Open Access. Powered by Scholars. Published by Universities.®

Other Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Other Psychology

Utilizing The Past To Shape The Future: The Rehabilitation Of Child Soldiers In Darfur, Michael K. Marriott Jan 2011

Utilizing The Past To Shape The Future: The Rehabilitation Of Child Soldiers In Darfur, Michael K. Marriott

Michael K Marriott

Child soldiering, an unfortunate reality of war, has become increasingly common in modern warfare. With world attention focused on the genocide taking place in the Darfur region of Sudan, issues regarding the use of child soldiers in the conflict have come to light. By providing an overview of the use of child soldiers both globally and in Sudan, discussing the relevant legal norms theoretically governing the country and providing a case study on Sierra Leone, this paper ultimately provides an analysis and proposed framework for comprehensive programs that could be put into action after cessation of hostilities in an attempt …


Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam Jan 2010

Against The State Governance, Governance From Below & Governing Through Terrorism: Analytically Investigating The Technologies Of Power Within The Terrorist Arsenal., Allen Gnanam

Allen Gnanam

Terrorism as a violent and destabilizing act performed by terrorists, meaning loyal followers of political or religious agendas who hold resent and animosity toward a certain authority/ government (Lin, Liou, & Wu, 2007, pg. 149), will be explored and analyzed through the utilization of the governmentality perspective. For the purposes of this paper terrorism governance will refer to the governance/ control/ influence exerted by terrorists and terrorism. The focus of this explorative and analysis paper will be to identify diverse terrorism oriented technologies of governance, and analyze the ways in which these technologies enable terrorist to exert governance both indirectly …


Hamas Controlled Televised News Media: Counter- Peace, Allen Gnanam Jan 2009

Hamas Controlled Televised News Media: Counter- Peace, Allen Gnanam

Allen Gnanam

The hegemonic force of Hamas censored televised news media in Gaza, can not be fully comprehended and appreciated without recognizing the role of propaganda, censorship, and the historical context of the middle east. These 3 interrelated dimensions will be analyzed using functionalism, the mass society theory, the dominant ideology framework, the critical criminology framework, and the symbolic interactionist framework. Through censorship, Hamas news media outlets were able to unilaterally inject culturally relevant propaganda, into the minds of children and citizens. The hypodermic syringe model can be applied to the state controlled news media situation in Gaza, as the people of …


Non Nation Destabilizing Eradication Of Opium Cultivation In Afghanistan: A History Backed Analysis, Allen Gnanam Jan 2009

Non Nation Destabilizing Eradication Of Opium Cultivation In Afghanistan: A History Backed Analysis, Allen Gnanam

Allen Gnanam

A successful and non nation destabilizing eradication of opium cultivation in Afghanistan, is contingent upon the mandatory countering of interconnected (a) economic obstacles, (b) sociocultural obstacles, and (c) political obstacles that are fueling and maintaining the illegal production and trade of heroin. This paper will explore and analyze the above mentioned interconnected obstacles, in order to present the complex issues that need to be addressed when it comes to dismantling the illegal opium bastion in Afghanistan. At a macro- level Foucault’s triangular model that identifies the interconnectivity between the government, the population, and the political economy (1978) will be utilized …


Cyber Terrorism, Allen Gnanam Jan 2009

Cyber Terrorism, Allen Gnanam

Allen Gnanam

This paper sets out to identify and explain the negative national security implications, negative physical & psychological implications, and the negative economic implications that society could face, as a result of a severe cyber attack against major sectors of a nations infrastructure. In addition instigating factors that lead to/ provoke cyber terrorism will be identified, in order to strategically influence counter cyber terrorism policy towards an offensive model. Along with that, this paper will present defensive/ target hardening counter- cyber terrorism policies that will enable proactive security mechanisms to be implemented.


Book Review Of: Crime In An Insecure World: By Richard Ericson, Allen Gnanam Jan 2009

Book Review Of: Crime In An Insecure World: By Richard Ericson, Allen Gnanam

Allen Gnanam

Crime in an Insecure World written by Richard Ericson, depicts western society as a neo-liberal state, that has an impulsive tendency to criminalizes all sources of harm through precautionary logic, risk assessment, surveillance measures, and counter law I and II, due to the dominant culture of impulsive criminalization that produces uncertainty. Counter Law, precautionary logical, risk assessment, and uncertainty are the 4 major concepts discussed by Ericson, and these concepts will be analyzed and interpreted during this book review.


Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam Jan 2009

Ban Opitc Private Security Goverance: Exceptionalism, Spatial Sorting And Risk Assessments, Allen Gnanam

Allen Gnanam

This paper is theoretically grounded on the Ban opticon framework that is characterized by the use of exceptionalism, the normalization of imperative movement, and profiling for insecurity management purposes (Bigo, 2005). This framework will be utilized in order to expose and analyze the Ban optic governmentality of the private security industry. Secondly, the overall discussion and analysis of the private security industry- Ban opticon nexus will be discussed with specific reference to the private security operations of The New Commons. Thirdly, three private security intelligence networks identified by Lippert & O’Connor (2006) namely Disciplinary Networks, Private Justice Networks, and Multilateral …