia.edu/Documents/in/Linguistic_Anthropology?f_ri=5523"},{"id":2827,"name":"Mental Health","url":"https://www.academia.edu/Documents/in/Mental_Health?f_ri=5523"},{"id":2860,"name":"Postcolonial Studies","url":"https://www.academia.edu/Documents/in/Postcolonial_Studies?f_ri=5523"},{"id":3114,"name":"Queer Theory","url":"https://www.academia.edu/Documents/in/Queer_Theory?f_ri=5523"},{"id":3115,"name":"Posthumanism","url":"https://www.academia.edu/Documents/in/Posthumanism?f_ri=5523"},{"id":3277,"name":"Race and Racism","url":"https://www.academia.edu/Documents/in/Race_and_Racism?f_ri=5523"},{"id":3354,"name":"Poststructuralism","url":"https://www.academia.edu/Documents/in/Poststructuralism?f_ri=5523"},{"id":3392,"name":"Critical Pedagogy","url":"https://www.academia.edu/Documents/in/Critical_Pedagogy?f_ri=5523"},{"id":3407,"name":"Environmental Studies","url":"https://www.academia.edu/Documents/in/Environmental_Studies?f_ri=5523"},{"id":3410,"name":"Urban History","url":"https://www.academia.edu/Documents/in/Urban_History?f_ri=5523"},{"id":3429,"name":"Educational Research","url":"https://www.academia.edu/Documents/in/Educational_Research?f_ri=5523"},{"id":3472,"name":"Political Anthropology","url":"https://www.academia.edu/Documents/in/Political_Anthropology?f_ri=5523"},{"id":3499,"name":"Social and Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology?f_ri=5523"},{"id":3516,"name":"Contemporary History","url":"https://www.academia.edu/Documents/in/Contemporary_History?f_ri=5523"},{"id":3741,"name":"Urban Anthropology","url":"https://www.academia.edu/Documents/in/Urban_Anthropology?f_ri=5523"},{"id":4124,"name":"Feminist Philosophy","url":"https://www.academia.edu/Documents/in/Feminist_Philosophy?f_ri=5523"},{"id":4195,"name":"Cultural Theory","url":"https://www.academia.edu/Documents/in/Cultural_Theory?f_ri=5523"},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=5523"},{"id":4524,"name":"Sustainable Development","url":"https://www.academia.edu/Documents/in/Sustainable_Development?f_ri=5523"},{"id":4714,"name":"Sexuality","url":"https://www.academia.edu/Documents/in/Sexuality?f_ri=5523"},{"id":4730,"name":"Mass Communication","url":"https://www.academia.edu/Documents/in/Mass_Communication?f_ri=5523"},{"id":4801,"name":"Sexual Violence","url":"https://www.academia.edu/Documents/in/Sexual_Violence?f_ri=5523"},{"id":4808,"name":"Urban Planning","url":"https://www.academia.edu/Documents/in/Urban_Planning?f_ri=5523"},{"id":4834,"name":"Economic Anthropology","url":"https://www.academia.edu/Documents/in/Economic_Anthropology?f_ri=5523"},{"id":4917,"name":"Gender and Sexuality","url":"https://www.academia.edu/Documents/in/Gender_and_Sexuality?f_ri=5523"},{"id":4952,"name":"Anarchism","url":"https://www.academia.edu/Documents/in/Anarchism?f_ri=5523"},{"id":5247,"name":"Critical Race Theory","url":"https://www.academia.edu/Documents/in/Critical_Race_Theory?f_ri=5523"},{"id":5248,"name":"Legal Theory","url":"https://www.academia.edu/Documents/in/Legal_Theory?f_ri=5523"},{"id":5273,"name":"Class","url":"https://www.academia.edu/Documents/in/Class?f_ri=5523"},{"id":5453,"name":"Race and Ethnicity","url":"https://www.academia.edu/Documents/in/Race_and_Ethnicity?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=5523"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=5523"},{"id":5745,"name":"Social Capital","url":"https://www.academia.edu/Documents/in/Social_Capital?f_ri=5523"},{"id":5792,"name":"Social Justice","url":"https://www.academia.edu/Documents/in/Social_Justice?f_ri=5523"},{"id":5960,"name":"Continental Philosophy","url":"https://www.academia.edu/Documents/in/Continental_Philosophy?f_ri=5523"},{"id":6275,"name":"Tourism Geography","url":"https://www.academia.edu/Documents/in/Tourism_Geography?f_ri=5523"},{"id":6276,"name":"International Political Economy","url":"https://www.academia.edu/Documents/in/International_Political_Economy?f_ri=5523"},{"id":6422,"name":"Urban Regeneration","url":"https://www.academia.edu/Documents/in/Urban_Regeneration?f_ri=5523"},{"id":6463,"name":"History of Sexuality","url":"https://www.academia.edu/Documents/in/History_of_Sexuality?f_ri=5523"},{"id":6910,"name":"Capital Markets","url":"https://www.academia.edu/Documents/in/Capital_Markets?f_ri=5523"},{"id":7024,"name":"Gender","url":"https://www.academia.edu/Documents/in/Gender?f_ri=5523"},{"id":7230,"name":"Anarchist Studies","url":"https://www.academia.edu/Documents/in/Anarchist_Studies?f_ri=5523"},{"id":7369,"name":"Political communication","url":"https://www.academia.edu/Documents/in/Political_communication?f_ri=5523"},{"id":7453,"name":"Rural Development","url":"https://www.academia.edu/Documents/in/Rural_Development?f_ri=5523"},{"id":7490,"name":"Gender Equality","url":"https://www.academia.edu/Documents/in/Gender_Equality?f_ri=5523"},{"id":7725,"name":"Urban Studies","url":"https://www.academia.edu/Documents/in/Urban_Studies?f_ri=5523"},{"id":8004,"name":"Resistance (Social)","url":"https://www.academia.edu/Documents/in/Resistance_Social_?f_ri=5523"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=5523"},{"id":9405,"name":"Post-Colonialism","url":"https://www.academia.edu/Documents/in/Post-Colonialism?f_ri=5523"},{"id":9437,"name":"Urbanism","url":"https://www.academia.edu/Documents/in/Urbanism?f_ri=5523"},{"id":9450,"name":"Radicalization","url":"https://www.academia.edu/Documents/in/Radicalization?f_ri=5523"},{"id":9491,"name":"Pedagogy","url":"https://www.academia.edu/Documents/in/Pedagogy?f_ri=5523"},{"id":9705,"name":"Capitalism","url":"https://www.academia.edu/Documents/in/Capitalism?f_ri=5523"},{"id":9822,"name":"Education Policy","url":"https://www.academia.edu/Documents/in/Education_Policy?f_ri=5523"},{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=5523"},{"id":10444,"name":"Postmodernism","url":"https://www.academia.edu/Documents/in/Postmodernism?f_ri=5523"},{"id":10453,"name":"Feminism","url":"https://www.academia.edu/Documents/in/Feminism?f_ri=5523"},{"id":11395,"name":"Economic Development","url":"https://www.academia.edu/Documents/in/Economic_Development?f_ri=5523"},{"id":12194,"name":"Critical Geography","url":"https://www.academia.edu/Documents/in/Critical_Geography?f_ri=5523"},{"id":12420,"name":"Neoliberalism","url":"https://www.academia.edu/Documents/in/Neoliberalism?f_ri=5523"},{"id":12421,"name":"Neoliberal ideologies","url":"https://www.academia.edu/Documents/in/Neoliberal_ideologies?f_ri=5523"},{"id":13078,"name":"Peacekeeping","url":"https://www.academia.edu/Documents/in/Peacekeeping?f_ri=5523"},{"id":13518,"name":"Gender and Development","url":"https://www.academia.edu/Documents/in/Gender_and_Development?f_ri=5523"},{"id":13958,"name":"Media","url":"https://www.academia.edu/Documents/in/Media?f_ri=5523"},{"id":13995,"name":"Postcolonial Theory","url":"https://www.academia.edu/Documents/in/Postcolonial_Theory?f_ri=5523"},{"id":14084,"name":"Energy and Environment","url":"https://www.academia.edu/Documents/in/Energy_and_Environment?f_ri=5523"},{"id":14965,"name":"Neoliberal Economies in the Postcolony, Social Movements, Political Ecology, Indigeneity, Cultures of Disposession, Urban Form in Asia, Non-Linear Systems, Fieldwork and Disruptive Epistemologies, Biopolitics, India","url":"https://www.academia.edu/Documents/in/Neoliberal_Economies_in_the_Postcolony_Social_Movements_Political_Ecology_Indigeneity_Cultures_o?f_ri=5523"},{"id":15588,"name":"Social History","url":"https://www.academia.edu/Documents/in/Social_History?f_ri=5523"},{"id":15674,"name":"Linguistics","url":"https://www.academia.edu/Documents/in/Linguistics?f_ri=5523"},{"id":15863,"name":"Postcolonial Literature","url":"https://www.academia.edu/Documents/in/Postcolonial_Literature?f_ri=5523"},{"id":16288,"name":"Public Health","url":"https://www.academia.edu/Documents/in/Public_Health?f_ri=5523"},{"id":16598,"name":"Social movements and revolution","url":"https://www.academia.edu/Documents/in/Social_movements_and_revolution?f_ri=5523"},{"id":16742,"name":"Urban Sociology","url":"https://www.academia.edu/Documents/in/Urban_Sociology?f_ri=5523"},{"id":18373,"name":"Moral Philosophy","url":"https://www.academia.edu/Documents/in/Moral_Philosophy?f_ri=5523"},{"id":18845,"name":"Environmental Sustainability","url":"https://www.academia.edu/Documents/in/Environmental_Sustainability?f_ri=5523"},{"id":19030,"name":"Political Geography","url":"https://www.academia.edu/Documents/in/Political_Geography?f_ri=5523"},{"id":20436,"name":"Urban And Regional Planning","url":"https://www.academia.edu/Documents/in/Urban_And_Regional_Planning?f_ri=5523"},{"id":23342,"name":"Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Cultural_Anthropology?f_ri=5523"},{"id":24048,"name":"Peace Studies","url":"https://www.academia.edu/Documents/in/Peace_Studies?f_ri=5523"},{"id":26879,"name":"Social Class","url":"https://www.academia.edu/Documents/in/Social_Class?f_ri=5523"},{"id":30089,"name":"Neoliberalisms and the Transformation of the Cultural Sphere","url":"https://www.academia.edu/Documents/in/Neoliberalisms_and_the_Transformation_of_the_Cultural_Sphere?f_ri=5523"},{"id":31886,"name":"Radical Democracy","url":"https://www.academia.edu/Documents/in/Radical_Democracy?f_ri=5523"},{"id":37723,"name":"Geography Education","url":"https://www.academia.edu/Documents/in/Geography_Education?f_ri=5523"},{"id":39153,"name":"Neoliberalism (Anthropology)","url":"https://www.academia.edu/Documents/in/Neoliberalism_Anthropology_?f_ri=5523"},{"id":43883,"name":"Tourism","url":"https://www.academia.edu/Documents/in/Tourism?f_ri=5523"},{"id":45559,"name":"Peace","url":"https://www.academia.edu/Documents/in/Peace?f_ri=5523"},{"id":45578,"name":"Peacebuilding","url":"https://www.academia.edu/Documents/in/Peacebuilding?f_ri=5523"},{"id":49837,"name":"Historia","url":"https://www.academia.edu/Documents/in/Historia?f_ri=5523"},{"id":51334,"name":"Orientalism","url":"https://www.academia.edu/Documents/in/Orientalism?f_ri=5523"},{"id":51360,"name":"Economia","url":"https://www.academia.edu/Documents/in/Economia?f_ri=5523"},{"id":51625,"name":"Educación","url":"https://www.academia.edu/Documents/in/Educaci%C3%B3n?f_ri=5523"},{"id":51694,"name":"Pedagogía","url":"https://www.academia.edu/Documents/in/Pedagog%C3%ADa?f_ri=5523"},{"id":52480,"name":"Sociologia","url":"https://www.academia.edu/Documents/in/Sociologia?f_ri=5523"},{"id":61835,"name":"Urban Design","url":"https://www.academia.edu/Documents/in/Urban_Design?f_ri=5523"},{"id":70643,"name":"Privatization","url":"https://www.academia.edu/Documents/in/Privatization?f_ri=5523"},{"id":73569,"name":"Geografia","url":"https://www.academia.edu/Documents/in/Geografia?f_ri=5523"},{"id":88935,"name":"Sociología","url":"https://www.academia.edu/Documents/in/Sociolog%C3%ADa?f_ri=5523"},{"id":93395,"name":"Geografía Humana","url":"https://www.academia.edu/Documents/in/Geograf%C3%ADa_Humana?f_ri=5523"},{"id":147412,"name":"Pedagogia","url":"https://www.academia.edu/Documents/in/Pedagogia?f_ri=5523"},{"id":150370,"name":"Geografía","url":"https://www.academia.edu/Documents/in/Geograf%C3%ADa?f_ri=5523"},{"id":385234,"name":"Political Economy and History","url":"https://www.academia.edu/Documents/in/Political_Economy_and_History?f_ri=5523"},{"id":427740,"name":"Géographie","url":"https://www.academia.edu/Documents/in/G%C3%A9ographie?f_ri=5523"},{"id":453278,"name":"Neoliberalism and Education","url":"https://www.academia.edu/Documents/in/Neoliberalism_and_Education?f_ri=5523"},{"id":613505,"name":"Neoliberalismo","url":"https://www.academia.edu/Documents/in/Neoliberalismo?f_ri=5523"},{"id":840224,"name":"Neoliberalizm","url":"https://www.academia.edu/Documents/in/Neoliberalizm?f_ri=5523"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8776021" data-work_id="8776021" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8776021/The_Snipers_Massacre_on_the_Maidan_in_Ukraine">The “Snipers’ Massacre” on the Maidan in Ukraine</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The massacre of almost 50 Maidan protesters on February 20, 2014 was a turning point in Ukrainian politics and a tipping point in the conflict between the West and Russia over Ukraine. This mass killing of the protesters and the mass... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8776021" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The massacre of almost 50 Maidan protesters on February 20, 2014 was a turning point in Ukrainian politics and a tipping point in the conflict between the West and Russia over Ukraine. This mass killing of the protesters and the mass shooting of the police that preceded it led to the overthrow of the pro-Russian government of Viktor Yanukovych and gave a start to a civil war in Donbas in Eastern Ukraine, Russian military intervention in Crimea and Donbas, and an international conflict between the West and Russia over Ukraine. A conclusion promoted by the post-Yanukovych governments and the media in Ukraine that the massacre was perpetrated by government snipers and special police units on a Yanukovych order has been nearly universally accepted by the Western governments, the media, and many scholars. The Ukrainian government investigation identified members of the special company of Berkut as responsible for killings of the absolute majority of the protesters, but did not release any evidence in support, with the exception of videos of the massacre. <br /> The question is which side organized the “snipers’ massacre.” This paper is the first academic study of this crucial case of the mass killing. It uses a theory of rational choice and a Weberian theory of instrumental rationality to examine actions of major actors both from the Yanukovych government, specifically various police and security forces, and the Maidan opposition, specifically its far right and oligarchic elements, during the massacre. <br /> The paper analyzes a large amount of evidence from different publicly available sources concerning this massacre and killings of specifics protesters. Qualitative content analysis includes the following data: about 1,500 videos and recordings of live internet and TV broadcasts from mass media and social media in different countries(some 150 gigabytes), news reports and social media posts by more than 100 journalists covering the massacre from Kyiv, some 5,000 photos, and nearly 30 gigabytes of publicly available radio intercepts of snipers and commanders from the special Alfa unit of the Security Service of Ukraine and Internal Troops, and Maidan massacre trial recordings. This study also employs field research on site of the massacre, eyewitness reports by both Maidan protesters and government special units commanders, statements by both former and current government officials, estimates of approximate ballistic trajectories, bullets and weapons used, and types of wounds among both protesters and the police. This study establishes a precise timeline for various events of the massacre, the locations of both the shooters and the government snipers, and the specific timeline and locations of nearly 50 protesters’ deaths. It also briefly analyzes other major cases of violence during and after the “Euromaidan.” This study includes two video appendixes. <br /> This academic investigation concludes that the massacre was a false flag operation, which was rationally planned and carried out with a goal of the overthrow of the government and seizure of power. It found various evidence of the involvement of an alliance of the far right organizations, specifically the Right Sector and Svoboda, and oligarchic parties, such as Fatherland. Concealed shooters and spotters were located in at least 20 Maidan-controlled buildings or areas. The various evidence that the protesters were killed from these locations include some 70 testimonies, primarily by Maidan protesters, several videos of “snipers” targeting protesters from these buildings, comparisons of positions of the specific protesters at the time of their killing and their entry wounds, and bullet impact signs. The study uncovered various videos and photos of armed Maidan “snipers” and spotters in many of these buildings. The paper presents implications of these findings for understanding the nature of the change of the government in Ukraine, the civil war in Donbas, Russian military intervention in Crimea and Donbas, and an international conflict between the West and Russia over Ukraine.