Search results for: violent conflicts and insecurity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1157

Search results for: violent conflicts and insecurity

857 Of Digital Games and Dignity: Rationalizing E-Sports Amidst Stereotypes Associated with Gamers

Authors: Sarthak Mohapatra, Ajith Babu, Shyam Prasad Ghosh

Abstract:

The community of gamers has been at the crux of stigmatization and marginalization by the larger society, resulting in dignity erosion. India presents a unique context where e-sports have recently seen large-scale investments, a massive userbase, and appreciable demand for gaming as a career option. Yet the apprehension towards gaming is salient among parents and non-gamers who engage in the de-dignification of gamers, by advocating the discourse of violence promotion via video games. Even the government is relentless in banning games due to data privacy issues. Thus, the current study explores the experiences of gamers and how they navigate these de-dignifying circumstances. The study follows an exploratory qualitative approach where in-depth interviews are used as data collection tools guided by a semi-structured questionnaire. A total of 25 individuals were interviewed comprising casual gamers, professional gamers, and individuals who are indirectly impacted by gaming including parents, relatives, and friends of gamers. Thematic analysis via three-level coding is used to arrive at broad themes (categories) and their sub-themes. The results indicate that the de-dignification of gamers results from attaching stereotypes of introversion, aggression, low intelligence, and low aspirations to them. It is interesting to note that the intensity of de-dignification varies and is more salient in violent shooting games which are perceived to require low cognitive resources to master. The moral disengagement of gamers while playing violent video games becomes the basis for de-dignification. Findings reveal that circumventing de-dignification required gamers to engage in several tactics that included playing behind closed doors, consciously hiding the gamer identity, rationalizing behavior by idolizing professionals, bragging about achievements within the game, and so on. Theoretically, it contributes to dignity and social identity literature by focusing on stereotyping and stigmatization. From a policy perspective, improving legitimacy toward gaming is expected to improve the social standing of gamers and professionals. For practitioners, it is important that proper channels of promotion and communication are used to educate the non-gamers so that the stereotypes blur away.

Keywords: dignity, social identity, stereotyping, video games

Procedia PDF Downloads 100
856 Assessing the Impact of Adopting Climate Smart Agriculture on Food Security and Multidimensional Poverty: Case of Rural Farm Households in the Central Rift Valley of Ethiopia

Authors: Hussien Ali, Mesfin Menza, Fitsum Hagos, Amare Haileslassie

Abstract:

Climate change has perverse effects on agricultural productivity and natural resource base, negatively affecting the well-being of the households and communities. The government and NGOs promote climate smart agricultural (CSA) practices to help farmers adapt to and mitigate the negative effects of climate change. This study aims to identify widely available CSA practices and examine their impacts on food security and multi-dimensional poverty of rural farm households in the Central Rift Valley, Ethiopia. Using three-stage proportional to size sampling procedure, the study randomly selected 278 households from two kebeles from four districts each. A cross-sectional data of 2020/21 cropping season was collected using structured and pretested survey questionnaire. Food consumption score, dietary diversity score, food insecurity experience scale, and multidimensional poverty index were calculated to measure households’ welfare indicators. Multinomial endogenous switching regression model was used to assess average treatment effects of CSA on these outcome indicators on adopter and non-adopter households. The results indicate that the widely adopted CSA practices in the area are conservation agriculture, soil fertility management, crop diversification, and small-scale irrigation. Adopter households have, on average, statistically higher food consumption score, dietary diversity score and lower food insecurity access scale than non-adopters. Moreover, adopter households, on average, have lower deprivation score in multidimensional poverty compared to non-adopter households. Up scaling the adoption of CSA practices through the improvement of households’ implementation capacity and better information, technical advice, and innovative financing mechanisms is advised. Up scaling CSA practices can further promote achieving global goals such as SDG 1, SDG 2, and SDG 13 targets, aimed to end poverty and hunger and mitigate the adverse impacts of climate change, respectively.

Keywords: climate-smart agriculture, food security, multidimensional poverty, upscaling CSA, Ethiopia

Procedia PDF Downloads 90
855 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 111
854 Factors Associated with Rural-Urban Migration and Its Associated Health Hazards on the Female Adolescents in Kumasi Metropolis

Authors: Freda Adomaa, Samuel Oppong Boampong, Charles Gyamfi Rahman

Abstract:

The living and working environment of migrants and their access to healthcare services induce good or poor health. This study was conducted to assess the factors associated with rural-urban migration and its associated health hazards among female adolescents. A sample size of two hundred (200) was chosen in which all responded to questionnaires comprising closed-ended questions, which were distributed to gather data from the respondents, after which it was analyzed using the Statistical Package for Social Sciences (SPSS) version 20. The utilized three causes of rural-urban migration thus political, economic and socio-cultural. The study revealed that political situations such as regional inequality (65.4%) and ethnic conflicts (78.2%) whereas economic factors such as lack of amenities (82.3%), lack of employment in rural communities (77.4%), lack of education (74%), and poverty (85.3%) as well as socio-cultural factors such as divorced parents (65.6%), media influence (79.1%), family conflicts (59.4%) and appealing urban informal sector (65.2%) are major causes of migration. Respondents’ encountered challenges such as poor remuneration for services (87.2%), being maltreated by a colleague or worker (69%), sleeping in open space (73.3%), and harassment by the task force (71.4%) and teenage pregnancies (58.5%). The study concluded that the three variables play a key role in adolescent migration and when they travel they end up getting involved in serious health hazardous behaviors such as rapes as well as physical and psychological harassments’. The study, therefore, recommends that vocational training of the rural people on small scale industries (non-farm) activities that could generate an income for the rural household should be introduced.

