Search results
1 – 10 of 21
Mobilization by diaspora activists against illiberalism in their country of origin and by immigrants for equality in their country of settlement has received widespread attention…
Abstract
Mobilization by diaspora activists against illiberalism in their country of origin and by immigrants for equality in their country of settlement has received widespread attention in political science and sociology, respectively. However, because extant studies treat these mobilizations as distinct types, little is known about the relationship between diaspora and immigrant mobilization. This chapter addresses this theoretical gap using 167 interviews with Syrian and Yemeni activists in the United States and Britain. The findings demonstrate how Syrian and Yemeni diaspora mobilization in support of the 2011 Arab Spring revolutions facilitated their visibility and voice as immigrants. Syrians built an organizational field with the capacity to contest host-country discrimination and local extremism; Yemenis instituted protests and brokerage that shaped the context of reception for home-country elites and challenged intragroup inequality. At the same time, economic disparities between national groups shaped their capacities to diversify tactics and sustain efforts over time. My chief claim is that diaspora mobilization facilitates immigrant voice and visibility but is mitigated in important ways by group-wise resources. The chapter concludes by emphasizing the importance of voice and visibility among marginalized groups subjected to intersecting repressions.
Details
Keywords
What kinds of support do interstate rivals provide to domestic actors in ongoing civil wars? And how do domestic actors utilize the support they receive? This chapter answers…
Abstract
What kinds of support do interstate rivals provide to domestic actors in ongoing civil wars? And how do domestic actors utilize the support they receive? This chapter answers these questions by comparing Iranian and Saudi military and non-military (mediation, foreign aid and religious soft-power promotion) support to the Houthis and to the Government of Yemen (GoY) during the Saada wars (2004–2010) and the internationalized civil war (2015–2018). It also focuses on the processes through which the GoY and the Houthis have utilized this support for their own strategic purposes. This chapter applies a structured, focused comparison methodology and relies on data from a review of both primary and secondary sources complemented by 14 interviews. This chapter finds that there were less external interventions in the conflict in Saada than in the internationalized civil war. During the latter, a broader set of intervention strategies enabled further instrumentalization by domestic actors, which in turn contributed to the protracted nature of the conflict. This chapter contributes to the literature on interstate rivalry and third-party intervention. The framework of analysis is applicable to civil wars that experience intervention by rivals, such as Syria or Libya.
Details
Keywords
Shekhar Ashok Pawar and Hemant Palivela
Purpose: Small and medium enterprises (SMEs) are the most significant contributors to maximum employment generation, the gross domestic product (GDP) of many countries, and the…
Abstract
Purpose: Small and medium enterprises (SMEs) are the most significant contributors to maximum employment generation, the gross domestic product (GDP) of many countries, and the overall global economy. It is also evident that cyber threats are becoming a big challenge for SMEs, which is directly impacting global economy.
Methodology: Existing research inputs were accessed to understand current cyber threats for SMEs and their cybersecurity posture. Additionally, this research has collected the latest insights by taking direct inputs from SMEs and conducting a well-designed research survey. It has provided a few direct inputs to designing solutions for the SME segment. For analysis and recommendations, cybersecurity best practices and core cybersecurity concepts are considered at the centre of the solution.
Findings: Implementing existing cybersecurity standards or frameworks is not easy for SMEs, as they generally have limited resources and different priorities for their business when it comes to the implementation of any cybersecurity controls. Currently, many cybersecurity standards are not able to support the implementation of business domain-specific controls.
Practical implications: Along with the research findings shared in this chapter, as a resolution to the problems faced by SMEs, the authors will propose a new framework as a solution. This framework is designed using core concepts of cybersecurity such as confidentiality, integrity, and availability (CIA triad) as well as defence in depth (DiD) mechanisms in each layer of organisation. The authors will also share a high-level idea about how reliable artificial intelligence-based software can help identify recommended controls for particular SMEs.
Details
Keywords
Yemen has a rich agricultural heritage that goes back over a thousand years. Climate and population changes, foreign intervention, civil wars, export markets, exchange rates and…
Abstract
Yemen has a rich agricultural heritage that goes back over a thousand years. Climate and population changes, foreign intervention, civil wars, export markets, exchange rates and policy experiments have all played significant roles in the ebb and flow of Yemeni agriculture. The character of Yemeni agriculture also varies considerably from region to region largely according to differences in the quantity and timing of rainfall and altitude. This paper takes advantage of this unusually rich and varied experience to draw policy lessons and assess future prospects.
Lars Mjøset, Roel Meijer, Nils Butenschøn and Kristian Berg Harpviken
This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial…
Abstract
This study employs Stein Rokkan's methodological approach to analyse state formation in the Greater Middle East. It develops a conceptual framework distinguishing colonial, populist and democratic pacts, suitable for analysis of state formation and nation-building through to the present period. The framework relies on historical institutionalism. The methodology, however, is Rokkan's. The initial conceptual analysis also specifies differences between European and the Middle Eastern state formation processes. It is followed by a brief and selective discussion of historical preconditions. Next, the method of plotting singular cases into conceptual-typological maps is applied to 20 cases in the Greater Middle East (including Afghanistan, Iran and Turkey). For reasons of space, the empirical analysis is limited to the colonial period (1870s to the end of World War 1). Three typologies are combined into one conceptual-typological map of this period. The vertical left-hand axis provides a composite typology that clarifies cultural-territorial preconditions. The horizontal axis specifies transformations of the region's agrarian class structures since the mid-19th century reforms. The right-hand vertical axis provides a four-layered typology of processes of external intervention. A final section presents selected comparative case reconstructions. To the authors' knowledge, this is the first time such a Rokkan-style conceptual-typological map has been constructed for a non-European region.
Details
Keywords
Presented at the “Disarm! For a Climate of Peace,” meeting held on September 30 – October 3, 2016 in Berlin and organized by the International Peace Bureau.
Abstract
Presented at the “Disarm! For a Climate of Peace,” meeting held on September 30 – October 3, 2016 in Berlin and organized by the International Peace Bureau.
Details
Keywords
It is commonly claimed that the entrapment defense has never succeeded in a terrorism case. Yet that is not precisely true. In several post-9/11 cases, entrapment claims have…
Abstract
It is commonly claimed that the entrapment defense has never succeeded in a terrorism case. Yet that is not precisely true. In several post-9/11 cases, entrapment claims have contributed to full or partial acquittals, hung juries, and unexpectedly lenient sentences. Prosecutors have also dropped charges, setting convicted defendants free, to prevent successful entrapment defenses upon retrial. This chapter concludes that, despite the fragility and ambiguity of the right not to be entrapped, entrapment claims can achieve partial victories even in terrorism cases, due to the multiple discretion points at which entrapment can inform strategic or normative judgments.
Details