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8776021" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="3df24dbd2a68ff0752ddb21f84dcacff" rel="nofollow" data-download="{"attachment_id":55794502,"asset_id":8776021,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55794502/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="186256" href="https://uottawa.academia.edu/IvanKatchanovski">Ivan Katchanovski</a><script data-card-contents-for-user="186256" type="text/json">{"id":186256,"first_name":"Ivan","last_name":"Katchanovski","domain_name":"uottawa","page_name":"IvanKatchanovski","display_name":"Ivan Katchanovski","profile_url":"https://uottawa.academia.edu/IvanKatchanovski?f_ri=5523","photo":"https://0.academia-photos.com/186256/93609/104202/s65_ivan.katchanovski.jpg"}</script></span></span></li><li class="js-paper-rank-work_8776021 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8776021"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8776021, container: ".js-paper-rank-work_8776021", }); });</script></li><li class="js-percentile-work_8776021 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8776021; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8776021"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8776021 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8776021"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8776021; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8776021]").text(description); $(".js-view-count-work_8776021").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8776021").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8776021"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">202</a> </div><span class="InlineList-item-text u-textTruncate u-pl11x"><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="189" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>, <script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="201" href="https://www.academia.edu/Documents/in/Political_Sociology">Political Sociology</a>, <script data-card-contents-for-ri="201" type="text/json">{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="382" href="https://www.academia.edu/Documents/in/Eastern_European_Studies">Eastern European Studies</a><script data-card-contents-for-ri="382" type="text/json">{"id":382,"name":"Eastern European Studies","url":"https://www.academia.edu/Documents/in/Eastern_European_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8776021]'), work: {"id":8776021,"title":"The “Snipers’ Massacre” on the Maidan in Ukraine","created_at":"2014-10-14T09:29:14.360-07:00","url":"https://www.academia.edu/8776021/The_Snipers_Massacre_on_the_Maidan_in_Ukraine?f_ri=5523","dom_id":"work_8776021","summary":"The massacre of almost 50 Maidan protesters on February 20, 2014 was a turning point in Ukrainian politics and a tipping point in the conflict between the West and Russia over Ukraine. This mass killing of the protesters and the mass shooting of the police that preceded it led to the overthrow of the pro-Russian government of Viktor Yanukovych and gave a start to a civil war in Donbas in Eastern Ukraine, Russian military intervention in Crimea and Donbas, and an international conflict between the West and Russia over Ukraine. A conclusion promoted by the post-Yanukovych governments and the media in Ukraine that the massacre was perpetrated by government snipers and special police units on a Yanukovych order has been nearly universally accepted by the Western governments, the media, and many scholars. The Ukrainian government investigation identified members of the special company of Berkut as responsible for killings of the absolute majority of the protesters, but did not release any evidence in support, with the exception of videos of the massacre. \r\n The question is which side organized the “snipers’ massacre.” This paper is the first academic study of this crucial case of the mass killing. It uses a theory of rational choice and a Weberian theory of instrumental rationality to examine actions of major actors both from the Yanukovych government, specifically various police and security forces, and the Maidan opposition, specifically its far right and oligarchic elements, during the massacre. \r\n The paper analyzes a large amount of evidence from different publicly available sources concerning this massacre and killings of specifics protesters. Qualitative content analysis includes the following data: about 1,500 videos and recordings of live internet and TV broadcasts from mass media and social media in different countries(some 150 gigabytes), news reports and social media posts by more than 100 journalists covering the massacre from Kyiv, some 5,000 photos, and nearly 30 gigabytes of publicly available radio intercepts of snipers and commanders from the special Alfa unit of the Security Service of Ukraine and Internal Troops, and Maidan massacre trial recordings. This study also employs field research on site of the massacre, eyewitness reports by both Maidan protesters and government special units commanders, statements by both former and current government officials, estimates of approximate ballistic trajectories, bullets and weapons used, and types of wounds among both protesters and the police. This study establishes a precise timeline for various events of the massacre, the locations of both the shooters and the government snipers, and the specific timeline and locations of nearly 50 protesters’ deaths. It also briefly analyzes other major cases of violence during and after the “Euromaidan.” This study includes two video appendixes. \r\n This academic investigation concludes that the massacre was a false flag operation, which was rationally planned and carried out with a goal of the overthrow of the government and seizure of power. It found various evidence of the involvement of an alliance of the far right organizations, specifically the Right Sector and Svoboda, and oligarchic parties, such as Fatherland. Concealed shooters and spotters were located in at least 20 Maidan-controlled buildings or areas. The various evidence that the protesters were killed from these locations include some 70 testimonies, primarily by Maidan protesters, several videos of “snipers” targeting protesters from these buildings, comparisons of positions of the specific protesters at the time of their killing and their entry wounds, and bullet impact signs. The study uncovered various videos and photos of armed Maidan “snipers” and spotters in many of these buildings. The paper presents implications of these findings for understanding the nature of the change of the government in Ukraine, the civil war in Donbas, Russian military intervention in Crimea and Donbas, and an international conflict between the West and Russia over Ukraine.","downloadable_attachments":[{"id":55794502,"asset_id":8776021,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":186256,"first_name":"Ivan","last_name":"Katchanovski","domain_name":"uottawa","page_name":"IvanKatchanovski","display_name":"Ivan Katchanovski","profile_url":"https://uottawa.academia.edu/IvanKatchanovski?f_ri=5523","photo":"https://0.academia-photos.com/186256/93609/104202/s65_ivan.katchanovski.jpg"}],"research_interests":[{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false},{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=5523","nofollow":false},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=5523","nofollow":false},{"id":382,"name":"Eastern European Studies","url":"https://www.academia.edu/Documents/in/Eastern_European_Studies?f_ri=5523","nofollow":false},{"id":383,"name":"European Studies","url":"https://www.academia.edu/Documents/in/European_Studies?f_ri=5523"},{"id":537,"name":"Criminal Justice","url":"https://www.academia.edu/Documents/in/Criminal_Justice?f_ri=5523"},{"id":796,"name":"Comparative Politics","url":"https://www.academia.edu/Documents/in/Comparative_Politics?f_ri=5523"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523"},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=5523"},{"id":928,"name":"Media Studies","url":"https://www.academia.edu/Documents/in/Media_Studies?f_ri=5523"},{"id":933,"name":"New Media","url":"https://www.academia.edu/Documents/in/New_Media?f_ri=5523"},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=5523"},{"id":1199,"name":"Eastern Europe","url":"https://www.academia.edu/Documents/in/Eastern_Europe?f_ri=5523"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=5523"},{"id":1287,"name":"Political Parties","url":"https://www.academia.edu/Documents/in/Political_Parties?f_ri=5523"},{"id":1321,"name":"Sociology of Violence","url":"https://www.academia.edu/Documents/in/Sociology_of_Violence?f_ri=5523"},{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=5523"},{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism?f_ri=5523"},{"id":1697,"name":"Violence","url":"https://www.academia.edu/Documents/in/Violence?f_ri=5523"},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=5523"},{"id":2169,"name":"Human Rights Law","url":"https://www.academia.edu/Documents/in/Human_Rights_Law?f_ri=5523"},{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=5523"},{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=5523"},{"id":2789,"name":"Government","url":"https://www.academia.edu/Documents/in/Government?f_ri=5523"},{"id":2869,"name":"Digital Media","url":"https://www.academia.edu/Documents/in/Digital_Media?f_ri=5523"},{"id":2965,"name":"Sociology of Crime and Deviance","url":"https://www.academia.edu/Documents/in/Sociology_of_Crime_and_Deviance?f_ri=5523"},{"id":3680,"name":"Courts","url":"https://www.academia.edu/Documents/in/Courts?f_ri=5523"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523"},{"id":3849,"name":"Conflict","url":"https://www.academia.edu/Documents/in/Conflict?f_ri=5523"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=5523"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=5523"},{"id":4487,"name":"Revolutions","url":"https://www.academia.edu/Documents/in/Revolutions?f_ri=5523"},{"id":4730,"name":"Mass Communication","url":"https://www.academia.edu/Documents/in/Mass_Communication?f_ri=5523"},{"id":5091,"name":"Democratization","url":"https://www.academia.edu/Documents/in/Democratization?f_ri=5523"},{"id":5321,"name":"International Human Rights Law","url":"https://www.academia.edu/Documents/in/International_Human_Rights_Law?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=5523"},{"id":5687,"name":"Interstate and Intrastate War","url":"https://www.academia.edu/Documents/in/Interstate_and_Intrastate_War?f_ri=5523"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=5523"},{"id":5779,"name":"Post-Soviet Regimes","url":"https://www.academia.edu/Documents/in/Post-Soviet_Regimes?f_ri=5523"},{"id":5821,"name":"Ukrainian Studies","url":"https://www.academia.edu/Documents/in/Ukrainian_Studies?f_ri=5523"},{"id":5847,"name":"Political Extremism/Radicalism/Populism","url":"https://www.academia.edu/Documents/in/Political_Extremism_Radicalism_Populism?f_ri=5523"},{"id":5878,"name":"Nationalism","url":"https://www.academia.edu/Documents/in/Nationalism?f_ri=5523"},{"id":6224,"name":"American Foreign Policy","url":"https://www.academia.edu/Documents/in/American_Foreign_Policy?f_ri=5523"},{"id":6264,"name":"East European studies","url":"https://www.academia.edu/Documents/in/East_European_studies?f_ri=5523"},{"id":6426,"name":"Content Analysis","url":"https://www.academia.edu/Documents/in/Content_Analysis?f_ri=5523"},{"id":6618,"name":"International Criminal Court","url":"https://www.academia.edu/Documents/in/International_Criminal_Court?f_ri=5523"},{"id":6707,"name":"Foreign Policy","url":"https://www.academia.edu/Documents/in/Foreign_Policy?f_ri=5523"},{"id":6989,"name":"Political Regimes","url":"https://www.academia.edu/Documents/in/Political_Regimes?f_ri=5523"},{"id":6990,"name":"Post-Soviet Politics","url":"https://www.academia.edu/Documents/in/Post-Soviet_Politics?f_ri=5523"},{"id":7369,"name":"Political communication","url":"https://www.academia.edu/Documents/in/Political_communication?f_ri=5523"},{"id":7669,"name":"Russian Foreign Policy","url":"https://www.academia.edu/Documents/in/Russian_Foreign_Policy?f_ri=5523"},{"id":7980,"name":"History of Political Violence","url":"https://www.academia.edu/Documents/in/History_of_Political_Violence?f_ri=5523"},{"id":8206,"name":"Police","url":"https://www.academia.edu/Documents/in/Police?f_ri=5523"},{"id":8208,"name":"Rational Choice","url":"https://www.academia.edu/Documents/in/Rational_Choice?f_ri=5523"},{"id":9246,"name":"Social Media","url":"https://www.academia.edu/Documents/in/Social_Media?f_ri=5523"},{"id":9251,"name":"Transitional Justice","url":"https://www.academia.edu/Documents/in/Transitional_Justice?f_ri=5523"},{"id":9451,"name":"Insurgency/Counterinsurgency(COIN)","url":"https://www.academia.edu/Documents/in/Insurgency_Counterinsurgency_COIN_?f_ri=5523"},{"id":9517,"name":"Protest","url":"https://www.academia.edu/Documents/in/Protest?f_ri=5523"},{"id":9626,"name":"Ukrainian Politics","url":"https://www.academia.edu/Documents/in/Ukrainian_Politics?f_ri=5523"},{"id":10191,"name":"Justice","url":"https://www.academia.edu/Documents/in/Justice?f_ri=5523"},{"id":10311,"name":"European Politics","url":"https://www.academia.edu/Documents/in/European_Politics?f_ri=5523"},{"id":10314,"name":"Social Movements (Political Science)","url":"https://www.academia.edu/Documents/in/Social_Movements_Political_Science_?f_ri=5523"},{"id":10317,"name":"Judicial Politics","url":"https://www.academia.edu/Documents/in/Judicial_Politics?f_ri=5523"},{"id":10342,"name":"Political Violence","url":"https://www.academia.edu/Documents/in/Political_Violence?f_ri=5523"},{"id":10344,"name":"International Politics","url":"https://www.academia.edu/Documents/in/International_Politics?f_ri=5523"},{"id":10466,"name":"Media and Democracy","url":"https://www.academia.edu/Documents/in/Media_and_Democracy?f_ri=5523"},{"id":12396,"name":"Post-Soviet Studies","url":"https://www.academia.edu/Documents/in/Post-Soviet_Studies?f_ri=5523"},{"id":12531,"name":"Post-Socialist Societies","url":"https://www.academia.edu/Documents/in/Post-Socialist_Societies?f_ri=5523"},{"id":12623,"name":"Elites (Political