CINXE.COM

Joseph H Campos II - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Joseph H Campos II - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="czDokS1EOGcxZjxndoFJZE5yvTboLsYLXuTBWFu+ys4oc9A/RoLylPqLSXpljmAacI4vccjcAZBHswK9kRShhA==" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-77f7b87cb1583fc59aa8f94756ebfe913345937eb932042b4077563bebb5fb4b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-9e8218e1301001388038e3fc3427ed00d079a4760ff7745d1ec1b2d59103170a.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-b2b823dd904da60a48fd1bfa1defd840610c2ff414d3f39ed3af46277ab8df3b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="author" content="joseph h campos ii" /> <meta name="description" content="Joseph H Campos II: 14 Followers, 3 Following, 5 Research papers." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '9387f500ddcbb8d05c67bef28a2fe0334f1aafb8'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15268,"monthly_visitors":"113 million","monthly_visitor_count":113692424,"monthly_visitor_count_in_millions":113,"user_count":277715432,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1733030874000); window.Aedu.timeDifference = new Date().getTime() - 1733030874000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-bdb9e8c097f01e611f2fc5e2f1a9dc599beede975e2ae5629983543a1726e947.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-3e572e3b706c3ed2ec5b2c1cb44a411fadc81f62a97963cb7bd9c327a0a9d5f2.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-2e8d3f30eaaddd1debd6ce4630b3453b23a23c91ac7c823ddf8822879835b029.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://independent.academia.edu/JosephCamposII" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-ae3d0ee232cd83d11499343688b0160a3c7db15e95cb2d0844cae78d49ea53f1.js" defer="defer"></script><script>Aedu.rankings = { showPaperRankingsLink: false } $viewedUser = Aedu.User.set_viewed( {"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII","photo":"/images/s65_no_pic.png","has_photo":false,"is_analytics_public":false,"interests":[]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = []</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://independent.academia.edu/JosephCamposII&quot;,&quot;location&quot;:&quot;/JosephCamposII&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;independent.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/JosephCamposII&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-a290aa47-e68a-4886-bcfc-33e17f9fc4e3"></div> <div id="ProfileCheckPaperUpdate-react-component-a290aa47-e68a-4886-bcfc-33e17f9fc4e3"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" border="0" alt="" src="//a.academia-assets.com/images/s200_no_pic.png" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Joseph H Campos II</h1><div class="affiliations-container fake-truncate js-profile-affiliations"></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Joseph" data-follow-user-id="35441196" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="35441196"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">14</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">3</p></div></a><a href="/JosephCamposII/mentions"><div class="stat-container"><p class="label">Mentions</p><p class="data">31</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by Joseph H Campos II</h3></div><div class="js-work-strip profile--work_container" data-work-id="112561724"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/112561724/Intelligence_Studies_Theory_and_Intergroup_Conflict_and_Resolution"><img alt="Research paper thumbnail of Intelligence Studies, Theory, and Intergroup Conflict and Resolution" class="work-thumbnail" src="https://attachments.academia-assets.com/109754809/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/112561724/Intelligence_Studies_Theory_and_Intergroup_Conflict_and_Resolution">Intelligence Studies, Theory, and Intergroup Conflict and Resolution</a></div><div class="wp-workCard_item"><span>National Security and Counterintelligence in the Era of Cyber Espionage</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e347b6ddbbbb1a4f355a6148d1ac3c0f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:109754809,&quot;asset_id&quot;:112561724,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/109754809/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="112561724"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="112561724"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 112561724; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=112561724]").text(description); $(".js-view-count[data-work-id=112561724]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 112561724; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='112561724']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 112561724, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e347b6ddbbbb1a4f355a6148d1ac3c0f" } } $('.js-work-strip[data-work-id=112561724]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":112561724,"title":"Intelligence Studies, Theory, and Intergroup Conflict and Resolution","translated_title":"","metadata":{"publication_name":"National Security and Counterintelligence in the Era of Cyber Espionage"},"translated_abstract":null,"internal_url":"https://www.academia.edu/112561724/Intelligence_Studies_Theory_and_Intergroup_Conflict_and_Resolution","translated_internal_url":"","created_at":"2023-12-29T09:20:59.092-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":109754809,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/109754809/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/109754809/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Intelligence_Studies_Theory_and_Intergro.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/109754809/viewtitlesample-libre.pdf?1703873195=\u0026response-content-disposition=attachment%3B+filename%3DIntelligence_Studies_Theory_and_Intergro.pdf\u0026Expires=1733034474\u0026Signature=fFbU9PBTdxxw67lbuY5w3pkZAeNf8yOQISv3JAJyGVHPwICYDxiCynUdWZZCAC-fiNxfsS4nrjcvO8-6ks9ComFrvUQxJjsA~DO8ppJEyLv3JY4uRaHagYr1O4FatRq5wgCMOEvxb3VeBhoKKoVzDDQ3HG~-yqpIwx5Gw9GyQbfk6tzHWMiJ0esKWpKW03KEb~u4GvoSgRc9IxShM4LXRVJnGC1k0HsiUKGgRbaCCUgt3SnpqrQJ5VXR1BF0wHBTgh0~1D0per5Fda2QJ9PIYFvi3DPdVQe-5QFZj2IBcgXNaBBbK3E2b5983JWDB3YYxL9Fgx3Rz8TANCNdzl28fg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Intelligence_Studies_Theory_and_Intergroup_Conflict_and_Resolution","translated_slug":"","page_count":3,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":109754809,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/109754809/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/109754809/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Intelligence_Studies_Theory_and_Intergro.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/109754809/viewtitlesample-libre.pdf?1703873195=\u0026response-content-disposition=attachment%3B+filename%3DIntelligence_Studies_Theory_and_Intergro.pdf\u0026Expires=1733034474\u0026Signature=fFbU9PBTdxxw67lbuY5w3pkZAeNf8yOQISv3JAJyGVHPwICYDxiCynUdWZZCAC-fiNxfsS4nrjcvO8-6ks9ComFrvUQxJjsA~DO8ppJEyLv3JY4uRaHagYr1O4FatRq5wgCMOEvxb3VeBhoKKoVzDDQ3HG~-yqpIwx5Gw9GyQbfk6tzHWMiJ0esKWpKW03KEb~u4GvoSgRc9IxShM4LXRVJnGC1k0HsiUKGgRbaCCUgt3SnpqrQJ5VXR1BF0wHBTgh0~1D0per5Fda2QJ9PIYFvi3DPdVQe-5QFZj2IBcgXNaBBbK3E2b5983JWDB3YYxL9Fgx3Rz8TANCNdzl28fg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology"},{"id":13614,"name":"Conflict Resolution","url":"https://www.academia.edu/Documents/in/Conflict_Resolution"},{"id":4047295,"name":"Conflict Resolution Strategy","url":"https://www.academia.edu/Documents/in/Conflict_Resolution_Strategy"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="96483899"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/96483899/The_state_terrorism_and_national_security_discourse_forging_the_state_in_a_time_of_terror_in_the_face_of_fear"><img alt="Research paper thumbnail of The state, terrorism, and national security discourse : forging the state in a time of terror, in the face of fear" class="work-thumbnail" src="https://attachments.academia-assets.com/98370480/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/96483899/The_state_terrorism_and_national_security_discourse_forging_the_state_in_a_time_of_terror_in_the_face_of_fear">The state, terrorism, and national security discourse : forging the state in a time of terror, in the face of