207,232 research outputs found
Visual securitization of Calais migrants
Since the advent of social media, political communication has become increasingly visual. The increasing use of visuals in political and security discourses presents fundamental challenges to Securitization Theory (ST), which analyses security through the performative aspect of a speech-act. Texts and visuals complement each other to generate security constructions and therefore, ST needs to adopt a multimodal analysis to theorize the performative aspect of text and visuals in combination.
This thesis has two main objectives. First, to present a visual securitization framework that can analyse how discourses of security are constructed through visuals. This will be achieved by drawing theoretical and methodological insights from Rose’s four sites of critical visual methodology, which analyses a visual’s meaning-making along its production, circulation, and consumption stages. The applicability of the framework will be demonstrated through the case study of Calais migrant situation, where visuals were used by truck drivers, travellers and mass media to Calais migrants as security threat.
The second aim of thesis is to analyse how visuals can facilitate the saliency of securitizing moves of actors with insignificant positional power. This thesis argues that for actors with insignificant positional power, visuals are an effective heuristic artefact to gain publicity around their securitizing moves. To this effect, the thesis highlights the importance of publicity in the ST.https://www.ester.ee/record=b5243229*es
Modern Application of the Roman Institution of fiducia cum creditore contracta
This is a preprint of a piece that appeared in Letitia Vacca, ed., La Garanzia nella prospettiva storico-comparatisca (Torino, 2003), pp. 327-44.The author illustrates the modern application of the Roman fiducia cum creditore contracta by reference to the South African case of Nedcor Bank Ltd v Absa Bank Ltd 1998 2 SA 830 (W)
Privacy as an Asset
Many attempts to define privacy have been made over the last century. Early definitions and theories of privacy had little to do with the concept of information and, when they did, only in an informal sense. With the advent of information technology, the question of a precise and universally acceptable definition of privacy in this new domain became an urgent issue as legal and business problems regarding privacy started to accrue. In this paper, I propose a definition of informational privacy that is simple, yet strongly tied with the concepts of information and property. Privacy thus defined is similar to intellectual property and should receive commensurate legal protection
The origins of SOE in France
This article explores the official motivation behind the authorization in 1960 of research into the activities of the Special Operations Executive (SOE) during the Second World War by M. R. D. Foot, leading to the publication of SOE in France in 1966. The work has traditionally been viewed as the official response to critical investigative works on SOE published during the 1950s, combined with the vocal campaign of Dame Irene Ward, who made several calls in the House of Commons for an official account of SOE to be published. Material now available at the Public Record Office reveals that these were not the sole considerations in official minds, nor the most significant, concerning the possibility of publishing such a work. The foreign office was particularly concerned that Britain's contribution to wartime resistance in Europe, exemplified by SOE, was being overshadowed by both soviet propoganda, emphasizing the communist contribution to resistance, and the publicity being given to SOE's American counterpart, the Office of Strategic Services (OSS). The ‘campaign’ of Dame Irene Ward, supported by the negative slant given to SOE in the books of Jean Overton Fuller and Elizabeth Nicholas, unknowingly gave support to a frame of mind that was already in existence in favour of an unofficial account of SOE activity, albeit for different reasons
A comparative study of the public relations programs and policies in schools and businesses
Thesis (Ed.M.)--Boston Universit
Terrorism and the Internet: new media - new threat?
The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and follows up with examples. The final section of the paper describes the responses of government, law enforcement, intelligence agencies, and others to the terrorism-Internet nexus. There is a particular emphasis within the text on the UK experience, although examples from other jurisdictions are also employed
Role of the officer in Air Force Public Relations
Thesis (M.S.)--Boston Universit
- …