This intersectional study provides fresh insights into the complex networks of migrants. More than 200 interviews with people following multiple routes over eight decades help to illustrate how social support and trust are developed, how networks evolve over time, and how they impact the opportunities and obstacles migrants encounter.
Access options:
The following links lead to the full text from the respective local libraries:
This book charts the authors journey as a cultural anthropologist through food resistance movements over two decades, in Catalonia (Spain), Australia and Venezuela. It brings important lessons from the field to current discussions on transitioning to just and sustainable food systems. In Australia, freegans consumption of garbage reveals the extent of food going to waste from commercial sources while people go hungry. In contrast, Venezuelas food sovereignty movement is part of an attempted national transition from a capitalist to socialist economy, highlighting processes of decentralisation, collectivisation, and government grassroots coalitions. The study of autonomous spaces in Catalonia illuminates how food sharing can enable people to live their politics, while highlighting governance, consumption, technology and use of space in food resistance efforts
Intro -- Acknowledgments -- Note on Sources and Key to Abbreviations -- Brentano von Arnim -- Fichte -- Günderrode -- Hegel -- Kant -- Leibniz -- Rousseau -- Schelling -- Schlegel -- Schleiermacher -- Contents -- Notes on Contributors -- Chapter 1: Introduction: German Idealism and Feminist Philosophy -- 1 Feminist Research on Gender Relations in German Idealism -- 2 Legacies of German Idealism in Feminist Philosophy -- 3 Structure of the Book -- Part I: Kant and Feminist Philosophy -- Chapter 2: Black Feminism and Kantian Universalism -- 1 What Is Universalism? -- 2 "Nasty Women": Kant's Sexism -- 3 Approaches to Kant's Sexism and Racism -- 4 In the Lurch: Black Feminism and Kant Scholarship -- 5 Conclusion -- Chapter 3: Kant and Feminist Political Thought, Redux: Complicity, Accountability and Refusal -- 1 Locating the Intersectional Exclusions in Kant: The Problem of Public Reason -- 2 Unpacking Kant's "As If": On the Material Conditions of Independence -- 3 Constructive Complicity: Re-Orienting Kantian Feminisms -- 4 Intersectional Interruptions: Accountability and Refusing to Work Our Way "Up" -- Chapter 4: Feminist Perspectives on Kant's Conception of Autonomy: On the Need to Distinguish between Self-Determination and Self-Legislation -- 1 Feminist Responses to Kantian Conceptions of Autonomy -- 1.1 Objections Addressing Rationalism, Individualism and Social Atomism -- 1.2 Relational Autonomy -- 1.3 Feminist Post-Humanism -- 2 One Term, Six Meanings -- 3 Why Kant's Conception of Moral Autonomy Proves Helpful for Feminist Research -- 3.1 The Obligation to Further the Happiness of Others -- 3.2 The Need for an Ethical Community -- Chapter 5: Reason and the Transcendental Subject: Kant's Trace in Feminist Theory -- 1 Introduction: Kant's Trace in Feminist Theory -- 2 Kant: Reason and the Transcendental -- 2.1 The Terms: 'Subject' and 'Reason'.
Access options:
The following links lead to the full text from the respective local libraries:
IoT for Defense and National Security Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base. Written by leading researchers and practitioners of IoT technology for defense and national security, IoT for Defense and National Security also includes information on: Changes in warfare driven by IoT weapons, logistics, and systems IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions) Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them Adapting rapidly expanding commercial IoT to power IoT for defense For application engineers from defense-related companies as well as managers, policy makers, and academics, IoT for Defense and National Security is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.
Access options:
The following links lead to the full text from the respective local libraries:
This volume tells the story of the Helsinki Process from the immediate post-war period through the signing of the Helsinki Final Act in 1975 to the collapse of the Soviet empire and up to the present day. Treating it as a single narrative in the search for a just and stable order in Europe adds significantly to the copious but mostly narrowly focused academic literature on the subject. Divided into 26 chapters, it can also serve as a handy reference book for different phases of the story. Chapter 22 examines the continuing debate over whether the West is responsible for the breakdown of relations with Russia and why the Helsinki Process failed to avert it. Chapter 26 asks whether the remarkable multilateral diplomacy that produced the Final Act could be replicated in other troubled areas today. It then offers 12 lessons that may be drawn from that experience. This book will help students and others understand the long arc of the Helsinki process, its place in European history and its continuing relevance today. Drawing on the first-hand experience of the author and other sources, the book corrects common errors and identifies some of the key people involved.
Cover -- Endorsements -- Half Title -- Series -- Title -- Copyright -- Dedication -- Contents -- List of Illustrations -- About the Author -- Preface -- Acknowledgements -- Acronyms -- Part 1 Setting Contexts -- 1 Introduction: Towards a Better Grasp of Policy Change -- 2 Modernizing Social Policy: Pressures and Patterns -- 3 On Stability and Change in Welfare Systems: A Path Forward? -- Part 2 Moving Boundaries -- 4 Complexity, Evolution, and Public Policy -- 5 The Structure-in-Evolution: An Integrated Picture of Policy Change -- 6 Mapping Change in Policy Systems: The Structure-in-Evolution Alternative -- Part 3 Exploring Evolutions -- 7 Developing the Danish Welfare State: Paths and Transitions -- 8 Evolving Social Policy in the United Kingdom: Constraintsand Adaptations -- 9 Conclusion: Ahead of Policy Evolution -- Epilogue: Investing Anew -- Index.
