CINXE.COM

University of Turku | Department of Political Science and Contemporary History - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>University of Turku | Department of Political Science and Contemporary History - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "departments", 'action': "show_works", 'controller_action': 'departments#show_works', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="ZsvzEiWrCig2U0ryphpj6Tb7U82qpewfsELBSwZgpJTEeLJaHc/3LkLxF9w43oapTZyGArqgMB9tt0x4MbQ6cw==" /> <link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="description" content="Academia.edu is the platform to share, find, and explore 50 Million research papers. Join us to accelerate your research needs &amp; academic interests." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'departments'; var $action_name = "show_works"; var $rails_env = 'production'; var $app_rev = '65a690de66ffd0e9f9c3f528feae2fde26a171eb'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15272,"monthly_visitors":"113 million","monthly_visitor_count":113784677,"monthly_visitor_count_in_millions":113,"user_count":277455194,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732716552000); window.Aedu.timeDifference = new Date().getTime() - 1732716552000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-296162c7af6fd81dcdd76f1a94f1fad04fb5f647401337d136fe8b68742170b1.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-abfe14709f87872daacfe98b00812033ac214684652bef9d49abfed8b549f9f6.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-57c07c4415ad4e6a22ced3639e4df9a5401c1e44346ffeb379134e0f2293c589.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://utu.academia.edu/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=4" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-departments a-show_works logged_out u-bgColorWhite'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-departments a-show_works logged_out u-bgColorWhite'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav no-xs no-sm no-md"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <div class="DesignSystem" style="margin-top:-40px"><div class="PageHeader"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><div class="u-floatLeft u-fs24 u-tcGrayDarkest"><span class="PageHeader-title u-m0x u-fw700 u-mr5x u-pr5x u-borderColorGrayLight u-borderRight1"><a href="https://utu.academia.edu/"><span class="u-linkUnstyled u-tcGrayDarkest">University of Turku</span></a></span><h1 class="u-m0x u-fw300 u-fs24 u-displayInline">Department of Political Science and Contemporary History</h1></div><div class="u-floatRight u-mt1x"></div></div></div></div></div><div class="TabbedNavigation"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><ul class="nav u-m0x u-p0x list-inline"><li class="u-floatLeft u-pr5x u-mr5x u-borderColorGrayLight u-borderRight1"><a href="https://utu.academia.edu/"><span><i class="fa fa-arrow-left"></i>&nbsp;&nbsp;All Departments</span></a></li><li class="u-floatLeft active"><a href="https://utu.academia.edu/Departments/Department_of_Political_Science_and_Contemporary_History/Documents">221 Papers</a></li><li class="u-floatLeft"><a href="https://utu.academia.edu/Departments/Department_of_Political_Science_and_Contemporary_History">85 Researchers</a></li></ul></div></div></div></div><div class="container"><div class="row"><div class="col-xs-12"><div class="u-displayFlex"><div class="u-flexGrow1"><div class="u-ph0x"><div class="works"><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_66958524" data-work_id="66958524" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/66958524/ASEM_in_its_Tenth_Year_Looking_Back_Looking_Forward">ASEM in its Tenth Year Looking Back , Looking Forward</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">An evaluation of ASEM in its first decade and an exploration of its future possibilities</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/66958524" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="9d08670fd40d732da2b0084ee620f9ed" rel="nofollow" data-download="{&quot;attachment_id&quot;:77957809,&quot;asset_id&quot;:66958524,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/77957809/download_file?st=MTczMjcxNjU1MCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="4511892" href="https://utu.academia.edu/SiljaKeva">Silja Keva</a><script data-card-contents-for-user="4511892" type="text/json">{"id":4511892,"first_name":"Silja","last_name":"Keva","domain_name":"utu","page_name":"SiljaKeva","display_name":"Silja Keva","profile_url":"https://utu.academia.edu/SiljaKeva","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_66958524 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="66958524"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 66958524, container: ".js-paper-rank-work_66958524", }); });</script></li><li class="js-percentile-work_66958524 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 66958524; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_66958524"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_66958524 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="66958524"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 66958524; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=66958524]").text(description); $(".js-view-count-work_66958524").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_66958524").removeClass('hidden') })</script></div></li></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_7475650" data-work_id="7475650" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/7475650/Mathematical_Handbook_of_Formulas_and_Tables">Mathematical Handbook of Formulas and Tables</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/7475650" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c3c38340bf60824a0a910f41acaeea50" rel="nofollow" data-download="{&quot;attachment_id&quot;:34050058,&quot;asset_id&quot;:7475650,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/34050058/download_file?st=MTczMjcxNjU1MCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="13325989" href="https://utu.academia.edu/SeokGyeongYoon">SeokGyeong Yoon</a><script data-card-contents-for-user="13325989" type="text/json">{"id":13325989,"first_name":"SeokGyeong","last_name":"Yoon","domain_name":"utu","page_name":"SeokGyeongYoon","display_name":"SeokGyeong Yoon","profile_url":"https://utu.academia.edu/SeokGyeongYoon","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_7475650 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="7475650"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 7475650, container: ".js-paper-rank-work_7475650", }); });</script></li><li class="js-percentile-work_7475650 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7475650; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_7475650"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_7475650 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="7475650"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7475650; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7475650]").text(description); $(".js-view-count-work_7475650").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_7475650").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="7475650"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="300" href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a><script data-card-contents-for-ri="300" type="text/json">{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics","nofollow":false}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=7475650]'), work: {"id":7475650,"title":"Mathematical Handbook of Formulas and Tables","created_at":"2014-06-26T19:17:08.167-07:00","owner_id":13325989,"url":"https://www.academia.edu/7475650/Mathematical_Handbook_of_Formulas_and_Tables","slug":"Mathematical_Handbook_of_Formulas_and_Tables","dom_id":"work_7475650","summary":null,"publication":null,"publication_with_fallback":"Mathematics of Computation","downloadable_attachments":[{"id":34050058,"asset_id":7475650,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/34050058/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/34050058/Mathematical_Handbook_of_Formulas_and_Tables-libre.pdf?1403835505=\u0026response-content-disposition=attachment%3B+filename%3DMathematical_Handbook_of_Formulas_and_Ta.pdf\u0026Expires=1729619655\u0026Signature=JWRjYyMmVqt3ZdhdEE1RLFkkWiZ9FOa30BSgRZoUQ5ki5nODLvQWBL618NdUyc54HqIK~JfpwBx8T4LdaqfIZHZUfu0GaY~0CvY0XzIYZnGjAKWMEiZOcd6lFU6loEQlF7ArBVa4FENDyPE~mmaZzYOmTHKh5FcKCGWmMAitGUuGogUSqHa2apDXNataGrEGtMsvhrXkRzIlmD70IoBBPGFL6eyTMAPNZD0rXBlAYSCVBPJHWQun9IU97MwcTqdMfMgs2-bWQF4DH51zrnsxaDAqyQ0qdzw4lkZevRlogzfSLsZoJb56CMJvG8Zj6lVsj14qrwjYsjMNWvl35AXnSw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/34050058/download_file?st=MTczMjcxNjU1MCw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/34050058/mini_magick20190326-17659-filr7d.png?1553648309"}],"downloadable_attachments_with_full_thumbnails":[{"id":34050058,"asset_id":7475650,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/34050058/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/34050058/Mathematical_Handbook_of_Formulas_and_Tables-libre.pdf?1403835505=\u0026response-content-disposition=attachment%3B+filename%3DMathematical_Handbook_of_Formulas_and_Ta.pdf\u0026Expires=1729619655\u0026Signature=JWRjYyMmVqt3ZdhdEE1RLFkkWiZ9FOa30BSgRZoUQ5ki5nODLvQWBL618NdUyc54HqIK~JfpwBx8T4LdaqfIZHZUfu0GaY~0CvY0XzIYZnGjAKWMEiZOcd6lFU6loEQlF7ArBVa4FENDyPE~mmaZzYOmTHKh5FcKCGWmMAitGUuGogUSqHa2apDXNataGrEGtMsvhrXkRzIlmD70IoBBPGFL6eyTMAPNZD0rXBlAYSCVBPJHWQun9IU97MwcTqdMfMgs2-bWQF4DH51zrnsxaDAqyQ0qdzw4lkZevRlogzfSLsZoJb56CMJvG8Zj6lVsj14qrwjYsjMNWvl35AXnSw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/34050058/download_file?st=MTczMjcxNjU1MCw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/34050058/mini_magick20190326-17659-filr7d.png?1553648309"}],"has_pdf":true,"has_fulltext":true,"page_count":301,"ordered_authors":[{"id":13325989,"first_name":"SeokGyeong","last_name":"Yoon","domain_name":"utu","page_name":"SeokGyeongYoon","display_name":"SeokGyeong Yoon","profile_url":"https://utu.academia.edu/SeokGyeongYoon","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":300,"name":"Mathematics","url":"https://www.academia.edu/Documents/in/Mathematics","nofollow":false}],"publication_year":null,"publication_year_with_fallback":1969,"paper_rank":null,"all_time_views":18933,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_114565327" data-work_id="114565327" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/114565327/Johtaja_silta_roolimalli_erist%C3%A4j%C3%A4_vakauttaja_Turkin_rooli_ja_asema_L%C3%A4hi_id%C3%A4ss%C3%A4_hein%C3%A4kuun_2016_vallankaappausyrityksen_j%C3%A4lkeen_analyysi_Turkin_alueellisista_rooleista_uuden_alueellisuuden_teoreettisessa_viitekehyksess%C3%A4">Johtaja, silta, roolimalli, eristäjä, vakauttaja – Turkin rooli ja asema Lähi-idässä heinäkuun 2016 vallankaappausyrityksen jälkeen : analyysi Turkin alueellisista rooleista uuden alueellisuuden teoreettisessa viitekehyksessä</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Alueiden merkitys on lisääntynyt kansainvälisessä järjestelmässä. Turkki on aktiivinen toimija sitä ympäröivillä alueilla Euroopassa, Kaukasiassa ja Lähi-idässä. Syyrian sota, alueelliset valtakamppailut ja etääntyminen Euroopan unionista... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_114565327" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Alueiden merkitys on lisääntynyt kansainvälisessä järjestelmässä. Turkki on aktiivinen toimija sitä ympäröivillä alueilla Euroopassa, Kaukasiassa ja Lähi-idässä. Syyrian sota, alueelliset valtakamppailut ja etääntyminen Euroopan unionista ovat tuoneet Turkin lähemmäs juuri Lähi-idän turvallisuuskompleksia. Näin ollen tutkielmassa tarkastellaan Turkin kykyä ja tahtoa toimia erilaisissa rooleissa Lähi-idässä. Tällaisia rooleja ovat johtaja, silta, roolimalli, eristäjä ja vakauttaja. Tutkielmassa esitetään kysymys, miten edellä mainitut roolit näkyvät Turkin toimijuudessa Lähi-idässä heinäkuun 2016 vallankaappausyrityksen jälkeen ja mikä on niiden keskinäinen painoarvo. Tutkielman metodinen lähestyminen on teoreettinen sisällönanalyysi, jossa empiriaa testataan aiempaa teoreettista tutkimusta ja sen pohjalta rakennettua analyysirunkoa vasten. Tutkielman teoriapohja rakentuu Buzanin ja Wæverin, Frazierin ja Stewart-Ingersollin sekä K. J. Holstin aikaisemmalle työlle uuden alueellisuuden...</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/114565327" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="868e90370be7057e9fd38ce5ba492dc8" rel="nofollow" data-download="{&quot;attachment_id&quot;:111230649,&quot;asset_id&quot;:114565327,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/111230649/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="21723520" href="https://utu.academia.edu/JanneSalakka">Janne Salakka</a><script data-card-contents-for-user="21723520" type="text/json">{"id":21723520,"first_name":"Janne","last_name":"Salakka","domain_name":"utu","page_name":"JanneSalakka","display_name":"Janne Salakka","profile_url":"https://utu.academia.edu/JanneSalakka","photo":"https://0.academia-photos.com/21723520/5972680/6778453/s65_janne.salakka.jpg_oh_f87422b0e93478c1057c4f114519b043_oe_54da0c47___gda___1427346646_34421d305998b47bbda5887941b944c2"}</script></span></span></li><li class="js-paper-rank-work_114565327 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="114565327"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 114565327, container: ".js-paper-rank-work_114565327", }); });</script></li><li class="js-percentile-work_114565327 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 114565327; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_114565327"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_114565327 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="114565327"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 114565327; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=114565327]").text(description); $(".js-view-count-work_114565327").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_114565327").removeClass('hidden') })</script></div></li></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34322228" data-work_id="34322228" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34322228/The_Finnish_Twitter_War_The_Winter_War_experienced_through_the_social_media_project_sota39_and_its_implications_to_traditional_historiography">The Finnish Twitter War: The Winter War experienced through the social media project #sota39 and its implications to traditional historiography</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This essay explores the #sota39 project by the Finnish national broadcasting company YLE. The project is a real-time chronological representation of the Finnish Winter War produced for the social media platform Twitter. The project... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34322228" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This essay explores the #sota39 project by the Finnish national broadcasting company YLE. The project is a real-time chronological representation of the Finnish Winter War produced for the social media platform Twitter. The project incorporates curated historical material with crowdsourced content to provide a multivocal historical representation that seems to excel in invoking experience to its readers. How can historical characters be transfigured to relive 105 days of national crisis in a strict chronology on a social media platform in a way that somehow connects with modern postmodern media consumers and still maintains its relevance as a historical project? The forms of social media are radical yet well suited for presenting chronological proceeding events. Simultaneously the fragmentary nature of the Twitter feed and the multivocality of the social media environment challenges the idea of having a strict narrative in a historical representation. #sota39 is an example of a well-made and successful experimental history project. In social media both the researchers and users of history can find new potential to push the limits of contemporary narrative representation. With projects like #sota39 that reach the 21th century digital media natives the interest for history can be revivified. In this essay our main attention is not in the content of #sota39 but in its experimental format, its application on historical sources and the resulting historiographical consequences. The complexities of the project have to be analyzed to fully appreciate its nature as a historical endeavor and to understand its possibilities for history as a traditional discipline forced to adapt to a digital era.