Search By: SubjectAbstractAuthorTitleFull-Text


Showing 1 through 5 of 20 records.
Pages: Previous - 1 2 3 4  - Next
2004 - The Midwest Political Science Association Pages: 19 pages || Words: 5198 words || 
1. Pace, Gerald. "Sacrificing Ishmael: YouthMartyrdom and Hamas" Paper presented at the annual meeting of the The Midwest Political Science Association, Palmer House Hilton, Chicago, Illinois, Apr 15, 2004 <Not Available>. 2019-06-19 <>
Publication Type: Conference Paper/Unpublished Manuscript
Review Method: Peer Reviewed
Abstract: The Second Palestinian Intifada marked a new phase within
Palestinian terrorism—use of the suicide bombers. While not the first
to utilize such tactics, Hamas has become increasingly reliant on them
in their campaign against Israeli occupation. What is new is the age of
the bombers—the self-martyred youth. But why use youth? Are they simply
more susceptible to the fundamentalist rhetoric? Arguing that
self-martyring youth are not simply crazed, confused participants, but
strategically utilized and highly symbolic soldiers in a very modern
form of warfare, the proposed work examines the role of, and
recruitment to, suicide bombing within the Hamas. The work examines
Hamas’ recruitment literature and techniques, as well as their
indoctrination procedures, in order to understand the process by which
young recruits are ultimately transformed into self-martyrs. Only by
examining the ways in which youth martyrs are “cultivated” can we begin
to disrupt the flow of new recruits and understand the conditions that
make youth susceptible to radical politics in the first

2011 - International Studies Association Annual Conference "Global Governance: Political Authority in Transition" Pages: 1 pages || Words: 518 words || 
2. Chesterman, Simon. "One Nation Under Surveillance: A New Social Contract to Defend Freedom Without Sacrificing Liberty" Paper presented at the annual meeting of the International Studies Association Annual Conference "Global Governance: Political Authority in Transition", Le Centre Sheraton Montreal Hotel, MONTREAL, QUEBEC, CANADA, Mar 16, 2011 Online <APPLICATION/PDF>. 2019-06-19 <>
Publication Type: Conference Paper/Unpublished Manuscript
Review Method: Peer Reviewed
Abstract: What limits, if any, should be placed on a government’s efforts to spy on its own citizens in the name of national security? Recent battles over privacy have been dominated by fights over warrantless electronic surveillance or CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This paper (based on a book to be published by Oxford University Press in February 2011) proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.

2009 - UCEA Annual Convention Words: 250 words || 
3. McKenzie, Kathryn. "Hiding Behind Democracy and Sacrificing Equity" Paper presented at the annual meeting of the UCEA Annual Convention, Anaheim Marriott, Anaheim, California, <Not Available>. 2019-06-19 <>
Publication Type: Symposium Paper
Abstract: In this paper, it is posited that the term democracy, implicitly or explicitly defined and communicated, is often used for justifying the structures, processes, and practices in schools today. However, as Apple (2008, p.6) contends, the term “democracy” is ambiguous and “the rhetorical conveniences of that ambiguity is more evident than ever.” This paper focuses specifically on the rhetorical convenience of hiding behind “democracy,” which often results in structures, processes, and practices that ultimately sacrifice equity in schools. Specifically, Apple and Beane’s (1995) “conditions for democracy through education” was used as the theoretical frame to examine the ways school leaders consciously or unconsciously define democracy and operationalize their definition to advance or sacrifice equity. Using the conditions for democracy, transformational, instructional, and distributed leadership models were examined. It was concluded that each of these models could be used to advance or sacrifice equity, depending upon the leaders’ understanding and definition of “democracy through education.” In other words, if the leader defined “the common good,” a democratic tenet, as all the adults in the school getting along, then regardless of which leadership model was employed, the ultimate goal of getting along often precluded the goal of achieving equity. Achieving equity in a context of changing demographics often requires schools to change structure, processes, and instructional practices—change that brings about conflict and disrupts “the common good” of getting along. Thus, if a leader holds fast to the “getting along” tenet and avoids the conflict needed to bring about change, equity is sacrificed.

2015 - American Society of Criminology – 71st Annual Meeting Words: 67 words || 
4. Karson, Larry. "Policing Beyond the Pale: Sacrificing Civil Rights for Achievement, Advancement and Affiliation" Paper presented at the annual meeting of the American Society of Criminology – 71st Annual Meeting, Washington Hilton, Washington, DC, Nov 18, 2015 <Not Available>. 2019-06-19 <>
Publication Type: Individual Paper
Review Method: Peer Reviewed
Abstract: Traditionally, subcultural explanations have been offered as to why police and criminal investigators violate the rights of citizens when investigating suspected criminal behavior. Though these theories may, at times, interact and subtly influence an investigator's actions in routine investigations, this paper presents the concept that motivational theory and more general workplace corruption theories not specific to criminal justice better explain an investigator's behavior and potential deviant activity.

2017 - American Society of Criminology Words: 157 words || 
5. Cucolo, Heather. "The Divergent Series: Why Lower Courts will Narrow Fourth Amendment Protections and Allow Fundamental Freedoms to be Sacrificed in the Name of Perceived Exigency after Grady v. North Carolina" Paper presented at the annual meeting of the American Society of Criminology, Philadelphia Marriott Downtown, Philadelphia, PA, Nov 14, 2017 <Not Available>. 2019-06-19 <>
Publication Type: Individual Paper
Review Method: Peer Reviewed
Abstract: In Grady v. North Carolina, the Supreme Court allowed a two-time sex offender to challenge the use of a global positioning system (GPS) tracking device as a violation of his Fourth Amendment right to be free from unreasonable searches and seizures.
In light of two earlier decisions, United States v. Jones, and Florida v. Jardines, the Supreme Court said that “[t]he reasonableness of a search depends on the totality of the circumstances, including the nature and purpose of the search and the extent to which the search intrudes upon reasonable privacy expectations.” The Supreme Court did not determine that Satellite Based Monitoring programs (SBM) are overall unconstitutional and instead left that decision to state courts. This paper will examine prior court decisions that allow governmental interests to override sex offender rights, the reasonableness of an offender’s expectation of privacy and recent studies on sex offender recidivism to analyze and project how future courts will rule on this issue.

Pages: Previous - 1 2 3 4  - Next

©2019 All Academic, Inc.   |   All Academic Privacy Policy