Keywords: rural, urban, migration, female health hazards

Procedia PDF Downloads 132
853 An Assessment into Impact of Regional Conflicts upon Socio-Political Sustainability in Pakistan

Authors: Syed Toqueer Akhter, Muhammad Muzaffar Abbas

Abstract:

Conflicts in Pakistan are a result of a configuration of factors, which are directly related to the system of the state, the unstable regional setting, and the geo-strategic location of Pakistan at large. This paper examines the impact of regional conflict onto the socio-political sustainability of Pakistan. The magnitude of the spillover from a conflicted region is similar in size of the equivalent increase in domestic conflict. Pakistan has gone at war three times with India; the border with India is named as the tensest borderlines of the world. Disagreements with India and lack of dispute settlement mechanisms have negatively effected the peace in the region, influx of illegal weapons and refugees from Afghanistan as an outcome of 9/11 incidence, have exasperated the criticality of levels of internal conflict in Pakistan. Our empirical findings are based on the data collected on regional conflict levels, regional trade, global trade, comparative defence capabilities of the region in contrast to Pakistan and the government regime (Autocratic, Democratic) over 1972-2007. It has been proposed in this paper that the intent of domestic conflict is associated with the conflict in the region, regional trade, global trade and the government regime of Pakistan. The estimated model (OLS) implies that domestic conflict is effected positively and significantly with long term impact of conflict in the region. Also, if defence capabilities of the region are better than that of Pakistan it effects domestic conflict positively and significantly. Conflict in neighbouring countries are found as a source of domestic conflict in Pakistan, whereas the regional trade as well as type of government regimes in Pakistan lowered the intensity of domestic conflict significantly, while globalized trade imply risk of domestic conflict to be reduced but not significantly.

Keywords: conflict, regional trade, socio-politcal instability

Procedia PDF Downloads 321
852 Youth and Radicalization: Main Causes Who Lead Young People to Radicalize in a Context with Background of Radicalization

Authors: Zineb Emrane

Abstract:

This abstract addresses the issue of radicalization of young people in a context with background of radicalization, in North of Morocco, 5 terrorist of Madrid's Attacts on 11th March, were coming from this context. It were developed a study pilot that describing young people perception about the main causes that lead and motivate for radicalization. Whenever we talk about this topic, we obtain information from studies and investigations by specialists in field, but we don’t give voice to the protagonists who in many cases are victims, specifically, young people at social risk because of social factors. Extremist radicalization is an expanding phenomenon, that affect young people, in north of Morocco. They live in a context with radical background and at risk of social exclusion, their social, economic and familiar needs make them vulnerable. The extremist groups take advantage of this vulnerability to involve them in a process of radicalization, offering them an alternative environment where they can found all they are looking for. This study pilot approaches the main causes that lead and motivates young people to become radicals, analyzing their context with emphasis on influencing factors, and bearing in mind the analysis of young people about how the radical background affect them and their opinion this phenomenon. The pilot study was carried out through the following actions: - Group dynamics with young people to analyze the process of violent radicalization of young people. -A participatory workshop with members of organizations that work directly with young people at risk of radicalization. -Interviews with institutional managers -Participant observation. The implementation of actions has led to the conclusion that young people define violent radicalization as a sequential process, depending on the stage, it can be deconstructed. Young people recognize that they stop feeling belonging to their family, school and neighborhood when they see behavior contrary to what they consider good and evil. The emotional rupture and the search for references outside their circle, push them to sympathize with groups that have an extremist ideology and that offer them what they need. The radicalization is a process with different stages, the main causes and the factors which lead young people to use extremist violence are related their low level of belonging feeling to their context, and lack of critical thinking about important issues. The young people are in a vulnerable stage, searching their identity, a space in which they can be accepted, and when they don't find it they are easily manipulated and susceptible to being attracted by extremist groups.

Keywords: exclusion, radicalization, vulnerability, youth

Procedia PDF Downloads 163
851 Microsimulation of Potential Crashes as a Road Safety Indicator

Authors: Vittorio Astarita, Giuseppe Guido, Vincenzo Pasquale Giofre, Alessandro Vitale

Abstract:

Traffic microsimulation has been used extensively to evaluate consequences of different traffic planning and control policies in terms of travel time delays, queues, pollutant emissions, and every other common measured performance while at the same time traffic safety has not been considered in common traffic microsimulation packages as a measure of performance for different traffic scenarios. Vehicle conflict techniques that were introduced at intersections in the early traffic researches carried out at the General Motor laboratory in the USA and in the Swedish traffic conflict manual have been applied to vehicles trajectories simulated in microscopic traffic simulators. The concept is that microsimulation can be used as a base for calculating the number of conflicts that will define the safety level of a traffic scenario. This allows engineers to identify unsafe road traffic maneuvers and helps in finding the right countermeasures that can improve safety. Unfortunately, most commonly used indicators do not consider conflicts between single vehicles and roadside obstacles and barriers. A great number of vehicle crashes take place with roadside objects or obstacles. Only some recent proposed indicators have been trying to address this issue. This paper introduces a new procedure based on the simulation of potential crash events for the evaluation of safety levels in microsimulation traffic scenarios, which takes into account also potential crashes with roadside objects and barriers. The procedure can be used to define new conflict indicators. The proposed simulation procedure generates with the random perturbation of vehicle trajectories a set of potential crashes which can be evaluated accurately in terms of DeltaV, the energy of the impact, and/or expected number of injuries or casualties. The procedure can also be applied to real trajectories giving birth to new surrogate safety performance indicators, which can be considered as “simulation-based”. The methodology and a specific safety performance indicator are described and applied to a simulated test traffic scenario. Results indicate that the procedure is able to evaluate safety levels both at the intersection level and in the presence of roadside obstacles. The procedure produces results that are expressed in the same unity of measure for both vehicle to vehicle and vehicle to roadside object conflicts. The total energy for a square meter of all generated crash can be used and is shown on the map, for the test network, after the application of a threshold to evidence the most dangerous points. Without any detailed calibration of the microsimulation model and without any calibration of the parameters of the procedure (standard values have been used), it is possible to identify dangerous points. A preliminary sensitivity analysis has shown that results are not dependent on the different energy thresholds and different parameters of the procedure. This paper introduces a specific new procedure and the implementation in the form of a software package that is able to assess road safety, also considering potential conflicts with roadside objects. Some of the principles that are at the base of this specific model are discussed. The procedure can be applied on common microsimulation packages once vehicle trajectories and the positions of roadside barriers and obstacles are known. The procedure has many calibration parameters and research efforts will have to be devoted to make confrontations with real crash data in order to obtain the best parameters that have the potential of giving an accurate evaluation of the risk of any traffic scenario.