Science)","url":"https://www.academia.edu/Documents/in/Elites_Political_Science_?f_ri=5523"},{"id":12855,"name":"Political Communication (Communication)","url":"https://www.academia.edu/Documents/in/Political_Communication_Communication_?f_ri=5523"},{"id":12939,"name":"Armed Conflict","url":"https://www.academia.edu/Documents/in/Armed_Conflict?f_ri=5523"},{"id":13614,"name":"Conflict Resolution","url":"https://www.academia.edu/Documents/in/Conflict_Resolution?f_ri=5523"},{"id":13958,"name":"Media","url":"https://www.academia.edu/Documents/in/Media?f_ri=5523"},{"id":14275,"name":"Ukrainian Nationalism","url":"https://www.academia.edu/Documents/in/Ukrainian_Nationalism?f_ri=5523"},{"id":15708,"name":"Bounded Rationality","url":"https://www.academia.edu/Documents/in/Bounded_Rationality?f_ri=5523"},{"id":16598,"name":"Social movements and revolution","url":"https://www.academia.edu/Documents/in/Social_movements_and_revolution?f_ri=5523"},{"id":16870,"name":"Political Organization","url":"https://www.academia.edu/Documents/in/Political_Organization?f_ri=5523"},{"id":17123,"name":"Democracy","url":"https://www.academia.edu/Documents/in/Democracy?f_ri=5523"},{"id":18394,"name":"Content Analysis (Research Methodology)","url":"https://www.academia.edu/Documents/in/Content_Analysis_Research_Methodology_?f_ri=5523"},{"id":18648,"name":"News Media Ethics","url":"https://www.academia.edu/Documents/in/News_Media_Ethics?f_ri=5523"},{"id":18919,"name":"Criminology (Social Sciences)","url":"https://www.academia.edu/Documents/in/Criminology_Social_Sciences_?f_ri=5523"},{"id":20477,"name":"Extremist Groups","url":"https://www.academia.edu/Documents/in/Extremist_Groups?f_ri=5523"},{"id":20520,"name":"Peace \u0026 Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies-3?f_ri=5523"},{"id":22072,"name":"American Foreign Policy in the post-Soviet space","url":"https://www.academia.edu/Documents/in/American_Foreign_Policy_in_the_post-Soviet_space?f_ri=5523"},{"id":22075,"name":"Democratisation","url":"https://www.academia.edu/Documents/in/Democratisation?f_ri=5523"},{"id":22665,"name":"Post-Socialism","url":"https://www.academia.edu/Documents/in/Post-Socialism?f_ri=5523"},{"id":25516,"name":"Postcommunist studies","url":"https://www.academia.edu/Documents/in/Postcommunist_studies?f_ri=5523"},{"id":25925,"name":"War and violence","url":"https://www.academia.edu/Documents/in/War_and_violence?f_ri=5523"},{"id":27077,"name":"International Relations and Human Rights","url":"https://www.academia.edu/Documents/in/International_Relations_and_Human_Rights?f_ri=5523"},{"id":27641,"name":"Soviet, post-Soviet, Russian politics","url":"https://www.academia.edu/Documents/in/Soviet_post-Soviet_Russian_politics?f_ri=5523"},{"id":27728,"name":"Politics of Ukraine","url":"https://www.academia.edu/Documents/in/Politics_of_Ukraine?f_ri=5523"},{"id":28151,"name":"Rational Choice Theory","url":"https://www.academia.edu/Documents/in/Rational_Choice_Theory?f_ri=5523"},{"id":28981,"name":"Ethnic Conflict and Civil War","url":"https://www.academia.edu/Documents/in/Ethnic_Conflict_and_Civil_War?f_ri=5523"},{"id":34598,"name":"Authoritarianism","url":"https://www.academia.edu/Documents/in/Authoritarianism?f_ri=5523"},{"id":35124,"name":"Post-Communism","url":"https://www.academia.edu/Documents/in/Post-Communism?f_ri=5523"},{"id":35321,"name":"Conflict, Violence and Peacebuilding","url":"https://www.academia.edu/Documents/in/Conflict_Violence_and_Peacebuilding?f_ri=5523"},{"id":36135,"name":"Authoritarian regimes","url":"https://www.academia.edu/Documents/in/Authoritarian_regimes?f_ri=5523"},{"id":36487,"name":"U.S. Foreign Policy","url":"https://www.academia.edu/Documents/in/U.S._Foreign_Policy?f_ri=5523"},{"id":37765,"name":"News","url":"https://www.academia.edu/Documents/in/News?f_ri=5523"},{"id":37778,"name":"Law Enforcement","url":"https://www.academia.edu/Documents/in/Law_Enforcement?f_ri=5523"},{"id":39787,"name":"International Affairs","url":"https://www.academia.edu/Documents/in/International_Affairs?f_ri=5523"},{"id":42350,"name":"Youtube","url":"https://www.academia.edu/Documents/in/Youtube?f_ri=5523"},{"id":42835,"name":"Video Analysis","url":"https://www.academia.edu/Documents/in/Video_Analysis?f_ri=5523"},{"id":43232,"name":"Conflict Analysis","url":"https://www.academia.edu/Documents/in/Conflict_Analysis?f_ri=5523"},{"id":43633,"name":"Criminal Investigation","url":"https://www.academia.edu/Documents/in/Criminal_Investigation?f_ri=5523"},{"id":44638,"name":"Max Weber","url":"https://www.academia.edu/Documents/in/Max_Weber?f_ri=5523"},{"id":44789,"name":"Media and Politics","url":"https://www.academia.edu/Documents/in/Media_and_Politics?f_ri=5523"},{"id":45036,"name":"Mass media","url":"https://www.academia.edu/Documents/in/Mass_media?f_ri=5523"},{"id":45426,"name":"Central and Eastern Europe","url":"https://www.academia.edu/Documents/in/Central_and_Eastern_Europe?f_ri=5523"},{"id":46635,"name":"Central and East European Studies","url":"https://www.academia.edu/Documents/in/Central_and_East_European_Studies?f_ri=5523"},{"id":46962,"name":"Ukrainian Foreign Policy","url":"https://www.academia.edu/Documents/in/Ukrainian_Foreign_Policy?f_ri=5523"},{"id":46989,"name":"Ukraine","url":"https://www.academia.edu/Documents/in/Ukraine?f_ri=5523"},{"id":48700,"name":"Violent Non-State Actors","url":"https://www.academia.edu/Documents/in/Violent_Non-State_Actors?f_ri=5523"},{"id":50967,"name":"Mass Communication and New Media","url":"https://www.academia.edu/Documents/in/Mass_Communication_and_New_Media?f_ri=5523"},{"id":50977,"name":"Current Events Analysis","url":"https://www.academia.edu/Documents/in/Current_Events_Analysis?f_ri=5523"},{"id":52236,"name":"Foreign Policy of Ukraine","url":"https://www.academia.edu/Documents/in/Foreign_Policy_of_Ukraine?f_ri=5523"},{"id":52867,"name":"Rationality","url":"https://www.academia.edu/Documents/in/Rationality?f_ri=5523"},{"id":55704,"name":"Transition","url":"https://www.academia.edu/Documents/in/Transition?f_ri=5523"},{"id":56845,"name":"Comparative Politics, Democratization, Authoritarian Regimes, Regime Change, Concept Analysis, Measurement","url":"https://www.academia.edu/Documents/in/Comparative_Politics_Democratization_Authoritarian_Regimes_Regime_Change_Concept_Analysis_Measu?f_ri=5523"},{"id":58717,"name":"Rebellion","url":"https://www.academia.edu/Documents/in/Rebellion?f_ri=5523"},{"id":58937,"name":"Slavic Studies","url":"https://www.academia.edu/Documents/in/Slavic_Studies?f_ri=5523"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=5523"},{"id":63322,"name":"Russian-Ukrainian Relations","url":"https://www.academia.edu/Documents/in/Russian-Ukrainian_Relations?f_ri=5523"},{"id":63483,"name":"Extremism","url":"https://www.academia.edu/Documents/in/Extremism?f_ri=5523"},{"id":65835,"name":"Human right","url":"https://www.academia.edu/Documents/in/Human_right?f_ri=5523"},{"id":67360,"name":"Crime","url":"https://www.academia.edu/Documents/in/Crime?f_ri=5523"},{"id":70358,"name":"Protest Movements","url":"https://www.academia.edu/Documents/in/Protest_Movements?f_ri=5523"},{"id":70659,"name":"Contentious Politics","url":"https://www.academia.edu/Documents/in/Contentious_Politics?f_ri=5523"},{"id":70763,"name":"EU institutions, EU foreign policy, Russia, Ukraine, Belarus and Moldova, securitization","url":"https://www.academia.edu/Documents/in/EU_institutions_EU_foreign_policy_Russia_Ukraine_Belarus_and_Moldova_securitization?f_ri=5523"},{"id":75826,"name":"Europe","url":"https://www.academia.edu/Documents/in/Europe?f_ri=5523"},{"id":76882,"name":"Violent Crime","url":"https://www.academia.edu/Documents/in/Violent_Crime?f_ri=5523"},{"id":79323,"name":"Foreign Affairs","url":"https://www.academia.edu/Documents/in/Foreign_Affairs?f_ri=5523"},{"id":79325,"name":"Current Affairs","url":"https://www.academia.edu/Documents/in/Current_Affairs?f_ri=5523"},{"id":80016,"name":"Police and Policing","url":"https://www.academia.edu/Documents/in/Police_and_Policing?f_ri=5523"},{"id":80513,"name":"Political Sciences","url":"https://www.academia.edu/Documents/in/Political_Sciences?f_ri=5523"},{"id":81822,"name":"Revolution","url":"https://www.academia.edu/Documents/in/Revolution?f_ri=5523"},{"id":89524,"name":"Right-Wing Extremism","url":"https://www.academia.edu/Documents/in/Right-Wing_Extremism?f_ri=5523"},{"id":97974,"name":"Non State Armed Actors","url":"https://www.academia.edu/Documents/in/Non_State_Armed_Actors?f_ri=5523"},{"id":103979,"name":"Ukrainian Far-Right Organisations","url":"https://www.academia.edu/Documents/in/Ukrainian_Far-Right_Organisations?f_ri=5523"},{"id":105076,"name":"Transitional justice and reconciliation processes","url":"https://www.academia.edu/Documents/in/Transitional_justice_and_reconciliation_processes?f_ri=5523"},{"id":107582,"name":"Transition to Democracy","url":"https://www.academia.edu/Documents/in/Transition_to_Democracy?f_ri=5523"},{"id":107620,"name":"Far Right","url":"https://www.academia.edu/Documents/in/Far_Right?f_ri=5523"},{"id":110605,"name":"Investigation","url":"https://www.academia.edu/Documents/in/Investigation?f_ri=5523"},{"id":122619,"name":"Political Transitions","url":"https://www.academia.edu/Documents/in/Political_Transitions?f_ri=5523"},{"id":126406,"name":"Protest and resistance","url":"https://www.academia.edu/Documents/in/Protest_and_resistance?f_ri=5523"},{"id":127515,"name":"Conflict Studies","url":"https://www.academia.edu/Documents/in/Conflict_Studies?f_ri=5523"},{"id":139802,"name":"Violencia Política","url":"https://www.academia.edu/Documents/in/Violencia_Pol%C3%ADtica?f_ri=5523"},{"id":140651,"name":"Weber","url":"https://www.academia.edu/Documents/in/Weber?f_ri=5523"},{"id":146308,"name":"Police use of force","url":"https://www.academia.edu/Documents/in/Police_use_of_force?f_ri=5523"},{"id":162817,"name":"Representation of Massacre","url":"https://www.academia.edu/Documents/in/Representation_of_Massacre?f_ri=5523"},{"id":172404,"name":"Mass Murder","url":"https://www.academia.edu/Documents/in/Mass_Murder?f_ri=5523"},{"id":173434,"name":"International Justice","url":"https://www.academia.edu/Documents/in/International_Justice?f_ri=5523"},{"id":183451,"name":"Far-Right Politics","url":"https://www.academia.edu/Documents/in/Far-Right_Politics?f_ri=5523"},{"id":183452,"name":"Extreme Right Politics","url":"https://www.academia.edu/Documents/in/Extreme_Right_Politics?f_ri=5523"},{"id":183454,"name":"far-right politics Europe","url":"https://www.academia.edu/Documents/in/far-right_politics_Europe?f_ri=5523"},{"id":189583,"name":"Post-Soviet Transformation","url":"https://www.academia.edu/Documents/in/Post-Soviet_Transformation?f_ri=5523"},{"id":194831,"name":"Ukrainian law","url":"https://www.academia.edu/Documents/in/Ukrainian_law?f_ri=5523"},{"id":199924,"name":"Extreme and Far Right","url":"https://www.academia.edu/Documents/in/Extreme_and_Far_Right?f_ri=5523"},{"id":202728,"name":"Post-Communist Studies","url":"https://www.academia.edu/Documents/in/Post-Communist_Studies?f_ri=5523"},{"id":220464,"name":"Politics and International relations","url":"https://www.academia.edu/Documents/in/Politics_and_International_relations?f_ri=5523"},{"id":228232,"name":"Massacre Sites","url":"https://www.academia.edu/Documents/in/Massacre_Sites?f_ri=5523"},{"id":234667,"name":"Far-right parties in Europe","url":"https://www.academia.edu/Documents/in/Far-right_parties_in_Europe?f_ri=5523"},{"id":241905,"name":"The Rational Actor Model","url":"https://www.academia.edu/Documents/in/The_Rational_Actor_Model?f_ri=5523"},{"id":244918,"name":"Sociology and Poltical Science","url":"https://www.academia.edu/Documents/in/Sociology_and_Poltical_Science?f_ri=5523"},{"id":250075,"name":"News Framing, Journalism, Political Communication","url":"https://www.academia.edu/Documents/in/News_Framing_Journalism_Political_Communication?f_ri=5523"},{"id":255194,"name":"Democratic Transitions","url":"https://www.academia.edu/Documents/in/Democratic_Transitions?f_ri=5523"},{"id":255195,"name":"Democracy and democratisation","url":"https://www.academia.edu/Documents/in/Democracy_and_democratisation?f_ri=5523"},{"id":255546,"name":"Current Events","url":"https://www.academia.edu/Documents/in/Current_Events?f_ri=5523"},{"id":255791,"name":"Criminology and Criminal Justice","url":"https://www.academia.edu/Documents/in/Criminology_and_Criminal_Justice?f_ri=5523"},{"id":270026,"name":"International Studies and Politics","url":"https://www.academia.edu/Documents/in/International_Studies_and_Politics?f_ri=5523"},{"id":334667,"name":"Protection of Civilians in Armed Conflict","url":"https://www.academia.edu/Documents/in/Protection_of_Civilians_in_Armed_Conflict?f_ri=5523"},{"id":365731,"name":"False Flag Operations","url":"https://www.academia.edu/Documents/in/False_Flag_Operations?f_ri=5523"},{"id":394781,"name":"News Media and War","url":"https://www.academia.edu/Documents/in/News_Media_and_War?f_ri=5523"},{"id":455608,"name":"Revolts and protests","url":"https://www.academia.edu/Documents/in/Revolts_and_protests?f_ri=5523"},{"id":487353,"name":"Political Communication and Public Opinion","url":"https://www.academia.edu/Documents/in/Political_Communication_and_Public_Opinion?f_ri=5523"},{"id":494435,"name":"Human Rights Violations","url":"https://www.academia.edu/Documents/in/Human_Rights_Violations?f_ri=5523"},{"id":496484,"name":"Protest and State Repression","url":"https://www.academia.edu/Documents/in/Protest_and_State_Repression?f_ri=5523"},{"id":532038,"name":"European and euroatlantic integration of Ukraine","url":"https://www.academia.edu/Documents/in/European_and_euroatlantic_integration_of_Ukraine?f_ri=5523"},{"id":589571,"name":"Mass Violence","url":"https://www.academia.edu/Documents/in/Mass_Violence?f_ri=5523"},{"id":598379,"name":"Special Issue on Political News","url":"https://www.academia.edu/Documents/in/Special_Issue_on_Political_News?f_ri=5523"},{"id":601581,"name":"News Analysis","url":"https://www.academia.edu/Documents/in/News_Analysis?f_ri=5523"},{"id":609104,"name":"Peace and Conflicts Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflicts_Studies?f_ri=5523"},{"id":636840,"name":"Conflict and Conflict Resolution","url":"https://www.academia.edu/Documents/in/Conflict_and_Conflict_Resolution?f_ri=5523"},{"id":756681,"name":"Mass Murderers","url":"https://www.academia.edu/Documents/in/Mass_Murderers?f_ri=5523"},{"id":761870,"name":"Terrorism and Counterterrorism","url":"https://www.academia.edu/Documents/in/Terrorism_and_Counterterrorism?f_ri=5523"},{"id":790675,"name":"Mass killings","url":"https://www.academia.edu/Documents/in/Mass_killings?f_ri=5523"},{"id":931986,"name":"Post Conflict Issues","url":"https://www.academia.edu/Documents/in/Post_Conflict_Issues?f_ri=5523"},{"id":951122,"name":"Political Parties and Party Politics","url":"https://www.academia.edu/Documents/in/Political_Parties_and_Party_Politics?f_ri=5523"},{"id":958661,"name":"Post Soviet","url":"https://www.academia.edu/Documents/in/Post_Soviet?f_ri=5523"},{"id":970967,"name":"International Current Affairs","url":"https://www.academia.edu/Documents/in/International_Current_Affairs?f_ri=5523"},{"id":973038,"name":"Democratization In Ukraine","url":"https://www.academia.edu/Documents/in/Democratization_In_Ukraine?f_ri=5523"},{"id":979881,"name":"Post comunism Country","url":"https://www.academia.edu/Documents/in/Post_comunism_Country?f_ri=5523"},{"id":993137,"name":"IR In Post soviet Space","url":"https://www.academia.edu/Documents/in/IR_In_Post_soviet_Space?f_ri=5523"},{"id":1008003,"name":"Criminology \u0026 Criminal Justice","url":"https://www.academia.edu/Documents/in/Criminology_and_Criminal_Justice-1?f_ri=5523"},{"id":1186656,"name":"Transition in Central and Eastern Europe","url":"https://www.academia.edu/Documents/in/Transition_in_Central_and_Eastern_Europe?f_ri=5523"},{"id":1197942,"name":"Social Science","url":"https://www.academia.edu/Documents/in/Social_Science?f_ri=5523"},{"id":1211285,"name":"Euromaidan","url":"https://www.academia.edu/Documents/in/Euromaidan?f_ri=5523"},{"id":1265902,"name":"Maidan","url":"https://www.academia.edu/Documents/in/Maidan?f_ri=5523"},{"id":1406613,"name":"Ukraine Crisis","url":"https://www.academia.edu/Documents/in/Ukraine_Crisis?f_ri=5523"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=5523"},{"id":2700356,"name":"Post-EuroMaidan Ukraine","url":"https://www.academia.edu/Documents/in/Post-EuroMaidan_Ukraine?