111 |
Towards my Imaginary Homeland: Contrapuntal Play Creation and the Palestinian DiasporaHaley, Sarah A. 18 July 2022 (has links)
In his analysis of modern theatre aesthetics, Hans-Thies Lehmann notes that performance has the ability to "destabilize the spectator's construction of identity and the 'other' " (Lehmann 5). This research project endeavours to test Lehmann's statement by applying it to the hybrid diasporic identity. Through the creation of a postdramatic performance text that focuses on the Palestinian diaspora and what Salman Rushdie refers to the longing for the 'imaginary homeland,' this thesis documents the creation of a performance text inspired by Edward Said's contrapuntal analysis.
In the first chapter, I define diaspora and hybridity and I provide the necessary context for my hybrid identity: Palestine and its diaspora. I detail the relationship between postdramatic theatre and identity, and I explore how the hybrid identity can be embodied in performance through an understanding of counterpoint and Said's contrapuntal analysis. In the second chapter, I explain the methods I used to create my performance text and to analyze my research and creative process. Finally, in my third chapter, I articulate the successes and failures of my research process and performance text through a final reflection.
|
112 |
A Wolf In Military Clothing: A Case Study Examination Of Lone Wolf Terrorism And The Roles And Responsibilities Of Government AgenciesBandel, Peter 01 January 2012 (has links)
Since the fall of September, 2011, there has been a major increase in awareness and study of global terrorism. Academia, the media, politicians, and the average citizen all have varying definitions, ideas, and concerns about terrorism. The focus has mainly been on international terrorism. Terrorist organizations like Al Qaeda have permeated the discussion. However, there is a growing concern of the "lone wolf terrorist." A lone wolf terrorist acts without a terrorist organization and is capable of having his/her own radical agenda with the audacity and simplicity to carry it out solely and enact great damage. The focus in the United States and globally has been on international lone wolf terrorists. This is important, but a longstanding concern (that often goes without much conversation) is the domestic lone wolf terrorist. Using Gustav Freytag’s Triangle and Rational Choice theory, it is shown that lone wolf terrorism must be examined by the United States government to ensure safety of its citizens. A lone wolf terrorist is characterized as a United States citizen who enacts a terrorist action without being part of an organization or terror group. His motives are extremist in nature. This thesis examines the iii growing phenomena of the domestic lone wolf terrorist. In doing so, the primary function is to look at an even starker reality: that some lone wolf terrorists have served in the military, and during service have shown to portray radical thoughts and actions. Furthermore, these lone wolf terrorists used their military training and weapon insight to enact their catastrophic aims. This thesis uses a case study methodology to examine three lone wolf actors. From the Oklahoma City Bombing, to the 1996 Olympic Summer Games in Atlanta and on to the Ft. Hood shootings the studies find that in all cases the actors did have radical beliefs, military training and used that training in concert with their attacks. This thesis can be used as a discussion about lone wolf terrorism, but also about governance. The findings show an increased need for the Department of Defense to work closely with the Department of Homeland Security and seek greater advice from organizations like the Federal Bureau of Investigation in order to conduct better psychological studies and examinations of military personnel. A disclaimer must be made that this thesis does not, in any way, seek to disparage the amazing amount of work and sacrifice of United States government personnel and agencies. This thesis aims to provide research towards improved understanding and combating of lone wolf terrorism.
|
113 |
The provision of education to minorities, with special emphasis on South AfricaMothata, Matoane Steward 06 1900 (has links)
Against the background of the lack of consensus on the definition of the concept
minority and the continuing debates on minorities and their rights in education, a
need exists for adequate provision of education suitable to different minorities.