Keywords: road safety, traffic, traffic safety, traffic simulation

Procedia PDF Downloads 135
850 Inherent Difficulties in Countering Islamophobia

Authors: Imbesat Daudi

Abstract:

Islamophobia, which is a billion-dollar industry, is widespread, especially in the United States, Europe, India, Israel, and countries that have Muslim minorities at odds with their governmental policies. Hatred of Islam in the West did not evolve spontaneously; it was methodically created. Islamophobia's current format has been designed to spread on its own, find a space in the Western psyche, and resist its eradication. Hatred has been sustained by neoconservative ideologues and their allies, which are supported by the mainstream media. Social scientists have evaluated how ideas spread, why any idea can go viral, and where new ideas find space in our brains. This was possible because of the advances in the computational power of software and computers. Spreading of ideas, including Islamophobia, follows a sine curve; it has three phases: An initial exploratory phase with a long lag period, an explosive phase if ideas go viral, and the final phase when ideas find space in the human psyche. In the initial phase, the ideas are quickly examined in a center in the prefrontal lobe. When it is deemed relevant, it is sent for evaluation to another center of the prefrontal lobe; there, it is critically examined. Once it takes a final shape, the idea is sent as a final product to a center in the occipital lobe. This center cannot critically evaluate ideas; it can only defend them from its critics. Counterarguments, no matter how scientific, are automatically rejected. Therefore, arguments that could be highly effective in the early phases are counterproductive once they are stored in the occipital lobe. Anti-Islamophobic intellectuals have done a very good job of countering Islamophobic arguments. However, they have not been as effective as neoconservative ideologues who have promoted anti-Muslim rhetoric that was based on half-truths, misinformation, or outright lies. The failure is partly due to the support pro-war activists receive from the mainstream media, state institutions, mega-corporations engaged in violent conflicts, and think tanks that provide Islamophobic arguments. However, there are also scientific reasons why anti-Islamophobic thinkers have been less effective. There are different dynamics of spreading ideas once they are stored in the occipital lobe. The human brain is incapable of evaluating further once it accepts ideas as its own; therefore, a different strategy is required to be effective. This paper examines 1) why anti-Islamophobic intellectuals have failed in changing the minds of non-Muslims and 2) the steps of countering hatred. Simply put, a new strategy is needed that can effectively counteract hatred of Islam and Muslims. Islamophobia is a disease that requires strong measures. Fighting hatred is always a challenge, but if we understand why Islamophobia is taking root in the twenty-first century, one can succeed in challenging Islamophobic arguments. That will need a coordinated effort of Intellectuals, writers and the media.

Keywords: islamophobia, Islam and violence, anti-islamophobia, demonization of Islam

Procedia PDF Downloads 48
849 Educaton for Social Reconstruction: Impact of Social Terrorism on Women Education in Nigeria

Authors: Theresa Chinyere ONU

Abstract:

This paper examines the effect of social terrorism on education in Nigeria. The article looked into some prevailing conditions of international political unrest and insecurity. The fear and risk of these conditions to national security and the struggle for power establishment which has further intensified and taken the shape of terrorism has imposed devastating effects on the growth and prosperity of Nigeria; as traffic patterns get disturbed, hospitals and schools get dysfunctional. This has also affected the educational standard in Nigeria as parents are no longer comfortable in sending their children to schools in some states for the fear of terrorist attacks. The study emphasized the integrated the effort of the government management institutions.

Keywords: education, social terrorism, women, Nigeria

Procedia PDF Downloads 583
848 Intertwined Lives: Narratives of Children with Disabilities and Their Siblings

Authors: Shyamani Hettiarachchi

Abstract:

The experiences of children with disabilities and their siblings are seldom documented in Sri Lanka. The aim of this study was to uncover the narratives of young children with disabilities and their siblings in Sri Lanka. Fifteen children with disabilities and fifteen siblings were included in this study. Opportunities were offered to the participants to engage in artwork and story making activities. Narratives on the artwork and stories were gathered and the data analyzed using the key principles of Framework Analysis to determine the key themes. The key themes to emerge were of love, protectiveness, insecurity and visibility. The results highlight the need to take account of the experiences of children with disabilities and their siblings to understand how they understand and cope with disability.

Keywords: art, children with disabilities, narratives, siblings, storymaking

Procedia PDF Downloads 277
847 Gender and Work-Family Conflict Gaps in Hong Kong: The Impact of Family-Friendly Policies

Authors: Lina Vyas

Abstract:

Gender gap, unfortunately, is still prevalent in the workplace around the world. In most countries, women are less likely than men to participate in the workplace. They earn considerably less than men for doing the same work and are generally expected to prioritize family obligations over work responsibilities. Women often face more conflicts while balancing the increasingly normalized roles of both worker and mother. True gender equality in the workplace is still a long way off. In Hong Kong, no less is this true. Despite the fact that female students are outnumbered by males at universities, only 55% of women are active participants in the labour market, and for those in the workforce, the gender pay gap is 22%. This structural inequality also exacerbates the issues of confronting biases at work for choosing to be employed as a mother, as well as reinforces the societal expectation of women to be the primary caregiver at home. These pressures are likely to add up for women and contribute to increased levels of work-life conflict, which may be a further barrier for the inclusion of women into the workplace. Family-friendly policies have long been thought to be an alleviator of work-life conflict through helping employees balance the demands in both work and family. Particularly, for women, this could be a facilitator of their integration into the workplace. However, little research has looked at how family-friendly policies may also have a gender differential in effect, as opposed to traditional notions of having universal efficacy. This study investigates both how and how much the gender dimension impacts work-family conflict. In addition to disentangling the reasons for gender gaps existing in work-life conflict for women, this study highlights what can be done at an organizational level to alleviate these conflicts. Most importantly, the policies recommendations derived from this study serve as an avenue for more active participation for women in the workplace and can be considered as a pathway for promoting greater gender egalitarianism and fairness in a traditionally gender-segregated society.