fear</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="366b8213511e4b7d2bdcbca8d4b1acb4" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:98370480,&quot;asset_id&quot;:96483899,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/98370480/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="96483899"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="96483899"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 96483899; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=96483899]").text(description); $(".js-view-count[data-work-id=96483899]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 96483899; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='96483899']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 96483899, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "366b8213511e4b7d2bdcbca8d4b1acb4" } } $('.js-work-strip[data-work-id=96483899]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":96483899,"title":"The state, terrorism, and national security discourse : forging the state in a time of terror, in the face of fear","translated_title":"","metadata":{"grobid_abstract":"This dissertation explores and interrogates how terrorism is consistently brought into the political and controlled by the power structure, specifically the ways in which national security discourse is used to create a specific knowledge structure and the ways in which discursive practices represent the mobilization of power. In addressing the role of ACKNOWLEDGMENTS The completion of this dissertation is based on the strength, tenacity, support, and encouragement of a variety of people. To all of these people lowe immense gratitude. Nevzat Soguk has been the best advisor one could ask for! Throughout this project, he guided my intellectual development and consistently provided me the confidence needed by always being available for advice, feedback, and the much-needed encouragement. I also appreciate the input and expertise of Drs. Henriksen, Henningsen, Manicas, and Shapiro. I thank Margot Henriksen for her guidance and close reading of the chapters; Manfred Henningsen and Peter Manicas for their support and skepticism that challenged me to defend my ideas and enhance my arguments; and to Michael Shapiro for his encouragement and contributions to my theoretical development. The support of my entire committee and their contributions were invaluable. Coupled with the intellectual and emotion support garnered from my committee, this dissertation would still be only an idea if was not for the love, support, and encouragement of friends and family. To my mother, Shirley Campos, thank you for sharing in my dreams and visions. Your strength, knowledge, and love have been guiding forces throughout my life. Finally, to the most important person in my life, my fabulous wife, Marta GonzaIez-Lloret, this dissertation only came to fruition because of the unabated support, enthusiasm, and love you have consistently given to me and this project. IV DEDICATION This dissertation is dedicated to the memory of my father, Lawrence Eugene Campos, who taught me the value of independent inquiry and analysis. v","publication_date":{"day":null,"month":null,"year":2005,"errors":{}},"grobid_abstract_attachment_id":98370480},"translated_abstract":null,"internal_url":"https://www.academia.edu/96483899/The_state_terrorism_and_national_security_discourse_forging_the_state_in_a_time_of_terror_in_the_face_of_fear","translated_internal_url":"","created_at":"2023-02-07T09:19:01.052-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":98370480,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/98370480/thumbnails/1.jpg","file_name":"5101088.pdf","download_url":"https://www.academia.edu/attachments/98370480/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"The_state_terrorism_and_national_securit.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/98370480/5101088-libre.pdf?1675802332=\u0026response-content-disposition=attachment%3B+filename%3DThe_state_terrorism_and_national_securit.pdf\u0026Expires=1733034474\u0026Signature=QFznDPUcnAF4H81lASmOBjEsw4EBu6iUvo5BgIlaFAziwkxZzxH2-o8V8T7GuwQuMEKywNzPV8yEfGqtQGBvqfNTKCaddZKoz7hYpz~VSPu9QmZ1qKGy5IbBOHkC3aXuhYT1SziFXJ7auhs6K-DGXn-cAp89YlhAMkZqDvx30UDmrHYGQCMny9IJ~FghGay4zhwpkk6vYJfQfDVGBt8Dlwd7Qc2sQgtEXkBQ4JlW2IppjvVM9A9gXbW~BSVWWNtWjqPZYtfb1ammm7eHTMCPfvHgzVCPm2xQdnv62j5QPNgkHrUrdmlhmM3egF-fNjvZB9Z0AwAO-im3fV1QGJRFsg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_state_terrorism_and_national_security_discourse_forging_the_state_in_a_time_of_terror_in_the_face_of_fear","translated_slug":"","page_count":268,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":98370480,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/98370480/thumbnails/1.jpg","file_name":"5101088.pdf","download_url":"https://www.academia.edu/attachments/98370480/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"The_state_terrorism_and_national_securit.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/98370480/5101088-libre.pdf?1675802332=\u0026response-content-disposition=attachment%3B+filename%3DThe_state_terrorism_and_national_securit.pdf\u0026Expires=1733034474\u0026Signature=QFznDPUcnAF4H81lASmOBjEsw4EBu6iUvo5BgIlaFAziwkxZzxH2-o8V8T7GuwQuMEKywNzPV8yEfGqtQGBvqfNTKCaddZKoz7hYpz~VSPu9QmZ1qKGy5IbBOHkC3aXuhYT1SziFXJ7auhs6K-DGXn-cAp89YlhAMkZqDvx30UDmrHYGQCMny9IJ~FghGay4zhwpkk6vYJfQfDVGBt8Dlwd7Qc2sQgtEXkBQ4JlW2IppjvVM9A9gXbW~BSVWWNtWjqPZYtfb1ammm7eHTMCPfvHgzVCPm2xQdnv62j5QPNgkHrUrdmlhmM3egF-fNjvZB9Z0AwAO-im3fV1QGJRFsg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":270103,"name":"Forging","url":"https://www.academia.edu/Documents/in/Forging"}],"urls":[{"id":28775099,"url":"http://scholarspace.manoa.hawaii.edu/handle/10125/11831"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40386174"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40386174/At_the_Nexus_of_Fear_Horror_and_Terror_Introduction"><img alt="Research paper thumbnail of At the Nexus of Fear, Horror and Terror: Introduction" class="work-thumbnail" src="https://attachments.academia-assets.com/60636773/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40386174/At_the_Nexus_of_Fear_Horror_and_Terror_Introduction">At the Nexus of Fear, Horror and Terror: Introduction</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="d42a80f3585ea0046feae3125968dd76" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:60636773,&quot;asset_id&quot;:40386174,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/60636773/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40386174"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40386174"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40386174; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40386174]").text(description); $(".js-view-count[data-work-id=40386174]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40386174; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40386174']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 40386174, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "d42a80f3585ea0046feae3125968dd76" } } $('.js-work-strip[data-work-id=40386174]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40386174,"title":"At the Nexus of Fear, Horror and Terror: Introduction","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2013,"errors":{}}},"translated_abstract":null,"internal_url":"https://www.academia.edu/40386174/At_the_Nexus_of_Fear_Horror_and_Terror_Introduction","translated_internal_url":"","created_at":"2019-09-18T12:29:25.849-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":33033545,"work_id":40386174,"tagging_user_id":35441196,"tagged_user_id":97550695,"co_author_invite_id":null,"email":"d***a@gmail.com","affiliation":"University of Craiova","display_order":1,"name":"Catalin Ghita","title":"At the Nexus of Fear, Horror and Terror: Introduction"}],"downloadable_attachments":[{"id":60636773,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636773/thumbnails/1.jpg","file_name":"FHT-6-240713-2-at_the_nexus_of_fear_horror_and_terror-intro20190918-52060-u3pbca.pdf","download_url":"https://www.academia.edu/attachments/60636773/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"At_the_Nexus_of_Fear_Horror_and_Terror_I.