This study investigates the provision of education to minorities. A literature
survey investigated how various countries make provision for minorities in their
education systems, starting from the Constitutions and various education laws to
educational practice. These countries include Belgium, Getmany, the
Netherlands, the United Kingdom (UK) and Italy. Regarding South Africa, an
analysis of documents dealing with the provision of education to minorities was
undertaken. Unstructured interviews, from a small sample of informants selected
by purposeful sampling, elicited additional data to the document analysis. Data
was analysed, discussed and synthesised. The major findings are: there is no
international consensus on the definition of the concept minority; the concept
minority does not even appear in the Constitutions of some of the countries
under investigation; the South African Constitution uses the concept
communities rather than minorities. However, no definition of the concept
community is provided and despite reservations expressed by a key informant
on group rights, generally the South African Constitution contains enough
sections regarding the provision of education to minorities. Subject to certain
limitations, minority groups may open their own schools and use their own
language. Based on these findings, recommendations for educational provision
for minorities are made. / Educational Studies / D.Ed. (Comparative Education)
|
114 |
From Frontline to Homefront : The Global Homeland in Contemporary U.S. War FictionRau, Kristen January 2017 (has links)
Criticized for providing a simplified depiction of a post-9/11 United States, contemporary American “War on Terror” fiction has been largely neglected by critical discourse. In this dissertation, I argue that this fiction offers a vital engagement with how the War on Terror is waged, and how the fantasies and policies of the Global Homeland inform it. Most immediately, the texts I analyze undercut the sanitization of the war by including depictions of intense combat and the psychological fallout of derealized warfare. In these works, the public’s reluctance to acknowledge such concerns lays the foundation for a schism between American civilians and the military. I argue moreover that this fiction engages with the collapse of distinctions between foreign and domestic spheres through exploring both battlefields abroad and how a military logic is transposed onto American society. In the first chapter, I analyze the way in which narratives by Kevin Powers, David Abrams, Phil Klay, and Dan Fesperman complicate sanitized images of the war by foregrounding its visceral qualities and representing the traumatic impact of mediated warfare. The second chapter focuses on Ben Fountain’s Billy Lynn’s Long Halftime Walk, specifically its representation of the military characters’ frustration with the public’s failure to acknowledge the traumatic impact of the War on Terror, and its critique of melodramatic patriotic gestures that glorify the war but do not require actual social, financial, or affective investment in the military. The third chapter zeroes in on portrayals of returned veterans in texts by George Saunders, Atticus Lish, and Joyce Carol Oates, who react with increasing antagonism to civilian disinterest in their plight, which gives rise to acts of violence against civilians and a shift in societal attitudes toward the military. I conclude by examining Lish’s depiction of how the policies of the Global Homeland result in the deployment of a military logic within the domestic U.S. Through its engagement with American warfare and the Global Homeland, contemporary American war fiction offers a nuanced exploration of the conduct and ramifications of the War on Terror.
|
115 |
Multi-state initiatives: agriculture security preparedness / Agriculture security preparednessGordon, Ellen M. 06 1900 (has links)
CHDS State/Local / Approved for public release, distribution is unlimited / To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Federal government to address these issues are limited and overextended. If states attempt to address this threat independently, important opportunities to reduce vulnerability and enhance capability will be lost. To achieve the capabilities needed for agro terrorism detection, mitigation, preparedness and response, states must collaborate to build the partnerships and programs their citizens require. This thesis argues multi-state partnerships are critical to defeating this threat as well as providing a robust response to an attack. Whether intentionally introduced or naturally occurring , infectious diseases can easily cross state borders before an outbreak is even detected. States must be prepared to act quickly to mitigate the effects of any crisis. There is a significant opportunity for states to strengthen their abilities to provide for a stronger agriculture counter terrorism preparedness system. The states can further their ability to combat attacks on agriculture actively by demonstrating leadership in implementing administrative agreements and ultimately adopting compact(s) between states as well as with the private sector. / Civilian, Homeland Security Advisor and Emergency Management Administrator, Iowa Homeland Security and Emergency Management Division
|
116 |
Budova 18, rue Bonaparte: Místo paměti a jeho význam pro Čechy žijící v Paříži / The building at 18, rue Bonaparte: The place of memory and its meaning for the Czechs living in ParisOkénková, Věra January 2014 (has links)
Diploma thesis "The building at 18, rue Bonaparte: The place of memory and its meaning for the Czechs living in Paris" deals with the theme of everyday life of the Czechs in Paris which is connected with a place that presents a piece of Czech country inside of the historical Paris. This work tries to show the perception of this place on the basis of material, functional and symbolic meaning of this building. As well it treats the overhangs to the migration studies, memory studies and problems of identity. Constituent of the text is also theoretical embodiment of the concept of a place not only in the ethnology but also in others social and humanity sciences - mainly with the regard to the Pierre Nora's theory "places of memory" and Marc Augé's theory "anthropological places". Apart from the symbolical capital of the building at 18, rue Bonaparte which is important place of memory there is presented in the text also history of another places in France which is a part of collective memory of the compatriots up to now. The main goal of this work is to present how important role can play one concrete physical place with strong functional and symbolic meaning for the Czechs living outside of their homeland and how this place can contribute to the process of integration to the hosting society.