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34322228" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b4914f3a9b8d532c1ce6730b6ae7e4cf" rel="nofollow" data-download="{&quot;attachment_id&quot;:54220664,&quot;asset_id&quot;:34322228,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54220664/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="20870583" href="https://utu.academia.edu/IlkkaL%C3%A4hteenm%C3%A4ki">Ilkka Lähteenmäki</a><script data-card-contents-for-user="20870583" type="text/json">{"id":20870583,"first_name":"Ilkka","last_name":"Lähteenmäki","domain_name":"utu","page_name":"IlkkaLähteenmäki","display_name":"Ilkka Lähteenmäki","profile_url":"https://utu.academia.edu/IlkkaL%C3%A4hteenm%C3%A4ki","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_34322228 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34322228"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34322228, container: ".js-paper-rank-work_34322228", }); });</script></li><li class="js-percentile-work_34322228 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34322228; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34322228"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34322228 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34322228"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34322228; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34322228]").text(description); $(".js-view-count-work_34322228").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34322228").removeClass('hidden') })</script></div></li></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34322229" data-work_id="34322229" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34322229/Possible_Worlds_of_History">Possible Worlds of History</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The theory of possible worlds has been minimally employed in the field of theory and philosophy of history, even though it has found a place as a tool in other areas of philosophy. Discussion has mostly focused on arguments concerning... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_34322229" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The theory of possible worlds has been minimally employed in the field of theory and philosophy of history, even though it has found a place as a tool in other areas of philosophy. Discussion has mostly focused on arguments concerning counterfactual history&#39;s status as either useful or harmful. The theory of possible worlds can, however be used also to analyze historical writing. The concept of textual possible worlds offers an interesting framework to work with for analyzing a historical text&#39;s characteristics and features. However, one of the challenges is that the literary theory&#39;s notion of possible worlds is that they are metaphorical in nature. This in itself is not problematic but while discussing about history, which arguably deals with the real world, the terminology can become muddled. The latest attempt to combine the literary and philosophical notions of possible worlds and apply it to historiography came from Lubomír Doležel in his Possible Worlds of Fiction and History: The Postmodern Stage (2010). I offer some criticism to his usage of possible worlds to separate history and fiction, and argue that when historiography is under discussion a more philosophical notion of possible worlds should be prioritized over the metaphorical interpretation of possible worlds.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34322229" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d0bfd2444c970ab6825ad0061dee1c04" rel="nofollow" data-download="{&quot;attachment_id&quot;:54220685,&quot;asset_id&quot;:34322229,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54220685/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="20870583" href="https://utu.academia.edu/IlkkaL%C3%A4hteenm%C3%A4ki">Ilkka Lähteenmäki</a><script data-card-contents-for-user="20870583" type="text/json">{"id":20870583,"first_name":"Ilkka","last_name":"Lähteenmäki","domain_name":"utu","page_name":"IlkkaLähteenmäki","display_name":"Ilkka Lähteenmäki","profile_url":"https://utu.academia.edu/IlkkaL%C3%A4hteenm%C3%A4ki","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_34322229 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34322229"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34322229, container: ".js-paper-rank-work_34322229", }); });</script></li><li class="js-percentile-work_34322229 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34322229; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34322229"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34322229 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34322229"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34322229; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34322229]").text(description); $(".js-view-count-work_34322229").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34322229").removeClass('hidden') })</script></div></li></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8922315" data-work_id="8922315" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8922315/Security_as_Justification_An_Analysis_of_Deng_Xiaopings_Speech_to_the_Martial_Law_Troops_in_Beijing_on_the_Ninth_of_June_1989">Security as Justification An Analysis of Deng Xiaoping&#39;s Speech to the Martial Law Troops in Beijing on the Ninth of June 1989</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The article takes a micro-level look at the construction of security in the PRC by analyzing Deng Xiaoping’s first speech after the Tiananmen incident in 1989. The author proposes that the reproduction or post-hoc construction of security... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8922315" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The article takes a micro-level look at the construction of security in the PRC by analyzing Deng Xiaoping’s first speech after the Tiananmen incident in 1989. The author proposes that the reproduction or post-hoc construction of security is a specific variant of securitization.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8922315" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="693410031563c921de1eff4b642bb698" rel="nofollow" data-download="{&quot;attachment_id&quot;:35247396,&quot;asset_id&quot;:8922315,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35247396/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_8922315 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8922315"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8922315, container: ".js-paper-rank-work_8922315", }); });</script></li><li class="js-percentile-work_8922315 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8922315; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8922315"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8922315 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8922315"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8922315; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8922315]").text(description); $(".js-view-count-work_8922315").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8922315").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8922315"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>,&nbsp;<script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>,&nbsp;<script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="6831" href="https://www.academia.edu/Documents/in/Securitization">Securitization</a>,&nbsp;<script data-card-contents-for-ri="6831" type="text/json">{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="15389" href="https://www.academia.edu/Documents/in/Copenhagen_School_Securitization">Copenhagen School/Securitization</a><script data-card-contents-for-ri="15389" type="text/json">{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8922315]'), work: {"id":8922315,"title":"Security as Justification An Analysis of Deng Xiaoping's Speech to the Martial Law Troops in Beijing on the Ninth of June 1989","created_at":"2014-10-23T00:38:38.344-07:00","owner_id":19692650,"url":"https://www.academia.edu/8922315/Security_as_Justification_An_Analysis_of_Deng_Xiaopings_Speech_to_the_Martial_Law_Troops_in_Beijing_on_the_Ninth_of_June_1989","slug":"Security_as_Justification_An_Analysis_of_Deng_Xiaopings_Speech_to_the_Martial_Law_Troops_in_Beijing_on_the_Ninth_of_June_1989","dom_id":"work_8922315","summary":"The article takes a micro-level look at the construction of security in the PRC by analyzing Deng Xiaoping’s first speech after the Tiananmen incident in 1989. The author proposes that the reproduction or post-hoc construction of security is a specific variant of securitization.","publication":"Politologiske Studier","publication_with_fallback":"Politologiske Studier","downloadable_attachments":[{"id":35247396,"asset_id":8922315,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247396/vuori2003-security-as-justification-libre.pdf?1414054459=\u0026response-content-disposition=attachment%3B+filename%3DSecurity_as_Justification_An_Analysis_of.pdf\u0026Expires=1729589397\u0026Signature=fkaRI87H3zpmHwH70-Qewff7HNz6pRXNJ75KJl1n7ts6IsAtMJB-zxujir8y5SJLQO1I15QmlcMF~9BUGaRq5W412~ppYzjI6hh2vbQcxjNAVidnodg~7mjkvXfSzoZIHCTuvUXUdkP~XE5hnN3lwgLESN~BM75utyPTYs7kG9EmF4I9vEsvEC0iJlnXSIiyWsaiHzhBsQ1tUASgxrgBQ-QqMVkHDua~7aDR4vgaQZ~ZQCp53lgW~d4KAH-NUjkLLmad2DGRguQwZK7de3zpZl5XMWZ-FngmPQkU5wx9dHHJc-XbbxnC6NF5WB-twu3YQAVYc-OtPYhvkyyob-EmJw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247396/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247396/mini_magick20190316-16720-ot7ugx.png?1552768958"}],"downloadable_attachments_with_full_thumbnails":[{"id":35247396,"asset_id":8922315,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247396/vuori2003-security-as-justification-libre.pdf?1414054459=\u0026response-content-disposition=attachment%3B+filename%3DSecurity_as_Justification_An_Analysis_of.pdf\u0026Expires=1729589397\u0026Signature=fkaRI87H3zpmHwH70-Qewff7HNz6pRXNJ75KJl1n7ts6IsAtMJB-zxujir8y5SJLQO1I15QmlcMF~9BUGaRq5W412~ppYzjI6hh2vbQcxjNAVidnodg~7mjkvXfSzoZIHCTuvUXUdkP~XE5hnN3lwgLESN~BM75utyPTYs7kG9EmF4I9vEsvEC0iJlnXSIiyWsaiHzhBsQ1tUASgxrgBQ-QqMVkHDua~7aDR4vgaQZ~ZQCp53lgW~d4KAH-NUjkLLmad2DGRguQwZK7de3zpZl5XMWZ-FngmPQkU5wx9dHHJc-XbbxnC6NF5WB-twu3YQAVYc-OtPYhvkyyob-EmJw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247396/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247396/mini_magick20190316-16720-ot7ugx.png?1552768958"}],"has_pdf":true,"has_fulltext":true,"page_count":14,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies","nofollow":false},{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization","nofollow":false},{"id":20602,"name":"China studies","url":"https://www.academia.edu/Documents/in/China_studies"}],"publication_year":2003,"publication_year_with_fallback":2003,"paper_rank":null,"all_time_views":296,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8922884" data-work_id="8922884" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8922884/Critical_Security_and_Chinese_Politics_The_Anti_Falungong_Campaign">Critical Security and Chinese Politics: The Anti-Falungong Campaign</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This book examines how critical approaches to security developed in Europe can be used to investigate a Chinese security issue - the case of the Falungong. The past few decades have produced a rich field of theoretical approaches... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8922884" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This book examines how critical approaches to security developed in Europe can be used to investigate a Chinese security issue - the case of the Falungong. <br /> <br />The past few decades have produced a rich field of theoretical approaches to ‘security’ in Europe. In this book, the security-specific notions of securitization, the politics of insecurity, and emancipation are used as analytical approaches to investigate the anti-Falungong campaign in the People’s Republic of China. This campaign, launched in 1999, was the largest security-related propaganda campaign since 1989 and was directed against a group of qigong-practitioners who were presented as a grave threat to society. The campaign had major impacts as new security legislation was established and human rights organizations reported severe mistreatment of practitioners. <br /> <br />This book approaches one empirical case with three approaches in order to transcend the tendency to pit one approach against another. It shows how they highlight different aspects in investigation, and how they can be combined to gain more comprehensive insights, and thereby invigorate renewed debate in the field. Furthermore, this is used as a vehicle to discuss more general philosophical issues of theory, development, and theory development and will assist students to comprehend the effects research framework selection has on a piece of research. Such discussions are necessary in order to apply the frameworks in investigations that go beyond the socio-political context they were originally developed in. <br /> <br />This book will be of interest to students of critical security studies, Chinese politics, research methods and IR in general.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8922884" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="091e8cb0b52ded21088ed281497beb80" rel="nofollow" data-download="{&quot;attachment_id&quot;:35280040,&quot;asset_id&quot;:8922884,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35280040/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_8922884 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8922884"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8922884, container: ".js-paper-rank-work_8922884", }); });</script></li><li class="js-percentile-work_8922884 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8922884; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8922884"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8922884 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8922884"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8922884; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8922884]").text(description); $(".js-view-count-work_8922884").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8922884").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8922884"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>,&nbsp;<script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>,&nbsp;<script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5535" href="https://www.academia.edu/Documents/in/Critical_Security_Studies">Critical Security Studies</a><script data-card-contents-for-ri="5535" type="text/json">{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8922884]'), work: {"id":8922884,"title":"Critical Security and Chinese Politics: The Anti-Falungong Campaign","created_at":"2014-10-23T01:10:21.628-07:00","owner_id":19692650,"url":"https://www.academia.edu/8922884/Critical_Security_and_Chinese_Politics_The_Anti_Falungong_Campaign","slug":"Critical_Security_and_Chinese_Politics_The_Anti_Falungong_Campaign","dom_id":"work_8922884","summary":"\r\n\r\nThis book examines how critical approaches to security developed in Europe can be used to investigate a Chinese security issue - the case of the Falungong.\r\n\r\nThe past few decades have produced a rich field of theoretical approaches to ‘security’ in Europe. In this book, the security-specific notions of securitization, the politics of insecurity, and emancipation are used as analytical approaches to investigate the anti-Falungong campaign in the People’s Republic of China. This campaign, launched in 1999, was the largest security-related propaganda campaign since 1989 and was directed against a group of qigong-practitioners who were presented as a grave threat to society. The campaign had major impacts as new security legislation was established and human rights organizations reported severe mistreatment of practitioners.\r\n\r\nThis book approaches one empirical case with three approaches in order to transcend the tendency to pit one approach against another. It shows how they highlight different aspects in investigation, and how they can be combined to gain more comprehensive insights, and thereby invigorate renewed debate in the field. Furthermore, this is used as a vehicle to discuss more general philosophical issues of theory, development, and theory development and will assist students to comprehend the effects research framework selection has on a piece of research. Such discussions are necessary in order to apply the frameworks in investigations that go beyond the socio-political context they were originally developed in.