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636773/FHT-6-240713-2-at_the_nexus_of_fear_horror_and_terror-intro20190918-52060-u3pbca-libre.pdf?1568838674=\u0026response-content-disposition=attachment%3B+filename%3DAt_the_Nexus_of_Fear_Horror_and_Terror_I.pdf\u0026Expires=1733034474\u0026Signature=Bs9ISVTj13ddhRmAdAMgBaWd6iOe1Tch6b-wD6ZzmR4w7srit6LqiIbesqKuTR5IroYZzXGUFcsVtep9EBxG938gMGXbA7qk~vamQ6p1uYD-2fyo17nFkp99BFoUhiK-OX28A50OWAEjlwki~KGvzMsjh4hcvnmXF-vSc8esvnAELrBrWdfOc0rwehMMYMNUnnKABVCwIIcsqBkc9gHfgNDy06GY9Pic4yUb5f8xOAqfc5XXPmpYT1KLK5BFXY1ZyW3zN57g85f65FPFOPefBcZ4QKoQ8QZAf0CnaWRbo-Sh8YIO8UfPKsEnfPbRQipzRR63PjQpact5N7mSZANZnA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"At_the_Nexus_of_Fear_Horror_and_Terror_Introduction","translated_slug":"","page_count":13,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":60636773,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636773/thumbnails/1.jpg","file_name":"FHT-6-240713-2-at_the_nexus_of_fear_horror_and_terror-intro20190918-52060-u3pbca.pdf","download_url":"https://www.academia.edu/attachments/60636773/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"At_the_Nexus_of_Fear_Horror_and_Terror_I.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636773/FHT-6-240713-2-at_the_nexus_of_fear_horror_and_terror-intro20190918-52060-u3pbca-libre.pdf?1568838674=\u0026response-content-disposition=attachment%3B+filename%3DAt_the_Nexus_of_Fear_Horror_and_Terror_I.pdf\u0026Expires=1733034474\u0026Signature=Bs9ISVTj13ddhRmAdAMgBaWd6iOe1Tch6b-wD6ZzmR4w7srit6LqiIbesqKuTR5IroYZzXGUFcsVtep9EBxG938gMGXbA7qk~vamQ6p1uYD-2fyo17nFkp99BFoUhiK-OX28A50OWAEjlwki~KGvzMsjh4hcvnmXF-vSc8esvnAELrBrWdfOc0rwehMMYMNUnnKABVCwIIcsqBkc9gHfgNDy06GY9Pic4yUb5f8xOAqfc5XXPmpYT1KLK5BFXY1ZyW3zN57g85f65FPFOPefBcZ4QKoQ8QZAf0CnaWRbo-Sh8YIO8UfPKsEnfPbRQipzRR63PjQpact5N7mSZANZnA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40385925"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40385925/The_State_and_Terrorism_National_Security_and_the_Mobilization_of_Power"><img alt="Research paper thumbnail of The State and Terrorism: National Security and the Mobilization of Power" class="work-thumbnail" src="https://attachments.academia-assets.com/60636497/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40385925/The_State_and_Terrorism_National_Security_and_the_Mobilization_of_Power">The State and Terrorism: National Security and the Mobilization of Power</a></div><div class="wp-workCard_item"><span>Taylor &amp; Francis eBooks</span><span>, 2007</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Adopting an innovative approach to the ongoing debate over homeland security and state response t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Adopting an innovative approach to the ongoing debate over homeland security and state response to terrorism, Joseph Campos investigates the contextualizing of national security discourse and its management of terrorism. New ideas developed in this book reflect ways in which national security is mobilized through specific discourse to manage threats. In addition, a review of presidential rhetoric over the last 30 years reveals that national security discourse has maintained an ideological hegemony to determine what constitutes violence and appropriate responses. The volume incorporates historical depth and critical theory in a comparative framework to provide an invaluable insight into how national security is developed and how it works with the concept of terrorism to secure the state.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="ce0401e15990b608d13c36fc6dadd4fb" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:60636497,&quot;asset_id&quot;:40385925,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/60636497/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40385925"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40385925"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40385925; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40385925]").text(description); $(".js-view-count[data-work-id=40385925]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40385925; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40385925']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 40385925, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "ce0401e15990b608d13c36fc6dadd4fb" } } $('.js-work-strip[data-work-id=40385925]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40385925,"title":"The State and Terrorism: National Security and the Mobilization of Power","translated_title":"","metadata":{"abstract":"Adopting an innovative approach to the ongoing debate over homeland security and state response to terrorism, Joseph Campos investigates the contextualizing of national security discourse and its management of terrorism. New ideas developed in this book reflect ways in which national security is mobilized through specific discourse to manage threats. In addition, a review of presidential rhetoric over the last 30 years reveals that national security discourse has maintained an ideological hegemony to determine what constitutes violence and appropriate responses. The volume incorporates historical depth and critical theory in a comparative framework to provide an invaluable insight into how national security is developed and how it works with the concept of terrorism to secure the state.","publication_date":{"day":null,"month":null,"year":2007,"errors":{}},"publication_name":"Taylor \u0026 Francis eBooks"},"translated_abstract":"Adopting an innovative approach to the ongoing debate over homeland security and state response to terrorism, Joseph Campos investigates the contextualizing of national security discourse and its management of terrorism. New ideas developed in this book reflect ways in which national security is mobilized through specific discourse to manage threats. In addition, a review of presidential rhetoric over the last 30 years reveals that national security discourse has maintained an ideological hegemony to determine what constitutes violence and appropriate responses. The volume incorporates historical depth and critical theory in a comparative framework to provide an invaluable insight into how national security is developed and how it works with the concept of terrorism to secure the state.","internal_url":"https://www.academia.edu/40385925/The_State_and_Terrorism_National_Security_and_the_Mobilization_of_Power","translated_internal_url":"","created_at":"2019-09-18T11:53:52.638-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":60636497,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636497/thumbnails/1.jpg","file_name":"The_State_and_Terrorism-intro20190918-127813-kwqinv.pdf","download_url":"https://www.academia.edu/attachments/60636497/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"The_State_and_Terrorism_National_Securit.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636497/The_State_and_Terrorism-intro20190918-127813-kwqinv-libre.pdf?1568833363=\u0026response-content-disposition=attachment%3B+filename%3DThe_State_and_Terrorism_National_Securit.pdf\u0026Expires=1733034474\u0026Signature=cui4RG9yuPi0tsSrh7EiNKb57iWNU1610IAS~O8AulNGwSIz2LJvz1KYzmEqCwiF4NEov51Q5Yi87KDEgC3hBY4JfJBt7m~c-MdnNXqbNTX79TUV30wZfDIlt4CGWGhaNxnunv2BnYLc1YJT2WsI5QjOQW1uL0X5SdNJJlnfTbhB1bdkFZTdf4TX4ZItX6DNjcy48EW-HaJ~ddOqami-TgusNTMRHu8N9TyLpFYfQuEjW3kdGrK01IenQAMbnvxiHA9o3vnvUDuOmCMK8oC2Wc9gAcit~uyz3BYTyqbQ0druVgqT1D~ET9-g8ZYJKl8CbKukt~cvYIwvjw4rklw7sw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_State_and_Terrorism_National_Security_and_the_Mobilization_of_Power","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":60636497,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636497/thumbnails/1.jpg","file_name":"The_State_and_Terrorism-intro20190918-127813-kwqinv.pdf","download_url":"https://www.academia.edu/attachments/60636497/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"The_State_and_Terrorism_National_Securit.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636497/The_State_and_Terrorism-intro20190918-127813-kwqinv-libre.pdf?1568833363=\u0026response-content-disposition=attachment%3B+filename%3DThe_State_and_Terrorism_National_Securit.pdf\u0026Expires=1733034474\u0026Signature=cui4RG9yuPi0tsSrh7EiNKb57iWNU1610IAS~O8AulNGwSIz2LJvz1KYzmEqCwiF4NEov51Q5Yi87KDEgC3hBY4JfJBt7m~c-MdnNXqbNTX79TUV30wZfDIlt4CGWGhaNxnunv2BnYLc1YJT2WsI5QjOQW1uL0X5SdNJJlnfTbhB1bdkFZTdf4TX4ZItX6DNjcy48EW-HaJ~ddOqami-TgusNTMRHu8N9TyLpFYfQuEjW3kdGrK01IenQAMbnvxiHA9o3vnvUDuOmCMK8oC2Wc9gAcit~uyz3BYTyqbQ0druVgqT1D~ET9-g8ZYJKl8CbKukt~cvYIwvjw4rklw7sw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40385859"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40385859/Terrorism_Security_and_the_State_Reframing_terror_for_a_new_dialogue"><img alt="Research paper thumbnail of Terrorism, Security, and the State: Reframing terror for a new dialogue" class="work-thumbnail" src="https://attachments.academia-assets.com/60636400/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40385859/Terrorism_Security_and_the_State_Reframing_terror_for_a_new_dialogue">Terrorism, Security, and the State: Reframing terror for a new dialogue</a></div><div class="wp-workCard_item"><span>Journal of International Relations Research Violence and Terrorism, Issue 1</span><span>, 2012</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This  article  will  address  the  ways  in  which  the  state  articulates  itself  as  a  domai...