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_23505842" data-work_id="23505842" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/23505842/Nuevas_amenazas_y_desaf%C3%ADos_permanentes_El_Estado_Isl%C3%A1mico_en_el_escenario_internacional_y_la_regionalizaci%C3%B3n_de_la_seguridad_en_Am%C3%A9rica_Latina">Nuevas amenazas y desafíos permanentes. El Estado Islámico en el escenario internacional y la regionalización de la seguridad en América Latina</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/23505842" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="de7a55fd9e1da00e366193c834d828f6" rel="nofollow" data-download="{"attachment_id":51198485,"asset_id":23505842,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/51198485/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="28415349" href="https://stmarystwickenham.academia.edu/FSaverioAngi%C3%B2">F. Saverio Angiò</a><script data-card-contents-for-user="28415349" type="text/json">{"id":28415349,"first_name":"F. Saverio","last_name":"Angiò","domain_name":"stmarystwickenham","page_name":"FSaverioAngiò","display_name":"F. Saverio Angiò","profile_url":"https://stmarystwickenham.academia.edu/FSaverioAngi%C3%B2?f_ri=5523","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_23505842 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="23505842"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 23505842, container: ".js-paper-rank-work_23505842", }); });</script></li><li class="js-percentile-work_23505842 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 23505842; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_23505842"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_23505842 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="23505842"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 23505842; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=23505842]").text(description); $(".js-view-count-work_23505842").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_23505842").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="23505842"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">9</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3705" href="https://www.academia.edu/Documents/in/International_Security">International Security</a>, <script data-card-contents-for-ri="3705" type="text/json">{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5686" href="https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism">Political Violence and Terrorism</a>, <script data-card-contents-for-ri="5686" type="text/json">{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="45146" href="https://www.academia.edu/Documents/in/Insurgency">Insurgency</a><script data-card-contents-for-ri="45146" type="text/json">{"id":45146,"name":"Insurgency","url":"https://www.academia.edu/Documents/in/Insurgency?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=23505842]'), work: {"id":23505842,"title":"Nuevas amenazas y desafíos permanentes. El Estado Islámico en el escenario internacional y la regionalización de la seguridad en América Latina","created_at":"2016-03-21T01:48:53.052-07:00","url":"https://www.academia.edu/23505842/Nuevas_amenazas_y_desaf%C3%ADos_permanentes_El_Estado_Isl%C3%A1mico_en_el_escenario_internacional_y_la_regionalizaci%C3%B3n_de_la_seguridad_en_Am%C3%A9rica_Latina?f_ri=5523","dom_id":"work_23505842","summary":null,"downloadable_attachments":[{"id":51198485,"asset_id":23505842,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":28415349,"first_name":"F. Saverio","last_name":"Angiò","domain_name":"stmarystwickenham","page_name":"FSaverioAngiò","display_name":"F. Saverio Angiò","profile_url":"https://stmarystwickenham.academia.edu/FSaverioAngi%C3%B2?f_ri=5523","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":5686,"name":"Political Violence and Terrorism","url":"https://www.academia.edu/Documents/in/Political_Violence_and_Terrorism?f_ri=5523","nofollow":false},{"id":45146,"name":"Insurgency","url":"https://www.academia.edu/Documents/in/Insurgency?f_ri=5523","nofollow":false},{"id":1231865,"name":"Islamic State of Iraq and the Levant","url":"https://www.academia.edu/Documents/in/Islamic_State_of_Iraq_and_the_Levant?f_ri=5523"},{"id":1236980,"name":"Yihadismo","url":"https://www.academia.edu/Documents/in/Yihadismo?f_ri=5523"},{"id":1398303,"name":"Daesh","url":"https://www.academia.edu/Documents/in/Daesh?f_ri=5523"},{"id":1415292,"name":"Islamic State of Iraq and Syria","url":"https://www.academia.edu/Documents/in/Islamic_State_of_Iraq_and_Syria?f_ri=5523"},{"id":1833817,"name":"ISIL TERROR","url":"https://www.academia.edu/Documents/in/ISIL_TERROR?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36885252" data-work_id="36885252" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36885252/Gasztold_Se%C5%84_P_Geneza_podstawy_prawne_i_pocz%C4%85tkowy_okres_dzia%C5%82alno%C5%9Bci_pionu_walki_z_bandytyzmem_zbrojnym_podziemiem_niepodleg%C5%82o%C5%9Bciowym_1944_1946_w_Pion_walki_z_podziemiem_niepodleg%C5%82o%C5%9Bciowym_RBP_MBP_1944_1954_red_T_Ruzikowski_Warszawa_2016_s_17_60">Gasztold-Seń P., Geneza, podstawy prawne i początkowy okres działalności pionu walki z „bandytyzmem” (zbrojnym podziemiem niepodległościowym) 1944–1946 [w:] Pion walki z podziemiem niepodległościowym RBP/MBP 1944–1954, red. T. Ruzikowski, Warszawa 2016, s. 17-60.</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36885252" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="bf77f9f4f6c7000103c96f392a3d5ba9" rel="nofollow" data-download="{"attachment_id":56837975,"asset_id":36885252,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56837975/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="28648548" href="https://akademia-pl.academia.edu/Przemys%C5%82awGasztold">Przemysław Gasztold</a><script data-card-contents-for-user="28648548" type="text/json">{"id":28648548,"first_name":"Przemysław","last_name":"Gasztold","domain_name":"akademia-pl","page_name":"PrzemysławGasztold","display_name":"Przemysław Gasztold","profile_url":"https://akademia-pl.academia.edu/Przemys%C5%82awGasztold?f_ri=5523","photo":"https://0.academia-photos.com/28648548/10759172/12009875/s65_przemys_aw.gasztold-se_.jpg"}</script></span></span></li><li class="js-paper-rank-work_36885252 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36885252"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36885252, container: ".js-paper-rank-work_36885252", }); });</script></li><li class="js-percentile-work_36885252 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36885252; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36885252"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36885252 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36885252"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36885252; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36885252]").text(description); $(".js-view-count-work_36885252").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36885252").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36885252"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">6</a> </div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3622" href="https://www.academia.edu/Documents/in/Polish_History">Polish History</a>, <script data-card-contents-for-ri="3622" type="text/json">{"id":3622,"name":"Polish History","url":"https://www.academia.edu/Documents/in/Polish_History?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5214" href="https://www.academia.edu/Documents/in/Cold_War">Cold War</a>, <script data-card-contents-for-ri="5214" type="text/json">{"id":5214,"name":"Cold War","url":"https://www.academia.edu/Documents/in/Cold_War?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>, <script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="27363" href="https://www.academia.edu/Documents/in/Poland">Poland</a><script data-card-contents-for-ri="27363" type="text/json">{"id":27363,"name":"Poland","url":"https://www.academia.edu/Documents/in/Poland?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36885252]'), work: {"id":36885252,"title":"Gasztold-Seń P., Geneza, podstawy prawne i początkowy okres działalności pionu walki z „bandytyzmem” (zbrojnym podziemiem niepodległościowym) 1944–1946 [w:] Pion walki z podziemiem niepodległościowym RBP/MBP 1944–1954, red. T. Ruzikowski, Warszawa 2016, s. 17-60.","created_at":"2018-06-21T01:53:12.826-07:00","url":"https://www.academia.edu/36885252/Gasztold_Se%C5%84_P_Geneza_podstawy_prawne_i_pocz%C4%85tkowy_okres_dzia%C5%82alno%C5%9Bci_pionu_walki_z_bandytyzmem_zbrojnym_podziemiem_niepodleg%C5%82o%C5%9Bciowym_1944_1946_w_Pion_walki_z_podziemiem_niepodleg%C5%82o%C5%9Bciowym_RBP_MBP_1944_1954_red_T_Ruzikowski_Warszawa_2016_s_17_60?f_ri=5523","dom_id":"work_36885252","summary":null,"downloadable_attachments":[{"id":56837975,"asset_id":36885252,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":28648548,"first_name":"Przemysław","last_name":"Gasztold","domain_name":"akademia-pl","page_name":"PrzemysławGasztold","display_name":"Przemysław Gasztold","profile_url":"https://akademia-pl.academia.edu/Przemys%C5%82awGasztold?f_ri=5523","photo":"https://0.academia-photos.com/28648548/10759172/12009875/s65_przemys_aw.gasztold-se_.jpg"}],"research_interests":[{"id":3622,"name":"Polish History","url":"https://www.academia.edu/Documents/in/Polish_History?f_ri=5523","nofollow":false},{"id":5214,"name":"Cold War","url":"https://www.academia.edu/Documents/in/Cold_War?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false},{"id":27363,"name":"Poland","url":"https://www.academia.edu/Documents/in/Poland?f_ri=5523","nofollow":false},{"id":105033,"name":"history of Poland","url":"https://www.academia.edu/Documents/in/history_of_Poland?f_ri=5523"},{"id":2580438,"name":"Polish Underground after the Second World War","url":"https://www.academia.edu/Documents/in/Polish_Underground_after_the_Second_World_War?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25830061" data-work_id="25830061" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25830061/Assessing_the_three_main_security_threats_facing_Europe_in_the_wake_of_the_Ukraine_crisis">Assessing the three main security threats facing Europe in the wake of the Ukraine crisis</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The crisis in Ukraine, which began in 2013, has had significant implications for European security. Cristian Nitoiu identifies three perceived security threats implied by developments in Ukraine and how these threats may develop in future... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_25830061" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The crisis in Ukraine, which began in 2013, has had significant implications for European security. Cristian Nitoiu identifies three perceived security threats implied by developments in Ukraine and how these threats may develop in future years: the threat of so called 'hybrid warfare' spilling over from the standoff between Ukraine and Russia; the threat posed by nuclear weapons; and the threat posed by more conventional forms of warfare. Perceptions of security threats are arguably more salient than actual threats, most times having a deep influence on the actions of states and other international actors. Hence, they play a key role in the way the EU, Kyiv and Moscow will shape their policies towards each other in the wake of the Ukraine crisis. While Russia can employ a wide range of capabilities, the EU and Ukraine have very few instruments to tackle security threats, be they traditional or nontraditional. In the case of Ukraine, but also more broadly the postSoviet space, EURussia/Ukraine relations are affected by the perception of three types of security threats: so called 'hybrid warfare', nuclear threats and traditional military threats (i.e. territorial invasion). Hybrid warfare In the West and Ukraine the perception of the threat posed by hybrid war has recently increased sharply. The annexation of Crimea and the war in eastern Ukraine have put the spotlight on the way states engage in conflict by using a series of (sometimes innovative) tools and strategies. Hybrid war combines the use of conventional and nonconventional capabilities, the use of irregular troops, cyberattacks, support for terrorist, rebel and criminal groups, or the use of the media and civil society for propaganda purposes. In eastern Ukraine in particular we have witnessed a combination of the use of both state and nonstate actors by all the sides involved. States tend to use parts of this toolkit even in times of peace, however in such situations these instruments are not combined in order to pursue certain assertive foreign policy goals.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25830061" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="366b62c20ea57dedea6714ad686dd44e" rel="nofollow" data-download="{"attachment_id":46196549,"asset_id":25830061,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46196549/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="379481" href="https://lborolondon.academia.edu/CristianNitoiu">Cristian Nitoiu</a><script data-card-contents-for-user="379481" type="text/json">{"id":379481,"first_name":"Cristian","last_name":"Nitoiu","domain_name":"lborolondon","page_name":"CristianNitoiu","display_name":"Cristian Nitoiu","profile_url":"https://lborolondon.academia.edu/CristianNitoiu?f_ri=5523","photo":"https://0.academia-photos.com/379481/117637/8854838/s65_cristian.nitoiu.jpg"}</script></span></span></li><li class="js-paper-rank-work_25830061 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25830061"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25830061, container: ".js-paper-rank-work_25830061", }); });</script></li><li class="js-percentile-work_25830061 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25830061; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25830061"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25830061 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25830061"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25830061; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25830061]").text(description); $(".js-view-count-work_25830061").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25830061").