21,283 research outputs found

    Introduction: Everyday narratives in world politics

    Get PDF
    Political science and international relations scholarship increasingly places substantive emphasis on, to put it broadly, the power of discourse in shaping world politics. This Special Issue develops a research agenda that seeks to consolidate a set of data collection and analysis strategies that can be used in studying the way in which elite-driven discourses are legitimated and challenged – in other words, an agenda for studying everyday narratives in world politics. In doing so, the Special Issue makes a threefold contribution: it analyses how key themes with world politics are reproduced and narrated; it demonstrates the need to go beyond ‘methodological elitism’ in understanding narratives, legitimacy, and world politics; and it highlights some of the methodological and practical issues in researching everyday narratives. In this introductory article, we situate the Special Issue within a critique of constructivist methodology broadly conceived, conceptualise everyday sites of politics, and finally, provide an overview of the articles in the issue

    Child’s Play: Cooperative Gaming as a Tool of Deradicalization

    Get PDF
    Research in the field of countering violent extremism (CVE) has grown significantly in the last few decades. This research project contributes to the CVE literature by studying narratives as tools of reflections on self-identity designed intentionally within gaming exercises to help contextualize and account for as much environmental complexity as possible. This paper provides theoretical understandings of narratives (and their role in our lives), discusses narratives as they relate to violent extremist ideologies, and proposes how narrative reflections may serve as a deradicalization tool within cooperative games. Additionally, this article highlights elements of narrative reflection within current CVE resources and provides a list of exercises (games) that can be used in the field to promote narrative reflections

    Toward a constructivist model of radicalization and deradicalization: a conceptual and methodological proposal.

    Get PDF
    © 2019 Feixas and Winter.This article identifies common features of existing models of radicalization and deradicalization, such as the transition from uncertainty to certainty, before integrating these in a model based upon personal construct theory. It is proposed that the personal construct concepts of validation and invalidation are particularly relevant to processes of identity change such as radicalization and deradicalization. Thus, it is argued that radicalization occurs when major invalidation of an individual’s construing is followed by the development of a new radicalized view of the world that provides a turning point in his or her sense of identity and a more structured and certain view of the world. There is likely to be seeking out of validation for this view in interactions with others who share similar views or by extorting evidence for the individual’s radical constructions. These constructions are likely to involve extreme negative views of another group, by contrast to members of which, and possibly by taking extreme action against this group, the individual’s new self-construction may become further defined. These same processes can be seen to operate in deradicalization, and it will therefore be argued that the model has implications for the development of deradicalization programs. A further advantage of the model is that it has an associated personal construct methodology, particularly repertory grid technique, that may be used to investigate processes of radicalization and deradicalization. As illustrations of such investigations, results will be summarized from a repertory grid study of Salafist Muslims in Tunisia, some of whom had returned from fighting in Syria, and an analysis of the writings of the Norwegian mass murderer Anders Breivik. The findings of these investigations are argued to be consistent with the personal construct model of radicalization and deradicalization.Peer reviewe

    A Cosmopolitan response to the 'war on terror'

    Get PDF
    This article explores the relevance and the significance of cosmopolitanism as an approach to understanding the ‘war on terror’. The article details how cosmopolitanism affords a perspective through which it is possible to critique and deconstruct the ‘war on terror’ and create narratives which include the impact of harmful state practices. The facets of cosmopolitanism which make it relevant to the ‘war on terror’ include its emphasis on justice and human rights. It also accounts for interactions between the global level and the local level, which are necessary to understanding the contemporary discourses of securitization and deviancy which are prominent in the ‘war on terror’. Through discussing the value of cosmopolitanism, and its concepts of human rights, equality, humanity, ethics, responsibility and justice, the article demonstrates how although the ‘war on terror’ has been constructed to defend and uphold such values, it has eroded these very values and in doing so, it facilitates the radicalization process

    Convergence towards a European strategic culture? A constructivist framework for explaining changing norms.

    Get PDF
    The article contributes to the debate about the emergence of a European strategic culture to underpin a European Security and Defence Policy. Noting both conceptual and empirical weaknesses in the literature, the article disaggregates the concept of strategic culture and focuses on four types of norms concerning the means and ends for the use of force. The study argues that national strategic cultures are less resistant to change than commonly thought and that they have been subject to three types of learning pressures since 1989: changing threat perceptions, institutional socialization, and mediatized crisis learning. The combined effect of these mechanisms would be a process of convergence with regard to strategic norms prevalent in current EU countries. If the outlined hypotheses can be substantiated by further research the implications for ESDP are positive, especially if the EU acts cautiously in those cases which involve norms that are not yet sufficiently shared across countries

    Technical vs Ideological Manipulation of MENA Political Narratives via Subtitling

    Get PDF
    MENA political conflicts have inculcated controversial narratives, giving rise to deep-seated political tensions and combat, locally and globally. Political media can accentuate or contest such narratives and, sometimes, even create new ones. Narratives dwell in their source text until they are relocated to the target text through the translation process, in which they can often be subject to multi-level manipulation in proportion to the ideological constraints of translators and their institutions. Subtitling, in particular, also has its own technical constraints that can require textual manipulation. This variation of constraints motivated the study to investigate whether manipulation is technically necessitated or ideologically driven. The ultimate purpose is to raise awareness of the commonly unrecognised role of ideology in manipulating the subtitling of political narratives under the pretext of technicality. Focusing on the Arabic–English subtitling of MENA political narratives produced by Monitor Mideast, Palestinian Media Watch, and Middle East Media Research Institute, the investigation starts with the first phase, where a micro-analysis drawing on Gottlieb’s (1992) subtitling strategies differentiates between the subtitlers’ technical and ideological choices. The second phase of the investigation comprises of a macro-analysis (comprehensive framework) drawing on Baker’s (2006a) narrative account, which interprets the subtitlers’ ideological choices for the text in association with broader patterns of manipulation in the paratext and context. The study discussed concrete examples where ideology—rather than a technicality—manifested in textual choices. Coherently woven, furthermore, the narrative distortion shown was not only limited to the text but also included the paratext and context. Besides paratextual verbal manipulation (e.g., using different titles), there were also higher-level patterns of non-verbal manipulation that included reconfiguring the original narrative features. These multi-level manipulation patterns have ultimately led to the source text narratives being reframed in the target text

    Cloaked Facebook pages: Exploring fake Islamist propaganda in social media

    Get PDF
    This research analyses cloaked Facebook pages that are created to spread political propaganda by cloaking a user profile and imitating the identity of a political opponent in order to spark hateful and aggressive reactions. This inquiry is pursued through a multi-sited online ethnographic case study of Danish Facebook pages disguised as radical Islamist pages, which provoked racist and anti-Muslim reactions as well as negative sentiments towards refugees and immigrants in Denmark in general. Drawing on Jessie Daniels’ critical insights into cloaked websites, this research furthermore analyses the epistemological, methodological and conceptual challenges of online propaganda. It enhances our understanding of disinformation and propaganda in an increasingly interactive social media environment and contributes to a critical inquiry into social media and subversive politics

    Crime scripting: A systematic review

    Get PDF
    The file attached to this record is the author's final peer reviewed version.More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been applied in our community. The study provides evidence confirming that the approach is increasingly popular; and takes stock of crime scripting practices through a systematic review of over one hundred scripts published between 1994 and 2018. The results offer the first comprehensive picture of this approach, and highlights new directions for those interested in using data from cyber-systems and the Internet of Things to develop effective situational crime prevention measures
    • …
    corecore