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This  article  will  address  the  ways  in  which  the  state  articulates  itself  as  a  domain  of  knowledge  and  power  in  the  discourse on Terrorism and Violence.&nbsp; Specifically this article will explore the language utilized within the dialogue of security in regard to terrorism.&nbsp; The language utilized is highly social, meaningful, and consistently entrenched in a social  contexts  that  incorporate  experiences  and  histories.    Words  are  essentially  empty  and  only  gain  meaning  through&nbsp; language&nbsp; and&nbsp; dialogue.&nbsp; Taking&nbsp; the&nbsp; concept&nbsp; that&nbsp; language&nbsp; is&nbsp; action&nbsp; in&nbsp; a&nbsp; dialogue&nbsp; with&nbsp; social&nbsp; context, several items  can  be  deduced.   Primarily,  the  interaction  of  language  dialogue  involves  a  level  of  power.   In  the  existence of power relations, all interaction is subject to values and norms enacting themselves.&nbsp; Given the existence of this power relation, dialogue is synchronic and diachronic in that dialogue is connected to other events that occur concurrently  or  have  historical  relevance.   This  synchronic  and  diachronic  nature  of  discourse  is  enacted  in  the  intertextuality&nbsp; of&nbsp; discourse&nbsp; (Der&nbsp; Derian&nbsp; &amp;&nbsp; Sahpiro,&nbsp; 1989).&nbsp; Finally,&nbsp; given&nbsp; power&nbsp; relations&nbsp; and&nbsp; the&nbsp; intertextuality&nbsp; of dialogue,  multiple  interpretations  are  possible  as  they  are  connected  to  the  location  and  understanding  of  the  individual&nbsp; participants&nbsp; –&nbsp; speaker,&nbsp; listener,&nbsp; and&nbsp; viewer.&nbsp; Interpretations&nbsp; are&nbsp; loaded&nbsp; with&nbsp; the&nbsp; values&nbsp; that&nbsp; affect&nbsp; the power of dialogue as it pushes at the parameters of what is typically seen as violence and terror, and ask questions regarding the dynamics of terror and violence.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="390893aad0630c122994bbb1b712ab0c" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:60636400,&quot;asset_id&quot;:40385859,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/60636400/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40385859"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40385859"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40385859; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40385859]").text(description); $(".js-view-count[data-work-id=40385859]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40385859; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40385859']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 40385859, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "390893aad0630c122994bbb1b712ab0c" } } $('.js-work-strip[data-work-id=40385859]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40385859,"title":"Terrorism, Security, and the State: Reframing terror for a new dialogue","translated_title":"","metadata":{"abstract":"This  article  will  address  the  ways  in  which  the  state  articulates  itself  as  a  domain  of  knowledge  and  power  in  the  discourse on Terrorism and Violence. Specifically this article will explore the language utilized within the dialogue of security in regard to terrorism. The language utilized is highly social, meaningful, and consistently entrenched in a social  contexts  that  incorporate  experiences  and  histories.    Words  are  essentially  empty  and  only  gain  meaning  through language and dialogue. Taking the concept that language is action in a dialogue with social context, several items  can  be  deduced.   Primarily,  the  interaction  of  language  dialogue  involves  a  level  of  power.   In  the  existence of power relations, all interaction is subject to values and norms enacting themselves. Given the existence of this power relation, dialogue is synchronic and diachronic in that dialogue is connected to other events that occur concurrently  or  have  historical  relevance.   This  synchronic  and  diachronic  nature  of  discourse  is  enacted  in  the  intertextuality of discourse (Der Derian \u0026 Sahpiro, 1989). Finally, given power relations and the intertextuality of dialogue,  multiple  interpretations  are  possible  as  they  are  connected  to  the  location  and  understanding  of  the  individual participants – speaker, listener, and viewer. Interpretations are loaded with the values that affect the power of dialogue as it pushes at the parameters of what is typically seen as violence and terror, and ask questions regarding the dynamics of terror and violence. ","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"Journal of International Relations Research Violence and Terrorism, Issue 1"},"translated_abstract":"This  article  will  address  the  ways  in  which  the  state  articulates  itself  as  a  domain  of  knowledge  and  power  in  the  discourse on Terrorism and Violence. Specifically this article will explore the language utilized within the dialogue of security in regard to terrorism. The language utilized is highly social, meaningful, and consistently entrenched in a social  contexts  that  incorporate  experiences  and  histories.    Words  are  essentially  empty  and  only  gain  meaning  through language and dialogue. Taking the concept that language is action in a dialogue with social context, several items  can  be  deduced.   Primarily,  the  interaction  of  language  dialogue  involves  a  level  of  power.   In  the  existence of power relations, all interaction is subject to values and norms enacting themselves. Given the existence of this power relation, dialogue is synchronic and diachronic in that dialogue is connected to other events that occur concurrently  or  have  historical  relevance.   This  synchronic  and  diachronic  nature  of  discourse  is  enacted  in  the  intertextuality of discourse (Der Derian \u0026 Sahpiro, 1989). Finally, given power relations and the intertextuality of dialogue,  multiple  interpretations  are  possible  as  they  are  connected  to  the  location  and  understanding  of  the  individual participants – speaker, listener, and viewer. Interpretations are loaded with the values that affect the power of dialogue as it pushes at the parameters of what is typically seen as violence and terror, and ask questions regarding the dynamics of terror and violence. ","internal_url":"https://www.academia.edu/40385859/Terrorism_Security_and_the_State_Reframing_terror_for_a_new_dialogue","translated_internal_url":"","created_at":"2019-09-18T11:40:13.599-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":60636400,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636400/thumbnails/1.jpg","file_name":"JIRR-Issue_1-Campos20190918-93940-76y1lo.pdf","download_url":"https://www.academia.edu/attachments/60636400/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Terrorism_Security_and_the_State_Reframi.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636400/JIRR-Issue_1-Campos20190918-93940-76y1lo-libre.pdf?1568832339=\u0026response-content-disposition=attachment%3B+filename%3DTerrorism_Security_and_the_State_Reframi.pdf\u0026Expires=1733034474\u0026Signature=cqVC4EvA7rVe1N16WMmJMqMWbWB25AT6Ik4Hu4ihakKTdOrKZvEJDPH7STrfZQgnwEt5Jwj-eImdddVouYuQMib1rreUEX75nz2PKVt0kADnQGUJYKLzsSnl7bC5tKnz65v5CHPQtS9gpQuIczQy0qg87xPBqTefOuh-JD39Ir6ha6JkhTci3qFT3YK74Vj4O7wOcAWa4Q8MnNYDod30riCDKCUnUL67uAQ7uBGxFdN67u-eckCqKMGQObiLy0tncoGomrhbtQs0w0wGjAoQ3y4ugBlGlQhOD6UuJq~gPMhB~NKBvLhgZsE0JzcJtLT4apF0EQLnOj24tBcdi~Qq3g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Terrorism_Security_and_the_State_Reframing_terror_for_a_new_dialogue","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":60636400,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636400/thumbnails/1.jpg","file_name":"JIRR-Issue_1-Campos20190918-93940-76y1lo.pdf","download_url":"https://www.academia.edu/attachments/60636400/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Terrorism_Security_and_the_State_Reframi.