\r\n\r\nThis book will be of interest to students of critical security studies, Chinese politics, research methods and IR in general.","publication":null,"publication_with_fallback":null,"downloadable_attachments":[{"id":35280040,"asset_id":8922884,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35280040/Critical_Security_and_Chinese_Politics-libre.pdf?1414305747=\u0026response-content-disposition=attachment%3B+filename%3DCritical_Security_and_Chinese_Politics_T.pdf\u0026Expires=1732720151\u0026Signature=eNXPt60bGodRGKeda8IX4A~CPn4shzpMACPSkicTsYAxUoJWqo0jveeqCAdqFld7A~cpHssKKbRumFHHD9KNg4PeOJ7bYr5VxOg9-WPwMBKxCs~ihva1HnkieoYC0~nE~mkpPGLTG4t41JEwMc5IJ8vJ-F0p1EkYaWzVcf9wyK0HFHMH7av6Yo7JR0aIldZZfXATvoZNmWNvQcP6g7s4gM53IUgaUuhXZTishtxvgdKlxCCEEjI1GXqIIvW8lZ8c-ZD2ST-b-Ho0A87wpYSywcMhZYKvnrbAlJXrmibnhdXrcJ6Fh-0Hu0lTXDVHspfY7s9eXRxy37me0VmMM-WNGg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35280040/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35280040/mini_magick20190316-27907-1o4afrf.png?1552743858"}],"downloadable_attachments_with_full_thumbnails":[{"id":35280040,"asset_id":8922884,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35280040/Critical_Security_and_Chinese_Politics-libre.pdf?1414305747=\u0026response-content-disposition=attachment%3B+filename%3DCritical_Security_and_Chinese_Politics_T.pdf\u0026Expires=1732720151\u0026Signature=eNXPt60bGodRGKeda8IX4A~CPn4shzpMACPSkicTsYAxUoJWqo0jveeqCAdqFld7A~cpHssKKbRumFHHD9KNg4PeOJ7bYr5VxOg9-WPwMBKxCs~ihva1HnkieoYC0~nE~mkpPGLTG4t41JEwMc5IJ8vJ-F0p1EkYaWzVcf9wyK0HFHMH7av6Yo7JR0aIldZZfXATvoZNmWNvQcP6g7s4gM53IUgaUuhXZTishtxvgdKlxCCEEjI1GXqIIvW8lZ8c-ZD2ST-b-Ho0A87wpYSywcMhZYKvnrbAlJXrmibnhdXrcJ6Fh-0Hu0lTXDVHspfY7s9eXRxy37me0VmMM-WNGg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35280040/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35280040/mini_magick20190316-27907-1o4afrf.png?1552743858"}],"has_pdf":true,"has_fulltext":true,"page_count":2,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations","nofollow":false},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies","nofollow":false},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies","nofollow":false},{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization"},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization"},{"id":20602,"name":"China studies","url":"https://www.academia.edu/Documents/in/China_studies"}],"publication_year":2014,"publication_year_with_fallback":2014,"paper_rank":null,"all_time_views":107,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8923009" data-work_id="8923009" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8923009/Chinese_Securitisation_Broadening_the_Scope_of_Securitisation_Studies_with_Three_Case_Studies_in_the_Context_of_the_People_s_Republic_of_China">Chinese Securitisation: Broadening the Scope of Securitisation Studies with Three Case Studies in the Context of the People’s Republic of China</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">How does securitisation work in the context of a non-democratic political system? This has been the general question that has guided the inquiry reported on in this Licentiate dissertation. The key concept and theory discussed in the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8923009" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">How does securitisation work in the context of a non-democratic <br />political system? This has been the general question that has <br />guided the inquiry reported on in this Licentiate dissertation. <br />The key concept and theory discussed in the present volume is <br />securitisation. Securitisation is understood here as a political <br />process, which identifies conditions of insecurity, points out <br />threats, and constructs objects of security. It is only through <br />this social process that an issue becomes a question of security <br />concern; even though many phenomena can jeopardise the <br />existence of something, issues receive the status function of <br />(national) security only through a process of social construction. <br />This process is thought to have various political and social <br />functions and purposes. The theory of securitisation directs <br />the focus on the ‘performativity’ of security issues. Instead of <br />asking what security is, securitisation scholars are interested <br />in what security does, what politicians in effect do when they <br />‘speak security’ (cf. Wæver 1995; Buzan et al. 1998; Buzan &amp; <br />Wæver 2003).</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8923009" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="12b00cb110e3b7bfea569ac525fa4f5c" rel="nofollow" data-download="{&quot;attachment_id&quot;:35247152,&quot;asset_id&quot;:8923009,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35247152/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_8923009 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8923009"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8923009, container: ".js-paper-rank-work_8923009", }); });</script></li><li class="js-percentile-work_8923009 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8923009; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8923009"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8923009 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8923009"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8923009; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8923009]").text(description); $(".js-view-count-work_8923009").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8923009").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8923009"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>,&nbsp;<script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="6831" href="https://www.academia.edu/Documents/in/Securitization">Securitization</a>,&nbsp;<script data-card-contents-for-ri="6831" type="text/json">{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="15389" href="https://www.academia.edu/Documents/in/Copenhagen_School_Securitization">Copenhagen School/Securitization</a><script data-card-contents-for-ri="15389" type="text/json">{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8923009]'), work: {"id":8923009,"title":"Chinese Securitisation: Broadening the Scope of Securitisation Studies with Three Case Studies in the Context of the People’s Republic of China","created_at":"2014-10-23T01:20:16.579-07:00","owner_id":19692650,"url":"https://www.academia.edu/8923009/Chinese_Securitisation_Broadening_the_Scope_of_Securitisation_Studies_with_Three_Case_Studies_in_the_Context_of_the_People_s_Republic_of_China","slug":"Chinese_Securitisation_Broadening_the_Scope_of_Securitisation_Studies_with_Three_Case_Studies_in_the_Context_of_the_People_s_Republic_of_China","dom_id":"work_8923009","summary":"How does securitisation work in the context of a non-democratic\r\npolitical system? This has been the general question that has\r\nguided the inquiry reported on in this Licentiate dissertation.\r\nThe key concept and theory discussed in the present volume is\r\nsecuritisation. Securitisation is understood here as a political\r\nprocess, which identifies conditions of insecurity, points out\r\nthreats, and constructs objects of security. It is only through\r\nthis social process that an issue becomes a question of security\r\nconcern; even though many phenomena can jeopardise the\r\nexistence of something, issues receive the status function of\r\n(national) security only through a process of social construction.\r\nThis process is thought to have various political and social\r\nfunctions and purposes. The theory of securitisation directs\r\nthe focus on the ‘performativity’ of security issues. Instead of\r\nasking what security is, securitisation scholars are interested\r\nin what security does, what politicians in effect do when they\r\n‘speak security’ (cf. Wæver 1995; Buzan et al. 1998; Buzan \u0026\r\nWæver 2003).","publication":null,"publication_with_fallback":null,"downloadable_attachments":[{"id":35247152,"asset_id":8923009,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247152/vuori20072008-libre.pdf?1414054523=\u0026response-content-disposition=attachment%3B+filename%3DChinese_Securitisation_Broadening_the_Sc.pdf\u0026Expires=1729576292\u0026Signature=UZ23osNVH3R2wYoi1AvB~d7OYaqGyBFlvqXNaZ5BZkJlLH7lSEHYmUkx6y0pTF6wiPOsL7hYGQGbtL05sHjfbgC0KfHeUf8a8UYsLCnU8DyGEGz0QcJnMvLPq5GZQGgOoiv1Qqona5dDJ3ozbDz-txObA0mWRVksLGtrcxr3GoRz0tKjjDQf9dVLpXRK1KX4ykzHjx3cqCTwny8t6gm79sXVkyXxx0eru~XsfSl-INeNZfHtYk14CPvf5IE-QWXk4UeIu4Btppkq-Ijxauy6~UYBR1pEloME702QaYW3m1Q8jHAVYl7rc30qtt2AjXW20BFSJEFSll6pNj7uSDeRiQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247152/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247152/mini_magick20190316-1129-1gsb7o7.png?1552769250"}],"downloadable_attachments_with_full_thumbnails":[{"id":35247152,"asset_id":8923009,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247152/vuori20072008-libre.pdf?1414054523=\u0026response-content-disposition=attachment%3B+filename%3DChinese_Securitisation_Broadening_the_Sc.pdf\u0026Expires=1729576292\u0026Signature=UZ23osNVH3R2wYoi1AvB~d7OYaqGyBFlvqXNaZ5BZkJlLH7lSEHYmUkx6y0pTF6wiPOsL7hYGQGbtL05sHjfbgC0KfHeUf8a8UYsLCnU8DyGEGz0QcJnMvLPq5GZQGgOoiv1Qqona5dDJ3ozbDz-txObA0mWRVksLGtrcxr3GoRz0tKjjDQf9dVLpXRK1KX4ykzHjx3cqCTwny8t6gm79sXVkyXxx0eru~XsfSl-INeNZfHtYk14CPvf5IE-QWXk4UeIu4Btppkq-Ijxauy6~UYBR1pEloME702QaYW3m1Q8jHAVYl7rc30qtt2AjXW20BFSJEFSll6pNj7uSDeRiQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247152/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247152/mini_magick20190316-1129-1gsb7o7.png?1552769250"}],"has_pdf":true,"has_fulltext":true,"page_count":176,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations","nofollow":false},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false},{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization","nofollow":false},{"id":20602,"name":"China studies","url":"https://www.academia.edu/Documents/in/China_studies"}],"publication_year":2007,"publication_year_with_fallback":2007,"paper_rank":null,"all_time_views":686,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8923267 coauthored" data-work_id="8923267" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8923267/How_Cheap_Is_Identity_Talk_A_Framework_of_Identity_Frames_and_Security_Discourse_for_the_Analysis_of_Repression_and_Legitimization_of_Social_Movements_in_Mainland_China">How Cheap Is Identity Talk?— A Framework of Identity Frames and Security Discourse for the Analysis of Repression and Legitimization of Social Movements in Mainland China</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This article approaches the repression and legitimization of mainland Chinese social movements through a framework that combines the theories of identity frames and securitization. Using the Democracy Wall movement of 1978-81 and the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8923267" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This article approaches the repression and legitimization of mainland Chinese social movements through a framework that combines the theories of identity frames and securitization. Using the Democracy Wall movement of 1978-81 and the Student Democracy Movement of 1989 as its cases, the article shows how various identity frames, which both the movements and the authorities produce in their interactions, can be seen as attempts both to legitimize protest and make it illegitimate through security discourse. This combination provides a framework which can be used to analyze and conceptualize the interaction between protest movements and authorities that has been lacking in studies on Chinese protest even though there is extensive research on the subject.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8923267" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="05da56ed0c9bcb1709687adda6a3eb72" rel="nofollow" data-download="{&quot;attachment_id&quot;:35247336,&quot;asset_id&quot;:8923267,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35247336/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-8923267">+1</span><div class="hidden js-additional-users-8923267"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://utu.academia.edu/LauriPaltemaa">Lauri Paltemaa</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-8923267'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-8923267').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_8923267 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8923267"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8923267, container: ".js-paper-rank-work_8923267", }); });</script></li><li class="js-percentile-work_8923267 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8923267; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8923267"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8923267 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8923267"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8923267; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8923267]").text(description); $(".js-view-count-work_8923267").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8923267").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8923267"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="208" href="https://www.academia.edu/Documents/in/Social_Movements">Social Movements</a>,&nbsp;<script data-card-contents-for-ri="208" type="text/json">{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>,&nbsp;<script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="6831" href="https://www.academia.edu/Documents/in/Securitization">Securitization</a><script data-card-contents-for-ri="6831" type="text/json">{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8923267]'), work: {"id":8923267,"title":"How Cheap Is Identity Talk?— A Framework of Identity Frames and Security Discourse for the Analysis of Repression and Legitimization of Social Movements in Mainland China","created_at":"2014-10-23T01:37:27.250-07:00","owner_id":19692650,"url":"https://www.academia.edu/8923267/How_Cheap_Is_Identity_Talk_A_Framework_of_Identity_Frames_and_Security_Discourse_for_the_Analysis_of_Repression_and_Legitimization_of_Social_Movements_in_Mainland_China","slug":"How_Cheap_Is_Identity_Talk_A_Framework_of_Identity_Frames_and_Security_Discourse_for_the_Analysis_of_Repression_and_Legitimization_of_Social_Movements_in_Mainland_China","dom_id":"work_8923267","summary":"This article approaches the repression and legitimization of mainland Chinese social movements through a framework that combines the theories of identity frames and securitization. Using the Democracy Wall movement of 1978-81 and the Student Democracy Movement of 1989 as its cases, the article shows how various identity frames, which both the movements and the authorities produce in their interactions, can be seen as attempts both to legitimize protest and make it illegitimate through security discourse. This combination provides a framework which can be used to analyze and conceptualize the interaction between protest movements and authorities that has been lacking in studies on Chinese protest even though there is extensive research on the subject.","publication":"Issues \u0026 Studies","publication_with_fallback":"Issues \u0026 Studies","downloadable_attachments":[{"id":35247336,"asset_id":8923267,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247336/vuori_paltemaa200647-86.PDF?1414053280=\u0026response-content-disposition=attachment%3B+filename%3DHow_Cheap_Is_Identity_Talk_A_Framework_o.pdf\u0026Expires=1731077639\u0026Signature=aWAmvUyKXVRSlMZ7ebdk3B7CPIvCEhSBUB8Oyx6-Kqy2TraEO5HIHXC9u3VHzQrPESDQLejQQlLjHLx1buZzkzXlCF5dXhcGD3bj9-ApJDUsaWTA62EBJworttOoa0ikE9GxIIKVu2O4gThnGySni~pJSG6avkP4WHk45aO7oDtIDxO9mCrO16VKcHcTr5EDEQhK2oVdSK~4S7gVxWmIv4LjfY9JK2Ee~QeRwsMH32UjnoVWzob7ENdpZD4VmT6kP6JDz3exQ1miI1oxd7vzjwDqbEgyvmw37BfBGwTiJIoHn-rUJDGEHr883c8GRi04P3t307ixNqFbqei7weEjzw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247336/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247336/mini_magick20190316-4723-adzdap.png?1552769013"}],"downloadable_attachments_with_full_thumbnails":[{"id":35247336,"asset_id":8923267,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247336/vuori_paltemaa200647-86.PDF?1414053280=\u0026response-content-disposition=attachment%3B+filename%3DHow_Cheap_Is_Identity_Talk_A_Framework_o.pdf\u0026Expires=1731077639\u0026Signature=aWAmvUyKXVRSlMZ7ebdk3B7CPIvCEhSBUB8Oyx6-Kqy2TraEO5HIHXC9u3VHzQrPESDQLejQQlLjHLx1buZzkzXlCF5dXhcGD3bj9-ApJDUsaWTA62EBJworttOoa0ikE9GxIIKVu2O4gThnGySni~pJSG6avkP4WHk45aO7oDtIDxO9mCrO16VKcHcTr5EDEQhK2oVdSK~4S7gVxWmIv4LjfY9JK2Ee~QeRwsMH32UjnoVWzob7ENdpZD4VmT6kP6JDz3exQ1miI1oxd7vzjwDqbEgyvmw37BfBGwTiJIoHn-rUJDGEHr883c8GRi04P3t307ixNqFbqei7weEjzw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247336/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247336/mini_magick20190316-4723-adzdap.png?1552769013"}],"has_pdf":true,"has_fulltext":true,"page_count":40,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"},{"id":33607776,"first_name":"Lauri","last_name":"Paltemaa","domain_name":"utu","page_name":"LauriPaltemaa","display_name":"Lauri Paltemaa","profile_url":"https://utu.academia.edu/LauriPaltemaa","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations","nofollow":false},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false},{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization"},{"id":20602,"name":"China studies","url":"https://www.academia.edu/Documents/in/China_studies"},{"id":642231,"name":"Tiananmen Square Protest in 1989","url":"https://www.academia.edu/Documents/in/Tiananmen_Square_Protest_in_1989"}],"publication_year":2006,"publication_year_with_fallback":2006,"paper_rank":null,"all_time_views":220,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8923407" data-work_id="8923407" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8923407/Turvallisuudesta_uhkantorjuntaan_K%C3%A4sitteen_k%C3%A4%C3%A4nt%C3%B6puolen_pohdintaa">Turvallisuudesta uhkantorjuntaan: Käsitteen kääntöpuolen pohdintaa</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Suuri osa suomalaisesta kansainvälisen politiikan ja rauhantutkimuksen keskustelusta on lähtöisin kansainvälisistä lähteistä. Tämä on ymmärrettävää, sillä merkittävimmät keskustelut käydään kansainvälisesti ja suomalainen kollegapiiri on... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8923407" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Suuri osa suomalaisesta kansainvälisen politiikan ja rauhantutkimuksen keskustelusta on lähtöisin kansainvälisistä lähteistä. Tämä on ymmärrettävää, sillä merkittävimmät keskustelut käydään kansainvälisesti ja suomalainen kollegapiiri on varsin rajallinen. Keskustelujen Suomeen tuomisessa on kuitenkin monesti ongelmana, että käytetyt <br />abstraktit käsitteet eivät käänny sujuvasti suomeksi. Seurauksena on <br />erikoisilta kuulostavia anglisismeja, jotka jättävät usein merkityksensä <br />arvailujen varaan ilman laajaa perehtymistä alan kansainväliseen kirjallisuuteen. <br />Tämä vaikeuttaa tutkimuksen popularisointia [sic].</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8923407" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c804ec2c6b3430deaa69a59a90ffb8a6" rel="nofollow" data-download="{&quot;attachment_id&quot;:35247444,&quot;asset_id&quot;:8923407,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35247444/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_8923407 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8923407"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8923407, container: ".js-paper-rank-work_8923407", }); });</script></li><li class="js-percentile-work_8923407 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8923407; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8923407"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8923407 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8923407"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8923407; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8923407]").text(description); $(".js-view-count-work_8923407").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8923407").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8923407"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>,&nbsp;<script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1028864" href="https://www.academia.edu/Documents/in/Turvallisuus">Turvallisuus</a><script data-card-contents-for-ri="1028864" type="text/json">{"id":1028864,"name":"Turvallisuus","url":"https://www.academia.edu/Documents/in/Turvallisuus","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8923407]'), work: {"id":8923407,"title":"Turvallisuudesta uhkantorjuntaan: Käsitteen kääntöpuolen pohdintaa","created_at":"2014-10-23T01:43:37.575-07:00","owner_id":19692650,"url":"https://www.academia.edu/8923407/Turvallisuudesta_uhkantorjuntaan_K%C3%A4sitteen_k%C3%A4%C3%A4nt%C3%B6puolen_pohdintaa","slug":"Turvallisuudesta_uhkantorjuntaan_Käsitteen_kääntöpuolen_pohdintaa","dom_id":"work_8923407","summary":"Suuri osa suomalaisesta kansainvälisen politiikan ja rauhantutkimuksen keskustelusta on lähtöisin kansainvälisistä lähteistä. Tämä on ymmärrettävää, sillä merkittävimmät keskustelut käydään kansainvälisesti ja suomalainen kollegapiiri on varsin rajallinen. Keskustelujen Suomeen tuomisessa on kuitenkin monesti ongelmana, että käytetyt\r\nabstraktit käsitteet eivät käänny sujuvasti suomeksi. Seurauksena on\r\nerikoisilta kuulostavia anglisismeja, jotka jättävät usein merkityksensä\r\narvailujen varaan ilman laajaa perehtymistä alan kansainväliseen kirjallisuuteen.\r\nTämä vaikeuttaa tutkimuksen popularisointia [sic].","publication":"Kosmopolis","publication_with_fallback":"Kosmopolis","downloadable_attachments":[{"id":35247444,"asset_id":8923407,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247444/Vuori2005-libre.pdf?1414054441=\u0026response-content-disposition=attachment%3B+filename%3DTurvallisuudesta_uhkantorjuntaan_Kasitte.pdf\u0026Expires=1729633640\u0026Signature=WBg6DStFcuMD6l1gue~Xoqiv4IrTtX25fbf34HPZUjRxznMTnx7m5oLznZgsVCtOHXrzHov~Y-pvMR-Zx4DiCs4U72v8s1zMXK3fEr8Jp26uHT2r5rXpegSpD9scGEUyGAaNOmf~RFyoR7vUlfx8VoIAhhhSXIazQndWv1q8JQJrH8vSIfn1o1iOVLccxjWgND9mzlYzEAxrEoyer1gnIs24lrJx-9DxVxs9Xesng1FH7iAoLYB6oGwRDDwAzY~llaykYaK8Ykm-SExYuAiB7tng3fykJWjm1N8GIJgEKgDOD41xu9zL4~uQYko3CVOokX~ZBqUwqpQadJPVMY7kvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247444/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247444/mini_magick20190316-4711-kq6s84.png?1552768889"}],"downloadable_attachments_with_full_thumbnails":[{"id":35247444,"asset_id":8923407,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247444/Vuori2005-libre.pdf?1414054441=\u0026response-content-disposition=attachment%3B+filename%3DTurvallisuudesta_uhkantorjuntaan_Kasitte.pdf\u0026Expires=1729633640\u0026Signature=WBg6DStFcuMD6l1gue~Xoqiv4IrTtX25fbf34HPZUjRxznMTnx7m5oLznZgsVCtOHXrzHov~Y-pvMR-Zx4DiCs4U72v8s1zMXK3fEr8Jp26uHT2r5rXpegSpD9scGEUyGAaNOmf~RFyoR7vUlfx8VoIAhhhSXIazQndWv1q8JQJrH8vSIfn1o1iOVLccxjWgND9mzlYzEAxrEoyer1gnIs24lrJx-9DxVxs9Xesng1FH7iAoLYB6oGwRDDwAzY~llaykYaK8Ykm-SExYuAiB7tng3fykJWjm1N8GIJgEKgDOD41xu9zL4~uQYko3CVOokX~ZBqUwqpQadJPVMY7kvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247444/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247444/mini_magick20190316-4711-kq6s84.png?1552768889"}],"has_pdf":true,"has_fulltext":true,"page_count":6,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies","nofollow":false},{"id":1028864,"name":"Turvallisuus","url":"https://www.academia.edu/Documents/in/Turvallisuus","nofollow":false}],"publication_year":2005,"publication_year_with_fallback":2005,"paper_rank":null,"all_time_views":184,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8923430" data-work_id="8923430" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8923430/Turvallistaminen_totalitaarisessa_poliittisessa_j%C3%A4rjestelm%C3%A4ss%C3%A4_Makrotason_mallin_ja_mikrotason_analyysin_yhdist%C3%A4misest%C3%A4">Turvallistaminen totalitaarisessa poliittisessa järjestelmässä –Makrotason mallin ja mikrotason analyysin yhdistämisestä</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Tässä artikkelissa ehdotetaan Ole Wæverin turvallistamisteorian2 ja Sujian Guon totalitaaristen poliittisten järjestelmien mallin3 yhdistämistä totalitaaristen poliittisten reaalijärjestelmien luonteen mahdollisen muutoksen arvioinnin... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8923430" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Tässä artikkelissa ehdotetaan Ole Wæverin turvallistamisteorian2 <br />ja Sujian Guon totalitaaristen poliittisten järjestelmien mallin3 yhdistämistä <br />totalitaaristen poliittisten reaalijärjestelmien luonteen <br />mahdollisen muutoksen arvioinnin työkaluksi; Guon makromallin <br />rakenneanalyysi ohjaisi totalitaaristen järjestelmien4 “kovan ytimen” <br />elementtien turvallistamisen mikrotason analyysia tässä <br />lähestymistavassa. Ajatuksena on, että reaalijärjestelmissä turvallistamista <br />ja turvallisuusuhkien sosiaalista rakentamista hyödynnetään <br />totalitaarisen järjestelmän “suojavyöllä” olevien “toimintakeinojen” <br />kohteiden määrittämisessä ja maalintamisessa, mikä <br />mahdollistaa järjestelmän ydinarvojen ja niiden uhkien arvioinnin <br />tämän turvallistamisprosessin analyysin kautta. Näiden lähestymistapojen <br />hypoteesina on, että mikäli turvallistamisprosessissa <br />turvallisuuden viitekohteena on totalitaarisen järjestelmän kovan <br />ytimen elementtejä, analyysi viittaisi järjestelmän totalitaarisen <br />luonteen säilymiseen. Jos taas totalitaarisen järjestelmän ydinarvoja <br />ei enää turvallisteta, analyysi viittaisi järjestelmän heikkenemiseen <br />tai jopa järjestelmämuutokseen.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8923430" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="91cde47a910a8fe86a8c268f9c9019b7" rel="nofollow" data-download="{&quot;attachment_id&quot;:35247481,&quot;asset_id&quot;:8923430,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35247481/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_8923430 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8923430"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8923430, container: ".js-paper-rank-work_8923430", }); });</script></li><li class="js-percentile-work_8923430 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8923430; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8923430"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8923430 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8923430"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8923430; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8923430]").text(description); $(".js-view-count-work_8923430").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8923430").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8923430"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="6831" href="https://www.academia.edu/Documents/in/Securitization">Securitization</a>,&nbsp;<script data-card-contents-for-ri="6831" type="text/json">{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="15389" href="https://www.academia.edu/Documents/in/Copenhagen_School_Securitization">Copenhagen School/Securitization</a><script data-card-contents-for-ri="15389" type="text/json">{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8923430]'), work: {"id":8923430,"title":"Turvallistaminen totalitaarisessa poliittisessa järjestelmässä –Makrotason mallin ja mikrotason analyysin yhdistämisestä","created_at":"2014-10-23T01:45:49.482-07:00","owner_id":19692650,"url":"https://www.academia.edu/8923430/Turvallistaminen_totalitaarisessa_poliittisessa_j%C3%A4rjestelm%C3%A4ss%C3%A4_Makrotason_mallin_ja_mikrotason_analyysin_yhdist%C3%A4misest%C3%A4","slug":"Turvallistaminen_totalitaarisessa_poliittisessa_järjestelmässä_Makrotason_mallin_ja_mikrotason_analyysin_yhdistämisestä","dom_id":"work_8923430","summary":"Tässä artikkelissa ehdotetaan Ole Wæverin turvallistamisteorian2\r\nja Sujian Guon totalitaaristen poliittisten järjestelmien mallin3 yhdistämistä\r\ntotalitaaristen poliittisten reaalijärjestelmien luonteen\r\nmahdollisen muutoksen arvioinnin työkaluksi; Guon makromallin\r\nrakenneanalyysi ohjaisi totalitaaristen järjestelmien4 “kovan ytimen”\r\nelementtien turvallistamisen mikrotason analyysia tässä\r\nlähestymistavassa. Ajatuksena on, että reaalijärjestelmissä turvallistamista\r\nja turvallisuusuhkien sosiaalista rakentamista hyödynnetään\r\ntotalitaarisen järjestelmän “suojavyöllä” olevien “toimintakeinojen”\r\nkohteiden määrittämisessä ja maalintamisessa, mikä\r\nmahdollistaa järjestelmän ydinarvojen ja niiden uhkien arvioinnin\r\ntämän turvallistamisprosessin analyysin kautta. Näiden lähestymistapojen\r\nhypoteesina on, että mikäli turvallistamisprosessissa\r\nturvallisuuden viitekohteena on totalitaarisen järjestelmän kovan\r\nytimen elementtejä, analyysi viittaisi järjestelmän totalitaarisen\r\nluonteen säilymiseen. Jos taas totalitaarisen järjestelmän ydinarvoja\r\nei enää turvallisteta, analyysi viittaisi järjestelmän heikkenemiseen\r\ntai jopa järjestelmämuutokseen.","publication":"Kosmopolis","publication_with_fallback":"Kosmopolis","downloadable_attachments":[{"id":35247481,"asset_id":8923430,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247481/Vuori2004-libre.pdf?1414054439=\u0026response-content-disposition=attachment%3B+filename%3DTurvallistaminen_totalitaarisessa_poliit.pdf\u0026Expires=1729573033\u0026Signature=TLu12OgosP-Fx6WdGWDI85chPpNhRet6bEENB8e4pJL3SyfDNTsUPnOmNZpIO5-B4yyk1V9B8DAVLQRgSfySCDxYs7oLQtrnfJHg4lYvfsHaV9q2BRVtyom6RfyocFHU8KwSrv6sl8ReMHRzGbERAwkKLYgk2dR~WVpBe0O0~9PZq4Tz1r-CMOvF0pmXWKuEDYEe0JdKa-ZxW2QQjyclu72uTxfcymrnH7kKDqjVHrxiLaGOq7~hpCvG2BgZk00xRqjpNJ2iaSmVQBHrb9sTPzE4MztiBlvycFSfslauZME5-4Mmm2aTtAucrSt7Ty~1zpXPzVpYEez5-q2XcXJllQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247481/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247481/mini_magick20180818-9186-tkjaf3.png?1534625819"}],"downloadable_attachments_with_full_thumbnails":[{"id":35247481,"asset_id":8923430,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247481/Vuori2004-libre.pdf?1414054439=\u0026response-content-disposition=attachment%3B+filename%3DTurvallistaminen_totalitaarisessa_poliit.pdf\u0026Expires=1729573033\u0026Signature=TLu12OgosP-Fx6WdGWDI85chPpNhRet6bEENB8e4pJL3SyfDNTsUPnOmNZpIO5-B4yyk1V9B8DAVLQRgSfySCDxYs7oLQtrnfJHg4lYvfsHaV9q2BRVtyom6RfyocFHU8KwSrv6sl8ReMHRzGbERAwkKLYgk2dR~WVpBe0O0~9PZq4Tz1r-CMOvF0pmXWKuEDYEe0JdKa-ZxW2QQjyclu72uTxfcymrnH7kKDqjVHrxiLaGOq7~hpCvG2BgZk00xRqjpNJ2iaSmVQBHrb9sTPzE4MztiBlvycFSfslauZME5-4Mmm2aTtAucrSt7Ty~1zpXPzVpYEez5-q2XcXJllQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247481/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247481/mini_magick20180818-9186-tkjaf3.png?1534625819"}],"has_pdf":true,"has_fulltext":true,"page_count":25,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization","nofollow":false}],"publication_year":2004,"publication_year_with_fallback":2004,"paper_rank":null,"all_time_views":525,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8923464" data-work_id="8923464" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8923464/Massakulttuuri_ja_ulkopoliittinen_ideologia_Ylev%C3%A4n_kohtaaminen_kolmessa_9_11_n_j%C3%A4lkeisess%C3%A4_avaruusoopperassa">Massakulttuuri ja ulkopoliittinen ideologia: Ylevän kohtaaminen kolmessa 9/11:n jälkeisessä avaruusoopperassa</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Kansainvälisten suhteiden tutkimus on viimeisen vuosikymmenen aikana osoittanut lisääntynyttä kiinnostusta kulttuuria kohtaan. Niin identiteetit kuin kulttuurien väliset konfliktit ovat jo osa valtavirran keskustelua kansainvälisistä... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8923464" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Kansainvälisten suhteiden tutkimus on viimeisen vuosikymmenen <br />aikana osoittanut lisääntynyttä kiinnostusta <br />kulttuuria kohtaan. Niin identiteetit kuin kulttuurien väliset <br />konfliktit ovat jo osa valtavirran keskustelua kansainvälisistä <br />suhteista. Kulttuurin rooli kansainvälisen politiikan <br />sosiaalistumisprosessissa on kuitenkin jäänyt vähemmälle <br />huomiolle. Mikä on massakulttuurin rooli ulkopolitiikan ja <br />kansainvälisen järjestelmän ymmärtämisen muodostumisessa? <br />Niin sanotun kansainvälisen politiikan tutkimuksen <br />esteettisen käänteen lähtökohtaisena ajatuksena on, että <br />massakulttuuri yhtäältä heijastaa vallitsevaa ulkopoliittista <br />ideologiaa, mutta samalla ylläpitää ja vahvistaa sitä. <br />Massakulttuuri toistaa samoja tarinoita ja malleja kuin ulkopoliittinen <br />puhe, samalla kun poliitikot viittaavat massakulttuurin <br />ilmiöihin ja siinä esiintyviin representaatioihin. <br />Massakulttuuri ja ulkopolitiikka siis muodostavat intertekstin. <br />Ylevän käsitettä on käytetty viime aikoina tämän <br />intertekstin analysoimisen aloituskohtana. Myös tässä esityksessä <br />tarkastellaan ylevän kohtaamisia kolmessa 9/11:n <br />jälkeisessä tieteisfiktiotelevisiosarjassa (Star Trek: Enterprise, <br />Farscape: Peacekeeper Wars ja Battlestar Galactica), joita <br />verrataan Yhdysvaltojen ulkopoliittisesta käytöksestä luettavaan <br />ideologiaan.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8923464" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6c3772d9e0e05db11df9df89a14f847f" rel="nofollow" data-download="{&quot;attachment_id&quot;:35247525,&quot;asset_id&quot;:8923464,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35247525/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_8923464 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8923464"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8923464, container: ".js-paper-rank-work_8923464", }); });</script></li><li class="js-percentile-work_8923464 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8923464; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8923464"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8923464 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8923464"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8923464; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8923464]").text(description); $(".js-view-count-work_8923464").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8923464").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8923464"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="55361" href="https://www.academia.edu/Documents/in/Popular_Culture_and_World_Politics">Popular Culture and World Politics</a><script data-card-contents-for-ri="55361" type="text/json">{"id":55361,"name":"Popular Culture and World Politics","url":"https://www.academia.edu/Documents/in/Popular_Culture_and_World_Politics","nofollow":false}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8923464]'), work: {"id":8923464,"title":"Massakulttuuri ja ulkopoliittinen ideologia: Ylevän kohtaaminen kolmessa 9/11:n jälkeisessä avaruusoopperassa","created_at":"2014-10-23T01:49:31.664-07:00","owner_id":19692650,"url":"https://www.academia.edu/8923464/Massakulttuuri_ja_ulkopoliittinen_ideologia_Ylev%C3%A4n_kohtaaminen_kolmessa_9_11_n_j%C3%A4lkeisess%C3%A4_avaruusoopperassa","slug":"Massakulttuuri_ja_ulkopoliittinen_ideologia_Ylevän_kohtaaminen_kolmessa_9_11_n_jälkeisessä_avaruusoopperassa","dom_id":"work_8923464","summary":"Kansainvälisten suhteiden tutkimus on viimeisen vuosikymmenen\r\naikana osoittanut lisääntynyttä kiinnostusta\r\nkulttuuria kohtaan. Niin identiteetit kuin kulttuurien väliset\r\nkonfliktit ovat jo osa valtavirran keskustelua kansainvälisistä\r\nsuhteista. Kulttuurin rooli kansainvälisen politiikan\r\nsosiaalistumisprosessissa on kuitenkin jäänyt vähemmälle\r\nhuomiolle. Mikä on massakulttuurin rooli ulkopolitiikan ja\r\nkansainvälisen järjestelmän ymmärtämisen muodostumisessa?