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25830061"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">15</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="382" href="https://www.academia.edu/Documents/in/Eastern_European_Studies">Eastern European Studies</a>, <script data-card-contents-for-ri="382" type="text/json">{"id":382,"name":"Eastern European Studies","url":"https://www.academia.edu/Documents/in/Eastern_European_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="389" href="https://www.academia.edu/Documents/in/Russian_Studies">Russian Studies</a>, <script data-card-contents-for-ri="389" type="text/json">{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1483" href="https://www.academia.edu/Documents/in/Foreign_Policy_Analysis">Foreign Policy Analysis</a>, <script data-card-contents-for-ri="1483" type="text/json">{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3705" href="https://www.academia.edu/Documents/in/International_Security">International Security</a><script data-card-contents-for-ri="3705" type="text/json">{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25830061]'), work: {"id":25830061,"title":"Assessing the three main security threats facing Europe in the wake of the Ukraine crisis","created_at":"2016-06-03T05:20:22.199-07:00","url":"https://www.academia.edu/25830061/Assessing_the_three_main_security_threats_facing_Europe_in_the_wake_of_the_Ukraine_crisis?f_ri=5523","dom_id":"work_25830061","summary":"The crisis in Ukraine, which began in 2013, has had significant implications for European security. Cristian Nitoiu identifies three perceived security threats implied by developments in Ukraine and how these threats may develop in future years: the threat of so called 'hybrid warfare' spilling over from the standoff between Ukraine and Russia; the threat posed by nuclear weapons; and the threat posed by more conventional forms of warfare. Perceptions of security threats are arguably more salient than actual threats, most times having a deep influence on the actions of states and other international actors. Hence, they play a key role in the way the EU, Kyiv and Moscow will shape their policies towards each other in the wake of the Ukraine crisis. While Russia can employ a wide range of capabilities, the EU and Ukraine have very few instruments to tackle security threats, be they traditional or nontraditional. In the case of Ukraine, but also more broadly the postSoviet space, EURussia/Ukraine relations are affected by the perception of three types of security threats: so called 'hybrid warfare', nuclear threats and traditional military threats (i.e. territorial invasion). Hybrid warfare In the West and Ukraine the perception of the threat posed by hybrid war has recently increased sharply. The annexation of Crimea and the war in eastern Ukraine have put the spotlight on the way states engage in conflict by using a series of (sometimes innovative) tools and strategies. Hybrid war combines the use of conventional and nonconventional capabilities, the use of irregular troops, cyberattacks, support for terrorist, rebel and criminal groups, or the use of the media and civil society for propaganda purposes. In eastern Ukraine in particular we have witnessed a combination of the use of both state and nonstate actors by all the sides involved. States tend to use parts of this toolkit even in times of peace, however in such situations these instruments are not combined in order to pursue certain assertive foreign policy goals.","downloadable_attachments":[{"id":46196549,"asset_id":25830061,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":379481,"first_name":"Cristian","last_name":"Nitoiu","domain_name":"lborolondon","page_name":"CristianNitoiu","display_name":"Cristian Nitoiu","profile_url":"https://lborolondon.academia.edu/CristianNitoiu?f_ri=5523","photo":"https://0.academia-photos.com/379481/117637/8854838/s65_cristian.nitoiu.jpg"}],"research_interests":[{"id":382,"name":"Eastern European Studies","url":"https://www.academia.edu/Documents/in/Eastern_European_Studies?f_ri=5523","nofollow":false},{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=5523","nofollow":false},{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=5523","nofollow":false},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523","nofollow":false},{"id":4507,"name":"Nuclear Weapons","url":"https://www.academia.edu/Documents/in/Nuclear_Weapons?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":7669,"name":"Russian Foreign Policy","url":"https://www.academia.edu/Documents/in/Russian_Foreign_Policy?f_ri=5523"},{"id":8697,"name":"European Foreign Policy","url":"https://www.academia.edu/Documents/in/European_Foreign_Policy?f_ri=5523"},{"id":12396,"name":"Post-Soviet Studies","url":"https://www.academia.edu/Documents/in/Post-Soviet_Studies?f_ri=5523"},{"id":27728,"name":"Politics of Ukraine","url":"https://www.academia.edu/Documents/in/Politics_of_Ukraine?f_ri=5523"},{"id":41863,"name":"Russia","url":"https://www.academia.edu/Documents/in/Russia?f_ri=5523"},{"id":45426,"name":"Central and Eastern Europe","url":"https://www.academia.edu/Documents/in/Central_and_Eastern_Europe?f_ri=5523"},{"id":46989,"name":"Ukraine","url":"https://www.academia.edu/Documents/in/Ukraine?f_ri=5523"},{"id":52236,"name":"Foreign Policy of Ukraine","url":"https://www.academia.edu/Documents/in/Foreign_Policy_of_Ukraine?f_ri=5523"},{"id":169102,"name":"Vladimir Putin","url":"https://www.academia.edu/Documents/in/Vladimir_Putin?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37711206" data-work_id="37711206" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37711206/The_Middle_East_reloaded_revolutionary_changes_power_dynamics_and_regional_rivalries_since_the_Arab_Spring">The Middle East reloaded: revolutionary changes, power dynamics, and regional rivalries since the Arab Spring</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37711206" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f9ba30ff86a75c44be356baffa74b934" rel="nofollow" data-download="{"attachment_id":57703336,"asset_id":37711206,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57703336/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="487924" href="https://independent.academia.edu/PhilippAmour">Philipp O Amour</a><script data-card-contents-for-user="487924" type="text/json">{"id":487924,"first_name":"Philipp","last_name":"Amour","domain_name":"independent","page_name":"PhilippAmour","display_name":"Philipp O Amour","profile_url":"https://independent.academia.edu/PhilippAmour?f_ri=5523","photo":"https://0.academia-photos.com/487924/2635502/32130708/s65_philipp.amour.png"}</script></span></span></li><li class="js-paper-rank-work_37711206 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37711206"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37711206, container: ".js-paper-rank-work_37711206", }); });</script></li><li class="js-percentile-work_37711206 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37711206; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37711206"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37711206 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37711206"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37711206; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37711206]").text(description); $(".js-view-count-work_37711206").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37711206").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37711206"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">17</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2015" href="https://www.academia.edu/Documents/in/Middle_East_Studies">Middle East Studies</a>, <script data-card-contents-for-ri="2015" type="text/json">{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2603" href="https://www.academia.edu/Documents/in/Middle_East_History">Middle East History</a>, <script data-card-contents-for-ri="2603" type="text/json">{"id":2603,"name":"Middle East History","url":"https://www.academia.edu/Documents/in/Middle_East_History?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2714" href="https://www.academia.edu/Documents/in/Gulf_Studies">Gulf Studies</a>, <script data-card-contents-for-ri="2714" type="text/json">{"id":2714,"name":"Gulf Studies","url":"https://www.academia.edu/Documents/in/Gulf_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3873" href="https://www.academia.edu/Documents/in/Strategic_Studies">Strategic Studies</a><script data-card-contents-for-ri="3873" type="text/json">{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37711206]'), work: {"id":37711206,"title":"The Middle East reloaded: revolutionary changes, power dynamics, and regional rivalries since the Arab Spring","created_at":"2018-11-06T03:52:21.149-08:00","url":"https://www.academia.edu/37711206/The_Middle_East_reloaded_revolutionary_changes_power_dynamics_and_regional_rivalries_since_the_Arab_Spring?f_ri=5523","dom_id":"work_37711206","summary":null,"downloadable_attachments":[{"id":57703336,"asset_id":37711206,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":487924,"first_name":"Philipp","last_name":"Amour","domain_name":"independent","page_name":"PhilippAmour","display_name":"Philipp O Amour","profile_url":"https://independent.academia.edu/PhilippAmour?f_ri=5523","photo":"https://0.academia-photos.com/487924/2635502/32130708/s65_philipp.amour.png"}],"research_interests":[{"id":2015,"name":"Middle East Studies","url":"https://www.academia.edu/Documents/in/Middle_East_Studies?f_ri=5523","nofollow":false},{"id":2603,"name":"Middle East History","url":"https://www.academia.edu/Documents/in/Middle_East_History?f_ri=5523","nofollow":false},{"id":2714,"name":"Gulf Studies","url":"https://www.academia.edu/Documents/in/Gulf_Studies?f_ri=5523","nofollow":false},{"id":3873,"name":"Strategic Studies","url":"https://www.academia.edu/Documents/in/Strategic_Studies?f_ri=5523","nofollow":false},{"id":4487,"name":"Revolutions","url":"https://www.academia.edu/Documents/in/Revolutions?f_ri=5523"},{"id":5218,"name":"Iranian Studies","url":"https://www.academia.edu/Documents/in/Iranian_Studies?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5723,"name":"Strategic Alliances","url":"https://www.academia.edu/Documents/in/Strategic_Alliances?f_ri=5523"},{"id":6184,"name":"Israel/Palestine","url":"https://www.academia.edu/Documents/in/Israel_Palestine?f_ri=5523"},{"id":12537,"name":"Egypt","url":"https://www.academia.edu/Documents/in/Egypt?f_ri=5523"},{"id":18623,"name":"Middle East Politics","url":"https://www.academia.edu/Documents/in/Middle_East_Politics?f_ri=5523"},{"id":28722,"name":"International Relations of Middle East","url":"https://www.academia.edu/Documents/in/International_Relations_of_Middle_East?f_ri=5523"},{"id":46065,"name":"Qatar","url":"https://www.academia.edu/Documents/in/Qatar?f_ri=5523"},{"id":52211,"name":"United Arab Emirates","url":"https://www.academia.edu/Documents/in/United_Arab_Emirates?f_ri=5523"},{"id":169938,"name":"Arab Spring (Arab Revolts)","url":"https://www.academia.edu/Documents/in/Arab_Spring_Arab_Revolts_?f_ri=5523"},{"id":229576,"name":"Alliances","url":"https://www.academia.edu/Documents/in/Alliances?f_ri=5523"},{"id":3055059,"name":"Regional order in the Middle East","url":"https://www.academia.edu/Documents/in/Regional_order_in_the_Middle_East?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_28751046" data-work_id="28751046" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/28751046/amg_o_que_e_pensar_uma_Geopoli_tica_do_Ciberespac_o_27_de_Setembro_2016_ppt">amg, o que é pensar uma Geopolítica do Ciberespaço (27 de Setembro, 2016).ppt</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/28751046" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8ca691d67a63f58c8b97b33d841ec53c" rel="nofollow" data-download="{"attachment_id":49165127,"asset_id":28751046,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/49165127/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="134181" href="https://cria.academia.edu/ArmandoMarquesGuedes">Armando Marques-Guedes</a><script data-card-contents-for-user="134181" type="text/json">{"id":134181,"first_name":"Armando","last_name":"Marques-Guedes","domain_name":"cria","page_name":"ArmandoMarquesGuedes","display_name":"Armando Marques-Guedes","profile_url":"https://cria.academia.edu/ArmandoMarquesGuedes?f_ri=5523","photo":"https://0.academia-photos.com/134181/3401094/148494125/s65_armando.marques-guedes.png"}</script></span></span></li><li class="js-paper-rank-work_28751046 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="28751046"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 28751046, container: ".js-paper-rank-work_28751046", }); });</script></li><li class="js-percentile-work_28751046 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 28751046; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_28751046"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_28751046 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="28751046"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 28751046; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=28751046]").text(description); $(".js-view-count-work_28751046").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_28751046").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="28751046"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">98</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="128" href="https://www.academia.edu/Documents/in/History">History</a>, <script data-card-contents-for-ri="128" type="text/json">{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="136" href="https://www.academia.edu/Documents/in/Cultural_History">Cultural History</a>, <script data-card-contents-for-ri="136" type="text/json">{"id":136,"name":"Cultural History","url":"https://www.academia.edu/Documents/in/Cultural_History?