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636400/JIRR-Issue_1-Campos20190918-93940-76y1lo-libre.pdf?1568832339=\u0026response-content-disposition=attachment%3B+filename%3DTerrorism_Security_and_the_State_Reframi.pdf\u0026Expires=1733034474\u0026Signature=cqVC4EvA7rVe1N16WMmJMqMWbWB25AT6Ik4Hu4ihakKTdOrKZvEJDPH7STrfZQgnwEt5Jwj-eImdddVouYuQMib1rreUEX75nz2PKVt0kADnQGUJYKLzsSnl7bC5tKnz65v5CHPQtS9gpQuIczQy0qg87xPBqTefOuh-JD39Ir6ha6JkhTci3qFT3YK74Vj4O7wOcAWa4Q8MnNYDod30riCDKCUnUL67uAQ7uBGxFdN67u-eckCqKMGQObiLy0tncoGomrhbtQs0w0wGjAoQ3y4ugBlGlQhOD6UuJq~gPMhB~NKBvLhgZsE0JzcJtLT4apF0EQLnOj24tBcdi~Qq3g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="9706355" id="papers"><div class="js-work-strip profile--work_container" data-work-id="112561724"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/112561724/Intelligence_Studies_Theory_and_Intergroup_Conflict_and_Resolution"><img alt="Research paper thumbnail of Intelligence Studies, Theory, and Intergroup Conflict and Resolution" class="work-thumbnail" src="https://attachments.academia-assets.com/109754809/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/112561724/Intelligence_Studies_Theory_and_Intergroup_Conflict_and_Resolution">Intelligence Studies, Theory, and Intergroup Conflict and Resolution</a></div><div class="wp-workCard_item"><span>National Security and Counterintelligence in the Era of Cyber Espionage</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e347b6ddbbbb1a4f355a6148d1ac3c0f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:109754809,&quot;asset_id&quot;:112561724,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/109754809/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="112561724"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="112561724"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 112561724; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=112561724]").text(description); $(".js-view-count[data-work-id=112561724]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 112561724; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='112561724']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 112561724, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e347b6ddbbbb1a4f355a6148d1ac3c0f" } } $('.js-work-strip[data-work-id=112561724]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":112561724,"title":"Intelligence Studies, Theory, and Intergroup Conflict and Resolution","translated_title":"","metadata":{"publication_name":"National Security and Counterintelligence in the Era of Cyber Espionage"},"translated_abstract":null,"internal_url":"https://www.academia.edu/112561724/Intelligence_Studies_Theory_and_Intergroup_Conflict_and_Resolution","translated_internal_url":"","created_at":"2023-12-29T09:20:59.092-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":109754809,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/109754809/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/109754809/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Intelligence_Studies_Theory_and_Intergro.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/109754809/viewtitlesample-libre.pdf?1703873195=\u0026response-content-disposition=attachment%3B+filename%3DIntelligence_Studies_Theory_and_Intergro.pdf\u0026Expires=1733034474\u0026Signature=fFbU9PBTdxxw67lbuY5w3pkZAeNf8yOQISv3JAJyGVHPwICYDxiCynUdWZZCAC-fiNxfsS4nrjcvO8-6ks9ComFrvUQxJjsA~DO8ppJEyLv3JY4uRaHagYr1O4FatRq5wgCMOEvxb3VeBhoKKoVzDDQ3HG~-yqpIwx5Gw9GyQbfk6tzHWMiJ0esKWpKW03KEb~u4GvoSgRc9IxShM4LXRVJnGC1k0HsiUKGgRbaCCUgt3SnpqrQJ5VXR1BF0wHBTgh0~1D0per5Fda2QJ9PIYFvi3DPdVQe-5QFZj2IBcgXNaBBbK3E2b5983JWDB3YYxL9Fgx3Rz8TANCNdzl28fg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Intelligence_Studies_Theory_and_Intergroup_Conflict_and_Resolution","translated_slug":"","page_count":3,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":109754809,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/109754809/thumbnails/1.jpg","file_name":"viewtitlesample.pdf","download_url":"https://www.academia.edu/attachments/109754809/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Intelligence_Studies_Theory_and_Intergro.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/109754809/viewtitlesample-libre.pdf?1703873195=\u0026response-content-disposition=attachment%3B+filename%3DIntelligence_Studies_Theory_and_Intergro.pdf\u0026Expires=1733034474\u0026Signature=fFbU9PBTdxxw67lbuY5w3pkZAeNf8yOQISv3JAJyGVHPwICYDxiCynUdWZZCAC-fiNxfsS4nrjcvO8-6ks9ComFrvUQxJjsA~DO8ppJEyLv3JY4uRaHagYr1O4FatRq5wgCMOEvxb3VeBhoKKoVzDDQ3HG~-yqpIwx5Gw9GyQbfk6tzHWMiJ0esKWpKW03KEb~u4GvoSgRc9IxShM4LXRVJnGC1k0HsiUKGgRbaCCUgt3SnpqrQJ5VXR1BF0wHBTgh0~1D0per5Fda2QJ9PIYFvi3DPdVQe-5QFZj2IBcgXNaBBbK3E2b5983JWDB3YYxL9Fgx3Rz8TANCNdzl28fg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology"},{"id":13614,"name":"Conflict Resolution","url":"https://www.academia.edu/Documents/in/Conflict_Resolution"},{"id":4047295,"name":"Conflict Resolution Strategy","url":"https://www.academia.edu/Documents/in/Conflict_Resolution_Strategy"}],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="96483899"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/96483899/The_state_terrorism_and_national_security_discourse_forging_the_state_in_a_time_of_terror_in_the_face_of_fear"><img alt="Research paper thumbnail of The state, terrorism, and national security discourse : forging the state in a time of terror, in the face of fear" class="work-thumbnail" src="https://attachments.academia-assets.com/98370480/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/96483899/The_state_terrorism_and_national_security_discourse_forging_the_state_in_a_time_of_terror_in_the_face_of_fear">The state, terrorism, and national security discourse : forging the state in a time of terror, in the face of fear</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="366b8213511e4b7d2bdcbca8d4b1acb4" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:98370480,&quot;asset_id&quot;:96483899,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/98370480/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="96483899"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="96483899"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 96483899; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=96483899]").text(description); $(".js-view-count[data-work-id=96483899]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 96483899; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='96483899']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 96483899, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "366b8213511e4b7d2bdcbca8d4b1acb4" } } $('.js-work-strip[data-work-id=96483899]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":96483899,"title":"The state, terrorism, and national security discourse : forging the state in a time of terror, in the face of fear","translated_title":"","metadata":{"grobid_abstract":"This dissertation explores and interrogates how terrorism is consistently brought into the political and controlled by the power structure, specifically the ways in which national security discourse is used to create a specific knowledge structure and the ways in which discursive practices represent the mobilization of power. In addressing the role of ACKNOWLEDGMENTS The completion of this dissertation is based on the strength, tenacity, support, and encouragement of a variety of people. To all of these people lowe immense gratitude. Nevzat Soguk has been the best advisor one could ask for! Throughout this project, he guided my intellectual development and consistently provided me the confidence needed by always being available for advice, feedback, and the much-needed encouragement. I also appreciate the input and expertise of Drs. Henriksen, Henningsen, Manicas, and Shapiro. I thank Margot Henriksen for her guidance and close reading of the chapters; Manfred Henningsen and Peter Manicas for their support and skepticism that challenged me to defend my ideas and enhance my arguments; and to Michael Shapiro for his encouragement and contributions to my theoretical development. The support of my entire