|
117 |
Maritime shipping container security and the Defense Transportation System: problems and policy in the 21st centuryJankowski, William M. 06 1900 (has links)
Approved for public release, distribution is unlimited / The Defense Transportation System (DTS), led by the Military Traffic Management Command (MTMC), depends on the commercial maritime industry to provide movement of supplies and equipment around the world. The maritime shipping container is a critical asset in providing for this logistical support to the war fighter abroad. These 20- or 40-foot containers have become the backbone of the maritime industry, and will continue to proliferate as global commerce continues to expand. While the growth in the use of maritime shipping containers in the 21st century has accelerated the nation's economic trade substantially, it may also have become a significant problem. Containers are an indispensable but vulnerable link in the chain of global trade; approximately 90 percent of the world's cargo moves by container. Because of DoD's dependency on the maritime industry and these containers, it will and must continue to ride the wave of commercial practices, specifically in pursuit of better security throughout the maritime industry. In the wake of September 11, 2001, and with the new threats of WMD, the maritime shipping container may become a weapons delivery system. This thesis documented the need for security improvements for the maritime shipping container in protecting global commerce and DoD cargo shipments. Comprehensive reviews of government reports, books, articles, and Internet based materials, as well as interviews with MTMC personnel, have indicated that DoD is taking a series of measures to meet these challenges. DoD's Defense Transportation System and the commercial maritime industry will be challenged and tested by new policy requirements. MTMC has already adopted new business processes, cargo manifest requirements, and technological innovations that assure customers in-transit visibility and total asset visibility (ITV/TAV), including the Intelligent Road-Rail Information Server (IRRIS) system. / Lieutenant Commander, United States Navy
|
118 |
People on the Edges of DreamsFrench, Francesca B. 17 November 1995 (has links)
This thesis is composed of a collection of twelve short stories, varying in length from 2 to 14 pages. Each story contains its own discrete theme, but fits as well within the overarching theme of the collection as a whole. This overarching theme is what gives the collection its cohesiveness. The main theme of the larger work can be found in the title of the collection, People on the Edges of Dreams. In many of the stories dreams, or dream-states, figure in the lives of the protagonists. In addition to the dream-state theme there is a less obvious theme, which has to do with the extent to which most or all of the main characters in the stories are faced with a kind of inescapable compassion for others. For example, the selfinvolved, self-gratifying protagonist in Matador cannot help but feel compassion first for Pearl, the woman he insults, and second for the "bums" on whom his livelihood depends. The theme of inescapable compassion can, I believe, be found to varying degrees in each of the stories in this collection.
|
119 |
Internet : och den tibetanska diasporan / Internet : and The Tibetan DiasporaSimonsson, Jerry January 2005 (has links)
<p>Uppsatsen handlar om hur tibetaner använder sig av Internet i strävan efter en nationell identitet och i kampen för ett fritt Tibet. Med information från fyra tibetaner analyseras olika webbplatser kopplade till den tibetanska diasporan för att se om denna koppling finns. Med hjälp av tidigare diaspora forskning och Benedict Andersons tankar om en föreställd gemenskap görs en analys av kopplingen mellan diasporan, Internet och en föreställd gemenskap. Abstracts: This essay discuss how Tibetans use Internet in their effort to maintain a national identity and their struggle for a free Tibet. With information from four Tibetans, Internet sites connected to the Diaspora is analyzed to see if this connection exists. With help from earlier Diasporaresearch and Benedict Andersons thoughts about imagined communities the essay analyse the connection between Diaspora, Internet and imagined communities.</p>
|
120 |
Quantitative vulnerability analysis of electric power networksHolmgren, Åke J. January 2006 (has links)
Disturbances in the supply of electric power can have serious implications for everyday life as well as for national (homeland) security. A power outage can be initiated by natural disasters, adverse weather, technical failures, human errors, sabotage, terrorism, and acts of war. The vulnerability of a system is described as a sensitivity to threats and hazards, and is measured by P (Q(t) > q), i.e. the probability of at least one disturbance with negative societal consequences Q larger than some critical value q, during a given period of time (0,t]. The aim of the thesis is to present methods for quantitative vulnerability analysis of electric power delivery networks to enable effective strategies for prevention, mitigation, response, and recovery to be developed. Paper I provides a framework for vulnerability assessment of infrastructure systems. The paper discusses concepts and perspectives for developing a methodology for vulnerability analysis, and gives examples related to power systems. Paper II analyzes the vulnerability of power delivery systems by means of statistical analysis of Swedish disturbance data. It is demonstrated that the size of large disturbances follows a power law, and that the occurrence of disturbances can be modeled as a Poisson process. Paper III models electric power delivery systems as graphs. Statistical measures for characterizing the structure of two empirical transmission systems are calculated, and a structural vulnerability analysis is performed, i.e. a study of the connectivity of the graph when vertices and edges are disabled. Paper IV discusses the origin of power laws in complex systems in terms of their structure and the dynamics of disturbance propagation. A branching process is used to model the structure of a power distribution system, and it is shown that the disturbance size in this analytical network model follows a power law. Paper V shows how the interaction between an antagonist and the defender of a power system can be modeled as a game. A numerical example is presented, and it is studied if there exists a dominant defense strategy, and if there is an optimal allocation of resources between protection of components, and recovery. / QC 20100831
|
Page generated in 0.0486 seconds