\r\nNiin sanotun kansainvälisen politiikan tutkimuksen\r\nesteettisen käänteen lähtökohtaisena ajatuksena on, että\r\nmassakulttuuri yhtäältä heijastaa vallitsevaa ulkopoliittista\r\nideologiaa, mutta samalla ylläpitää ja vahvistaa sitä.\r\nMassakulttuuri toistaa samoja tarinoita ja malleja kuin ulkopoliittinen\r\npuhe, samalla kun poliitikot viittaavat massakulttuurin\r\nilmiöihin ja siinä esiintyviin representaatioihin.\r\nMassakulttuuri ja ulkopolitiikka siis muodostavat intertekstin.\r\nYlevän käsitettä on käytetty viime aikoina tämän\r\nintertekstin analysoimisen aloituskohtana. Myös tässä esityksessä\r\ntarkastellaan ylevän kohtaamisia kolmessa 9/11:n\r\njälkeisessä tieteisfiktiotelevisiosarjassa (Star Trek: Enterprise,\r\nFarscape: Peacekeeper Wars ja Battlestar Galactica), joita\r\nverrataan Yhdysvaltojen ulkopoliittisesta käytöksestä luettavaan\r\nideologiaan.","publication":"Kosmopolis","publication_with_fallback":"Kosmopolis","downloadable_attachments":[{"id":35247525,"asset_id":8923464,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247525/Vuori2007-libre.pdf?1414054409=\u0026response-content-disposition=attachment%3B+filename%3DMassakulttuuri_ja_ulkopoliittinen_ideolo.pdf\u0026Expires=1732720151\u0026Signature=I~5MQHuFve8TVAnQuYH9itC~bOH9WDPZpFpCt4lwd-buQS9fJDT-704EJUsX07r1TMKkdQWdX3V2SRZiY9pT4-R1eaRpWgJ5fy9FApqa-o6Z38~go9dcNL2Viq-ritg26c82ahHAkS53AgI~gR4lGkmrK0NQ3PqXMuNA32F-hcs2WhhxTMe2BLWiRRFg3LkD4UzVkhYBHr6DTWSPxc5nLZKhcNKvO2sb7BXijc94~FNgYMJtIvULDO5-r6Mhu7dibUZmnRnC8DmY3LqEJk8FYddGEy1njrLFutJTgvc-PJH49gNrc-1ujZiLL3Wch8xGMedl6TlCWCmNBe4ujbM7EA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247525/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247525/mini_magick20190316-400-7sc6w2.png?1552768959"}],"downloadable_attachments_with_full_thumbnails":[{"id":35247525,"asset_id":8923464,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247525/Vuori2007-libre.pdf?1414054409=\u0026response-content-disposition=attachment%3B+filename%3DMassakulttuuri_ja_ulkopoliittinen_ideolo.pdf\u0026Expires=1732720151\u0026Signature=I~5MQHuFve8TVAnQuYH9itC~bOH9WDPZpFpCt4lwd-buQS9fJDT-704EJUsX07r1TMKkdQWdX3V2SRZiY9pT4-R1eaRpWgJ5fy9FApqa-o6Z38~go9dcNL2Viq-ritg26c82ahHAkS53AgI~gR4lGkmrK0NQ3PqXMuNA32F-hcs2WhhxTMe2BLWiRRFg3LkD4UzVkhYBHr6DTWSPxc5nLZKhcNKvO2sb7BXijc94~FNgYMJtIvULDO5-r6Mhu7dibUZmnRnC8DmY3LqEJk8FYddGEy1njrLFutJTgvc-PJH49gNrc-1ujZiLL3Wch8xGMedl6TlCWCmNBe4ujbM7EA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247525/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247525/mini_magick20190316-400-7sc6w2.png?1552768959"}],"has_pdf":true,"has_fulltext":true,"page_count":18,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":55361,"name":"Popular Culture and World Politics","url":"https://www.academia.edu/Documents/in/Popular_Culture_and_World_Politics","nofollow":false}],"publication_year":2007,"publication_year_with_fallback":2007,"paper_rank":null,"all_time_views":52,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8950765" data-work_id="8950765" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8950765/Visuality">Visuality</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Visuals matter to socio-political analysis, and they do so in a categorically different way than words. Sight, or the act of seeing, is one of the key human senses and thereby ‘visuality’, either in the form of rendering visible,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8950765" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Visuals matter to socio-political analysis, and they do so in a categorically different way than words. Sight, or the act of seeing, is one of the key human senses and thereby ‘visuality’, either in the form of rendering visible, invisible, or visible in particular ways, is a vital part of most forms of representation. Visuality – both as ‘ways of seeing’, and in the form of the artefacts produced through them (such as still or moving images, signs, symbols, charts, graphs, sculptures and so on) – plays a central role in numerous manifestations of security practices. Yet, the vast majority of works in critical approaches to security have focused on the verbal and the written rather than the visual as the modality through which security can be analysed. In other words, critical reflection on visuality and the uses of visuals is still relatively limited within the critical security studies literature. This is understandable, in that the study of visual objects and signs eventually encounters the limits of language (Barthes 1973: 9). Visual aspects of meaning making and discourse have properties that discourse analysis of written or spoken artefacts cannot reach. Indeed, to get a comprehensive grasp of meaning on the one hand and practice on the other, critical scholars of security need to engage visual modalities in addition to verbal or written ones (cf. Williams 2003, McDonald 2008).</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8950765" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a255a27d6e551fd4799b340c888955d7" rel="nofollow" data-download="{&quot;attachment_id&quot;:35280048,&quot;asset_id&quot;:8950765,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35280048/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_8950765 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8950765"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8950765, container: ".js-paper-rank-work_8950765", }); });</script></li><li class="js-percentile-work_8950765 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8950765; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8950765"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8950765 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8950765"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8950765; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8950765]").text(description); $(".js-view-count-work_8950765").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8950765").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8950765"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2065" href="https://www.academia.edu/Documents/in/Research_Methodology">Research Methodology</a>,&nbsp;<script data-card-contents-for-ri="2065" type="text/json">{"id":2065,"name":"Research Methodology","url":"https://www.academia.edu/Documents/in/Research_Methodology","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4399" href="https://www.academia.edu/Documents/in/Visual_Semiotics">Visual Semiotics</a>,&nbsp;<script data-card-contents-for-ri="4399" type="text/json">{"id":4399,"name":"Visual Semiotics","url":"https://www.academia.edu/Documents/in/Visual_Semiotics","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>,&nbsp;<script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="5535" href="https://www.academia.edu/Documents/in/Critical_Security_Studies">Critical Security Studies</a><script data-card-contents-for-ri="5535" type="text/json">{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8950765]'), work: {"id":8950765,"title":"Visuality","created_at":"2014-10-24T22:17:12.176-07:00","owner_id":19692650,"url":"https://www.academia.edu/8950765/Visuality","slug":"Visuality","dom_id":"work_8950765","summary":"Visuals matter to socio-political analysis, and they do so in a categorically different way than words. Sight, or the act of seeing, is one of the key human senses and thereby ‘visuality’, either in the form of rendering visible, invisible, or visible in particular ways, is a vital part of most forms of representation. Visuality – both as ‘ways of seeing’, and in the form of the artefacts produced through them (such as still or moving images, signs, symbols, charts, graphs, sculptures and so on) – plays a central role in numerous manifestations of security practices. Yet, the vast majority of works in critical approaches to security have focused on the verbal and the written rather than the visual as the modality through which security can be analysed. In other words, critical reflection on visuality and the uses of visuals is still relatively limited within the critical security studies literature. This is understandable, in that the study of visual objects and signs eventually encounters the limits of language (Barthes 1973: 9). Visual aspects of meaning making and discourse have properties that discourse analysis of written or spoken artefacts cannot reach. Indeed, to get a comprehensive grasp of meaning on the one hand and practice on the other, critical scholars of security need to engage visual modalities in addition to verbal or written ones (cf. Williams 2003, McDonald 2008).","publication":"Critical Security Methods: New Frameworks for Analysis","publication_with_fallback":"Critical Security Methods: New Frameworks for Analysis","downloadable_attachments":[{"id":35280048,"asset_id":8950765,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35280048/Critical_Security_Methods_flyer-libre.pdf?1414306367=\u0026response-content-disposition=attachment%3B+filename%3DVisuality.pdf\u0026Expires=1732720151\u0026Signature=ZxU9SYtgl4fhUB62WffBYK3-5~~JEl4lqer~xMPGYxAKINkkN8Z8AQHJtzI~ARBl7VD8hsZJRaar9oasvmDX6N~xfqETyoqkfwNIK115Iam9Cd9zWzA3T7fCQVg-QJh1f~A3ZV7~0CklfKAImfKrY2cATeKSSJBgGANV5PkO6gXZlt710EpEfQIVNgU5lAt7aHCSG4X5RD0B70rqNMpMbMFuu~r6v5S-InEqbazkL1qVVc5-Nd4f8dvMWkWtyYAfN9bvpeBwQlS72sLDQezCrwTVxbGbRgcMcDYOXLeeHdhU1Mc3WTbBKnplQIqSIpFCrv5wco6lRqG4HQvLIXRo6A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35280048/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35280048/mini_magick20190316-12052-1duxfvs.png?1552743851"}],"downloadable_attachments_with_full_thumbnails":[{"id":35280048,"asset_id":8950765,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35280048/Critical_Security_Methods_flyer-libre.pdf?1414306367=\u0026response-content-disposition=attachment%3B+filename%3DVisuality.pdf\u0026Expires=1732720151\u0026Signature=ZxU9SYtgl4fhUB62WffBYK3-5~~JEl4lqer~xMPGYxAKINkkN8Z8AQHJtzI~ARBl7VD8hsZJRaar9oasvmDX6N~xfqETyoqkfwNIK115Iam9Cd9zWzA3T7fCQVg-QJh1f~A3ZV7~0CklfKAImfKrY2cATeKSSJBgGANV5PkO6gXZlt710EpEfQIVNgU5lAt7aHCSG4X5RD0B70rqNMpMbMFuu~r6v5S-InEqbazkL1qVVc5-Nd4f8dvMWkWtyYAfN9bvpeBwQlS72sLDQezCrwTVxbGbRgcMcDYOXLeeHdhU1Mc3WTbBKnplQIqSIpFCrv5wco6lRqG4HQvLIXRo6A__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35280048/download_file?st=MTczMjcxNjU1MSw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35280048/mini_magick20190316-12052-1duxfvs.png?1552743851"}],"has_pdf":true,"has_fulltext":true,"page_count":2,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":2065,"name":"Research Methodology","url":"https://www.academia.edu/Documents/in/Research_Methodology","nofollow":false},{"id":4399,"name":"Visual Semiotics","url":"https://www.academia.edu/Documents/in/Visual_Semiotics","nofollow":false},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies","nofollow":false},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies","nofollow":false},{"id":22538,"name":"Visual Methodologies","url":"https://www.academia.edu/Documents/in/Visual_Methodologies"},{"id":1632326,"name":"Visual Securitization","url":"https://www.academia.edu/Documents/in/Visual_Securitization"}],"publication_year":2014,"publication_year_with_fallback":2014,"paper_rank":null,"all_time_views":142,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11196271" data-work_id="11196271" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/11196271/Strange_encounters_Past_present_and_future_conceivable_life">Strange encounters: Past, present, and future conceivable life</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In the present chapter, I examine three documentaries that consist of encounters with ‘strange’ others: North Korea in The Red Chapel (dir. Mads Brügger 2009),1 the Central African Republic in The Ambassador (dir. Mads Brügger 2011),2 and... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_11196271" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In the present chapter, I examine three documentaries that consist of encounters with ‘strange’ others: North Korea in The Red Chapel (dir. Mads Brügger 2009),1 the Central African Republic in The Ambassador (dir. Mads Brügger 2011),2 and future beings in Into Eternity: A Film for the Future (dir. Michael Madsen 2010).3 Of interest to me here is how these fairly recent Danish documentaries present the possibility of communication across ‘difference’ and how they produce social imaginaries of diplomacy. The focus is on the apprehension or conceivability of strange life: how do documentaries of distant communities – whether in terms of geographical, political, or temporal distance – apprehend or fail to apprehend life. To achieve this, I utilize two notions of Judith Butler’s (2006, 2010) in reading the films. First, how do the documentaries present ‘life’ when the subject matter is outside the sphere of the contemporary liberal-democratic order? Second, how does ‘temporality’ play into this? Can communication and recognition take place outside ‘our time’? Furthermore, how do documentaries merge into more general semiotic flows of signs and social imaginaries on the (im)possibility of communication with life beyond the documentarian’s norm? How are encounters with the strange imagined in terms of representation, representativeness, and mediation? These three films suggest that communication across strangeness and temporalities is difficult.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11196271" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7b7f11526cbca45ef774b742b231e72d" rel="nofollow" data-download="{&quot;attachment_id&quot;:36823508,&quot;asset_id&quot;:11196271,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36823508/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_11196271 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11196271"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11196271, container: ".js-paper-rank-work_11196271", }); });</script></li><li class="js-percentile-work_11196271 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11196271; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11196271"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11196271 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11196271"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11196271; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11196271]").text(description); $(".js-view-count-work_11196271").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11196271").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11196271"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3399" href="https://www.academia.edu/Documents/in/Documentary_Film_Studies_">Documentary (Film Studies)</a>,&nbsp;<script data-card-contents-for-ri="3399" type="text/json">{"id":3399,"name":"Documentary (Film Studies)","url":"https://www.academia.edu/Documents/in/Documentary_Film_Studies_","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="21512" href="https://www.academia.edu/Documents/in/Central_African_Republic_Politics">Central African Republic Politics</a>,&nbsp;<script data-card-contents-for-ri="21512" type="text/json">{"id":21512,"name":"Central African Republic Politics","url":"https://www.academia.edu/Documents/in/Central_African_Republic_Politics","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="21989" href="https://www.academia.edu/Documents/in/Social_Imaginaries">Social Imaginaries</a>,&nbsp;<script data-card-contents-for-ri="21989" type="text/json">{"id":21989,"name":"Social Imaginaries","url":"https://www.academia.edu/Documents/in/Social_Imaginaries","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="26655" href="https://www.academia.edu/Documents/in/Nuclear_Wastes_Management">Nuclear Wastes Management</a><script data-card-contents-for-ri="26655" type="text/json">{"id":26655,"name":"Nuclear Wastes Management","url":"https://www.academia.edu/Documents/in/Nuclear_Wastes_Management","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11196271]'), work: {"id":11196271,"title":"Strange encounters: Past, present, and future conceivable life","created_at":"2015-03-02T01:01:12.183-08:00","owner_id":19692650,"url":"https://www.academia.edu/11196271/Strange_encounters_Past_present_and_future_conceivable_life","slug":"Strange_encounters_Past_present_and_future_conceivable_life","dom_id":"work_11196271","summary":"In the present chapter, I examine three documentaries that consist of encounters with ‘strange’ others: North Korea in The Red Chapel (dir. Mads Brügger 2009),1 the Central African Republic in The Ambassador (dir. Mads Brügger 2011),2 and future beings in Into Eternity: A Film for the Future (dir. Michael Madsen 2010).3 Of interest to me here is how these fairly recent Danish documentaries present the possibility of communication across ‘difference’ and how they produce social imaginaries of diplomacy. The focus is on the apprehension or conceivability of strange life: how do documentaries of distant communities – whether in terms of geographical, political, or temporal distance – apprehend or fail to apprehend life. To achieve this, I utilize two notions of Judith Butler’s (2006, 2010) in reading the films. First, how do the documentaries present ‘life’ when the subject matter is outside the sphere of the contemporary liberal-democratic order? Second, how