committee and their contributions were invaluable. Coupled with the intellectual and emotion support garnered from my committee, this dissertation would still be only an idea if was not for the love, support, and encouragement of friends and family. To my mother, Shirley Campos, thank you for sharing in my dreams and visions. Your strength, knowledge, and love have been guiding forces throughout my life. Finally, to the most important person in my life, my fabulous wife, Marta GonzaIez-Lloret, this dissertation only came to fruition because of the unabated support, enthusiasm, and love you have consistently given to me and this project. IV DEDICATION This dissertation is dedicated to the memory of my father, Lawrence Eugene Campos, who taught me the value of independent inquiry and analysis. v","publication_date":{"day":null,"month":null,"year":2005,"errors":{}},"grobid_abstract_attachment_id":98370480},"translated_abstract":null,"internal_url":"https://www.academia.edu/96483899/The_state_terrorism_and_national_security_discourse_forging_the_state_in_a_time_of_terror_in_the_face_of_fear","translated_internal_url":"","created_at":"2023-02-07T09:19:01.052-08:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":98370480,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/98370480/thumbnails/1.jpg","file_name":"5101088.pdf","download_url":"https://www.academia.edu/attachments/98370480/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"The_state_terrorism_and_national_securit.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/98370480/5101088-libre.pdf?1675802332=\u0026response-content-disposition=attachment%3B+filename%3DThe_state_terrorism_and_national_securit.pdf\u0026Expires=1733034474\u0026Signature=QFznDPUcnAF4H81lASmOBjEsw4EBu6iUvo5BgIlaFAziwkxZzxH2-o8V8T7GuwQuMEKywNzPV8yEfGqtQGBvqfNTKCaddZKoz7hYpz~VSPu9QmZ1qKGy5IbBOHkC3aXuhYT1SziFXJ7auhs6K-DGXn-cAp89YlhAMkZqDvx30UDmrHYGQCMny9IJ~FghGay4zhwpkk6vYJfQfDVGBt8Dlwd7Qc2sQgtEXkBQ4JlW2IppjvVM9A9gXbW~BSVWWNtWjqPZYtfb1ammm7eHTMCPfvHgzVCPm2xQdnv62j5QPNgkHrUrdmlhmM3egF-fNjvZB9Z0AwAO-im3fV1QGJRFsg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_state_terrorism_and_national_security_discourse_forging_the_state_in_a_time_of_terror_in_the_face_of_fear","translated_slug":"","page_count":268,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":98370480,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/98370480/thumbnails/1.jpg","file_name":"5101088.pdf","download_url":"https://www.academia.edu/attachments/98370480/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"The_state_terrorism_and_national_securit.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/98370480/5101088-libre.pdf?1675802332=\u0026response-content-disposition=attachment%3B+filename%3DThe_state_terrorism_and_national_securit.pdf\u0026Expires=1733034474\u0026Signature=QFznDPUcnAF4H81lASmOBjEsw4EBu6iUvo5BgIlaFAziwkxZzxH2-o8V8T7GuwQuMEKywNzPV8yEfGqtQGBvqfNTKCaddZKoz7hYpz~VSPu9QmZ1qKGy5IbBOHkC3aXuhYT1SziFXJ7auhs6K-DGXn-cAp89YlhAMkZqDvx30UDmrHYGQCMny9IJ~FghGay4zhwpkk6vYJfQfDVGBt8Dlwd7Qc2sQgtEXkBQ4JlW2IppjvVM9A9gXbW~BSVWWNtWjqPZYtfb1ammm7eHTMCPfvHgzVCPm2xQdnv62j5QPNgkHrUrdmlhmM3egF-fNjvZB9Z0AwAO-im3fV1QGJRFsg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":1660,"name":"Terrorism","url":"https://www.academia.edu/Documents/in/Terrorism"},{"id":4486,"name":"Political Science","url":"https://www.academia.edu/Documents/in/Political_Science"},{"id":270103,"name":"Forging","url":"https://www.academia.edu/Documents/in/Forging"}],"urls":[{"id":28775099,"url":"http://scholarspace.manoa.hawaii.edu/handle/10125/11831"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40386174"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40386174/At_the_Nexus_of_Fear_Horror_and_Terror_Introduction"><img alt="Research paper thumbnail of At the Nexus of Fear, Horror and Terror: Introduction" class="work-thumbnail" src="https://attachments.academia-assets.com/60636773/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40386174/At_the_Nexus_of_Fear_Horror_and_Terror_Introduction">At the Nexus of Fear, Horror and Terror: Introduction</a></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="d42a80f3585ea0046feae3125968dd76" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:60636773,&quot;asset_id&quot;:40386174,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/60636773/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40386174"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40386174"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40386174; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40386174]").text(description); $(".js-view-count[data-work-id=40386174]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40386174; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40386174']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 40386174, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "d42a80f3585ea0046feae3125968dd76" } } $('.js-work-strip[data-work-id=40386174]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40386174,"title":"At the Nexus of Fear, Horror and Terror: Introduction","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2013,"errors":{}}},"translated_abstract":null,"internal_url":"https://www.academia.edu/40386174/At_the_Nexus_of_Fear_Horror_and_Terror_Introduction","translated_internal_url":"","created_at":"2019-09-18T12:29:25.849-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[{"id":33033545,"work_id":40386174,"tagging_user_id":35441196,"tagged_user_id":97550695,"co_author_invite_id":null,"email":"d***a@gmail.com","affiliation":"University of Craiova","display_order":1,"name":"Catalin Ghita","title":"At the Nexus of Fear, Horror and Terror: Introduction"}],"downloadable_attachments":[{"id":60636773,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636773/thumbnails/1.jpg","file_name":"FHT-6-240713-2-at_the_nexus_of_fear_horror_and_terror-intro20190918-52060-u3pbca.pdf","download_url":"https://www.academia.edu/attachments/60636773/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"At_the_Nexus_of_Fear_Horror_and_Terror_I.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636773/FHT-6-240713-2-at_the_nexus_of_fear_horror_and_terror-intro20190918-52060-u3pbca-libre.pdf?1568838674=\u0026response-content-disposition=attachment%3B+filename%3DAt_the_Nexus_of_Fear_Horror_and_Terror_I.pdf\u0026Expires=1733034474\u0026Signature=Bs9ISVTj13ddhRmAdAMgBaWd6iOe1Tch6b-wD6ZzmR4w7srit6LqiIbesqKuTR5IroYZzXGUFcsVtep9EBxG938gMGXbA7qk~vamQ6p1uYD-2fyo17nFkp99BFoUhiK-OX28A50OWAEjlwki~KGvzMsjh4hcvnmXF-vSc8esvnAELrBrWdfOc0rwehMMYMNUnnKABVCwIIcsqBkc9gHfgNDy06GY9Pic4yUb5f8xOAqfc5XXPmpYT1KLK5BFXY1ZyW3zN57g85f65FPFOPefBcZ4QKoQ8QZAf0CnaWRbo-Sh8YIO8UfPKsEnfPbRQipzRR63PjQpact5N7mSZANZnA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"At_the_Nexus_of_Fear_Horror_and_Terror_Introduction","translated_slug":"","page_count":13,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":60636773,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636773/thumbnails/1.jpg","file_name":"FHT-6-240713-2-at_the_nexus_of_fear_horror_and_terror-intro20190918-52060-u3pbca.pdf","download_url":"https://www.academia.edu/attachments/60636773/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"At_the_Nexus_of_Fear_Horror_and_Terror_I.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636773/FHT-6-240713-2-at_the_nexus_of_fear_horror_and_terror-intro20190918-52060-u3pbca-libre.pdf?1568838674=\u0026response-content-disposition=attachment%3B+filename%3DAt_the_Nexus_of_Fear_Horror_and_Terror_I.pdf\u0026Expires=1733034474\u0026Signature=Bs9ISVTj13ddhRmAdAMgBaWd6iOe1Tch6b-wD6ZzmR4w7srit6LqiIbesqKuTR5IroYZzXGUFcsVtep9EBxG938gMGXbA7qk~vamQ6p1uYD-2fyo17nFkp99BFoUhiK-OX28A50OWAEjlwki~KGvzMsjh4hcvnmXF-vSc8esvnAELrBrWdfOc0rwehMMYMNUnnKABVCwIIcsqBkc9gHfgNDy06GY9Pic4yUb5f8xOAqfc5XXPmpYT1KLK5BFXY1ZyW3zN57g85f65FPFOPefBcZ4QKoQ8QZAf0CnaWRbo-Sh8YIO8UfPKsEnfPbRQipzRR63PjQpact5N7mSZANZnA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40385925"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40385925/The_State_and_Terrorism_National_Security_and_the_Mobilization_of_Power"><img alt="Research paper thumbnail of The State and Terrorism: National Security and the Mobilization of Power" class="work-thumbnail" src="https://attachments.academia-assets.com/60636497/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40385925/The_State_and_Terrorism_National_Security_and_the_Mobilization_of_Power">The State and Terrorism: National Security and the Mobilization of Power</a></div><div class="wp-workCard_item"><span>Taylor &amp; Francis eBooks</span><span>, 2007</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Adopting an innovative approach to the ongoing debate over homeland security and state response t...