Access options:
The following links lead to the full text from the respective local libraries:
Cover -- Half Title -- Series -- Title -- Copyright -- Dedication -- Contents -- Preface -- Introduction: an irrepressible political thread -- 1 Politics as violence -- The state and its means -- The state's extra-territoriality -- Politics and morals -- Vocation and passion -- Conclusion -- 2 Race as a political project -- Race in Weber -- Race and its refinement -- Race and the basis of 'selection' -- The power-state/nation/people/race nexus in Weber -- An ethno-national frame in Weber's sociology -- Conclusion -- 3 Citizenship and its military basis -- Citizenship in the history of the west -- Modern citizenship -- Soldier-citizen without republicanism -- Conclusion -- 4 A calling for political education -- From The Protestant Ethic to the inaugural lecture -- A calling for political education -- A method of political education -- Conclusion -- Conclusion: lessons, sociological and political -- Appendix: politics of religion -- Calvinist demagicalization, according to Weber -- Magic in and out of religion -- Demonic magic in Reformation Protestantism -- Magic in China -- Conclusion -- References -- Index.
Access options:
The following links lead to the full text from the respective local libraries:
Engaging with representations in literature, film, governmental discourse, and news and infotainment media, this book investigates the ways in which Aboriginal children figure in Australia's cultural life, to mediate Australians' ambivalence about the colonial origins of the nation, as well as its possible post-colonial future.
Access options:
The following links lead to the full text from the respective local libraries:
This book studies regional approaches to the Responsibility to Protect (R2P) in Europe and West Africa. The work assesses how and to what extent the European Union (EU) and the Economic Community of West African States (ECOWAS) have internalised the norm, both generally, in institutions, policies, and programs and specifically, in crisis situations of R2P concern, such as the 2011 Libyan crisis and 2012 Malian crisis. It provides a historical analysis of how the two regional organisations have dealt with questions of sovereignty, security, and human rights since their founding, as well as an analysis of some of the European and West African roots of the R2P norm. This reflects the notion that global norms are often informed by local and regional practices and that this needs to be recognised in order to fully understand regional responses to alleged global norms. The book uses process tracing to trace the regional internalisation of R2P and has benefited from qualitative research interviews with EU- and ECOWAS-stakeholders. One of the key findings is that ECOWAS and West Africa have delivered a key contribution to the norm construction of R2P, a finding insufficiently recognised in the current literature.
Access options:
The following links lead to the full text from the respective local libraries:
Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- List of illustrations -- Preface -- Acknowledgements -- List of abbreviations -- 1. Introduction: The irrelevancy of Schengenland and Frontex's rise -- Border evolution -- New 'kids' on the border control block -- Setting Frontex's scene -- Border control actors -- Speaking of culture -- Cultures of border control -- To Schengen or not to Schengen? -- A new border control culture? -- Book overview -- Notes -- References -- 2. Frontex: An insurgent border control actor -- Introduction -- Frontex's birth -- Frontex's governance -- Frontex's expansion -- Frontex's institutional brigade -- Frontex's deeds -- Frontex's role in EU border control: reviewing the literature -- Towards Frontex's reinvigoration: bringing culture in -- Conclusion -- Notes -- References -- 3. Constructing Frontex's culture -- Introduction -- Frontex: the essential EU border control actor -- Delving into Frontex's cultural traits -- Conclusion -- Notes -- References -- 4. Constructing the border of Lampedusa -- Introduction -- The island setting -- The making of a border -- Border control conduct and actors -- Frontex on the field -- Border control assumptions and practices in Lampedusa -- Conclusion -- Notes -- References -- 5. Constructing the border of Evros -- Introduction -- The river setting -- The making of a border -- Border control conduct and actors -- Frontex on the field -- Border control assumptions and practices in Evros -- Evros and Lampedusa: drawing differences and similarities -- Conclusion -- Notes -- References -- 6. Border control in process: The rise of Warsaw culture -- Introduction -- Culture loading -- And its name shall be Warsaw culture -- Schengen, Westphalia, Brussels, and Warsaw: Variant in name only? -- From Schengen to Warsaw -- Frontex in Warsaw.
Access options:
The following links lead to the full text from the respective local libraries:
"Zhou applies network governance theories to Chinese education and focuses on Chinese education policy implementation in particular with the Chinese Communist Party Schools (CCPS). The CCPS is the institution which follows the Chinese Communist Party (CCP)'s ideas and decisions to educate key education leaders at all levels with different political purposes. In the Chinese education policy-making process, the CCP is the leading power which provides policy directions, but the education department is the main vehicle for delivery of education policy. Using document analysis and interviews, Zhou argues that an education policy implementation process can be successful from top to bottom level in cooperation with the education department. He further posits that the processes of formulating and implementing Chinese education policy can be characterised as a form of network governance, which coordinates actors and stakeholders' motivation to comply with collective decisions in Chinese education implementation. The book offers fresh data for the study of policy networks in Chinese education, the study of CCPS and Chinese network governance. This book will be of interest to scholars and postgraduate students studying Chinese education, comparative educational policy and comparative education research"--
"Changes in the economy and greater competition force us to adapt our business practices and to take greater account of the needs of consumers and the social problems they care about. Consumers are placing an increasing weight on the social responsibility of the organisations they choose to purchase from and associate with, and businesses must adopt corporate social responsibility practices into their marketing strategies. This book demonstrates the concept of CSR and how it is included as an element of value-based marketing. Using research from the Polish market, the author explores the concept of value-based marketing, how organisations are implementing CSR and analyses the effect on consumer behaviour. It examines consumer awareness of CSR practices and the effect this has on their purchasing decisions and brand loyalty, making the argument that disregarding CSR can be detrimental to businesses success and profit. Providing both empirical and theoretical perspectives, this book will be a useful reference for scholars and upper-level students across business disciplines including marketing, CSR and business ethics"--