You searched for subject:(Spying)
.
Showing records 1 – 9 of
9 total matches.
No search limiters apply to these results.

Leiden University
1.
Willett, Molly.
Colonising the Ancient Night? Functions of the Night-Time in Ancient Greek Warfare.
Degree: 2019, Leiden University
URL: http://hdl.handle.net/1887/87176
► In this thesis, I will explore, on an intellectual and sensory level, the ways in which the night time was perceived and utilised in the…
(more)
▼ In this thesis, I will explore, on an intellectual and sensory level, the ways in which the night time was perceived and utilised in the context of ancient Greek warfare. By ascertaining what activities took place during the night time of the 4th century BC, in a military context, it will become possible to understand more about how the experience of the night was used and presented in antiquity. I will argue that far from being desolate and empty of human presence, the ancient night was a significant time for military activity and that it was in fact used in a variety of interesting ways that are not served by the rather simplistic image of nocturnal ‘colonisation’ presented in Histories of the Early Modern period.
Advisors/Committee Members: Beerden, Kim (advisor).
Subjects/Keywords: Night; Darkness; Warfare; War; Xenophon; Aeneas Tacticus; Spying; Colonisation; Colonization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Willett, M. (2019). Colonising the Ancient Night? Functions of the Night-Time in Ancient Greek Warfare. (Masters Thesis). Leiden University. Retrieved from http://hdl.handle.net/1887/87176
Chicago Manual of Style (16th Edition):
Willett, Molly. “Colonising the Ancient Night? Functions of the Night-Time in Ancient Greek Warfare.” 2019. Masters Thesis, Leiden University. Accessed April 13, 2021.
http://hdl.handle.net/1887/87176.
MLA Handbook (7th Edition):
Willett, Molly. “Colonising the Ancient Night? Functions of the Night-Time in Ancient Greek Warfare.” 2019. Web. 13 Apr 2021.
Vancouver:
Willett M. Colonising the Ancient Night? Functions of the Night-Time in Ancient Greek Warfare. [Internet] [Masters thesis]. Leiden University; 2019. [cited 2021 Apr 13].
Available from: http://hdl.handle.net/1887/87176.
Council of Science Editors:
Willett M. Colonising the Ancient Night? Functions of the Night-Time in Ancient Greek Warfare. [Masters Thesis]. Leiden University; 2019. Available from: http://hdl.handle.net/1887/87176

University of Southern California
2.
Stefanek, Robert David.
Spying and surveillance in the early modern state and
stage.
Degree: PhD, English, 2012, University of Southern California
URL: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/75462/rec/6024
► This dissertation argues that the theatre of William Shakespeare, Christopher Marlowe, Thomas Middleton, and their professional and amateur contemporaries was used by different authorities throughout…
(more)
▼ This dissertation argues that the theatre of William
Shakespeare, Christopher Marlowe, Thomas Middleton, and their
professional and amateur contemporaries was used by different
authorities throughout early modern England to conduct surveillance
on audiences comprised of suspect classes, including political
rivals, recusant Catholics, radical Protestants, and economic
dissidents. I argue furthermore that the architecture of theatres
was designed with an eye towards audience surveillance and control.
This project is organized by different performance locations
throughout England – towns, the universities, and the court – and
analyzes a variety of sources, including court, civic, and
university records, political, scientific, and philosophical
treatises, maps, architecture, painting, prose works, and poetry. ❧
This dissertation deepens our understanding of how Shakespeare and
his contemporaries achieved the central place in our culture that
they occupy today, while critiquing Michel Foucault's genealogy of
the modern surveillance state and his rigid distinctions between
the disciplinary strategies of different epochs. By considering
plays in their historical conditions of performance throughout
England, I theorize that meaning is a complex interaction involving
not only play texts and actors, but also audiences and theatre
architectures. I also offer an approach that opens the study of
early modern drama in a way that is inclusive of the dramatic
experiences available to the entire English population, not just
the portion residing in London.
Advisors/Committee Members: Smith, Bruce R. (Committee Chair), Lemon, Rebecca (Committee Member), Lloyd, David C. (Committee Member), Velasco, Sherry (Committee Member).
Subjects/Keywords: architecture; early modern English literature; English Renaissance literature; Shakespeare; surveillance; spying; theatre
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Stefanek, R. D. (2012). Spying and surveillance in the early modern state and
stage. (Doctoral Dissertation). University of Southern California. Retrieved from http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/75462/rec/6024
Chicago Manual of Style (16th Edition):
Stefanek, Robert David. “Spying and surveillance in the early modern state and
stage.” 2012. Doctoral Dissertation, University of Southern California. Accessed April 13, 2021.
http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/75462/rec/6024.