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="184" href="https://www.academia.edu/Documents/in/Sociology">Sociology</a>, <script data-card-contents-for-ri="184" type="text/json">{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="201" href="https://www.academia.edu/Documents/in/Political_Sociology">Political Sociology</a><script data-card-contents-for-ri="201" type="text/json">{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=28751046]'), work: {"id":28751046,"title":"amg, o que é pensar uma Geopolítica do Ciberespaço (27 de Setembro, 2016).ppt","created_at":"2016-09-27T15:00:37.548-07:00","url":"https://www.academia.edu/28751046/amg_o_que_e_pensar_uma_Geopoli_tica_do_Ciberespac_o_27_de_Setembro_2016_ppt?f_ri=5523","dom_id":"work_28751046","summary":null,"downloadable_attachments":[{"id":49165127,"asset_id":28751046,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":134181,"first_name":"Armando","last_name":"Marques-Guedes","domain_name":"cria","page_name":"ArmandoMarquesGuedes","display_name":"Armando Marques-Guedes","profile_url":"https://cria.academia.edu/ArmandoMarquesGuedes?f_ri=5523","photo":"https://0.academia-photos.com/134181/3401094/148494125/s65_armando.marques-guedes.png"}],"research_interests":[{"id":128,"name":"History","url":"https://www.academia.edu/Documents/in/History?f_ri=5523","nofollow":false},{"id":136,"name":"Cultural History","url":"https://www.academia.edu/Documents/in/Cultural_History?f_ri=5523","nofollow":false},{"id":184,"name":"Sociology","url":"https://www.academia.edu/Documents/in/Sociology?f_ri=5523","nofollow":false},{"id":201,"name":"Political Sociology","url":"https://www.academia.edu/Documents/in/Political_Sociology?f_ri=5523","nofollow":false},{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements?f_ri=5523"},{"id":261,"name":"Geography","url":"https://www.academia.edu/Documents/in/Geography?f_ri=5523"},{"id":262,"name":"Human Geography","url":"https://www.academia.edu/Documents/in/Human_Geography?f_ri=5523"},{"id":268,"name":"Political Geography and Geopolitics","url":"https://www.academia.edu/Documents/in/Political_Geography_and_Geopolitics?f_ri=5523"},{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics?f_ri=5523"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science?f_ri=5523"},{"id":472,"name":"Human Computer Interaction","url":"https://www.academia.edu/Documents/in/Human_Computer_Interaction?f_ri=5523"},{"id":498,"name":"Physics","url":"https://www.academia.edu/Documents/in/Physics?f_ri=5523"},{"id":516,"name":"Optics","url":"https://www.academia.edu/Documents/in/Optics?f_ri=5523"},{"id":724,"name":"Economics","url":"https://www.academia.edu/Documents/in/Economics?f_ri=5523"},{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=5523"},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523"},{"id":802,"name":"Political Economy","url":"https://www.academia.edu/Documents/in/Political_Economy?f_ri=5523"},{"id":803,"name":"Philosophy","url":"https://www.academia.edu/Documents/in/Philosophy?f_ri=5523"},{"id":813,"name":"Political Philosophy","url":"https://www.academia.edu/Documents/in/Political_Philosophy?f_ri=5523"},{"id":821,"name":"Philosophy of Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Science?f_ri=5523"},{"id":859,"name":"Communication","url":"https://www.academia.edu/Documents/in/Communication?f_ri=5523"},{"id":922,"name":"Education","url":"https://www.academia.edu/Documents/in/Education?f_ri=5523"},{"id":954,"name":"Social Anthropology","url":"https://www.academia.edu/Documents/in/Social_Anthropology?f_ri=5523"},{"id":1003,"name":"Educational Technology","url":"https://www.academia.edu/Documents/in/Educational_Technology?f_ri=5523"},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory?f_ri=5523"},{"id":1233,"name":"Social Networks","url":"https://www.academia.edu/Documents/in/Social_Networks?f_ri=5523"},{"id":1237,"name":"Social Sciences","url":"https://www.academia.edu/Documents/in/Social_Sciences?f_ri=5523"},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=5523"},{"id":1380,"name":"Computer Engineering","url":"https://www.academia.edu/Documents/in/Computer_Engineering?f_ri=5523"},{"id":1512,"name":"Climate Change","url":"https://www.academia.edu/Documents/in/Climate_Change?f_ri=5523"},{"id":1583,"name":"Industrial Ecology","url":"https://www.academia.edu/Documents/in/Industrial_Ecology?f_ri=5523"},{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=5523"},{"id":1736,"name":"Science Education","url":"https://www.academia.edu/Documents/in/Science_Education?f_ri=5523"},{"id":1911,"name":"International Studies","url":"https://www.academia.edu/Documents/in/International_Studies?f_ri=5523"},{"id":2180,"name":"Optical Fiber Communications","url":"https://www.academia.edu/Documents/in/Optical_Fiber_Communications?f_ri=5523"},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=5523"},{"id":2509,"name":"Philosophy Of Mathematics","url":"https://www.academia.edu/Documents/in/Philosophy_Of_Mathematics?f_ri=5523"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=5523"},{"id":2553,"name":"Social Networking","url":"https://www.academia.edu/Documents/in/Social_Networking?f_ri=5523"},{"id":2621,"name":"Higher Education","url":"https://www.academia.edu/Documents/in/Higher_Education?f_ri=5523"},{"id":2990,"name":"Geopolitics","url":"https://www.academia.edu/Documents/in/Geopolitics?f_ri=5523"},{"id":3116,"name":"Space and Place","url":"https://www.academia.edu/Documents/in/Space_and_Place?f_ri=5523"},{"id":3165,"name":"Maritime History","url":"https://www.academia.edu/Documents/in/Maritime_History?f_ri=5523"},{"id":3255,"name":"Climate Change Adaptation","url":"https://www.academia.edu/Documents/in/Climate_Change_Adaptation?f_ri=5523"},{"id":3499,"name":"Social and Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology?f_ri=5523"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=5523"},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=5523"},{"id":3723,"name":"History of Science","url":"https://www.academia.edu/Documents/in/History_of_Science?f_ri=5523"},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=5523"},{"id":4252,"name":"Computer Networks","url":"https://www.academia.edu/Documents/in/Computer_Networks?f_ri=5523"},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science?f_ri=5523"},{"id":4730,"name":"Mass Communication","url":"https://www.academia.edu/Documents/in/Mass_Communication?f_ri=5523"},{"id":5420,"name":"Anthropology of space","url":"https://www.academia.edu/Documents/in/Anthropology_of_space?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":5709,"name":"Politics","url":"https://www.academia.edu/Documents/in/Politics?f_ri=5523"},{"id":6276,"name":"International Political Economy","url":"https://www.academia.edu/Documents/in/International_Political_Economy?f_ri=5523"},{"id":7369,"name":"Political communication","url":"https://www.academia.edu/Documents/in/Political_communication?f_ri=5523"},{"id":7454,"name":"Information Communication Technology","url":"https://www.academia.edu/Documents/in/Information_Communication_Technology?f_ri=5523"},{"id":9846,"name":"Ecology","url":"https://www.academia.edu/Documents/in/Ecology?f_ri=5523"},{"id":10344,"name":"International Politics","url":"https://www.academia.edu/Documents/in/International_Politics?f_ri=5523"},{"id":10601,"name":"Data Warehousing","url":"https://www.academia.edu/Documents/in/Data_Warehousing?f_ri=5523"},{"id":12115,"name":"Optical Communication","url":"https://www.academia.edu/Documents/in/Optical_Communication?f_ri=5523"},{"id":13872,"name":"Facebook","url":"https://www.academia.edu/Documents/in/Facebook?f_ri=5523"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=5523"},{"id":15263,"name":"First World War","url":"https://www.academia.edu/Documents/in/First_World_War?f_ri=5523"},{"id":15588,"name":"Social History","url":"https://www.academia.edu/Documents/in/Social_History?f_ri=5523"},{"id":25618,"name":"Phenomenology of Space and Place","url":"https://www.academia.edu/Documents/in/Phenomenology_of_Space_and_Place?f_ri=5523"},{"id":30632,"name":"Public Space","url":"https://www.academia.edu/Documents/in/Public_Space?f_ri=5523"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=5523"},{"id":30947,"name":"The Internet","url":"https://www.academia.edu/Documents/in/The_Internet?f_ri=5523"},{"id":45405,"name":"Global Warming","url":"https://www.academia.edu/Documents/in/Global_Warming?f_ri=5523"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=5523"},{"id":48532,"name":"Maritime Security","url":"https://www.academia.edu/Documents/in/Maritime_Security?f_ri=5523"},{"id":49837,"name":"Historia","url":"https://www.academia.edu/Documents/in/Historia?f_ri=5523"},{"id":50361,"name":"Sociologie","url":"https://www.academia.edu/Documents/in/Sociologie?f_ri=5523"},{"id":50967,"name":"Mass Communication and New Media","url":"https://www.academia.edu/Documents/in/Mass_Communication_and_New_Media?f_ri=5523"},{"id":51360,"name":"Economia","url":"https://www.academia.edu/Documents/in/Economia?f_ri=5523"},{"id":51625,"name":"Educación","url":"https://www.academia.edu/Documents/in/Educaci%C3%B3n?f_ri=5523"},{"id":52480,"name":"Sociologia","url":"https://www.academia.edu/Documents/in/Sociologia?f_ri=5523"},{"id":58119,"name":"Facebook Studies","url":"https://www.academia.edu/Documents/in/Facebook_Studies?f_ri=5523"},{"id":60807,"name":"Maritime","url":"https://www.academia.edu/Documents/in/Maritime?f_ri=5523"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=5523"},{"id":67378,"name":"Sattelite Altimetry","url":"https://www.academia.edu/Documents/in/Sattelite_Altimetry?f_ri=5523"},{"id":88935,"name":"Sociología","url":"https://www.academia.edu/Documents/in/Sociolog%C3%ADa?f_ri=5523"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523"},{"id":190814,"name":"Réseau Informatique","url":"https://www.academia.edu/Documents/in/R%C3%A9seau_Informatique?f_ri=5523"},{"id":196091,"name":"Sattelite Imagery","url":"https://www.academia.edu/Documents/in/Sattelite_Imagery?f_ri=5523"},{"id":265674,"name":"Submarine Cable","url":"https://www.academia.edu/Documents/in/Submarine_Cable?f_ri=5523"},{"id":435047,"name":"Architecture Des Ordinateurs","url":"https://www.academia.edu/Documents/in/Architecture_Des_Ordinateurs?f_ri=5523"},{"id":548084,"name":"Humanités Numériques","url":"https://www.academia.edu/Documents/in/Humanites_Numeriques?f_ri=5523"},{"id":670216,"name":"Sattelite Communication","url":"https://www.academia.edu/Documents/in/Sattelite_Communication?f_ri=5523"},{"id":1009312,"name":"Geographic Information Systems (GIS)","url":"https://www.academia.edu/Documents/in/Geographic_Information_Systems_GIS_?f_ri=5523"},{"id":1115297,"name":"Twiiter","url":"https://www.academia.edu/Documents/in/Twiiter?f_ri=5523"},{"id":1147310,"name":"Réseaux et télécoms","url":"https://www.academia.edu/Documents/in/R%C3%A9seaux_et_t%C3%A9l%C3%A9coms?f_ri=5523"},{"id":1195931,"name":"Geographic Information Systems GIS)","url":"https://www.academia.edu/Documents/in/Geographic_Information_Systems_GIS_-2?f_ri=5523"},{"id":1227987,"name":"Mathemtics","url":"https://www.academia.edu/Documents/in/Mathemtics?f_ri=5523"},{"id":1581553,"name":"Global Warming Research Paper Topics Global Warming Research Paper Topics","url":"https://www.academia.edu/Documents/in/Global_Warming_Research_Paper_Topics_Global_Warming_Research_Paper_Topics?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_9179958 coauthored" data-work_id="9179958" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/9179958/Global_Health_as_an_Intelligence_and_National_Security_Issue_abstract_ISA_2015">Global Health as an Intelligence and National Security Issue abstract ISA 2015</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Fragile, corrupt and ineffective National Health Systems in authoritarian regimes deserve greater attention by the Intelligence Community.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/9179958" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ee8a01468fc2fdb021cdff06580bc369" rel="nofollow" data-download="{"attachment_id":35463252,"asset_id":9179958,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35463252/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4772381" href="https://unifi.academia.edu/LMartino">Luigi Martino</a><script data-card-contents-for-user="4772381" type="text/json">{"id":4772381,"first_name":"Luigi","last_name":"Martino","domain_name":"unifi","page_name":"LMartino","display_name":"Luigi Martino","profile_url":"https://unifi.academia.edu/LMartino?f_ri=5523","photo":"https://0.academia-photos.com/4772381/2638836/3067809/s65_luigi.martino.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text"> and <span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-9179958">+1</span><div class="hidden js-additional-users-9179958"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://luiss.academia.edu/marcomayer">marco mayer</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-9179958'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-9179958').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_9179958 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="9179958"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 9179958, container: ".js-paper-rank-work_9179958", }); });</script></li><li class="js-percentile-work_9179958 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 9179958; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_9179958"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_9179958 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="9179958"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 9179958; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=9179958]").text(description); $(".js-view-count-work_9179958").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_9179958").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="9179958"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">20</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>, <script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1439" href="https://www.academia.edu/Documents/in/Globalization">Globalization</a>, <script data-card-contents-for-ri="1439" type="text/json">{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="2674" href="https://www.academia.edu/Documents/in/Intelligence">Intelligence</a>, <script data-card-contents-for-ri="2674" type="text/json">{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3660" href="https://www.academia.edu/Documents/in/Global_Governance">Global Governance</a><script data-card-contents-for-ri="3660" type="text/json">{"id":3660,"name":"Global Governance","url":"https://www.academia.edu/Documents/in/Global_Governance?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=9179958]'), work: {"id":9179958,"title":"Global Health as an Intelligence and National Security Issue abstract ISA 2015","created_at":"2014-11-07T07:35:35.683-08:00","url":"https://www.academia.edu/9179958/Global_Health_as_an_Intelligence_and_National_Security_Issue_abstract_ISA_2015?f_ri=5523","dom_id":"work_9179958","summary":" Fragile, corrupt and ineffective National Health Systems in authoritarian regimes deserve greater attention by the Intelligence Community. \r\n \r\n ","downloadable_attachments":[{"id":35463252,"asset_id":9179958,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":4772381,"first_name":"Luigi","last_name":"Martino","domain_name":"unifi","page_name":"LMartino","display_name":"Luigi Martino","profile_url":"https://unifi.academia.edu/LMartino?f_ri=5523","photo":"https://0.academia-photos.com/4772381/2638836/3067809/s65_luigi.martino.jpg"},{"id":3933644,"first_name":"marco","last_name":"mayer","domain_name":"luiss","page_name":"marcomayer","display_name":"marco mayer","profile_url":"https://luiss.academia.edu/marcomayer?f_ri=5523","photo":"https://0.academia-photos.com/3933644/1468798/67992119/s65_marco.mayer.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=5523","nofollow":false},{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=5523","nofollow":false},{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=5523","nofollow":false},{"id":3660,"name":"Global Governance","url":"https://www.academia.edu/Documents/in/Global_Governance?f_ri=5523","nofollow":false},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=5523"},{"id":4527,"name":"Africa","url":"https://www.academia.edu/Documents/in/Africa?f_ri=5523"},{"id":4990,"name":"Global Health","url":"https://www.academia.edu/Documents/in/Global_Health?f_ri=5523"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":6019,"name":"US","url":"https://www.academia.edu/Documents/in/US?f_ri=5523"},{"id":22733,"name":"Global Health Policy","url":"https://www.academia.edu/Documents/in/Global_Health_Policy?f_ri=5523"},{"id":26067,"name":"Development","url":"https://www.academia.edu/Documents/in/Development?f_ri=5523"},{"id":32805,"name":"E-Health","url":"https://www.academia.edu/Documents/in/E-Health?f_ri=5523"},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=5523"},{"id":53441,"name":"Defence","url":"https://www.academia.edu/Documents/in/Defence?f_ri=5523"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=5523"},{"id":219075,"name":"Ebola","url":"https://www.academia.edu/Documents/in/Ebola?f_ri=5523"},{"id":249490,"name":"Cyber","url":"https://www.academia.edu/Documents/in/Cyber?f_ri=5523"},{"id":594653,"name":"Pandemics","url":"https://www.academia.edu/Documents/in/Pandemics?f_ri=5523"},{"id":1355677,"name":"Dual","url":"https://www.academia.edu/Documents/in/Dual?f_ri=5523"},{"id":1723635,"name":"Public Policy","url":"https://www.academia.edu/Documents/in/Public_Policy?