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Adopting an innovative approach to the ongoing debate over homeland security and state response to terrorism, Joseph Campos investigates the contextualizing of national security discourse and its management of terrorism. New ideas developed in this book reflect ways in which national security is mobilized through specific discourse to manage threats. In addition, a review of presidential rhetoric over the last 30 years reveals that national security discourse has maintained an ideological hegemony to determine what constitutes violence and appropriate responses. The volume incorporates historical depth and critical theory in a comparative framework to provide an invaluable insight into how national security is developed and how it works with the concept of terrorism to secure the state.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="ce0401e15990b608d13c36fc6dadd4fb" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:60636497,&quot;asset_id&quot;:40385925,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/60636497/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40385925"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40385925"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40385925; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40385925]").text(description); $(".js-view-count[data-work-id=40385925]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40385925; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40385925']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 40385925, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "ce0401e15990b608d13c36fc6dadd4fb" } } $('.js-work-strip[data-work-id=40385925]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40385925,"title":"The State and Terrorism: National Security and the Mobilization of Power","translated_title":"","metadata":{"abstract":"Adopting an innovative approach to the ongoing debate over homeland security and state response to terrorism, Joseph Campos investigates the contextualizing of national security discourse and its management of terrorism. New ideas developed in this book reflect ways in which national security is mobilized through specific discourse to manage threats. In addition, a review of presidential rhetoric over the last 30 years reveals that national security discourse has maintained an ideological hegemony to determine what constitutes violence and appropriate responses. The volume incorporates historical depth and critical theory in a comparative framework to provide an invaluable insight into how national security is developed and how it works with the concept of terrorism to secure the state.","publication_date":{"day":null,"month":null,"year":2007,"errors":{}},"publication_name":"Taylor \u0026 Francis eBooks"},"translated_abstract":"Adopting an innovative approach to the ongoing debate over homeland security and state response to terrorism, Joseph Campos investigates the contextualizing of national security discourse and its management of terrorism. New ideas developed in this book reflect ways in which national security is mobilized through specific discourse to manage threats. In addition, a review of presidential rhetoric over the last 30 years reveals that national security discourse has maintained an ideological hegemony to determine what constitutes violence and appropriate responses. The volume incorporates historical depth and critical theory in a comparative framework to provide an invaluable insight into how national security is developed and how it works with the concept of terrorism to secure the state.","internal_url":"https://www.academia.edu/40385925/The_State_and_Terrorism_National_Security_and_the_Mobilization_of_Power","translated_internal_url":"","created_at":"2019-09-18T11:53:52.638-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":60636497,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636497/thumbnails/1.jpg","file_name":"The_State_and_Terrorism-intro20190918-127813-kwqinv.pdf","download_url":"https://www.academia.edu/attachments/60636497/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"The_State_and_Terrorism_National_Securit.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636497/The_State_and_Terrorism-intro20190918-127813-kwqinv-libre.pdf?1568833363=\u0026response-content-disposition=attachment%3B+filename%3DThe_State_and_Terrorism_National_Securit.pdf\u0026Expires=1733034474\u0026Signature=cui4RG9yuPi0tsSrh7EiNKb57iWNU1610IAS~O8AulNGwSIz2LJvz1KYzmEqCwiF4NEov51Q5Yi87KDEgC3hBY4JfJBt7m~c-MdnNXqbNTX79TUV30wZfDIlt4CGWGhaNxnunv2BnYLc1YJT2WsI5QjOQW1uL0X5SdNJJlnfTbhB1bdkFZTdf4TX4ZItX6DNjcy48EW-HaJ~ddOqami-TgusNTMRHu8N9TyLpFYfQuEjW3kdGrK01IenQAMbnvxiHA9o3vnvUDuOmCMK8oC2Wc9gAcit~uyz3BYTyqbQ0druVgqT1D~ET9-g8ZYJKl8CbKukt~cvYIwvjw4rklw7sw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"The_State_and_Terrorism_National_Security_and_the_Mobilization_of_Power","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":60636497,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636497/thumbnails/1.jpg","file_name":"The_State_and_Terrorism-intro20190918-127813-kwqinv.pdf","download_url":"https://www.academia.edu/attachments/60636497/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"The_State_and_Terrorism_National_Securit.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636497/The_State_and_Terrorism-intro20190918-127813-kwqinv-libre.pdf?1568833363=\u0026response-content-disposition=attachment%3B+filename%3DThe_State_and_Terrorism_National_Securit.pdf\u0026Expires=1733034474\u0026Signature=cui4RG9yuPi0tsSrh7EiNKb57iWNU1610IAS~O8AulNGwSIz2LJvz1KYzmEqCwiF4NEov51Q5Yi87KDEgC3hBY4JfJBt7m~c-MdnNXqbNTX79TUV30wZfDIlt4CGWGhaNxnunv2BnYLc1YJT2WsI5QjOQW1uL0X5SdNJJlnfTbhB1bdkFZTdf4TX4ZItX6DNjcy48EW-HaJ~ddOqami-TgusNTMRHu8N9TyLpFYfQuEjW3kdGrK01IenQAMbnvxiHA9o3vnvUDuOmCMK8oC2Wc9gAcit~uyz3BYTyqbQ0druVgqT1D~ET9-g8ZYJKl8CbKukt~cvYIwvjw4rklw7sw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="40385859"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/40385859/Terrorism_Security_and_the_State_Reframing_terror_for_a_new_dialogue"><img alt="Research paper thumbnail of Terrorism, Security, and the State: Reframing terror for a new dialogue" class="work-thumbnail" src="https://attachments.academia-assets.com/60636400/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/40385859/Terrorism_Security_and_the_State_Reframing_terror_for_a_new_dialogue">Terrorism, Security, and the State: Reframing terror for a new dialogue</a></div><div class="wp-workCard_item"><span>Journal of International Relations Research Violence and Terrorism, Issue 1</span><span>, 2012</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">This  article  will  address  the  ways  in  which  the  state  articulates  itself  as  a  domai...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">This  article  will  address  the  ways  in  which  the  state  articulates  itself  as  a  domain  of  knowledge  and  power  in  the  discourse on Terrorism and Violence.&nbsp; Specifically this article will explore the language utilized within the dialogue of security in regard to terrorism.&nbsp; The language utilized is highly social, meaningful, and consistently entrenched in a social  contexts  that  incorporate  experiences  and  histories.    Words  are  essentially  empty  and  only  gain  meaning  through&nbsp; language&nbsp; and&nbsp; dialogue.&nbsp; Taking&nbsp; the&nbsp; concept&nbsp; that&nbsp; language&nbsp; is&nbsp; action&nbsp; in&nbsp; a&nbsp; dialogue&nbsp; with&nbsp; social&nbsp; context, several items  can  be  deduced.   Primarily,  the  interaction  of  language  dialogue  involves  a  level  of  power.   In  the  existence of power relations, all interaction is subject to values and norms enacting themselves.&nbsp; Given the existence of this power relation, dialogue is synchronic and diachronic in that dialogue is connected to other events that occur concurrently  or  have  historical  relevance.   This  synchronic  and  diachronic  nature  of  discourse  is  enacted  in  the  intertextuality&nbsp; of&nbsp; discourse&nbsp; (Der&nbsp; Derian&nbsp; &amp;&nbsp; Sahpiro,&nbsp; 1989).