MLA Handbook (7th Edition):
Stefanek, Robert David. “Spying and surveillance in the early modern state and
stage.” 2012. Web. 13 Apr 2021.
Vancouver:
Stefanek RD. Spying and surveillance in the early modern state and
stage. [Internet] [Doctoral dissertation]. University of Southern California; 2012. [cited 2021 Apr 13].
Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/75462/rec/6024.
Council of Science Editors:
Stefanek RD. Spying and surveillance in the early modern state and
stage. [Doctoral Dissertation]. University of Southern California; 2012. Available from: http://digitallibrary.usc.edu/cdm/compoundobject/collection/p15799coll3/id/75462/rec/6024

University of Cambridge
3.
Maddrell, John Paul.
Britain's exploitation of Occupied Germany for scientific and technical intelligence on the Soviet Union.
Degree: PhD, 1999, University of Cambridge
URL: https://doi.org/10.17863/CAM.16476
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310934
► At the beginning of the Cold War, the gathering of intelligence on the Soviet Union's current and future military capability seemed a near-impossibility. Soviet high-level…
(more)
▼ At the beginning of the Cold War, the gathering of intelligence on the Soviet Union's current and future military capability seemed a near-impossibility. Soviet high-level communications were secure against decryption. Agent networks in the USSR were very difficult to establish and of uncertain reliability. Aerial reconnaissance of warrelated targets in the Soviet Union was risky and could only be occasional. But valuable intelligence was gathered in the years 1945-55 on the USSR's frantic arms build-up, thanks to its policy towards Germans and their country. Its exploitation of Germans and its Zone of Germany in its war-related research and development and the reconstruction of its war-related industries gave British Intelligence penetrable targets in the Soviet Zone and gave great numbers of Germans sought-after information on the USSR itself. The ease of recruiting age nts in East Germany and the flight (including enticed defections) of refugees from it allowed research and development projects and uranium.-mining operations there to be penetrated. Intelligence of Soviet weapons development and of the quality of Soviet military technology was obtained. The mass interrogation of prisoners-of-war returned by the Soviets to the British Occupation Zone in the late 1940s yielded a wealth of valuable information on war-related construction and the locations of numerous intelligence targets in the Soviet Union: most importantly, those of atomic and chemical plants, aircraft and aero-engine factories, airfields, rocket development centres and other installations. When, in the period 1949-58, some 3,000 deported German scientists , engineers and technicians were sent back to their homeland from the USSR, promising sources among them were enticed West and interrogated for their knowledge of the Soviets' research and development projects. The cream of the information they provided was crucial intelligence on the locations of atomic plants and laboratories and uranium deposits; useful information on structural weaknesses in the Soviet system of scientific and economic management; expert (if out-of-date) assessments of the quality of Soviet accomplishments in atomic science, electronics and other fields; and well-informed indications as to possible lines of development in guided missile and aircraft design. One Soviet scientific defector in Germany provided similar information which influenced British perceptions of the Soviet Union's scientific potential and missile development plans. Refugees entering the British Zone from East Germany, intercepted letters and monitored telecommunications, informal contacts and, of course, secret agents all made significant contributions to the gathering of scientific and technical intelligence in Germany too. The British passed to the Americans much of the intelligence they acquired in Germany and the installations identified and located by German sources were overtlown by spyplanes in the 1950s and particularly by U-2s in the latter half of-the decade. Priceless information was obtained,…
Subjects/Keywords: 900; Second world war; Cold war; British; Spying
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Maddrell, J. P. (1999). Britain's exploitation of Occupied Germany for scientific and technical intelligence on the Soviet Union. (Doctoral Dissertation). University of Cambridge. Retrieved from https://doi.org/10.17863/CAM.16476 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310934
Chicago Manual of Style (16th Edition):
Maddrell, John Paul. “Britain's exploitation of Occupied Germany for scientific and technical intelligence on the Soviet Union.” 1999. Doctoral Dissertation, University of Cambridge. Accessed April 13, 2021.
https://doi.org/10.17863/CAM.16476 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310934.
MLA Handbook (7th Edition):
Maddrell, John Paul. “Britain's exploitation of Occupied Germany for scientific and technical intelligence on the Soviet Union.” 1999. Web. 13 Apr 2021.