Keywords: family-friendly policies, Hong Kong, work-family conflict, workplace

Procedia PDF Downloads 178
846 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 291
845 Thai Cultural Conceptualizations that Underly Intercultural Business Communication Problems with Koreans

Authors: Yangwon Hyun

Abstract:

Nowadays, business settings are becoming increasingly multilingual and multicultural under the conditions of globalization. When people from different linguistic and cultural background interact, their divergent cultural conceptualizations may result in communicative problems. Even though intercultural business communication between Thais and South Koreans has become increasingly significant along with the development of international trade relations, there have been very few attempts to conduct research on interactional problems in that context. Based on a Cultural Linguistics perspective, this study analyzes Thai cultural conceptualizations that underly interactional problems with Koreans at Korean business organizations where were located in Thailand. The data was gathered through in-depth interviews with ten Korean and ten Thai employees as well as through six months of field observations. The results indicate that there are three cultural pragmatic schemas that underly problems of interaction between the two groups; (1) the schema of kreng-jai as a communicative strategy of withholding one’s intentions in order to not hurt another’s emotion, (2) the schema of mai-pen-rai as a linguistic strategy of inducing interlocutors to not be concerned about substantial matters so as to avoid confrontations, and (3) the schema of jai-yen as a linguistic expression used for persuading interlocutors to maintain a calm state of mind in order to avoid conflicts. The linguistic behaviors of Thai employees in relation to these three cultural schemas had led to misunderstandings and interpersonal conflicts with Korean supervisors and co-workers. These interactional problems were caused not only because Koreans were unfamiliar with Thai cultural conceptualizations, but also because these conceptualizations were incompatible with goal-oriented Korean business discourse. The findings of this study can enhance mutual understandings between Thai and Korean employees. Thus, it contributes to the promotion of smooth intercultural communication in the workplace.

Keywords: business context, cultural conceptualizations, cultural linguistics, intercultural communication, thai culture

Procedia PDF Downloads 132
844 Advancing Food System Resilience by Pseudocereals Utilization

Authors: Yevheniia Varyvoda, Douglas Taren

Abstract:

At the aggregate level, climate variability, the rising number of active violent conflicts, globalization and industrialization of agriculture, the loss in diversity of crop species, the increase in demand for agricultural production, and the adoption of healthy and sustainable dietary patterns are exacerbating factors of food system destabilization. The importance of pseudocereals to fuel and sustain resilient food systems is recognized by leading organizations working to end hunger, particularly for their critical capability to diversify livelihood portfolios and provide plant-sourced healthy nutrition in the face of systemic shocks and stresses. Amaranth, buckwheat, and quinoa are the most promising and used pseudocereals for ensuring food system resilience in the reality of climate change due to their high nutritional profile, good digestibility, palatability, medicinal value, abiotic stress tolerance, pest and disease resistance, rapid growth rate, adaptability to marginal and degraded lands, high genetic variability, low input requirements, and income generation capacity. The study provides the rationale and examples of advancing local and regional food systems' resilience by scaling up the utilization of amaranth, buckwheat, and quinoa along all components of food systems to architect indirect nutrition interventions and climate-smart approaches. Thus, this study aims to explore the drivers for ancient pseudocereal utilization, the potential resilience benefits that can be derived from using them, and the challenges and opportunities for pseudocereal utilization within the food system components. The PSALSAR framework regarding the method for conducting systematic review and meta-analysis for environmental science research was used to answer these research questions. Nevertheless, the utilization of pseudocereals has been slow for a number of reasons, namely the increased production of commercial and major staples such as maize, rice, wheat, soybean, and potato, the displacement due to pressure from imported crops, lack of knowledge about value-adding practices in food supply chain, limited technical knowledge and awareness about nutritional and health benefits, absence of marketing channels and limited access to extension services and information about resilient crops. The success of climate-resilient pathways based on pseudocereal utilization underlines the importance of co-designed activities that use modern technologies, high-value traditional knowledge of underutilized crops, and a strong acknowledgment of cultural norms to increase community-level economic and food system resilience.

Keywords: resilience, pseudocereals, food system, climate change

Procedia PDF Downloads 79
843 Intercultural Competencies as a Means to Rethink the Pedagogies of Diversity in Latin America

Authors: Marcelo Jose Cabarcas Ortega, Lissette Herrera, Juan Carlos Lemus Stave

Abstract:

This work makes a rather theoretical reflection on a pedagogical response against the coloniality of knowledge and power. The purpose here is to reflect on the challenges and opportunities it opens up in the educational field. No doubt, ours derived in a more abstract than concrete reflection. The quest, nevertheless, to stimulate the interest in a non-violent, non-contemptuous education able to balance, improves and if necessary, transforms the relationships that have made it a space of privilege and exclusion. We all know the school has found itself in need of rethinking diversity while developing awareness of its own role in reproducing inequality. Intercultural education may provide an answer to that hurry when fostering critical awareness and dialogue.