&nbsp; Finally,&nbsp; given&nbsp; power&nbsp; relations&nbsp; and&nbsp; the&nbsp; intertextuality&nbsp; of dialogue,  multiple  interpretations  are  possible  as  they  are  connected  to  the  location  and  understanding  of  the  individual&nbsp; participants&nbsp; –&nbsp; speaker,&nbsp; listener,&nbsp; and&nbsp; viewer.&nbsp; Interpretations&nbsp; are&nbsp; loaded&nbsp; with&nbsp; the&nbsp; values&nbsp; that&nbsp; affect&nbsp; the power of dialogue as it pushes at the parameters of what is typically seen as violence and terror, and ask questions regarding the dynamics of terror and violence.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="390893aad0630c122994bbb1b712ab0c" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:60636400,&quot;asset_id&quot;:40385859,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/60636400/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="40385859"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="40385859"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40385859; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40385859]").text(description); $(".js-view-count[data-work-id=40385859]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40385859; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='40385859']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 40385859, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "390893aad0630c122994bbb1b712ab0c" } } $('.js-work-strip[data-work-id=40385859]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":40385859,"title":"Terrorism, Security, and the State: Reframing terror for a new dialogue","translated_title":"","metadata":{"abstract":"This  article  will  address  the  ways  in  which  the  state  articulates  itself  as  a  domain  of  knowledge  and  power  in  the  discourse on Terrorism and Violence. Specifically this article will explore the language utilized within the dialogue of security in regard to terrorism. The language utilized is highly social, meaningful, and consistently entrenched in a social  contexts  that  incorporate  experiences  and  histories.    Words  are  essentially  empty  and  only  gain  meaning  through language and dialogue. Taking the concept that language is action in a dialogue with social context, several items  can  be  deduced.   Primarily,  the  interaction  of  language  dialogue  involves  a  level  of  power.   In  the  existence of power relations, all interaction is subject to values and norms enacting themselves. Given the existence of this power relation, dialogue is synchronic and diachronic in that dialogue is connected to other events that occur concurrently  or  have  historical  relevance.   This  synchronic  and  diachronic  nature  of  discourse  is  enacted  in  the  intertextuality of discourse (Der Derian \u0026 Sahpiro, 1989). Finally, given power relations and the intertextuality of dialogue,  multiple  interpretations  are  possible  as  they  are  connected  to  the  location  and  understanding  of  the  individual participants – speaker, listener, and viewer. Interpretations are loaded with the values that affect the power of dialogue as it pushes at the parameters of what is typically seen as violence and terror, and ask questions regarding the dynamics of terror and violence. ","publication_date":{"day":null,"month":null,"year":2012,"errors":{}},"publication_name":"Journal of International Relations Research Violence and Terrorism, Issue 1"},"translated_abstract":"This  article  will  address  the  ways  in  which  the  state  articulates  itself  as  a  domain  of  knowledge  and  power  in  the  discourse on Terrorism and Violence. Specifically this article will explore the language utilized within the dialogue of security in regard to terrorism. The language utilized is highly social, meaningful, and consistently entrenched in a social  contexts  that  incorporate  experiences  and  histories.    Words  are  essentially  empty  and  only  gain  meaning  through language and dialogue. Taking the concept that language is action in a dialogue with social context, several items  can  be  deduced.   Primarily,  the  interaction  of  language  dialogue  involves  a  level  of  power.   In  the  existence of power relations, all interaction is subject to values and norms enacting themselves. Given the existence of this power relation, dialogue is synchronic and diachronic in that dialogue is connected to other events that occur concurrently  or  have  historical  relevance.   This  synchronic  and  diachronic  nature  of  discourse  is  enacted  in  the  intertextuality of discourse (Der Derian \u0026 Sahpiro, 1989). Finally, given power relations and the intertextuality of dialogue,  multiple  interpretations  are  possible  as  they  are  connected  to  the  location  and  understanding  of  the  individual participants – speaker, listener, and viewer. Interpretations are loaded with the values that affect the power of dialogue as it pushes at the parameters of what is typically seen as violence and terror, and ask questions regarding the dynamics of terror and violence. ","internal_url":"https://www.academia.edu/40385859/Terrorism_Security_and_the_State_Reframing_terror_for_a_new_dialogue","translated_internal_url":"","created_at":"2019-09-18T11:40:13.599-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":35441196,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":60636400,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636400/thumbnails/1.jpg","file_name":"JIRR-Issue_1-Campos20190918-93940-76y1lo.pdf","download_url":"https://www.academia.edu/attachments/60636400/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Terrorism_Security_and_the_State_Reframi.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636400/JIRR-Issue_1-Campos20190918-93940-76y1lo-libre.pdf?1568832339=\u0026response-content-disposition=attachment%3B+filename%3DTerrorism_Security_and_the_State_Reframi.pdf\u0026Expires=1733034474\u0026Signature=cqVC4EvA7rVe1N16WMmJMqMWbWB25AT6Ik4Hu4ihakKTdOrKZvEJDPH7STrfZQgnwEt5Jwj-eImdddVouYuQMib1rreUEX75nz2PKVt0kADnQGUJYKLzsSnl7bC5tKnz65v5CHPQtS9gpQuIczQy0qg87xPBqTefOuh-JD39Ir6ha6JkhTci3qFT3YK74Vj4O7wOcAWa4Q8MnNYDod30riCDKCUnUL67uAQ7uBGxFdN67u-eckCqKMGQObiLy0tncoGomrhbtQs0w0wGjAoQ3y4ugBlGlQhOD6UuJq~gPMhB~NKBvLhgZsE0JzcJtLT4apF0EQLnOj24tBcdi~Qq3g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Terrorism_Security_and_the_State_Reframing_terror_for_a_new_dialogue","translated_slug":"","page_count":17,"language":"en","content_type":"Work","owner":{"id":35441196,"first_name":"Joseph","middle_initials":"H","last_name":"Campos II","page_name":"JosephCamposII","domain_name":"independent","created_at":"2015-09-30T11:16:04.758-07:00","display_name":"Joseph H Campos II","url":"https://independent.academia.edu/JosephCamposII"},"attachments":[{"id":60636400,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/60636400/thumbnails/1.jpg","file_name":"JIRR-Issue_1-Campos20190918-93940-76y1lo.pdf","download_url":"https://www.academia.edu/attachments/60636400/download_file?st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&st=MTczMzAzMDg3NCw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Terrorism_Security_and_the_State_Reframi.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/60636400/JIRR-Issue_1-Campos20190918-93940-76y1lo-libre.pdf?1568832339=\u0026response-content-disposition=attachment%3B+filename%3DTerrorism_Security_and_the_State_Reframi.pdf\u0026Expires=1733034474\u0026Signature=cqVC4EvA7rVe1N16WMmJMqMWbWB25AT6Ik4Hu4ihakKTdOrKZvEJDPH7STrfZQgnwEt5Jwj-eImdddVouYuQMib1rreUEX75nz2PKVt0kADnQGUJYKLzsSnl7bC5tKnz65v5CHPQtS9gpQuIczQy0qg87xPBqTefOuh-JD39Ir6ha6JkhTci3qFT3YK74Vj4O7wOcAWa4Q8MnNYDod30riCDKCUnUL67uAQ7uBGxFdN67u-eckCqKMGQObiLy0tncoGomrhbtQs0w0wGjAoQ3y4ugBlGlQhOD6UuJq~gPMhB~NKBvLhgZsE0JzcJtLT4apF0EQLnOj24tBcdi~Qq3g__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "cd51eca2d1dfa8c26d81406b792ad2231827f9266b250f01356588afc68ac188", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="Y3zk2SkDL+H+A8bA99RX8X6sT5kCBJhkqWLz3JcL+Vg4P9x3QsXlEjXus93k236PQFDd3iL2X/+wNTA5XaGSEg==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://independent.academia.edu/JosephCamposII" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="MA5Kbw8fQURX4Bcjd5kiW/NDH9ayTexqrG49Kn6X7tNrTXLBZNmLt5wNYj5klgslzb+NkZK/K/G1Of7PtD2FmQ==" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10