Vancouver:
Maddrell JP. Britain's exploitation of Occupied Germany for scientific and technical intelligence on the Soviet Union. [Internet] [Doctoral dissertation]. University of Cambridge; 1999. [cited 2021 Apr 13].
Available from: https://doi.org/10.17863/CAM.16476 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310934.
Council of Science Editors:
Maddrell JP. Britain's exploitation of Occupied Germany for scientific and technical intelligence on the Soviet Union. [Doctoral Dissertation]. University of Cambridge; 1999. Available from: https://doi.org/10.17863/CAM.16476 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310934
4.
Watson, Ronald E.
Spying: A Normative Account of the Second Oldest Profession.
Degree: PhD, Political Science, 2013, Washington University in St. Louis
URL: https://openscholarship.wustl.edu/etd/1106
► My dissertation attends to the urgent ethical problems raised by government spying. It asks and answers three principal questions: What is spying? What principles…
(more)
▼ My dissertation attends to the urgent ethical problems raised by government
spying. It asks and answers three principal questions: What is
spying? What principles should regulate government
spying? And how can government agents be constrained to follow these principles? The first chapter takes up the conceptual question. I defend the following definition of
spying: agent A spies on agent B, if and only if she collects information that relates to B and intends to conceal her information collection from B. The main challenge any conception of
spying faces is to cover a relatively wide range of agents often thought to be spies - e.g. defectors, moles, and informants - without including agents not often thought of as spies. This challenge is best met, I argue, by drawing on the concept of collective intentionality. Aldrich Ames, for example, although he did not intend to conceal his information collection from the U.S. government, nevertheless spied on the U.S. government, since he participated in a collectivity, which included his handlers at the KGB, that met both of the conditions stipulated in my definition. Chapters three through six examine the ethics of domestic government
spying, i.e. governments
spying on their own citizens within their own territories. I make two main arguments. The first is that domestic government
spying should be regulated by five principles: just cause, proportionality, necessity, minimization, and discrimination. The second argument is that the law-enforcement and intelligence officials who employ these principles should not alone determine how they apply in particular cases - the principles should be institutionalized. In chapter three I demonstrate that the five principles are supported by widespread intuitions about government
spying in liberal democracies. In chapters four through six, I show that the same principles are supported by the moral theory that I think is most plausible: two-level utilitarianism. Since utilitarianism is often thought to strongly conflict with people's ordinary moral intuitions, if I am correct and the same principles can be derived both from widespread intuitions and utilitarianism, then the principles are on strong ground. In chapter seven, I shift my focus from domestic government
spying to foreign
spying. I focus on two kinds of foreign
spying in particular: government
spying on foreign individuals and government
spying on foreign states. I argue that government
spying on foreign individuals and on foreign states should be institutionalized and that both should follow principles similar but not identical to those that governments should follow in the domestic context. In the final two chapters I turn to the institutional question. In chapter eight I examine the two primary American institutions employed to control intelligence agencies: legislative oversight and judicial review. Both I argue employ biased principals and suffer from informational asymmetries. In chapter nine I step back from American institutions and…
Advisors/Committee Members: Andrew Rehfeld.
Subjects/Keywords: Espionage; Ethics; Oversight; Spying; Surveillance; Political Science
…5.1
The Consequences of Successfully Concealed Spying . . . . . . . . . . 129
5.2
The… …Consequences of Suspected Spying . . . . . . . . . . . . . . . . . 130
vi
90
ACKNOWLEDGEMENTS
I… …government spying. Spying has the potential to secure governments from any
number of threats… …and therefore vulnerable.
The protective role that government spying can play is in part why… …many resources to build and maintain the capacity to spy today. Records of spying
stretch so…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Watson, R. E. (2013). Spying: A Normative Account of the Second Oldest Profession. (Doctoral Dissertation). Washington University in St. Louis. Retrieved from https://openscholarship.wustl.edu/etd/1106
Chicago Manual of Style (16th Edition):
Watson, Ronald E. “Spying: A Normative Account of the Second Oldest Profession.” 2013. Doctoral Dissertation, Washington University in St. Louis. Accessed April 13, 2021.
https://openscholarship.wustl.edu/etd/1106.
MLA Handbook (7th Edition):
Watson, Ronald E. “Spying: A Normative Account of the Second Oldest Profession.” 2013. Web. 13 Apr 2021.