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_3339500" data-work_id="3339500" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/3339500/_New_Forms_of_Security_and_the_Challenge_for_Human_Security_in_Mark_Beeson_and_Nick_Bisley_eds_Issues_in_Twenty_first_Century_World_Politics_2nd_Edition_Palgrave_2013">‘New Forms of Security and the Challenge for Human Security’ in Mark Beeson and Nick Bisley eds., Issues in Twenty-first Century World Politics, 2nd Edition, Palgrave, 2013.</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/3339500" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c35c979bb711896622bcd69bcd05565f" rel="nofollow" data-download="{"attachment_id":32139348,"asset_id":3339500,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32139348/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2646536" href="https://leeds.academia.edu/EdwardNewman">Edward Newman</a><script data-card-contents-for-user="2646536" type="text/json">{"id":2646536,"first_name":"Edward","last_name":"Newman","domain_name":"leeds","page_name":"EdwardNewman","display_name":"Edward Newman","profile_url":"https://leeds.academia.edu/EdwardNewman?f_ri=5523","photo":"https://0.academia-photos.com/2646536/1323262/2144828/s65_edward.newman.jpg"}</script></span></span></li><li class="js-paper-rank-work_3339500 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="3339500"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 3339500, container: ".js-paper-rank-work_3339500", }); });</script></li><li class="js-percentile-work_3339500 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 3339500; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_3339500"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_3339500 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="3339500"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 3339500; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=3339500]").text(description); $(".js-view-count-work_3339500").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_3339500").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="3339500"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a><script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=3339500]'), work: {"id":3339500,"title":"‘New Forms of Security and the Challenge for Human Security’ in Mark Beeson and Nick Bisley eds., Issues in Twenty-first Century World Politics, 2nd Edition, Palgrave, 2013.","created_at":"2013-04-19T22:02:29.364-07:00","url":"https://www.academia.edu/3339500/_New_Forms_of_Security_and_the_Challenge_for_Human_Security_in_Mark_Beeson_and_Nick_Bisley_eds_Issues_in_Twenty_first_Century_World_Politics_2nd_Edition_Palgrave_2013?f_ri=5523","dom_id":"work_3339500","summary":null,"downloadable_attachments":[{"id":32139348,"asset_id":3339500,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2646536,"first_name":"Edward","last_name":"Newman","domain_name":"leeds","page_name":"EdwardNewman","display_name":"Edward Newman","profile_url":"https://leeds.academia.edu/EdwardNewman?f_ri=5523","photo":"https://0.academia-photos.com/2646536/1323262/2144828/s65_edward.newman.jpg"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523","nofollow":false}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_40473374" data-work_id="40473374" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/40473374/_LEtat_ce_nest_personne_Les_relations_de_pouvoir_dans_larme_e_guine_enne">"L'Etat, ce n'est personne" ? Les relations de pouvoir dans l'armée guinéenne</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Highlights: - Quelles sont les dynamiques de pouvoir dans une institution supposée posséder le monopole de la violence légitime ? Quelles relations et perceptions entretiennent les militaires vis-à-vis du pouvoir politique ? - S’il est... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_40473374" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Highlights:<br />- Quelles sont les dynamiques de pouvoir dans une institution supposée posséder le monopole de la violence légitime ? Quelles relations et perceptions entretiennent les militaires vis-à-vis du pouvoir politique ?<br />- S’il est d’usage d’associer militaires et violence (politique) dans le cas de la Guinée, peu d’analyses ont été proposées sur les conceptions du pouvoir internes à l’armée.<br />- Il s’agit ici d’interroger ce qu’est une institution d’État, qui échappe à cet État à certains moments, s’y confond à d’autres et qui repose sur des modes de gouvernement ambigus et complexes.<br />- L’armée possède ses propres logiques organisationnelles d’abord au niveau du camp, considéré comme un espace-ressource en soi.<br />- Il existe aussi des opportunités de gain pour les militaires hors des camps, en particulier la participation aux opérations dans le cadre de la MINUSMA et la sécurisation des terrains miniers industriels. Dans ces deux cas, il s’agit donc d’activités financées de l’extérieur, par une institution internationale d’abord (les Nations unies), puis par des compagnies privées (les industries minières).<br />- À partir de l’analyse de ces différents canaux d’enrichissement, j’interrogerai les rapports que les militaires entretiennent avec le pouvoir politique et surtout, comment ils le perçoivent.<br />- Sans prétendre être représentatif de la situation de l’armée guinéenne en général, cet article montre en quoi le pouvoir dans l’armée se structure autour de la gestion et du contrôle des ressources, entraînant des fragmentations internes, souvent compétitives.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/40473374" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="266a3e34576d8f1343c087de86b23d8f" rel="nofollow" data-download="{"attachment_id":60739408,"asset_id":40473374,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/60739408/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5652454" href="https://ird.academia.edu/annadessertine">anna dessertine</a><script data-card-contents-for-user="5652454" type="text/json">{"id":5652454,"first_name":"anna","last_name":"dessertine","domain_name":"ird","page_name":"annadessertine","display_name":"anna dessertine","profile_url":"https://ird.academia.edu/annadessertine?f_ri=5523","photo":"https://0.academia-photos.com/5652454/14719706/28894450/s65_anna.dessertine.jpg"}</script></span></span></li><li class="js-paper-rank-work_40473374 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="40473374"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 40473374, container: ".js-paper-rank-work_40473374", }); });</script></li><li class="js-percentile-work_40473374 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40473374; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_40473374"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_40473374 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="40473374"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40473374; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40473374]").text(description); $(".js-view-count-work_40473374").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_40473374").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="40473374"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">10</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="767" href="https://www.academia.edu/Documents/in/Anthropology">Anthropology</a>, <script data-card-contents-for-ri="767" type="text/json">{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1198" href="https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies">Peace and Conflict Studies</a>, <script data-card-contents-for-ri="1198" type="text/json">{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3472" href="https://www.academia.edu/Documents/in/Political_Anthropology">Political Anthropology</a>, <script data-card-contents-for-ri="3472" type="text/json">{"id":3472,"name":"Political Anthropology","url":"https://www.academia.edu/Documents/in/Political_Anthropology?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3499" href="https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology">Social and Cultural Anthropology</a><script data-card-contents-for-ri="3499" type="text/json">{"id":3499,"name":"Social and Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=40473374]'), work: {"id":40473374,"title":"\"L'Etat, ce n'est personne\" ? Les relations de pouvoir dans l'armée guinéenne","created_at":"2019-09-29T12:05:24.722-07:00","url":"https://www.academia.edu/40473374/_LEtat_ce_nest_personne_Les_relations_de_pouvoir_dans_larme_e_guine_enne?f_ri=5523","dom_id":"work_40473374","summary":"Highlights:\n- Quelles sont les dynamiques de pouvoir dans une institution supposée posséder le monopole de la violence légitime ? Quelles relations et perceptions entretiennent les militaires vis-à-vis du pouvoir politique ?\n- S’il est d’usage d’associer militaires et violence (politique) dans le cas de la Guinée, peu d’analyses ont été proposées sur les conceptions du pouvoir internes à l’armée.\n- Il s’agit ici d’interroger ce qu’est une institution d’État, qui échappe à cet État à certains moments, s’y confond à d’autres et qui repose sur des modes de gouvernement ambigus et complexes.\n- L’armée possède ses propres logiques organisationnelles d’abord au niveau du camp, considéré comme un espace-ressource en soi.\n- Il existe aussi des opportunités de gain pour les militaires hors des camps, en particulier la participation aux opérations dans le cadre de la MINUSMA et la sécurisation des terrains miniers industriels. Dans ces deux cas, il s’agit donc d’activités financées de l’extérieur, par une institution internationale d’abord (les Nations unies), puis par des compagnies privées (les industries minières).\n- À partir de l’analyse de ces différents canaux d’enrichissement, j’interrogerai les rapports que les militaires entretiennent avec le pouvoir politique et surtout, comment ils le perçoivent.\n- Sans prétendre être représentatif de la situation de l’armée guinéenne en général, cet article montre en quoi le pouvoir dans l’armée se structure autour de la gestion et du contrôle des ressources, entraînant des fragmentations internes, souvent compétitives.","downloadable_attachments":[{"id":60739408,"asset_id":40473374,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5652454,"first_name":"anna","last_name":"dessertine","domain_name":"ird","page_name":"annadessertine","display_name":"anna dessertine","profile_url":"https://ird.academia.edu/annadessertine?f_ri=5523","photo":"https://0.academia-photos.com/5652454/14719706/28894450/s65_anna.dessertine.jpg"}],"research_interests":[{"id":767,"name":"Anthropology","url":"https://www.academia.edu/Documents/in/Anthropology?f_ri=5523","nofollow":false},{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=5523","nofollow":false},{"id":3472,"name":"Political Anthropology","url":"https://www.academia.edu/Documents/in/Political_Anthropology?f_ri=5523","nofollow":false},{"id":3499,"name":"Social and Cultural Anthropology","url":"https://www.academia.edu/Documents/in/Social_and_Cultural_Anthropology?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":56524,"name":"Guinea","url":"https://www.academia.edu/Documents/in/Guinea?f_ri=5523"},{"id":92251,"name":"Sciences Politiques","url":"https://www.academia.edu/Documents/in/Sciences_Politiques?f_ri=5523"},{"id":385051,"name":"République de Guinée Conakry","url":"https://www.academia.edu/Documents/in/Republique_de_Guinee_Conakry?f_ri=5523"},{"id":906893,"name":"Armée","url":"https://www.academia.edu/Documents/in/Armee?f_ri=5523"},{"id":1247434,"name":"Armed Forces and Security","url":"https://www.academia.edu/Documents/in/Armed_Forces_and_Security?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_72071351" data-work_id="72071351" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/72071351/Att_m%C3%B6ta_hybridhot_och_hybridkrigf%C3%B6ring">Att möta hybridhot och hybridkrigföring</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Security challenges arising from hybrid threats and hybrid warfare, HT&HW, are today high on the security agenda not only in Sweden but across the globe. Despite the attention and the growing body of studies on the subject, there is a... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_72071351" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Security challenges arising from hybrid threats and hybrid warfare, HT&HW, are today high on the security agenda not only in Sweden but across the globe. Despite the attention and the growing body of studies on the subject, there is a lack of research bringing attention to how these challenges can be addressed. This article contributes to such an approach by sharing the findings of a project that brings together practitioners and scholarly perspectives on this subject spanning the threats themselves as well as the tools and means to counter them. The article outlines the Western response to hybrid threats and hybrid warfare. It is argued that there is no single response to HT&HW, nor to building resilience. HT&HW needs to be addressed through a comprehensive, all-inclusive approach. Finally, the article outlines how we address these challenges in practice.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/72071351" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fde1359b43efc4b7ba3d7590451d1dc8" rel="nofollow" data-download="{"attachment_id":81148620,"asset_id":72071351,"asset_type":"Work","always_allow_download":false,"track":null,"button_location":"work_strip","source":null,"hide_modal":null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/81148620/download_file?st=MTczMzI2NzkyMSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by <span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="149406" href="https://fhs.academia.edu/MikaelWeissmann">Mikael Weissmann</a><script data-card-contents-for-user="149406" type="text/json">{"id":149406,"first_name":"Mikael","last_name":"Weissmann","domain_name":"fhs","page_name":"MikaelWeissmann","display_name":"Mikael Weissmann","profile_url":"https://fhs.academia.edu/MikaelWeissmann?f_ri=5523","photo":"https://0.academia-photos.com/149406/775099/59747628/s65_mikael.weissmann.jpg"}</script></span></span></li><li class="js-paper-rank-work_72071351 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="72071351"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 72071351, container: ".js-paper-rank-work_72071351", }); });</script></li><li class="js-percentile-work_72071351 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 72071351; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_72071351"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_72071351 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="72071351"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 72071351; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=72071351]").text(description); $(".js-view-count-work_72071351").