Open Access. Powered by Scholars. Published by Universities.®

Regional Sociology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Regional Sociology

Utilizing The Past To Shape The Future: The Rehabilitation Of Child Soldiers In Darfur, Michael K. Marriott Jan 2011

Utilizing The Past To Shape The Future: The Rehabilitation Of Child Soldiers In Darfur, Michael K. Marriott

Michael K Marriott

Child soldiering, an unfortunate reality of war, has become increasingly common in modern warfare. With world attention focused on the genocide taking place in the Darfur region of Sudan, issues regarding the use of child soldiers in the conflict have come to light. By providing an overview of the use of child soldiers both globally and in Sudan, discussing the relevant legal norms theoretically governing the country and providing a case study on Sierra Leone, this paper ultimately provides an analysis and proposed framework for comprehensive programs that could be put into action after cessation of hostilities in an attempt …


Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam Jan 2010

Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam

Allen Gnanam

Terrorism as a violent and destabilizing act performed by terrorists, meaning loyal followers of political or religious agendas who hold resent and animosity toward a certain authority/ government (Lin, Liou, & Wu, 2007, pg. 149), will be explored and analyzed through the utilization of the governmentality perspective. For the purposes of this paper terrorism governance will refer to the governance/ control/ influence exerted by terrorists and terrorism. The focus of this explorative and analysis paper will be to identify diverse terrorism oriented technologies of governance, and analyze the ways in which these technologies enable terrorist to exert governance both indirectly …