does ‘temporality’ play into this? Can communication and recognition take place outside ‘our time’? Furthermore, how do documentaries merge into more general semiotic flows of signs and social imaginaries on the (im)possibility of communication with life beyond the documentarian’s norm? How are encounters with the strange imagined in terms of representation, representativeness, and mediation? These three films suggest that communication across strangeness and temporalities is difficult.","publication":"Documenting World Politics: A Critical Companion to IR and Non-Fiction Film","publication_with_fallback":"Documenting World Politics: A Critical Companion to IR and Non-Fiction Film","downloadable_attachments":[{"id":36823508,"asset_id":11196271,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/36823508/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/36823508/Documenting_World_Politics_UK-libre.pdf?1425286969=\u0026response-content-disposition=attachment%3B+filename%3DStrange_encounters_Past_present_and_futu.pdf\u0026Expires=1732720151\u0026Signature=IZd-KoBf-QSy5MVuHs1EiBb1fig5R-PangpMQb8cwA4Iu1neqYliadNU7YlG7e3vZIrzFWDcsfz4IfE1~-KOgdVai6ctyFe31MLGoSwHOzyGT44aaJNyOrL~TivHefXOuqY3gIs2bktKlfvPwM7Vi8H4koPcQf~GmM3biaE634QKwaAD5zSKDUaybQ1h1uWc~O-TcN~m7qtO29dBD4gt7YyCOZIlfswp-~MYjNO5ubYNlp4ZBm8DIf9aUWjt0YpFVkSiPa23CnFxnlxTvuLYswLtTqjUvEUvLw1yixhEtJO3F6GCjSUI2z6tH2QHoHAlL613CIohu36eVjjQCxjLsQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/36823508/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/36823508/mini_magick20190306-15477-2k0i1r.png?1551925613"}],"downloadable_attachments_with_full_thumbnails":[{"id":36823508,"asset_id":11196271,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/36823508/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/36823508/Documenting_World_Politics_UK-libre.pdf?1425286969=\u0026response-content-disposition=attachment%3B+filename%3DStrange_encounters_Past_present_and_futu.pdf\u0026Expires=1732720151\u0026Signature=IZd-KoBf-QSy5MVuHs1EiBb1fig5R-PangpMQb8cwA4Iu1neqYliadNU7YlG7e3vZIrzFWDcsfz4IfE1~-KOgdVai6ctyFe31MLGoSwHOzyGT44aaJNyOrL~TivHefXOuqY3gIs2bktKlfvPwM7Vi8H4koPcQf~GmM3biaE634QKwaAD5zSKDUaybQ1h1uWc~O-TcN~m7qtO29dBD4gt7YyCOZIlfswp-~MYjNO5ubYNlp4ZBm8DIf9aUWjt0YpFVkSiPa23CnFxnlxTvuLYswLtTqjUvEUvLw1yixhEtJO3F6GCjSUI2z6tH2QHoHAlL613CIohu36eVjjQCxjLsQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/36823508/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/36823508/mini_magick20190306-15477-2k0i1r.png?1551925613"}],"has_pdf":true,"has_fulltext":true,"page_count":2,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":3399,"name":"Documentary (Film Studies)","url":"https://www.academia.edu/Documents/in/Documentary_Film_Studies_","nofollow":false},{"id":21512,"name":"Central African Republic Politics","url":"https://www.academia.edu/Documents/in/Central_African_Republic_Politics","nofollow":false},{"id":21989,"name":"Social Imaginaries","url":"https://www.academia.edu/Documents/in/Social_Imaginaries","nofollow":false},{"id":26655,"name":"Nuclear Wastes Management","url":"https://www.academia.edu/Documents/in/Nuclear_Wastes_Management","nofollow":false},{"id":31227,"name":"Cultural Diplomacy","url":"https://www.academia.edu/Documents/in/Cultural_Diplomacy"},{"id":55361,"name":"Popular Culture and World Politics","url":"https://www.academia.edu/Documents/in/Popular_Culture_and_World_Politics"},{"id":71057,"name":"North Korea (politics and society)","url":"https://www.academia.edu/Documents/in/North_Korea_politics_and_society_"},{"id":313371,"name":"Diplomacy and international relations","url":"https://www.academia.edu/Documents/in/Diplomacy_and_international_relations"}],"publication_year":2015,"publication_year_with_fallback":2015,"paper_rank":null,"all_time_views":49,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_14657903 coauthored" data-work_id="14657903" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/14657903/Regime_Transition_and_the_Chinese_Politics_of_Technology_From_Mass_Science_to_the_Controlled_Internet">Regime Transition and the Chinese Politics of Technology: From Mass Science to the Controlled Internet</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The article employs the concepts of the politics of technology and regime transition for analysing the connection between political power and the application of technology in contemporary Chinese history. Examining the Maoist policy of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_14657903" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The article employs the concepts of the politics of technology and regime transition for analysing the connection between political power and the application of technology in contemporary Chinese history. Examining the Maoist policy of ‘mass science’ and the contemporary Chinese Communist Party (CCP) policies on information and communication technologies, and Internet control, shows how regime-determined policy goals, namely social transformation</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/14657903" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fa3be6983f1695e1156f8ff195c3c261" rel="nofollow" data-download="{&quot;attachment_id&quot;:58041414,&quot;asset_id&quot;:14657903,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58041414/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-14657903">+1</span><div class="hidden js-additional-users-14657903"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://utu.academia.edu/LauriPaltemaa">Lauri Paltemaa</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-14657903'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-14657903').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_14657903 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="14657903"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 14657903, container: ".js-paper-rank-work_14657903", }); });</script></li><li class="js-percentile-work_14657903 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 14657903; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_14657903"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_14657903 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="14657903"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 14657903; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=14657903]").text(description); $(".js-view-count-work_14657903").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_14657903").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="14657903"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>,&nbsp;<script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>,&nbsp;<script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="16416" href="https://www.academia.edu/Documents/in/Internet_and_Society">Internet &amp; Society</a>,&nbsp;<script data-card-contents-for-ri="16416" type="text/json">{"id":16416,"name":"Internet \u0026 Society","url":"https://www.academia.edu/Documents/in/Internet_and_Society","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="18814" href="https://www.academia.edu/Documents/in/Information_and_Communication_technology-1">Information and Communication technology</a><script data-card-contents-for-ri="18814" type="text/json">{"id":18814,"name":"Information and Communication technology","url":"https://www.academia.edu/Documents/in/Information_and_Communication_technology-1","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=14657903]'), work: {"id":14657903,"title":"Regime Transition and the Chinese Politics of Technology: From Mass Science to the Controlled Internet","created_at":"2015-08-04T09:51:54.908-07:00","owner_id":33607776,"url":"https://www.academia.edu/14657903/Regime_Transition_and_the_Chinese_Politics_of_Technology_From_Mass_Science_to_the_Controlled_Internet","slug":"Regime_Transition_and_the_Chinese_Politics_of_Technology_From_Mass_Science_to_the_Controlled_Internet","dom_id":"work_14657903","summary":"The article employs the concepts of the politics of technology and regime transition for analysing the connection between political power and the application of technology in contemporary Chinese history. Examining the Maoist policy of ‘mass science’ and the contemporary Chinese Communist Party (CCP) policies on information and communication technologies, and Internet control, shows how regime-determined policy goals, namely social transformation","publication":"Asian Journal of Political Science","publication_with_fallback":"Asian Journal of Political Science","downloadable_attachments":[{"id":58041414,"asset_id":14657903,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/58041414/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/58041414/Regime_Transition_and_the_Chinese_Politics_of_Technology_AJPS-libre.pdf?1545407420=\u0026response-content-disposition=attachment%3B+filename%3DRegime_Transition_and_the_Chinese_Politi.pdf\u0026Expires=1732257891\u0026Signature=HwmpNFfnxk-QBkguL~34bm523DhSjF2-9jX08KSrHQGeH~H0FPXN5OtgNzdM1QWK7Gw5hkeU1QfdPQ0Ns85V8irxmq762OXrTv3wuHalPCCISnp0VNE42mTKMoyrmXwa~COIVu33dVYejHkcNaBuQXkYzUNzD1E6EhOjwqrxVUspWb4U4tkto4TRi5OY3OZwgQGpfKSTaXDHYTmTOxS8VQrAZBVWFWejfCxpI8GrpY3~NZtyjfNHJcU8rJgzmzoqy1KGwX0w5A5m-X8H5Yb0GXyO5z8TNu8Z~mYS8ZGPtppNnrff9l8nyRmAEcfY6n-nrFrCxo21xP2wHyLJVZFdkw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/58041414/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/58041414/mini_magick20181221-21395-a35ium.png?1545395615"}],"downloadable_attachments_with_full_thumbnails":[{"id":58041414,"asset_id":14657903,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/58041414/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/58041414/Regime_Transition_and_the_Chinese_Politics_of_Technology_AJPS-libre.pdf?1545407420=\u0026response-content-disposition=attachment%3B+filename%3DRegime_Transition_and_the_Chinese_Politi.pdf\u0026Expires=1732257891\u0026Signature=HwmpNFfnxk-QBkguL~34bm523DhSjF2-9jX08KSrHQGeH~H0FPXN5OtgNzdM1QWK7Gw5hkeU1QfdPQ0Ns85V8irxmq762OXrTv3wuHalPCCISnp0VNE42mTKMoyrmXwa~COIVu33dVYejHkcNaBuQXkYzUNzD1E6EhOjwqrxVUspWb4U4tkto4TRi5OY3OZwgQGpfKSTaXDHYTmTOxS8VQrAZBVWFWejfCxpI8GrpY3~NZtyjfNHJcU8rJgzmzoqy1KGwX0w5A5m-X8H5Yb0GXyO5z8TNu8Z~mYS8ZGPtppNnrff9l8nyRmAEcfY6n-nrFrCxo21xP2wHyLJVZFdkw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/58041414/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/58041414/mini_magick20181221-21395-a35ium.png?1545395615"}],"has_pdf":true,"has_fulltext":true,"page_count":42,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"},{"id":33607776,"first_name":"Lauri","last_name":"Paltemaa","domain_name":"utu","page_name":"LauriPaltemaa","display_name":"Lauri Paltemaa","profile_url":"https://utu.academia.edu/LauriPaltemaa","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies","nofollow":false},{"id":16416,"name":"Internet \u0026 Society","url":"https://www.academia.edu/Documents/in/Internet_and_Society","nofollow":false},{"id":18814,"name":"Information and Communication technology","url":"https://www.academia.edu/Documents/in/Information_and_Communication_technology-1","nofollow":false},{"id":20602,"name":"China studies","url":"https://www.academia.edu/Documents/in/China_studies"},{"id":123951,"name":"Political Power","url":"https://www.academia.edu/Documents/in/Political_Power"},{"id":150548,"name":"Chinese Communist Party","url":"https://www.academia.edu/Documents/in/Chinese_Communist_Party"}],"publication_year":2009,"publication_year_with_fallback":2009,"paper_rank":null,"all_time_views":68,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_14683822" data-work_id="14683822" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/14683822/Tiedonintressit_ja_teorioiden_k%C3%A4yt%C3%A4nn%C3%B6llisen_arvon_perusta_kansainv%C3%A4listen_suhteiden_tutkimuksessa">Tiedonintressit ja teorioiden käytännöllisen arvon perusta kansainvälisten suhteiden tutkimuksessa</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Lähden tässä luvussa liikkeelle siitä, että tiede on tavoit- teellista toimintaa. Ilkka Niiniluodon (2000, 60) tavoin voidaan todeta, että tieteen metodit ovat keinoja tieteen päämäärien saavuttamiseksi. Niin tieteen tavoitteet kuin... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_14683822" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Lähden tässä luvussa liikkeelle siitä, että tiede on tavoit- <br />teellista toimintaa. Ilkka Niiniluodon (2000, 60) tavoin <br />voidaan todeta, että tieteen metodit ovat keinoja tieteen <br />päämäärien saavuttamiseksi. Niin tieteen tavoitteet kuin <br />tieteen metodit eivät kuitenkaan ole lopulliseen maaliinsa saapuneita, loppuun pureksittuja tai valmiiksi annettuja. <br />Uusien tutkijasukupolvien tuleekin pohtia aiempia tieteenkäsityksiä ja pyrkiä oman jäsennellyn tieteenkäsityksen <br />muodostumiseen. Martin Hollisin ja Steve Smithin <br />(1991, 27) tavoin: ”jokaisen kansainvälisten suhteiden tutkijan tulee syvällisesti miettiä tieteen luonnetta.”</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/14683822" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fc87ca1a68f3984063c426556255aa0d" rel="nofollow" data-download="{&quot;attachment_id&quot;:38388280,&quot;asset_id&quot;:14683822,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38388280/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_14683822 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="14683822"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 14683822, container: ".js-paper-rank-work_14683822", }); });</script></li><li class="js-percentile-work_14683822 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 14683822; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_14683822"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_14683822 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="14683822"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 14683822; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=14683822]").text(description); $(".js-view-count-work_14683822").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_14683822").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="14683822"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="821" href="https://www.academia.edu/Documents/in/Philosophy_of_Science">Philosophy of Science</a>,&nbsp;<script data-card-contents-for-ri="821" type="text/json">{"id":821,"name":"Philosophy of Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Science","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1166" href="https://www.academia.edu/Documents/in/International_Relations_Theory">International Relations Theory</a><script data-card-contents-for-ri="1166" type="text/json">{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=14683822]'), work: {"id":14683822,"title":"Tiedonintressit ja teorioiden käytännöllisen arvon perusta kansainvälisten suhteiden tutkimuksessa","created_at":"2015-08-05T03:20:55.877-07:00","owner_id":19692650,"url":"https://www.academia.edu/14683822/Tiedonintressit_ja_teorioiden_k%C3%A4yt%C3%A4nn%C3%B6llisen_arvon_perusta_kansainv%C3%A4listen_suhteiden_tutkimuksessa","slug":"Tiedonintressit_ja_teorioiden_käytännöllisen_arvon_perusta_kansainvälisten_suhteiden_tutkimuksessa","dom_id":"work_14683822","summary":"Lähden tässä luvussa liikkeelle siitä, että tiede on tavoit-\r\nteellista toimintaa. Ilkka Niiniluodon (2000, 60) tavoin\r\nvoidaan todeta, että tieteen metodit ovat keinoja tieteen\r\npäämäärien saavuttamiseksi. Niin tieteen tavoitteet kuin\r\ntieteen metodit eivät kuitenkaan ole lopulliseen maaliinsa saapuneita, loppuun pureksittuja tai valmiiksi annettuja.\r\nUusien tutkijasukupolvien tuleekin pohtia aiempia tieteenkäsityksiä ja pyrkiä oman jäsennellyn tieteenkäsityksen\r\nmuodostumiseen. Martin Hollisin ja Steve Smithin\r\n(1991, 27) tavoin: ”jokaisen kansainvälisten suhteiden tutkijan tulee syvällisesti miettiä tieteen luonnetta.”","publication":"Tieteenteoriat ja kansainvälisten suhteiden oppialan kehitys","publication_with_fallback":"Tieteenteoriat ja kansainvälisten suhteiden oppialan kehitys","downloadable_attachments":[{"id":38388280,"asset_id":14683822,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/38388280/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/38388280/Vuori2008_tiedonintressit-libre.pdf?1438770265=\u0026response-content-disposition=attachment%3B+filename%3DTiedonintressit_ja_teorioiden_kaytannoll.pdf\u0026Expires=1731839524\u0026Signature=ceoP~pBBD0o3LxJ0EpqxMbSlxdNWXk2Vzg6eGs8aotdMqMs3FI~o-OcuCznfIeb6lkBuqPmEJk8gB-CRW0AAnwwed~VtEiGZjRNyPEM8cozBCGQOJkOqZf5r5aEnUVSrSI5JZcCFpihDYKvdPH1rq9vLDRryVocUt6USTzw1zXJ6LR2pf9gF1LGJ1kyLd6uC1q2tDIBBL4HGoj8CB2BSsmnF31gw6dNIQRQCCncZj-hCQrBsxIbO8jRhwI2Ar49BlUW8EtbkcWDmDDq7corwzGs~fTFGfKQF-GMpqkLIZG-Az4YHYGacjJtAiI5LU8lwjvekELPMRM4SpkMo7ImthQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/38388280/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/38388280/mini_magick20190225-21852-a2yh1o.png?1551118730"}],"downloadable_attachments_with_full_thumbnails":[{"id":38388280,"asset_id":14683822,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/38388280/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/38388280/Vuori2008_tiedonintressit-libre.pdf?1438770265=\u0026response-content-disposition=attachment%3B+filename%3DTiedonintressit_ja_teorioiden_kaytannoll.pdf\u0026Expires=1731839524\u0026Signature=ceoP~pBBD0o3LxJ0EpqxMbSlxdNWXk2Vzg6eGs8aotdMqMs3FI~o-OcuCznfIeb6lkBuqPmEJk8gB-CRW0AAnwwed~VtEiGZjRNyPEM8cozBCGQOJkOqZf5r5aEnUVSrSI5JZcCFpihDYKvdPH1rq9vLDRryVocUt6USTzw1zXJ6LR2pf9gF1LGJ1kyLd6uC1q2tDIBBL4HGoj8CB2BSsmnF31gw6dNIQRQCCncZj-hCQrBsxIbO8jRhwI2Ar49BlUW8EtbkcWDmDDq7corwzGs~fTFGfKQF-GMpqkLIZG-Az4YHYGacjJtAiI5LU8lwjvekELPMRM4SpkMo7ImthQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/38388280/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/38388280/mini_magick20190225-21852-a2yh1o.png?1551118730"}],"has_pdf":true,"has_fulltext":true,"page_count":34,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":821,"name":"Philosophy of Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Science","nofollow":false},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory","nofollow":false}],"publication_year":2008,"publication_year_with_fallback":2008,"paper_rank":null,"all_time_views":20,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_14683909" data-work_id="14683909" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/14683909/Luomisen_hurmaa_Konstruktivistinen_tiede_kansainv%C3%A4listen_suhteiden_tutkimuksessa">Luomisen hurmaa? Konstruktivistinen tiede kansainvälisten suhteiden tutkimuksessa</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Robert Coxin (ks. esim. 1986) kriittisen tutkimusotteen mukaan tutkimusta ei voi suorittaa määrittämättä sen pohjalla olevia olettamuksia, joko tietoisesti tai tiedostamatta. Vaikka tämä tapahtuu usein implisiittisesti, tutkijan on... