207,232 research outputs found

    Visual securitization of Calais migrants

    Get PDF
    Since the advent of social media, political communication has become increasingly visual. The increasing use of visuals in political and security discourses presents fundamental challenges to Securitization Theory (ST), which analyses security through the performative aspect of a speech-act. Texts and visuals complement each other to generate security constructions and therefore, ST needs to adopt a multimodal analysis to theorize the performative aspect of text and visuals in combination. This thesis has two main objectives. First, to present a visual securitization framework that can analyse how discourses of security are constructed through visuals. This will be achieved by drawing theoretical and methodological insights from Rose’s four sites of critical visual methodology, which analyses a visual’s meaning-making along its production, circulation, and consumption stages. The applicability of the framework will be demonstrated through the case study of Calais migrant situation, where visuals were used by truck drivers, travellers and mass media to Calais migrants as security threat. The second aim of thesis is to analyse how visuals can facilitate the saliency of securitizing moves of actors with insignificant positional power. This thesis argues that for actors with insignificant positional power, visuals are an effective heuristic artefact to gain publicity around their securitizing moves. To this effect, the thesis highlights the importance of publicity in the ST.https://www.ester.ee/record=b5243229*es

    Arvida and the SEC: Prefiling Publicity

    Get PDF

    Modern Application of the Roman Institution of fiducia cum creditore contracta

    Get PDF
    This is a preprint of a piece that appeared in Letitia Vacca, ed., La Garanzia nella prospettiva storico-comparatisca (Torino, 2003), pp. 327-44.The author illustrates the modern application of the Roman fiducia cum creditore contracta by reference to the South African case of Nedcor Bank Ltd v Absa Bank Ltd 1998 2 SA 830 (W)

    Problems of Codifying Security Law

    Get PDF

    Privacy as an Asset

    Get PDF
    Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a definition of informational privacy that is simple, yet strongly tied with the concepts of information and property. Privacy thus defined is similar to intellectual property and should receive commensurate legal protection

    The origins of SOE in France

    Get PDF
    This article explores the official motivation behind the authorization in 1960 of research into the activities of the Special Operations Executive (SOE) during the Second World War by M. R. D. Foot, leading to the publication of SOE in France in 1966. The work has traditionally been viewed as the official response to critical investigative works on SOE published during the 1950s, combined with the vocal campaign of Dame Irene Ward, who made several calls in the House of Commons for an official account of SOE to be published. Material now available at the Public Record Office reveals that these were not the sole considerations in official minds, nor the most significant, concerning the possibility of publishing such a work. The foreign office was particularly concerned that Britain's contribution to wartime resistance in Europe, exemplified by SOE, was being overshadowed by both soviet propoganda, emphasizing the communist contribution to resistance, and the publicity being given to SOE's American counterpart, the Office of Strategic Services (OSS). The ‘campaign’ of Dame Irene Ward, supported by the negative slant given to SOE in the books of Jean Overton Fuller and Elizabeth Nicholas, unknowingly gave support to a frame of mind that was already in existence in favour of an unofficial account of SOE activity, albeit for different reasons

    Terrorism and the Internet: new media - new threat?

    Get PDF
    The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and follows up with examples. The final section of the paper describes the responses of government, law enforcement, intelligence agencies, and others to the terrorism-Internet nexus. There is a particular emphasis within the text on the UK experience, although examples from other jurisdictions are also employed

    Role of the officer in Air Force Public Relations

    Full text link
    Thesis (M.S.)--Boston Universit
    corecore