Vancouver:
Watson RE. Spying: A Normative Account of the Second Oldest Profession. [Internet] [Doctoral dissertation]. Washington University in St. Louis; 2013. [cited 2021 Apr 13].
Available from: https://openscholarship.wustl.edu/etd/1106.
Council of Science Editors:
Watson RE. Spying: A Normative Account of the Second Oldest Profession. [Doctoral Dissertation]. Washington University in St. Louis; 2013. Available from: https://openscholarship.wustl.edu/etd/1106
5.
Moulin, Thibault.
Le cyber-espionnage en Droit international : Cyber-espionage in International Law.
Degree: Docteur es, Droit international, 2018, Université Grenoble Alpes (ComUE); University of Manchester
URL: http://www.theses.fr/2018GREAD010
► Les Etats s’espionnent depuis des siècles, soulevant des tensions. Toutefois, une régulation expresse ne peut être trouvée que dans le droit des conflits armés. Alors…
(more)
▼ Les Etats s’espionnent depuis des siècles, soulevant des tensions. Toutefois, une régulation expresse ne peut être trouvée que dans le droit des conflits armés. Alors que les espions peuvent être capturés et punis, il est paradoxalement admis que leur envoi en temps de guerre n’est pas contraire au droit international. En revanche, aucune règle expresse ne vient réglementer l’espionnage en temps de paix. Une appréhension indirecte n’existe que par le biais de la souveraineté territoriale. En effet, en l’absence de son consentement, l’envoi d’un agent sur le sol d’un territoire étranger est illégal. Cela fait écho à la position ambivalente des Etats sur la scène internationale, qui ont toujours envoyé des espions en territoire étranger. Quand ces agents sont capturés, l’Etat peut les punir conformément à sa législation pénale, protester ou les échanger. Toutefois, l’applicabilité de ce cadre juridique est remise en question par l’émergence du cyber-espionnage, dans la mesure où la présence physique d’un agent n’est plus requise. Le fil d’Ariane de cette thèse est donc de savoir si la dématérialisation et la déterritorialisation de l’espionnage prévient l’application des règles de droit international au cyber-espionnage.La doctrine a tenté de faire face à ce manque de régulation expresse et ces changements. Les auteurs ont habituellement proposé d’appliquer les traités existants, d’examiner la légalité du cyber-espionnage à la lumière des règles de souveraineté et de non-intervention, ou essaient d’identifier de nouvelles règles coutumières. Toutefois, cette thèse perçoit de nombreux problèmes dans cette démarche. En effet, seules de rares références sont faites aux règles d’interprétation contenues dans la Convention de Vienne sur le Droit des Traités, les conclusions de la Commission de Droit International (CDI) sur l’identification du droit international coutumier, ainsi qu’à la pratique étatique. De plus, de nombreuses analogies reposent sur la supposition erronée que le territoire et le cyberespace sont similaires.Huit instruments sont analysés dans cette thèse. Afin de déterminer ce qu’ils ont à dire au sujet du cyber-espionnage, cette recherche propose de recourir aux règles officielles d’interprétation contenue dans la Convention de Vienne, les conclusions de la CDI, et d’incorporer le montant maximum de pratique étatique. Cette thèse conclut finalement que le cyber-espionnage ne viole pas les règles de souveraineté, de non-intervention, la Charte des Nations Unies, l’Accord sur les aspects des droits de propriété intellectuelle qui touchent au commerce et la Constitution de l’Union Internationale des Télécommunications. Elle révèle également que la plupart des règles applicables en temps de guerre sont inapplicables, et que ni l’espionnage ni le cyber-espionnage ne sont interdits par le droit international coutumier. Seule la surveillance des archives et documents digitaux, ainsi que la correspondance électronique et vocale violent la Convention de Vienne sur les Relations Diplomatiques.
States have spied…
Advisors/Committee Members: Christakis, Théodore (thesis director), D'Aspremont, Jean (thesis director), Scobbie, Iain (thesis director).
Subjects/Keywords: Espionnage; Cyber-Espionnage; Cyber; Droit international; Espionnage économique; Relations Internationales; Spying; Cyber-Espionage; Cyber; International Law; Economic espionage; International relations; 340
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Moulin, T. (2018). Le cyber-espionnage en Droit international : Cyber-espionage in International Law. (Doctoral Dissertation). Université Grenoble Alpes (ComUE); University of Manchester. Retrieved from http://www.theses.fr/2018GREAD010
Chicago Manual of Style (16th Edition):
Moulin, Thibault. “Le cyber-espionnage en Droit international : Cyber-espionage in International Law.” 2018. Doctoral Dissertation, Université Grenoble Alpes (ComUE); University of Manchester. Accessed April 13, 2021.
http://www.theses.fr/2018GREAD010.