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_14683909" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Robert Coxin (ks. esim. 1986) kriittisen tutkimusotteen mukaan tutkimusta ei voi suorittaa määrittämättä sen pohjalla olevia olettamuksia, joko tietoisesti tai tiedostamatta. Vaikka tämä tapahtuu usein implisiittisesti, tutkijan on pystyttävä pohtimaan oman tietämyksensä perustaa kuvailun, selittämisen, ennustamisen ja tuottamisen lisäksi. Teoretisoinnilla voikin nähdä olevan kaksi päämäärää: reflektointi eli ajattelun tarkoitusperien ja lähtökohtien analysointi sekä faktuaalisen eli tosiasiallisen maailman mallintaminen ja tulkitseminen.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/14683909" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d0d19036bd0f73df1d99001b9ac6fe17" rel="nofollow" data-download="{&quot;attachment_id&quot;:38388310,&quot;asset_id&quot;:14683909,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38388310/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span></li><li class="js-paper-rank-work_14683909 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="14683909"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 14683909, container: ".js-paper-rank-work_14683909", }); });</script></li><li class="js-percentile-work_14683909 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 14683909; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_14683909"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_14683909 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="14683909"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 14683909; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=14683909]").text(description); $(".js-view-count-work_14683909").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_14683909").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="14683909"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="821" href="https://www.academia.edu/Documents/in/Philosophy_of_Science">Philosophy of Science</a>,&nbsp;<script data-card-contents-for-ri="821" type="text/json">{"id":821,"name":"Philosophy of Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Science","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="1166" href="https://www.academia.edu/Documents/in/International_Relations_Theory">International Relations Theory</a><script data-card-contents-for-ri="1166" type="text/json">{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=14683909]'), work: {"id":14683909,"title":"Luomisen hurmaa? Konstruktivistinen tiede kansainvälisten suhteiden tutkimuksessa","created_at":"2015-08-05T03:24:28.639-07:00","owner_id":19692650,"url":"https://www.academia.edu/14683909/Luomisen_hurmaa_Konstruktivistinen_tiede_kansainv%C3%A4listen_suhteiden_tutkimuksessa","slug":"Luomisen_hurmaa_Konstruktivistinen_tiede_kansainvälisten_suhteiden_tutkimuksessa","dom_id":"work_14683909","summary":"Robert Coxin (ks. esim. 1986) kriittisen tutkimusotteen mukaan tutkimusta ei voi suorittaa määrittämättä sen pohjalla olevia olettamuksia, joko tietoisesti tai tiedostamatta. Vaikka tämä tapahtuu usein implisiittisesti, tutkijan on pystyttävä pohtimaan oman tietämyksensä perustaa kuvailun, selittämisen, ennustamisen ja tuottamisen lisäksi. Teoretisoinnilla voikin nähdä olevan kaksi päämäärää: reflektointi eli ajattelun tarkoitusperien ja lähtökohtien analysointi sekä faktuaalisen eli tosiasiallisen maailman mallintaminen ja tulkitseminen.","publication":"Tieteenteoriat ja kansainvälisten suhteiden oppialan kehitys ","publication_with_fallback":"Tieteenteoriat ja kansainvälisten suhteiden oppialan kehitys ","downloadable_attachments":[{"id":38388310,"asset_id":14683909,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/38388310/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/38388310/Vuori2008_konstruktivistinen_tiede-libre.pdf?1438770643=\u0026response-content-disposition=attachment%3B+filename%3DLuomisen_hurmaa_Konstruktivistinen_tiede.pdf\u0026Expires=1732720152\u0026Signature=fd-mufBNnaYFWQgiZcNjIkZSPnDg6Cq3YLSshI4DlxNJEOwTmxyHzgALL03xp~qgKUXfcZM9YKev6bSfPT1nTuFLG95dRoXPYEnL946YJ6b5UmsOp~2lROk2sb7IuhNWzlBrFW7SIkaer~28OGildKlEK~~6Od5N0~8szYOZpiDWDZAwceBqCRvf423X0SGFULooB-kJ6M0zYG4v~m9Zhcxv-Ck0TZc-mG3TwmfAABFq-vfggDLJEkYZw832f3TjKAm0qpD0r7P6LerSbUaNTtw4FhapQMG5JidpuiUyyncyD59axiCgMyfHKfVemlcM5CeEYVz4mHfGnRlbvngzFQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/38388310/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/38388310/mini_magick20190225-15242-9n1v4y.png?1551118740"}],"downloadable_attachments_with_full_thumbnails":[{"id":38388310,"asset_id":14683909,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/38388310/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/38388310/Vuori2008_konstruktivistinen_tiede-libre.pdf?1438770643=\u0026response-content-disposition=attachment%3B+filename%3DLuomisen_hurmaa_Konstruktivistinen_tiede.pdf\u0026Expires=1732720152\u0026Signature=fd-mufBNnaYFWQgiZcNjIkZSPnDg6Cq3YLSshI4DlxNJEOwTmxyHzgALL03xp~qgKUXfcZM9YKev6bSfPT1nTuFLG95dRoXPYEnL946YJ6b5UmsOp~2lROk2sb7IuhNWzlBrFW7SIkaer~28OGildKlEK~~6Od5N0~8szYOZpiDWDZAwceBqCRvf423X0SGFULooB-kJ6M0zYG4v~m9Zhcxv-Ck0TZc-mG3TwmfAABFq-vfggDLJEkYZw832f3TjKAm0qpD0r7P6LerSbUaNTtw4FhapQMG5JidpuiUyyncyD59axiCgMyfHKfVemlcM5CeEYVz4mHfGnRlbvngzFQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/38388310/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/38388310/mini_magick20190225-15242-9n1v4y.png?1551118740"}],"has_pdf":true,"has_fulltext":true,"page_count":48,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}],"research_interests":[{"id":821,"name":"Philosophy of Science","url":"https://www.academia.edu/Documents/in/Philosophy_of_Science","nofollow":false},{"id":1166,"name":"International Relations Theory","url":"https://www.academia.edu/Documents/in/International_Relations_Theory","nofollow":false}],"publication_year":2008,"publication_year_with_fallback":2008,"paper_rank":null,"all_time_views":83,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8923267 coauthored" data-work_id="8923267" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8923267/How_Cheap_Is_Identity_Talk_A_Framework_of_Identity_Frames_and_Security_Discourse_for_the_Analysis_of_Repression_and_Legitimization_of_Social_Movements_in_Mainland_China">How Cheap Is Identity Talk?— A Framework of Identity Frames and Security Discourse for the Analysis of Repression and Legitimization of Social Movements in Mainland China</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This article approaches the repression and legitimization of mainland Chinese social movements through a framework that combines the theories of identity frames and securitization. Using the Democracy Wall movement of 1978-81 and the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_8923267" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This article approaches the repression and legitimization of mainland Chinese social movements through a framework that combines the theories of identity frames and securitization. Using the Democracy Wall movement of 1978-81 and the Student Democracy Movement of 1989 as its cases, the article shows how various identity frames, which both the movements and the authorities produce in their interactions, can be seen as attempts both to legitimize protest and make it illegitimate through security discourse. This combination provides a framework which can be used to analyze and conceptualize the interaction between protest movements and authorities that has been lacking in studies on Chinese protest even though there is extensive research on the subject.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8923267" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="32c9902cc68855212f02564f03324bbb" rel="nofollow" data-download="{&quot;attachment_id&quot;:35247336,&quot;asset_id&quot;:8923267,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35247336/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-8923267">+1</span><div class="hidden js-additional-users-8923267"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://utu.academia.edu/LauriPaltemaa">Lauri Paltemaa</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-8923267'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-8923267').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_8923267 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8923267"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8923267, container: ".js-paper-rank-work_8923267", }); });</script></li><li class="js-percentile-work_8923267 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8923267; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8923267"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8923267 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8923267"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8923267; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8923267]").text(description); $(".js-view-count-work_8923267").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8923267").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8923267"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="208" href="https://www.academia.edu/Documents/in/Social_Movements">Social Movements</a>,&nbsp;<script data-card-contents-for-ri="208" type="text/json">{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="797" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>,&nbsp;<script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="6831" href="https://www.academia.edu/Documents/in/Securitization">Securitization</a><script data-card-contents-for-ri="6831" type="text/json">{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8923267]'), work: {"id":8923267,"title":"How Cheap Is Identity Talk?— A Framework of Identity Frames and Security Discourse for the Analysis of Repression and Legitimization of Social Movements in Mainland China","created_at":"2014-10-23T01:37:27.250-07:00","owner_id":19692650,"url":"https://www.academia.edu/8923267/How_Cheap_Is_Identity_Talk_A_Framework_of_Identity_Frames_and_Security_Discourse_for_the_Analysis_of_Repression_and_Legitimization_of_Social_Movements_in_Mainland_China","slug":"How_Cheap_Is_Identity_Talk_A_Framework_of_Identity_Frames_and_Security_Discourse_for_the_Analysis_of_Repression_and_Legitimization_of_Social_Movements_in_Mainland_China","dom_id":"work_8923267","summary":"This article approaches the repression and legitimization of mainland Chinese social movements through a framework that combines the theories of identity frames and securitization. Using the Democracy Wall movement of 1978-81 and the Student Democracy Movement of 1989 as its cases, the article shows how various identity frames, which both the movements and the authorities produce in their interactions, can be seen as attempts both to legitimize protest and make it illegitimate through security discourse. This combination provides a framework which can be used to analyze and conceptualize the interaction between protest movements and authorities that has been lacking in studies on Chinese protest even though there is extensive research on the subject.","publication":"Issues \u0026 Studies","publication_with_fallback":"Issues \u0026 Studies","downloadable_attachments":[{"id":35247336,"asset_id":8923267,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247336/vuori_paltemaa200647-86.PDF?1414053280=\u0026response-content-disposition=attachment%3B+filename%3DHow_Cheap_Is_Identity_Talk_A_Framework_o.pdf\u0026Expires=1731077639\u0026Signature=aWAmvUyKXVRSlMZ7ebdk3B7CPIvCEhSBUB8Oyx6-Kqy2TraEO5HIHXC9u3VHzQrPESDQLejQQlLjHLx1buZzkzXlCF5dXhcGD3bj9-ApJDUsaWTA62EBJworttOoa0ikE9GxIIKVu2O4gThnGySni~pJSG6avkP4WHk45aO7oDtIDxO9mCrO16VKcHcTr5EDEQhK2oVdSK~4S7gVxWmIv4LjfY9JK2Ee~QeRwsMH32UjnoVWzob7ENdpZD4VmT6kP6JDz3exQ1miI1oxd7vzjwDqbEgyvmw37BfBGwTiJIoHn-rUJDGEHr883c8GRi04P3t307ixNqFbqei7weEjzw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247336/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247336/mini_magick20190316-4723-adzdap.png?1552769013"}],"downloadable_attachments_with_full_thumbnails":[{"id":35247336,"asset_id":8923267,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://a.academia-assets.com/images/blank-paper.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/35247336/vuori_paltemaa200647-86.PDF?1414053280=\u0026response-content-disposition=attachment%3B+filename%3DHow_Cheap_Is_Identity_Talk_A_Framework_o.pdf\u0026Expires=1731077639\u0026Signature=aWAmvUyKXVRSlMZ7ebdk3B7CPIvCEhSBUB8Oyx6-Kqy2TraEO5HIHXC9u3VHzQrPESDQLejQQlLjHLx1buZzkzXlCF5dXhcGD3bj9-ApJDUsaWTA62EBJworttOoa0ikE9GxIIKVu2O4gThnGySni~pJSG6avkP4WHk45aO7oDtIDxO9mCrO16VKcHcTr5EDEQhK2oVdSK~4S7gVxWmIv4LjfY9JK2Ee~QeRwsMH32UjnoVWzob7ENdpZD4VmT6kP6JDz3exQ1miI1oxd7vzjwDqbEgyvmw37BfBGwTiJIoHn-rUJDGEHr883c8GRi04P3t307ixNqFbqei7weEjzw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/35247336/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/35247336/mini_magick20190316-4723-adzdap.png?1552769013"}],"has_pdf":true,"has_fulltext":true,"page_count":40,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"},{"id":33607776,"first_name":"Lauri","last_name":"Paltemaa","domain_name":"utu","page_name":"LauriPaltemaa","display_name":"Lauri Paltemaa","profile_url":"https://utu.academia.edu/LauriPaltemaa","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":208,"name":"Social Movements","url":"https://www.academia.edu/Documents/in/Social_Movements","nofollow":false},{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations","nofollow":false},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false},{"id":6831,"name":"Securitization","url":"https://www.academia.edu/Documents/in/Securitization","nofollow":false},{"id":15389,"name":"Copenhagen School/Securitization","url":"https://www.academia.edu/Documents/in/Copenhagen_School_Securitization"},{"id":20602,"name":"China studies","url":"https://www.academia.edu/Documents/in/China_studies"},{"id":642231,"name":"Tiananmen Square Protest in 1989","url":"https://www.academia.edu/Documents/in/Tiananmen_Square_Protest_in_1989"}],"publication_year":2006,"publication_year_with_fallback":2006,"paper_rank":null,"all_time_views":220,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_14657903 coauthored" data-work_id="14657903" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/14657903/Regime_Transition_and_the_Chinese_Politics_of_Technology_From_Mass_Science_to_the_Controlled_Internet">Regime Transition and the Chinese Politics of Technology: From Mass Science to the Controlled Internet</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The article employs the concepts of the politics of technology and regime transition for analysing the connection between political power and the application of technology in contemporary Chinese history. Examining the Maoist policy of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_14657903" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The article employs the concepts of the politics of technology and regime transition for analysing the connection between political power and the application of technology in contemporary Chinese history. Examining the Maoist policy of ‘mass science’ and the contemporary Chinese Communist Party (CCP) policies on information and communication technologies, and Internet control, shows how regime-determined policy goals, namely social transformation</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/14657903" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d1ec3fd9d3906978ea0e966ca6f8c6d7" rel="nofollow" data-download="{&quot;attachment_id&quot;:58041414,&quot;asset_id&quot;:14657903,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58041414/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="19692650" href="https://helsinki.academia.edu/JuhaVuori">Juha A Vuori</a><script data-card-contents-for-user="19692650" type="text/json">{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-14657903">+1</span><div class="hidden js-additional-users-14657903"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://utu.academia.edu/LauriPaltemaa">Lauri Paltemaa</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-14657903'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-14657903').