Keywords: decoloniality, coloniality of power, diversity, interculturality

Procedia PDF Downloads 233
842 Effectiveness of Conflict Resolution Board Game: An Experimental Research

Authors: Safa Abdussalam

Abstract:

Adolescence is a period of storm and stress. It is a transitional period. Adolescents undergo a lot of changes physically, emotionally and mentally during adolescence. Physical changes include puberty, sexual maturation, changes in height, weight, hormonal changes, changes in body image, changes in brain and in sexuality. Changes also occur in their cognition. According to Piaget’s theory, adolescent enter formal operational stage and engage in hypothetical-deductive reasoning. Main characteristic of adolescent cognition is adolescent egocentrism: imaginary audience and personal fable. One of the most common struggle majority of adolescents face is the conflict between parent and adolescent. They often complain that parents do not understand them/their situation. Common topics of conflict include identity crisis, issues with personal freedom and issues over personal preferences. Conflict resolution refers to solving conflicts in a healthy way. There is a lack of resources in dealing with such conflicts creatively. To deal with parent-adolescent conflict, a conflict resolution board game is designed. The board game consists of tokens, dice, 10 conflict situation cards and two conflict resolution sheets. Purpose of using a board game is to help adolescents understand the conflict situations and resolutions in a fun, creative and interactive way. It can be used for self-help or even therapists can use it in their clinical practice. The study aims to assess the effectiveness of the board game in dealing with the conflict. Experimental design will be used. Samples include 15 adolescents belonging to age group 10-19. Samples will be divided into two groups: Experimental group and control group. A pre-test and post-test will be conducted. The board game will be demonstrated to the experimental group. Results will be obtained after statistical analysis. Board games are a great way to be used with children and adolescents.

Keywords: adolescent, adolescence, parent-child conflict, conflict resolution

Procedia PDF Downloads 96
841 Social and Digital Transformation of the Saudi Education System: A Cyberconflict Analysis

Authors: Mai Alshareef

Abstract:

The Saudi government considers the modernisation of the education system as a critical component of the national development plan, Saudi Vision 2030; however, this sudden reform creates tension amongst Saudis. This study examines first the reflection of the social and digital education reform on stakeholders and the general Saudi public, and second, the influence of information and communication technologies (ICTs) on the ethnoreligious conflict in Saudi Arabia. This study employs Cyberconflict theory to examine conflicts in the real world and cyberspace. The findings are based on a qualitative case study methodology that uses netnography, an analysis of 3,750 Twitter posts and semi-structural interviews with 30 individuals, including key actors in the Saudi education sector and Twitter activists during 2019\2020. The methods utilised are guided by thematic analysis to map an understanding of factors that influence societal conflicts in Saudi Arabia, which in this case include religious, national, and gender identity. Elements of Cyberconflict theory are used to better understand how conflicting groups build their identities in connection to their ethnic/religious/cultural differences and competing national identities. The findings correspond to the ethnoreligious components of the Cyberconflict theory. Twitter became a battleground for liberals, conservatives, the Saudi public and elites, and it is used in a novel way to influence public opinion and to challenge the media monopoly. Opposing groups relied heavily on a discourse of exclusion and inclusion and showed ethnic and religious affiliations, national identity, and chauvinism. The findings add to existing knowledge in the cyberconflict field of study, and they also reveal outcomes that are critical to the Saudi Arabian national context.

Keywords: education, cyberconflict, Twitter, national identity

Procedia PDF Downloads 174
840 Religion and Democracy: Assessing Tolerance in the Diversity of Indonesia

Authors: Harsi Nastiti, Haidar Fikri

Abstract:

Indonesia has been known for its diversity of cultures, ethnics, religions, and races. This diversity signs as the uniqueness of the country, so tolerance becomes vital point here. As a unitary state, tolerance value is established strongly as the foundation of democracy implementation but recently this tolerance condition facing up some problems after regional election. In this case, religion issue takes a main role for the Indonesian political system which is managed into tolerance breaker especially for local democracy. The election of Jakarta’s Governor 2017 can be said as the momentum for the people to rethink the democracy and tolerance meaning. It begins from one of the governor candidates who makes statement about the majority religion and unfortunately the candidate comes from the minority. The statement emerges into a new social movement based on religiosity. Basically, the social movement which is coordinated by Islamic Defender Front (Front Pembela Islam or FPI) and National Movement to Safeguard the Fatwa-Indonesian Ulama Council (GNPF-MUI) want to demand the justice in the name of blasphemy. The action continuously happens in different names (Action 411, 212, etc.). So, this article analyzes the new phenomenon and how does the impact for the tolerance and democracy life in Indonesia. The method is using qualitative method by review of literature and media content analysis. Results show this phenomenon potentially spreading new conflicts far beyond the goal of the action itself; justice. It makes the conflicts more complex after there are actions such as; Parade Kebhinekaan and Aksi Lilin which contrary reacts to the actions before. These actions and reactions rise up the sensitive issues for Indonesia like religions, Pancasila, unity in diversity, ethnics, and races. At the same time raising skepticism; will it be over after the candidate is getting sentenced or becomes the dangerous latent conflict that will threaten tolerance and democracy in Indonesia.

