283 research outputs found

    EinfĂŒhrung von Substituenten in den 7-Ring des Azulens mit Hilfe metallorganischer Verbindungen

    Get PDF
    Die Erkenntnis, daß das Azulen ein inneres Fulven darstellt, gab zu Versuchen Anlaß, Metallalkyle bzw. -aryle auf das kondensierte 5-, 7-Ring-System einwirken zu lassen

    Combatting insecurity in the everyday: the global anti-street harassment movement as everyday security practitioners

    Get PDF
    Street harassment renders countless women, girls and others insecure in their everyday lives. Over the past two decades a global grassroots movement developed to combat street harassment and its attendant insecurities. But neither phenomenon has excited the attention of Security Studies, critical or otherwise. In this paper, we focus on the global anti-street harassment movement, conceptualising its activists as ‘everyday security practitioners’ who, like privileged security practitioners in the state or the academy, theorise street harassment and devise and implement strategies to tackle it. In so doing we argue that Security Studies should pay more attention to the everyday, to insecurities like street harassment, and to such ‘everyday security practitioners’. To illustrate this argument we first define street harassment. We then consider Security Studies and its exclusion of the everyday. To argue for its inclusion in Security Studies, we explicate the diverse insecurities produced by street harassment, conceptualise 'everyday security practitioners’, and provide some illustrations of strategies deployed by the global anti-street harassment movement both to bring street harassment to wider public attention as a pervasive everyday insecurity and to combat it. We conclude with two suggestions for Security Studies

    A proteção de dados virtuais no Brasil: a regulamentação do uso de dados virtuais pessoais no Brasil sob a influĂȘncia das normas europeias

    Get PDF
    The present work aims to describe the Brazilian General Data Protection Law under the aegis of the European Law. With the technology advance and mainly the world wide web, the personal data became to be used more widely because there is a massive spread of them in the internet through the information collected on the web. Nowadays, in a society highly connected to technology, the internet is already used by more than a half of the world’s population, the cases where those personal informations are used without the consent or even leaked by companies to be used with business purposes are recurrent, affecting peoples’ privacy. Then, this article analyses the evolving context of the European Laws and the Brazilian ones to analyse their structure with the technological developments. Here, the influence of the european law on the brazilian one and how they are related will be analysed to explain how the european law built the Brazilian law. Then, this is an exploratory research using the qualitative and analytical research being a literature review.O presente trabalho analisou a lei de proteção de dados brasileira sob a Ă©gide da lei europeia. Com a evolução da tecnologia e principalmente da rede de computadores, os dados pessoais passaram a ser utilizados de modo amplo, jĂĄ que hĂĄ uma massiva disseminação deles na internet por meio de informaçÔes coletadas na rede. Atualmente, em uma sociedade altamente ligada Ă  tecnologia e que a internet jĂĄ Ă© utilizada por mais da metade da população mundial, sĂŁo recorrentes os casos em que essas informaçÔes pessoais importantes sĂŁo utilizadas sem consentimento ou atĂ© mesmo compartilhadas por empresas para serem utilizadas com fim comercial afetando a privacidade das pessoas. Dessa maneira, este artigo analisou o contexto evolutivo das leis de proteção de dados tanto na Europa, quanto no Brasil para analisar a sua estrutura junto com a evolução tecnolĂłgica. Aqui, tambĂ©m foi analisada a influĂȘncia da lei Europeia na Brasileira e como essas leis se relacionam para explicar como a lei europeia moldou a brasileira e como ela afeta a proteção de dados no Brasil. Logo, esta pesquisa tem o carĂĄter exploratĂłrio utilizando como metodologia a pesquisa qualitativa e analĂ­tica envolvendo assim uma revisĂŁo bibliogrĂĄfica

    The ontological security of special relationships: the case of Germany’s relations with Israel

    Get PDF
    This article suggests studying special relationships in international politics from an ontological security perspective. It argues that conceptualising the partners to special relationships as ontological security-seekers provides a promising theoretical angle to address gaps in our understanding of three important dimensions of such relations: their emergence and stability; the processes and practices of maintaining them; and the power relations within special relations. The article illustrates its theoretical argument in a case study on the German-Israeli relationship. The close partnership between the two countries that has developed since the Holocaust ranks as one of the most remarkable examples of special relationships in the international arena. We argue that foregrounding the ontological security which the special relationship provides in particular for Germany sheds important new light on how German-Israeli relations have developed. Specifically, we hold that Germany’s ontological security needs already were an important driver in establishing the relationship and have been a key stabiliser of it ever since; that the ontological security perspective can make sense of three interrelated practices of maintaining the ‘specialness’ of the relationship; and that the asymmetries between the ontological security needs of the two partners help account for Israel’s political leverage in the relationship

    Captured by the camera's eye: Guantanamo and the shifting frame of the Global War on Terror

    Get PDF
    In January 2002, images of the detention of prisoners held at US Naval Station Guantanamo Bay as part of the Global War on Terrorism were released by the US Department of Defense, a public relations move that Secretary of Defense Donald Rumsfeld later referred to as ‘probably unfortunate’. These images, widely reproduced in the media, quickly came to symbolise the facility and the practices at work there. Nine years on, the images of orange-clad ‘detainees’ – the ‘orange series’ – remain a powerful symbol of US military practices and play a significant role in the resistance to the site. However, as the site has evolved, so too has its visual representation. Official images of these new facilities not only document this evolution but work to constitute, through a careful (re)framing (literal and figurative), a new (re)presentation of the site, and therefore the identities of those involved. The new series of images not only (re)inscribes the identities of detainees as dangerous but, more importantly, work to constitute the US State as humane and modern. These images are part of a broader effort by the US administration to resituate its image, and remind us, as IR scholars, to look at the diverse set of practices (beyond simply spoken language) to understand the complexity of international politic

    Re-imagining the Borders of US Security after 9/11: Securitisation, Risk, and the Creation of the Department of Homeland Security

    Get PDF
    The articulation of international and transnational terrorism as a key issue in US security policy, as a result of the 9/11 attacks, has not only led to a policy rethink, it has also included a bureaucratic shift within the US, showing a re-thinking of the role of borders within US security policy. Drawing substantively on the 'securitisation' approach to security studies, the article analyses the discourse of US security in order to examine the founding of the Department of Homeland Security, noting that its mission provides a new way of conceptualising 'borders' for US national security. The securitisation of terrorism is, therefore, not only represented by marking terrorism as a security issue, it is also solidified in the organisation of security policy-making within the US state. As such, the impact of a 'war on terror' provides an important moment for analysing the re-articulation of what security is in the US, and, in theoretical terms, for reaffirming the importance of a relationship between the production of threat and the institutionalisation of threat response. © 2007 Taylor & Francis
    • 

    corecore