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_14657903 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="14657903"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 14657903, container: ".js-paper-rank-work_14657903", }); });</script></li><li class="js-percentile-work_14657903 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 14657903; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_14657903"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_14657903 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="14657903"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 14657903; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=14657903]").text(description); $(".js-view-count-work_14657903").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_14657903").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="14657903"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="4486" href="https://www.academia.edu/Documents/in/Political_Science">Political Science</a>,&nbsp;<script data-card-contents-for-ri="4486" type="text/json">{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="7480" href="https://www.academia.edu/Documents/in/Surveillance_Studies">Surveillance Studies</a>,&nbsp;<script data-card-contents-for-ri="7480" type="text/json">{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="16416" href="https://www.academia.edu/Documents/in/Internet_and_Society">Internet &amp; Society</a>,&nbsp;<script data-card-contents-for-ri="16416" type="text/json">{"id":16416,"name":"Internet \u0026 Society","url":"https://www.academia.edu/Documents/in/Internet_and_Society","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="18814" href="https://www.academia.edu/Documents/in/Information_and_Communication_technology-1">Information and Communication technology</a><script data-card-contents-for-ri="18814" type="text/json">{"id":18814,"name":"Information and Communication technology","url":"https://www.academia.edu/Documents/in/Information_and_Communication_technology-1","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=14657903]'), work: {"id":14657903,"title":"Regime Transition and the Chinese Politics of Technology: From Mass Science to the Controlled Internet","created_at":"2015-08-04T09:51:54.908-07:00","owner_id":33607776,"url":"https://www.academia.edu/14657903/Regime_Transition_and_the_Chinese_Politics_of_Technology_From_Mass_Science_to_the_Controlled_Internet","slug":"Regime_Transition_and_the_Chinese_Politics_of_Technology_From_Mass_Science_to_the_Controlled_Internet","dom_id":"work_14657903","summary":"The article employs the concepts of the politics of technology and regime transition for analysing the connection between political power and the application of technology in contemporary Chinese history. Examining the Maoist policy of ‘mass science’ and the contemporary Chinese Communist Party (CCP) policies on information and communication technologies, and Internet control, shows how regime-determined policy goals, namely social transformation","publication":"Asian Journal of Political Science","publication_with_fallback":"Asian Journal of Political Science","downloadable_attachments":[{"id":58041414,"asset_id":14657903,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/58041414/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/58041414/Regime_Transition_and_the_Chinese_Politics_of_Technology_AJPS-libre.pdf?1545407420=\u0026response-content-disposition=attachment%3B+filename%3DRegime_Transition_and_the_Chinese_Politi.pdf\u0026Expires=1732257891\u0026Signature=HwmpNFfnxk-QBkguL~34bm523DhSjF2-9jX08KSrHQGeH~H0FPXN5OtgNzdM1QWK7Gw5hkeU1QfdPQ0Ns85V8irxmq762OXrTv3wuHalPCCISnp0VNE42mTKMoyrmXwa~COIVu33dVYejHkcNaBuQXkYzUNzD1E6EhOjwqrxVUspWb4U4tkto4TRi5OY3OZwgQGpfKSTaXDHYTmTOxS8VQrAZBVWFWejfCxpI8GrpY3~NZtyjfNHJcU8rJgzmzoqy1KGwX0w5A5m-X8H5Yb0GXyO5z8TNu8Z~mYS8ZGPtppNnrff9l8nyRmAEcfY6n-nrFrCxo21xP2wHyLJVZFdkw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/58041414/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/58041414/mini_magick20181221-21395-a35ium.png?1545395615"}],"downloadable_attachments_with_full_thumbnails":[{"id":58041414,"asset_id":14657903,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/58041414/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/58041414/Regime_Transition_and_the_Chinese_Politics_of_Technology_AJPS-libre.pdf?1545407420=\u0026response-content-disposition=attachment%3B+filename%3DRegime_Transition_and_the_Chinese_Politi.pdf\u0026Expires=1732257891\u0026Signature=HwmpNFfnxk-QBkguL~34bm523DhSjF2-9jX08KSrHQGeH~H0FPXN5OtgNzdM1QWK7Gw5hkeU1QfdPQ0Ns85V8irxmq762OXrTv3wuHalPCCISnp0VNE42mTKMoyrmXwa~COIVu33dVYejHkcNaBuQXkYzUNzD1E6EhOjwqrxVUspWb4U4tkto4TRi5OY3OZwgQGpfKSTaXDHYTmTOxS8VQrAZBVWFWejfCxpI8GrpY3~NZtyjfNHJcU8rJgzmzoqy1KGwX0w5A5m-X8H5Yb0GXyO5z8TNu8Z~mYS8ZGPtppNnrff9l8nyRmAEcfY6n-nrFrCxo21xP2wHyLJVZFdkw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/58041414/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/58041414/mini_magick20181221-21395-a35ium.png?1545395615"}],"has_pdf":true,"has_fulltext":true,"page_count":42,"ordered_authors":[{"id":19692650,"first_name":"Juha","last_name":"Vuori","domain_name":"helsinki","page_name":"JuhaVuori","display_name":"Juha A Vuori","profile_url":"https://helsinki.academia.edu/JuhaVuori","photo":"https://0.academia-photos.com/19692650/5486379/6253108/s65_juha.vuori.jpg"},{"id":33607776,"first_name":"Lauri","last_name":"Paltemaa","domain_name":"utu","page_name":"LauriPaltemaa","display_name":"Lauri Paltemaa","profile_url":"https://utu.academia.edu/LauriPaltemaa","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science","nofollow":false},{"id":7480,"name":"Surveillance Studies","url":"https://www.academia.edu/Documents/in/Surveillance_Studies","nofollow":false},{"id":16416,"name":"Internet \u0026 Society","url":"https://www.academia.edu/Documents/in/Internet_and_Society","nofollow":false},{"id":18814,"name":"Information and Communication technology","url":"https://www.academia.edu/Documents/in/Information_and_Communication_technology-1","nofollow":false},{"id":20602,"name":"China studies","url":"https://www.academia.edu/Documents/in/China_studies"},{"id":123951,"name":"Political Power","url":"https://www.academia.edu/Documents/in/Political_Power"},{"id":150548,"name":"Chinese Communist Party","url":"https://www.academia.edu/Documents/in/Chinese_Communist_Party"}],"publication_year":2009,"publication_year_with_fallback":2009,"paper_rank":null,"all_time_views":68,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_17743083" data-work_id="17743083" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/17743083/The_Democracy_Wall_Movement_Marxist_Revisionism_and_the_Variations_on_Socialist_Democracy">The Democracy Wall Movement, Marxist Revisionism, and the Variations on Socialist Democracy</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This article analyses the Beijing Democracy Wall Movement&amp;amp;#39;s argumentation on democratic reforms in 1978–1981 from the perspective of the larger genre of international revisionist Marxism critical of Leninist/Stalinist political... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_17743083" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This article analyses the Beijing Democracy Wall Movement&amp;amp;#39;s argumentation on democratic reforms in 1978–1981 from the perspective of the larger genre of international revisionist Marxism critical of Leninist/Stalinist political systems at the time of the movement. The movement&amp;amp;#39;s argumentation contained three distinct variations on the same theme of socialist democracy, which the author calls classical Marxist, eclectic Marxist and non-Marxist</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/17743083" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="4aaf4fbba141f848855e1cb2b1f586b3" rel="nofollow" data-download="{&quot;attachment_id&quot;:58041385,&quot;asset_id&quot;:17743083,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58041385/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="33607776" href="https://utu.academia.edu/LauriPaltemaa">Lauri Paltemaa</a><script data-card-contents-for-user="33607776" type="text/json">{"id":33607776,"first_name":"Lauri","last_name":"Paltemaa","domain_name":"utu","page_name":"LauriPaltemaa","display_name":"Lauri Paltemaa","profile_url":"https://utu.academia.edu/LauriPaltemaa","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_17743083 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="17743083"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 17743083, container: ".js-paper-rank-work_17743083", }); });</script></li><li class="js-percentile-work_17743083 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 17743083; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_17743083"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_17743083 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="17743083"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 17743083; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=17743083]").text(description); $(".js-view-count-work_17743083").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_17743083").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="17743083"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="24550" href="https://www.academia.edu/Documents/in/Contemporary_China">Contemporary China</a>,&nbsp;<script data-card-contents-for-ri="24550" type="text/json">{"id":24550,"name":"Contemporary China","url":"https://www.academia.edu/Documents/in/Contemporary_China","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="28235" href="https://www.academia.edu/Documents/in/Multidisciplinary">Multidisciplinary</a>,&nbsp;<script data-card-contents-for-ri="28235" type="text/json">{"id":28235,"name":"Multidisciplinary","url":"https://www.academia.edu/Documents/in/Multidisciplinary","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="80072" href="https://www.academia.edu/Documents/in/Economic_System">Economic System</a>,&nbsp;<script data-card-contents-for-ri="80072" type="text/json">{"id":80072,"name":"Economic System","url":"https://www.academia.edu/Documents/in/Economic_System","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="123752" href="https://www.academia.edu/Documents/in/Political_System">Political System</a><script data-card-contents-for-ri="123752" type="text/json">{"id":123752,"name":"Political System","url":"https://www.academia.edu/Documents/in/Political_System","nofollow":false}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=17743083]'), work: {"id":17743083,"title":"The Democracy Wall Movement, Marxist Revisionism, and the Variations on Socialist Democracy","created_at":"2015-11-04T08:01:09.710-08:00","owner_id":33607776,"url":"https://www.academia.edu/17743083/The_Democracy_Wall_Movement_Marxist_Revisionism_and_the_Variations_on_Socialist_Democracy","slug":"The_Democracy_Wall_Movement_Marxist_Revisionism_and_the_Variations_on_Socialist_Democracy","dom_id":"work_17743083","summary":"This article analyses the Beijing Democracy Wall Movement\u0026amp;#39;s argumentation on democratic reforms in 1978–1981 from the perspective of the larger genre of international revisionist Marxism critical of Leninist/Stalinist political systems at the time of the movement. The movement\u0026amp;#39;s argumentation contained three distinct variations on the same theme of socialist democracy, which the author calls classical Marxist, eclectic Marxist and non-Marxist","publication":"Journal of Contemporary China","publication_with_fallback":"Journal of Contemporary China","downloadable_attachments":[{"id":58041385,"asset_id":17743083,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/58041385/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/58041385/The_Democracy_Wall_Movement_Marxist_Revisionism_and_the_Variations_on_Socialist_Democracy-libre.pdf?1545407428=\u0026response-content-disposition=attachment%3B+filename%3DThe_Democracy_Wall_Movement_Marxist_Revi.pdf\u0026Expires=1732720152\u0026Signature=CMak04G9viOd4-HHFaiRKikJ-2yqHRgcoIJN7fQ~CynmGPli2Wq5d~POOwYpnv5J7s3Hyd3NpOk9nWkMsIiXDRYvoDJAYpN1GLXhEVaBJuwNsyjLd~QmR-MhtggiCz8vuO4px2r9tFtOZJGy2hSjX8y6rw8lP2uFzLExPURmJUgwxkd7T6iPRHbEbU61Xbu-hpkSEZXskbCIW9BkuW3Dc5tjFc7uyd1w2vQGHeuVljrXspWnjW-J1kMCScLfgZTZLbKETKiv3Cu7vmV1d0AUhomFAmkABQlV2qgcuh2AkjqfTP703TWdMzAzA6mNYUw2pkdwSxR3S4Gy36QhxEC8fQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/58041385/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/58041385/mini_magick20181221-13749-1q7hkqi.png?1545391712"}],"downloadable_attachments_with_full_thumbnails":[{"id":58041385,"asset_id":17743083,"asset_type":"Work","always_allow_download":false,"scribd_thumbnail_url":"https://attachments.academia-assets.com/58041385/thumbnails/1.jpg","download_url":"https://d1wqtxts1xzle7.cloudfront.net/58041385/The_Democracy_Wall_Movement_Marxist_Revisionism_and_the_Variations_on_Socialist_Democracy-libre.pdf?1545407428=\u0026response-content-disposition=attachment%3B+filename%3DThe_Democracy_Wall_Movement_Marxist_Revi.pdf\u0026Expires=1732720152\u0026Signature=CMak04G9viOd4-HHFaiRKikJ-2yqHRgcoIJN7fQ~CynmGPli2Wq5d~POOwYpnv5J7s3Hyd3NpOk9nWkMsIiXDRYvoDJAYpN1GLXhEVaBJuwNsyjLd~QmR-MhtggiCz8vuO4px2r9tFtOZJGy2hSjX8y6rw8lP2uFzLExPURmJUgwxkd7T6iPRHbEbU61Xbu-hpkSEZXskbCIW9BkuW3Dc5tjFc7uyd1w2vQGHeuVljrXspWnjW-J1kMCScLfgZTZLbKETKiv3Cu7vmV1d0AUhomFAmkABQlV2qgcuh2AkjqfTP703TWdMzAzA6mNYUw2pkdwSxR3S4Gy36QhxEC8fQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA","download_file_url":"https://www.academia.edu/attachments/58041385/download_file?st=MTczMjcxNjU1Miw4LjIyMi4yMDguMTQ2&","full_thumbnail_url":"https://0.academia-photos.com/attachment_thumbnails/58041385/mini_magick20181221-13749-1q7hkqi.png?1545391712"}],"has_pdf":true,"has_fulltext":true,"page_count":26,"ordered_authors":[{"id":33607776,"first_name":"Lauri","last_name":"Paltemaa","domain_name":"utu","page_name":"LauriPaltemaa","display_name":"Lauri Paltemaa","profile_url":"https://utu.academia.edu/LauriPaltemaa","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":24550,"name":"Contemporary China","url":"https://www.academia.edu/Documents/in/Contemporary_China","nofollow":false},{"id":28235,"name":"Multidisciplinary","url":"https://www.academia.edu/Documents/in/Multidisciplinary","nofollow":false},{"id":80072,"name":"Economic System","url":"https://www.academia.edu/Documents/in/Economic_System","nofollow":false},{"id":123752,"name":"Political System","url":"https://www.academia.edu/Documents/in/Political_System","nofollow":false},{"id":467728,"name":"Institutional Reform","url":"https://www.academia.edu/Documents/in/Institutional_Reform"}],"publication_year":2007,"publication_year_with_fallback":2007,"paper_rank":null,"all_time_views":146,"active_discussion":{}}, }) } })();</script></ul></li></ul></div></div></div></div><div class="u-taCenter Pagination"><ul class="pagination "> <li class="first"> <a href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents">&laquo; First</a> </li> <li class="prev"> <a rel="prev" href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=3">&lsaquo; Prev</a> </li> <li class="page"> <a href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents">1</a> </li> <li class="page"> <a href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=2">2</a> </li> <li class="page"> <a rel="prev" href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=3">3</a> </li> <li class="page active"> <a href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=4">4</a> </li> <li class="page"> <a rel="next" href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=5">5</a> </li> <li class="page"> <a href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=6">6</a> </li> <li class="page"> <a href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=7">7</a> </li> <li class="page gap disabled"><a href="#" onclick="return false;">&hellip;</a></li> <li class="page"> <a href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=12">12</a> </li> <li class="next_page"> <a rel="next" href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=5">Next &rsaquo;</a> </li> <li class="last next"> <a href="/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=12">Last &raquo;</a> </li> </ul> </div></div></div></div></div></div></div> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "e77b9a3700f8de29bf5d0576d4ed86713be071d6796378cb0ceba5342ea0e25b", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="bZ8SYc/upSmM77d3FKN5T7xByRvcdWtXueS7pOf3dXjPLFMp94pYL/hN6lmKZ5wPxyYc1Mxwt1dkETaX0CPrnw==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://utu.academia.edu/Departments/Department_of_Political_Science_and_Contemporary_History/Documents?page=4" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="EakYrCLUqwe+N21NBPi6sO5HwTncz1rgbSbf8ayEafizGlnkGrBWAcqVMGOaPF/wlSAU9szKhuCw01LCm1D3Hw==" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style=""><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style=""><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10