Results 101 to 110 of about 49,938 (311)

A voice against criminal networks in Africa [PDF]

open access: yes, 2015
The U.S. Federal Bureau of Investigation (FBI) says Nigerian ‘criminal enterprises’ are considerable.https://www.researchgate.net/publication/292762733_A_voice_against_criminal_networks_in_AfricaPublished versionPublished ...
Goncalves, Marcus
core  

National identity after conquest

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Conquering powers routinely adopt state‐directed nationalization projects that seek to make the boundaries of the nation coterminous with the (newly expanded) boundaries of the state. To this end, they implement policies that elevate the economic status of individuals who embrace the occupier's national identity and discriminate against those ...
Christopher Carter, Daniel W. Gingerich
wiley   +1 more source

Borders Manifest: Racializing the Nicaraguan Refugee in Costa Rica [PDF]

open access: yes, 2019
I look to border responses of North American countries as refugees and migrants move across them to argue that border responses racialize the foreign other in receiving countries.
Twidwell, Theodore B.
core   +1 more source

TRENDS: Police Militarization and the Use of Lethal Force

open access: yesPolitical research quarterly, 2018
In recent years, the killing of suspects by police and the “militarization” of police have drawn considerable public attention, but there is little analysis of a relationship between the two.
E. Lawson
semanticscholar   +1 more source

The logic of secret alliances

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Alliances are typically understood as agreements intended to deter aggression from enemy states. By signaling an ally's commitment to a protégé state, a shared enemy may be deterred from attacking. In light of this signaling logic, secret alliances are puzzling.
Peter Bils, Bradley C. Smith
wiley   +1 more source

CYBERSECURITY IN CENTRAL EASTERN EUROPE: FROM IDENTIFYING RISKS TO COUNTERING THREATS

open access: yesBaltic Journal of Political Science, 2017
Today, ensuring security in cyberspace is a top priority of national security policy for most states. States’ approaches to cybersecurity can be divided into two categories: those that regard cybersecurity as a civilian task; and those that involve their
Agnija Tumkevič
doaj   +1 more source

Haunted by Houses: Built and Lived Absences in a Transnational Mexican Community

open access: yesAnthropology of Consciousness, EarlyView.
ABSTRACT Globally, millions of migrants have sent money home to build a house. In early phases of migration, remittance houses are aspirational objects that materialize the continuous belonging of migrants to a community. In later stages, experiences of loss, estrangement, deportation, and death increasingly challenge these attachments.
Julia Pauli
wiley   +1 more source

Conflict, Gendered Borders, and Emotional Mobility: The Case of Kashmiri Women Seeking Legal Justice

open access: yesSocieties
How do Kashmiri women, seeking justice for the enforced disappearance and detention of their male relatives, navigate and negotiate with the gendered borders of ‘spaces of legality’?
Sweta Sen, Aarash Pirzada
doaj   +1 more source

“Dreams Don’t Come True in Eritrea”: Anomie and Family Disintegration due to the Structural Militarization of Society [PDF]

open access: yes
This article analyzes contemporary Eritrea’s acute crisis within the framework of the theory of anomie. It is based on the hypothesis that militarization, forced labor, mass exodus, and family disintegration can be interpreted as the consequences of two ...
Nicole Hirt
core  

Home - About - Disclaimer - Privacy