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_72071351").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="72071351"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i> <a class="InlineList-item-text u-positionRelative">16</a> </div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="579" href="https://www.academia.edu/Documents/in/Strategy_Military_Science_">Strategy (Military Science)</a>, <script data-card-contents-for-ri="579" type="text/json">{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="3872" href="https://www.academia.edu/Documents/in/War_Studies">War Studies</a>, <script data-card-contents-for-ri="3872" type="text/json">{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4138" href="https://www.academia.edu/Documents/in/Hybridity">Hybridity</a>, <script data-card-contents-for-ri="4138" type="text/json">{"id":4138,"name":"Hybridity","url":"https://www.academia.edu/Documents/in/Hybridity?f_ri=5523","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4810" href="https://www.academia.edu/Documents/in/Information_Warfare">Information Warfare</a><script data-card-contents-for-ri="4810" type="text/json">{"id":4810,"name":"Information Warfare","url":"https://www.academia.edu/Documents/in/Information_Warfare?f_ri=5523","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=72071351]'), work: {"id":72071351,"title":"Att möta hybridhot och hybridkrigföring","created_at":"2022-02-21T01:20:27.913-08:00","url":"https://www.academia.edu/72071351/Att_m%C3%B6ta_hybridhot_och_hybridkrigf%C3%B6ring?f_ri=5523","dom_id":"work_72071351","summary":"Security challenges arising from hybrid threats and hybrid warfare, HT\u0026HW, are today high on the security agenda not only in Sweden but across the globe. Despite the attention and the growing body of studies on the subject, there is a lack of research bringing attention to how these challenges can be addressed. This article contributes to such an approach by sharing the findings of a project that brings together practitioners and scholarly perspectives on this subject spanning the threats themselves as well as the tools and means to counter them. The article outlines the Western response to hybrid threats and hybrid warfare. It is argued that there is no single response to HT\u0026HW, nor to building resilience. HT\u0026HW needs to be addressed through a comprehensive, all-inclusive approach. Finally, the article outlines how we address these challenges in practice.","downloadable_attachments":[{"id":81148620,"asset_id":72071351,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":149406,"first_name":"Mikael","last_name":"Weissmann","domain_name":"fhs","page_name":"MikaelWeissmann","display_name":"Mikael Weissmann","profile_url":"https://fhs.academia.edu/MikaelWeissmann?f_ri=5523","photo":"https://0.academia-photos.com/149406/775099/59747628/s65_mikael.weissmann.jpg"}],"research_interests":[{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=5523","nofollow":false},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=5523","nofollow":false},{"id":4138,"name":"Hybridity","url":"https://www.academia.edu/Documents/in/Hybridity?f_ri=5523","nofollow":false},{"id":4810,"name":"Information Warfare","url":"https://www.academia.edu/Documents/in/Information_Warfare?f_ri=5523","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=5523"},{"id":7669,"name":"Russian Foreign Policy","url":"https://www.academia.edu/Documents/in/Russian_Foreign_Policy?f_ri=5523"},{"id":42194,"name":"Warfare","url":"https://www.academia.edu/Documents/in/Warfare?f_ri=5523"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=5523"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=5523"},{"id":119358,"name":"Defense and National Security","url":"https://www.academia.edu/Documents/in/Defense_and_National_Security?f_ri=5523"},{"id":174704,"name":"Defence and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defence_and_Strategic_Studies?f_ri=5523"},{"id":218563,"name":"Assymetric warfare","url":"https://www.academia.edu/Documents/in/Assymetric_warfare?f_ri=5523"},{"id":346639,"name":"Intelligence and security studies","url":"https://www.academia.edu/Documents/in/Intelligence_and_security_studies?f_ri=5523"},{"id":378350,"name":"Hybrid Threats","url":"https://www.academia.edu/Documents/in/Hybrid_Threats?f_ri=5523"},{"id":1038695,"name":"Grey Zone","url":"https://www.academia.edu/Documents/in/Grey_Zone?f_ri=5523"},{"id":1328172,"name":"Hybrid Warfare","url":"https://www.academia.edu/Documents/in/Hybrid_Warfare?f_ri=5523"}]}, }) } })();</script></ul></li></ul></div></div></div><div class="u-taCenter Pagination"><ul class="pagination"><li class="next_page"><a href="/Documents/in/Security_Studies?after=50%2C72071351" rel="next">Next</a></li><li class="last next"><a href="/Documents/in/Security_Studies?page=last">Last »</a></li></ul></div></div><div class="hidden-xs hidden-sm"><div class="u-pl6x"><div style="width: 300px;"><div class="panel panel-flat u-mt7x"><div class="panel-heading u-p5x"><div class="u-tcGrayDark u-taCenter u-fw700 u-textUppercase">Related Topics</div></div><ul class="list-group"><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/International_Security">International Security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="3705">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="3705">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Critical_Security_Studies">Critical Security Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="5535">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="5535">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/International_Relations_Theory">International Relations Theory</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="1166">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="1166">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="797">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="797">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Foreign_Policy_Analysis">Foreign Policy Analysis</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="1483">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="1483">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/International_Studies">International Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="1911">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="1911">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Security">Security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="4370">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="4370">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/Strategic_Studies">Strategic Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="3873">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="3873">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/NATO">NATO</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="3826">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="3826">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" href="https://www.academia.edu/Documents/in/War_Studies">War Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="3872">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="3872">Following</a></div></li></ul></div></div></div></div></div></div><script>// MIT License // Copyright © 2011 Sebastian Tschan, https://blueimp.net // Permission is hereby granted, free of charge, to any person obtaining a copy of // this software and associated documentation files (the "Software"), to deal in // the Software without restriction, including without limitation the rights to // use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of // the Software, and to permit persons to whom the Software is furnished to do so, // subject to the following conditions: // The above copyright notice and this permission notice shall be included in all // copies or substantial portions of the Software. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS // FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR // COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER // IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN // CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. !function(n){"use strict";function d(n,t){var r=(65535&n)+(65535&t);return(n>>16)+(t>>16)+(r>>16)<<16|65535&r}function f(n,t,r,e,o,u){return d((c=d(d(t,n),d(e,u)))<<(f=o)|c>>>32-f,r);var c,f}function l(n,t,r,e,o,u,c){return f(t&r|~t&e,n,t,o,u,c)}function v(n,t,r,e,o,u,c){return f(t&e|r&~e,n,t,o,u,c)}function g(n,t,r,e,o,u,c){return f(t^r^e,n,t,o,u,c)}function m(n,t,r,e,o,u,c){return f(r^(t|~e),n,t,o,u,c)}function i(n,t){var r,e,o,u;n[t>>5]|=128<<t%32,n[14+(t+64>>>9<<4)]=t;for(var c=1732584193,f=-271733879,i=-1732584194,a=271733878,h=0;h<n.length;h+=16)c=l(r=c,e=f,o=i,u=a,n[h],7,-680876936),a=l(a,c,f,i,n[h+1],12,-389564586),i=l(i,a,c,f,n[h+2],17,606105819),f=l(f,i,a,c,n[h+3],22,-1044525330),c=l(c,f,i,a,n[h+4],7,-176418897),a=l(a,c,f,i,n[h+5],12,1200080426),i=l(i,a,c,f,n[h+6],17,-1473231341),f=l(f,i,a,c,n[h+7],22,-45705983),c=l(c,f,i,a,n[h+8],7,1770035416),a=l(a,c,f,i,n[h+9],12,-1958414417),i=l(i,a,c,f,n[h+10],17,-42063),f=l(f,i,a,c,n[h+11],22,-1990404162),c=l(c,f,i,a,n[h+12],7,1804603682),a=l(a,c,f,i,n[h+13],12,-40341101),i=l(i,a,c,f,n[h+14],17,-1502002290),c=v(c,f=l(f,i,a,c,n[h+15],22,1236535329),i,a,n[h+1],5,-165796510),a=v(a,c,f,i,n[h+6],9,-1069501632),i=v(i,a,c,f,n[h+11],14,643717713),f=v(f,i,a,c,n[h],20,-373897302),c=v(c,f,i,a,n[h+5],5,-701558691),a=v(a,c,f,i,n[h+10],9,38016083),i=v(i,a,c,f,n[h+15],14,-660478335),f=v(f,i,a,c,n[h+4],20,-405537848),c=v(c,f,i,a,n[h+9],5,568446438),a=v(a,c,f,i,n[h+14],9,-1019803690),i=v(i,a,c,f,n[h+3],14,-187363961),f=v(f,i,a,c,n[h+8],20,1163531501),c=v(c,f,i,a,n[h+13],5,-1444681467),a=v(a,c,f,i,n[h+2],9,-51403784),i=v(i,a,c,f,n[h+7],14,1735328473),c=g(c,f=v(f,i,a,c,n[h+12],20,-1926607734),i,a,n[h+5],4,-378558),a=g(a,c,f,i,n[h+8],11,-2022574463),i=g(i,a,c,f,n[h+11],16,1839030562),f=g(f,i,a,c,n[h+14],23,-35309556),c=g(c,f,i,a,n[h+1],4,-1530992060),a=g(a,c,f,i,n[h+4],11,1272893353),i=g(i,a,c,f,n[h+7],16,-155497632),f=g(f,i,a,c,n[h+10],23,-1094730640),c=g(c,f,i,a,n[h+13],4,681279174),a=g(a,c,f,i,n[h],11,-358537222),i=g(i,a,c,f,n[h+3],16,-722521979),f=g(f,i,a,c,n[h+6],23,76029189),c=g(c,f,i,a,n[h+9],4,-640364487),a=g(a,c,f,i,n[h+12],11,-421815835),i=g(i,a,c,f,n[h+15],16,530742520),c=m(c,f=g(f,i,a,c,n[h+2],23,-995338651),i,a,n[h],6,-198630844),a=m(a,c,f,i,n[h+7],10,1126891415),i=m(i,a,c,f,n[h+14],15,-1416354905),f=m(f,i,a,c,n[h+5],21,-57434055),c=m(c,f,i,a,n[h+12],6,1700485571),a=m(a,c,f,i,n[h+3],10,-1894986606),i=m(i,a,c,f,n[h+10],15,-1051523),f=m(f,i,a,c,n[h+1],21,-2054922799),c=m(c,f,i,a,n[h+8],6,1873313359),a=m(a,c,f,i,n[h+15],10,-30611744),i=m(i,a,c,f,n[h+6],15,-1560198380),f=m(f,i,a,c,n[h+13],21,1309151649),c=m(c,f,i,a,n[h+4],6,-145523070),a=m(a,c,f,i,n[h+11],10,-1120210379),i=m(i,a,c,f,n[h+2],15,718787259),f=m(f,i,a,c,n[h+9],21,-343485551),c=d(c,r),f=d(f,e),i=d(i,o),a=d(a,u);return[c,f,i,a]}function a(n){for(var t="",r=32*n.length,e=0;e<r;e+=8)t+=String.fromCharCode(n[e>>5]>>>e%32&255);return t}function h(n){var t=[];for(t[(n.length>>2)-1]=void 0,e=0;e<t.length;e+=1)t[e]=0;for(var r=8*n.length,e=0;e<r;e+=8)t[e>>5]|=(255&n.charCodeAt(e/8))<<e%32;return t}function e(n){for(var t,r="0123456789abcdef",e="",o=0;o<n.length;o+=1)t=n.charCodeAt(o),e+=r.charAt(t>>>4&15)+r.charAt(15&t);return e}function r(n){return unescape(encodeURIComponent(n))}function o(n){return a(i(h(t=r(n)),8*t.length));var t}function u(n,t){return function(n,t){var r,e,o=h(n),u=[],c=[];for(u[15]=c[15]=void 0,16<o.length&&(o=i(o,8*n.length)),r=0;r<16;r+=1)u[r]=909522486^o[r],c[r]=1549556828^o[r];return e=i(u.concat(h(t)),512+8*t.length),a(i(c.concat(e),640))}(r(n),r(t))}function t(n,t,r){return t?r?u(t,n):e(u(t,n)):r?o(n):e(o(n))}"function"==typeof define&&define.amd?define(function(){return t}):"object"==typeof module&&module.exports?module.exports=t:n.md5=t}(this);</script><script>window.AbTest = (function() { return { 'ab_test': (uniqueId, test_name, buckets) => { let override = new URLSearchParams(window.location.search).get(`ab_test[${test_name}]`); if ( override ) { return override; } const bucketNames = buckets.map((bucket) => { return typeof bucket === 'string' ? bucket : Object.keys(bucket)[0]; }); const weights = buckets.map((bucket) => { return typeof bucket === 'string' ? 1 : Object.values(bucket)[0]; }); const total = weights.reduce((sum, weight) => sum + weight); const hash = md5(`${uniqueId}${test_name}`); const hashNum = parseInt(hash.slice(-12), 16); let bucketPoint = total * (hashNum % 100000) / 100000; const bucket = bucketNames.find((_, i) => { if (weights[i] > bucketPoint) { return true; } bucketPoint -= weights[i]; return false; }); return bucket; } }; })();</script><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-landing_url="https://www.academia.edu/Documents/in/Security_Studies" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><script>function onGoogleOneTapEvent(event) { var momentType = event.getMomentType(); var momentReason = null; if (event.isNotDisplayed()) { momentReason = event.getNotDisplayedReason(); } else if (event.isSkippedMoment()) { momentReason = event.getSkippedReason(); } else if (event.isDismissedMoment()) { momentReason = event.getDismissedReason(); } Aedu.arbitraryEvents.write('GoogleOneTapEvent', { moment_type: momentType, moment_reason: momentReason, }); }</script><script>(function() { var auvid = unescape( document.cookie .split(/; ?/) .find((s) => s.startsWith('auvid')) .substring(6)); var bucket = AbTest.ab_test(auvid, 'lo_ri_one_tap_google_sign_on', ['control', 'one_tap_google_sign_on']); if (bucket === 'control') return; var oneTapTag = document.createElement('script') oneTapTag.async = true oneTapTag.defer = true oneTapTag.src = 'https://accounts.google.com/gsi/client' document.body.appendChild(oneTapTag) })();</script></div></div></div> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">×</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span ="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "b96cbb1bf8e7f17c56701377b48caa3ee60b352c356a55032fa2c577ac794da0", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="X161/11dlC/tcdHhPF/Bhyzg3rduX1g0S7vFdGOwI5gp4rxqD2EGA23413FDVbok1pOqAvUBozqlj/gT2R6nwA==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/Documents/in/Security_Studies" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="✓" autocomplete="off" /><input type="hidden" name="authenticity_token" value="+QlMDHdim4/kJeTLF0OPvgV6FpVecrRExeDQ3AA/g9GPtUWZJV4Jo2Ss4ltoSfQd/wliIMUsT0or1O27upEHiQ==" autocomplete="off" /><p>Enter the email address you signed up with and we'll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account? <a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg> <strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg> <strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia ©2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>