Keywords: conflict, democracy, religion, tolerance

Procedia PDF Downloads 290
839 Regeneration of a Liquid Desiccant Using Membrane Distillation to Unlock Coastal Desert Agriculture Potential

Authors: Kimberly J. Cribbs, Ryan M. Lefers, TorOve Leiknes, Noreddine Ghaffour

Abstract:

In Gulf Cooperation Council (GCC) countries, domestic agriculture is hindered by a lack of freshwater, poor soil quality, and ambient temperatures unsuitable for cultivation resulting in a heavy reliance on imported food. Attempts to minimize the risk of food insecurity by growing crops domestically creates a significant demand on limited freshwater resources in this region. Cultivating food in a greenhouse allows some of these challenges, such as poor soil quality and temperatures unsuitable for cultivation, to be overcome. One of the most common methods for greenhouse cooling is evaporative cooling. This method cools the air by the evaporation of water and requires a large amount of water relative to that needed for plant growth and air with a low relative humidity. Considering that much of the population in GCC countries live within 100 km of a coast and that sea water can be utilized for evaporative cooling, coastal agriculture could reduce the risk of food insecurity and water demand. Unfortunately, coastal regions tend to experience both high temperatures and high relative humidity causing evaporative cooling by itself to be inadequate. Therefore, dehumidification is needed prior to utilizing evaporative cooling. Utilizing a liquid desiccant for air dehumidification is promising, but the desiccant regeneration to retain its dehumidification potential remains a significant obstacle for the adoption of this technology. This project studied the regeneration of a magnesium chloride (MgCl₂) desiccant solution from 20wt% to 30wt% by direct contact membrane distillation (DCMD) and explored the possibility of using the recovered water for irrigation. Two 0.2 µm hydrophobic PTFE membranes were tested at feed temperatures of 80, 70, and 60°C and with a permeate temperature of 20°C. It was observed that the permeate flux increases as the difference between the feed and coolant temperature increases and also as the feed concentration decreases. At 21wt% the permeate flux was 34,17, and 14 L m⁻² h⁻¹ for feed temperatures of 80, 70, and 60°C, respectively. Salt rejection decreased overtime; however, it remained greater than 99.9% over an experimental time span of 10 hours. The results show that DCMD can successfully regenerate the magnesium chloride desiccant solution.

Keywords: agriculture, direct contact membrane distillation, GCC countries, liquid desiccant, water recovery

Procedia PDF Downloads 149
838 The Grievances Theory versus Transnationalism and the Cameroon Anglophone Question, 1961-2017

Authors: Nkatow Mafany Christian

Abstract:

No other period in human history has offered such great opportunities for grievances not only to last long but also to be manifested across international boundaries. This state of affairs is likely a common feature of the advent of social media. The Anglophone Question in Cameroon has been a problem of poor constitutional arrangements that can be traced to 1961 when the former French Cameroon reunified with former British Southern Cameroons following a plebiscite in which the latter overwhelmingly voted to reunify with the former. Though Southern/Anglophone Cameroons complained of perceived marginalization and an attempt by the majority French section to assimilate them, the manifestation was subtle and took place only through protests, petitions, strikes movements and demonstrations. However, with the advent of social media, a new cream of leaders emerged in the diaspora, including the US, Canada, Europe, Asia and the Middle East, to champion the manifestations leading to violence and conflicts that have bedeviled the region since 2017. The feeling of political subjugation, economic exploitation, social suppression and cultural assimilation among Anglophone Cameroonians united them under diaspora leaders against the government of Cameroon, calling for the creation of a separate state for Anglophones. This paper draws from this lead-up to analyze the current Anglophone Crisis in Cameroon in the light of the Grievance Theory and Transnationalism. The paper makes an appeal to field experience, interviews, official sources, documentation, and the internet to succor its central thesis. From the fertility of its sources, the paper submits that social media is a potent source of conflicts and makes nonsense of the principle of sovereignty and territorial integrity by its capacity to promote the transnational manifestation of grievances.

Keywords: grievance, transnationalism, anglophone crisis, Cameroon, crisis and social media

Procedia PDF Downloads 63
837 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 91
836 The Evolution of Strike and Intelligence Functions in Special Operations Forces

Authors: John Hardy

Abstract:

The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations.

Keywords: counterinsurgency, counterterrorism, intelligence, irregular warfare, military operations, special operations forces

Procedia PDF Downloads 268
835 Depollution of the Pinheiros River in the City of São Paulo: Mapping the Dynamics of Conflicts and Coalitions between Actors in Two Recent Depollution Projects

Authors: Adalberto Gregorio Back

Abstract:

Historically, the Pinheiros River, which crosses the urban area of the largest South American metropolis, the city of São Paulo, has been the subject of several interventions involving different interests and multiple demands, including the implementation of road axes and industrial occupation in the city, following its floodplains. the dilution of sewers; generation of electricity, with the reversal of its waters to the Billings Dam; and urban drainage. These processes, together with the exclusionary and peripheral urban sprawl with high population density in the peripheries, result in difficulties for the collection and treatment of household sewage, which flow into the tributaries and the Pinheiros River itself. In the last 20 years, two separate projects have been undertaken to clean up its waters. The first one between 2001-2011 was the flotation system, aimed at cleaning the river in its own gutter with equipment installed near the Bilings Dam; and, more recently, from 2019 to 2022, the proposal to connect about 74 thousand dwellings to the sewage collection and treatment system, as well as to install treatment plants in the tributaries of Pinheiros where the connection to the system is impracticable, given the irregular occupations. The purpose of this paper is to make a comparative analysis on the dynamics of conflicts, interests and opportunities of coalitions between the actors involved in the two referred projects of pollution of the Pinheiros River. For this, we use the analysis of documents produced by the state government; as well as documents related to the legal disputes that occurred in the first attempt of decontamination involving the sanitation company; the Billings Dam management company interested in power generation; the city hall and regular and irregular dwellings not linked to the sanitation system.

Keywords: depollution of the Pinheiros River, interests groups, São Paulo, water energy nexus

Procedia PDF Downloads 106
834 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks

Authors: Sulemana Ibrahim

Abstract:

Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.

Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks

Procedia PDF Downloads 62
833 How Fascism and Authoritarianism Are Expanding in the USA

Authors: Warner Woodworth

Abstract:

While the explosion of autocratic governments is growing globally, perhaps nowhere is it more obvious than in the United States since 2015. In that nation, democracy is increasingly caving to extreme Right-wing movements, especially after Donald Trump lost to Joe Biden in the 2020 election. Angered by that rejection, he and his support groups that foster extremism began an all-out assault on freedom, beginning with the attack on the US Capitol itself on January 6, 2021. Since then, following Trump’s two presidential impeachments, 34 felony convictions, 88 impending court cases by the Department of Justice, and crimes by some of his most ardent co-conspirators, the rule of law, traditional political values, and even the Constitution became threatened. Now, since his Nov. 5, 2024, campaign victory, the dark clouds of autocracies loom larger every day. To wit: Appointments to Trump’s cabinet are all extremists promising to eliminate major beneficiary citizen programs such as healthcare, civil rights, education, justice, and a massive move to drive millions of immigrants from the country. The political divide is at its highest extreme since the 1861 Civil War between North and South. Autocratization is manifest daily in fake news media, as well as traditional conspiracy organizations such as politically violent motorcycle gangs, the John Birch Society, Eagle Forum, and Anti-Constitutional Sheriffs and other law enforcement groups. Even worse is the expansion of violent groups such as the Proud Boys, Aryan Nations, Patriot Front, White Nationalists, Stormfront, Oath Keepers, Three Percenters, Ku Klux Klan, Moms for Liberty, American Nazi Party, Operation Homeland, Skinhead organizations, America First, Veterans on Patrol, hundreds of militia groups from coast to coast, and of course, hundreds more under the banner of Trump’s movement, ‘Make America Great Again.’ This paper will draw on the author’s decades of researching these groups and Trump's new authoritarian agenda. Qualitative data will include expert analysis from multiple academic disciplines as Americans, and the larger world seek to understand these dangerous U.S. trends and future prospects. The paper concludes by sharing the prospects of America’s future over the next four years, or longer if Trump’s vow to be a dictator is extended.

Keywords: American authoritarianism, trump, fascism, conspiracies, extremism

Procedia PDF Downloads 6
832 Food Processing Role in Ensuring Food and Health Security

Authors: Muhammad Haseeb

Abstract:

It is crucial to have a balanced approach to food's energy and nutritional content in a world with limited resources. The preservation of the environment is vital, and both the agrifood-making and food service sectors will be requested to use fewer resources to produce a wider range of existing foods and develop imaginative foods that are physiologically appropriate for a better sense of good health, have long shelf lives and are conveniently transportable. Delivering healthy diets that satisfy consumer expectations from robust and sustainable agrifood systems is necessary in a world that is changing and where natural resources are running out. Across the whole food supply chain, an integrated multi-sectoral approach is needed to alleviate global food and nutrition insecurity.

Keywords: health, food, nutrition, supply chain

Procedia PDF Downloads 18
831 “Uninformed” Religious Orientation Can Lead to Violence in Any Given Community: The Case of African Independence Churches in South Africa

Authors: Ngwako Daniel Sebola

Abstract:

Introductory Statement: Religions are necessary as they offer and teach something to their adherence. People in one religion may not have a complete understanding of the Supreme Being (Deity) in a certain religion other than their own. South Africa, like other countries in the world, consists of various religions, including Christianity. Almost 80% of South African population adheres to the Christian faith, though in different denominations and sects. Each church fulfils spiritual needs that perhaps others cannot fill. African Independent Churches is one of the denominations in the country. These churches arose as a protest to the Western forms and expressions of Christianity. Their major concern was to develop an indigenous expression of Christianity. The relevance of African Independent Churches includes addressing the needs of the people holistically. Controlling diseases was an important aspect of change in different historical periods. Through healing services, leaders of African churches are able to attract many followers. The healing power associated with the founders of many African Initiated Churches leads to people following and respecting them as true leaders within many African communities. Despite its strong points, African Independent Churches, like many others, face a variety of challenges, especially conflicts. Ironically, destructive conflicts resulted in violence.. Such violence demonstrates a lack of informed religious orientation among those concerned. This paper investigates and analyses the causes of conflict and violence in the African Independent Church. The researcher used the Shembe and International Pentecostal Holiness Churches, in South Africa, as a point of departure. As a solution to curb violence, the researcher suggests useful strategies in handling conflicts. Methodology: Comparative and qualitative approaches have been used as methods of collecting data in this research. The intention is to analyse the similarities and differences of violence among members of the Shembe and International Pentecostal Holiness Churches. Equally important, the researcher aims to obtain data through interviews, questionnaires, focus groups, among others. The researcher aims to interview fifteen individuals from both churches. Finding: Leadership squabbles and power struggle appear to be the main contributing factors of violence in many Independent Churches. Ironically, violence resulted in the loss of life and destruction of properties, like in the case of the Shembe and International Pentecostal Holiness Churches. Violence is an indication that congregations and some leaders have not been properly equipped to deal with conflict. Concluding Statement: Conflict is a common part of every human existence in any given community. The concern is when such conflict becomes contagious; it leads to violence. There is a need to understand consciously and objectively towards devising the appropriate measures to handle the conflict. Conflict management calls for emotional maturity, self-control, empathy, patience, tolerance and informed religious orientation.

Keywords: African, church, religion, violence

Procedia PDF Downloads 116
830 Traditional Mechanisms of Conflict Resolution in Africa: A Pathway to Sustainable Peace in Nigeria

Authors: Ejovi Eghwubare Augustine

Abstract:

This study delved into the traditional mechanisms of conflict resolution in Africa, a pathway to sustainable peace in Nigeria. It deployed the quantitative and qualitative methods of data collection and content analysis. The work adopted the Peace Process theory propounded by John Darby and Roger Macunity. It ascertained that disputes or disagreements are unarguably and necessarily an inevitable part of human existence, flowing directly from communication, interaction, and relationships which can occur at individual and national levels, even at international levels in view of the current trend of globalization. The alternative Dispute Resolution (ADR) mechanism is a basket of procedures outside the traditional process of litigation or strict determination of legal rights. It may also be elucidated as a range of procedures that serve as generally involve the intercession and assistance of a neutral and impartial third party. The traditional mechanisms of conflict resolution in Africa are alien to the Western world; this paper is of utmost importance to the Western world and also enriched their pool of literature. Nigeria is a country that is dominated by various ethnic groups anchored on diverse cultures, customs, and traditions. It is, therefore, not surprising to see conflicts arise, and despite the various attempts at resolving these conflicts through litigation, they still remained unabated. The paper investigated the lessons learned from Traditional Mechanisms of Conflict resolution; it also interrogated its impact and the way forward. In light of the lessons that were learned and the impact of the traditional mechanisms of conflict resolution, suggestions on how to attain a sustainable, peaceful society were proffered. In conclusion, the study crystallized reforms on the alternative dispute resolution introduced through the traditional mechanism, which includes, amongst others, that constitutional recognition should be given to traditional institutions of conflict resolution to enable quick dispensation of matters.

Keywords: traditional, conflict, peace, resolution

Procedia PDF Downloads 72
829 Examining Terrorism through a Constructivist Framework: Case Study of the Islamic State

Authors: Shivani Yadav

Abstract:

The Study of terrorism lends itself to the constructivist framework as constructivism focuses on the importance of ideas and norms in shaping interests and identities. Constructivism is pertinent to understand the phenomenon of a terrorist organization like the Islamic State (IS), which opportunistically utilizes radical ideas and norms to shape its ‘politics of identity’. This ‘identity’, which is at the helm of preferences and interests of actors, in turn, shapes actions. The paper argues that an effective counter-terrorism policy must recognize the importance of ideas in order to counter the threat arising from acts of radicalism and terrorism. Traditional theories of international relations, with an emphasis on state-centric security problematic, exhibit several limitations and problems in interpreting the phenomena of terrorism. With the changing global order, these theories have failed to adapt to the changing dimensions of terrorism, especially ‘newer’ actors like the Islamic State (IS). The paper observes that IS distinguishes itself from other terrorist organizations in the way that it recruits and spreads its propaganda. Not only are its methods different, but also its tools (like social media) are new. Traditionally, too, force alone has rarely been sufficient to counter terrorism, but it seems especially impossible to completely root out an organization like IS. Time is ripe to change the discourse around terrorism and counter-terrorism strategies. The counter-terrorism measures adopted by states, which primarily focus on mitigating threats to the national security of the state, are preoccupied with statist objectives of the continuance of state institutions and maintenance of order. This limitation prevents these theories from addressing the questions of justice and the ‘human’ aspects of ideas and identity. These counter-terrorism strategies adopt a problem-solving approach that attempts to treat the symptoms without diagnosing the disease. Hence, these restrictive strategies fail to look beyond calculated retaliation against violent actions in order to address the underlying causes of discontent pertaining to ‘why’ actors turn violent in the first place. What traditional theories also overlook is that overt acts of violence may have several causal factors behind them, some of which are rooted in the structural state system. Exploring these root causes through the constructivist framework helps to decipher the process of ‘construction of terror’ and to move beyond the ‘what’ in theorization in order to describe ‘why’, ‘how’ and ‘when’ terrorism occurs. Study of terrorism would much benefit from a constructivist analysis in order to explore non-military options while countering the ideology propagated by the IS.

Keywords: constructivism, counter terrorism, Islamic State, politics of identity

Procedia PDF Downloads 189
828 Men's Intimate Violence: Theory and Practice Relationship

Authors: Omer Zvi Shaked

Abstract:

Intimate Partner Violence (IPV) is a widespread social problem. Since the 1970's, and due to political changes resulting from the feminist movement, western society has been changing its attitude towards the phenomenon and has been taking an active approach to reduce its magnitude. Enterprises in the form of legislation, awareness and prevention campaigns, women's shelters, and community intervention programs became more prevalent as years progressed. Although many initiatives were found to be productive, the effectiveness of one, however, remained questionable throughout the years: intervention programs for men's intimate violence. Surveys outline two main intervention models for men's intimate violence. The first is the Duluth model, which argued that men are socialized to be dominant - while women are socialized to be subordinate - and men are therefore required by social imperative to enforce, physically if necessary, their dominance. The Duluth model became the chief authorized intervention program, and some states in the US even regulated it as the standard criminal justice program for men's intimate violence. However, meta-analysis findings demonstrated that based on a partner's reports, Duluth treatment completers have 44% recidivism rate, and between 40% and 85% dropout range. The second model is the Cognitive-Behavioral Model (CBT), which is a highly accepted intervention worldwide. The model argues that cognitive misrepresentations of intimate situations precede violent behaviors frequently when anger predisposition exists. Since anger dysregulation mediates between one's cognitive schemes and violent response, anger regulation became the chief purpose of the intervention. Yet, a meta-analysis found only a 56% risk reduction for CBT interventions. It is, therefore, crucial to understand the background behind the domination of both the Duluth model and CBT interventions. This presentation will discuss the ways in which theoretical conceptualizations of men's intimate violence, as well as ideologies, had contributed to the above-mentioned interventions' wide acceptance, despite known lack of scientific and evidential support. First, the presentation will review the prominent interventions for male intimate violence, the Duluth model, and CBT. Second, the presentation will review the prominent theoretical models explaining men's intimate violence: The Patriarchal model, the Abusive Personality model, and the Post-Traumatic Stress model. Third, the presentation will discuss the interrelation between theory and practice, and the nature of affinity between research and practice regarding men's intimate violence. Finally, the presentation will set new directions for further research, aiming to improve intervention's efficiency with men's intimate violence and advance social work practice in the field.

Keywords: intimate partner violence, theory and practice relationship, Duluth, CBT, abusive personality, post-traumatic stress

Procedia PDF Downloads 126