MLA Handbook (7th Edition):
Moulin, Thibault. “Le cyber-espionnage en Droit international : Cyber-espionage in International Law.” 2018. Web. 13 Apr 2021.
Vancouver:
Moulin T. Le cyber-espionnage en Droit international : Cyber-espionage in International Law. [Internet] [Doctoral dissertation]. Université Grenoble Alpes (ComUE); University of Manchester; 2018. [cited 2021 Apr 13].
Available from: http://www.theses.fr/2018GREAD010.
Council of Science Editors:
Moulin T. Le cyber-espionnage en Droit international : Cyber-espionage in International Law. [Doctoral Dissertation]. Université Grenoble Alpes (ComUE); University of Manchester; 2018. Available from: http://www.theses.fr/2018GREAD010
6.
Patton, Cliffard A.
The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic
.
Degree: 2017, George Mason University
URL: http://hdl.handle.net/1920/10518
► This thesis describes an international impact of cyber espionage with an emphasis on the United States of America and its National Security Agency's clandestine tactics…
(more)
▼ This thesis describes an international impact of cyber espionage with an emphasis on the United States of America and its National Security Agency's clandestine tactics among its Western allies in the Transatlantic region. The National Security Agency's covert operations had came to world attention, through the media, when various tactics of mass surveillance had become public in June 2013. Which was consequentially followed by other revelations on later dates. The US had acknowledged there is much more information still in the hands of a former agent, which could lead to more international difficulties. In the process of researching and writing this thesis, the author conducted a literature search and reviews internal documents, literature reviews, news articles etc. This thesis is in fulfillment for a graduate course on conflict analysis and resolution/conflict resolution and Mediterranean security.
Advisors/Committee Members: Calleya, Stephen (advisor).
Subjects/Keywords: espionage;
electronic surveillance;
international law;
spying;
cyber espionage;
Conflict resolution
…of a foreign government, military, political entity or a business
competitor. Spying is… …knowledge that all governments, if not most, spy. They have been spying for centuries,
but the… …Jamieson, 2013).
Reports come out in September 2013, that indicted the U.S. was spying on… …of violating human rights and international law through espionage, which
included spying on… …United States' spying tactics involving its allies (Payne & Shah,
2013)…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Patton, C. A. (2017). The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic
. (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/10518
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Patton, Cliffard A. “The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic
.” 2017. Thesis, George Mason University. Accessed April 13, 2021.
http://hdl.handle.net/1920/10518.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Patton, Cliffard A. “The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic
.” 2017. Web. 13 Apr 2021.
Vancouver:
Patton CA. The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic
. [Internet] [Thesis]. George Mason University; 2017. [cited 2021 Apr 13].
Available from: http://hdl.handle.net/1920/10518.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Patton CA. The Impact of Cyber Espionage: Changing Perceptions with the US vis-a-vis the Transatlantic
. [Thesis]. George Mason University; 2017. Available from: http://hdl.handle.net/1920/10518
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
7.
Reyhan, Dilnur.
Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure : The role of the ICT in the construction of new diasporas : the Uyghur case.
Degree: Docteur es, Sociologie, 2017, Université de Strasbourg
URL: http://www.theses.fr/2017STRAG003
► Cette thèse s’intéresse aux rôles des TIC dans la constitution de la diaspora ouïghoure. L’approche sociologique choisie a permis d’aborder cette question sous l’angle politique…
(more)
▼ Cette thèse s’intéresse aux rôles des TIC dans la constitution de la diaspora ouïghoure. L’approche sociologique choisie a permis d’aborder cette question sous l’angle politique et communicationnelle mais aussi historique et géographique et de prendre en compte tant les aspects idéologiques, sociaux qu’institutionnels et organisationnels. Les communautés ouïghoures à l’étranger commencent à être visibles et créent des organisations officielles représentant leur cause. La première partie met en évidence un réseau complexe constitué des communautés ouïghoures institutionalisées qui sont en interaction entre elles et avec le pays d’origine à travers les TIC, le Congrès Mondial Ouïghour rassemblant la majorité de ces associations. La deuxième partie montre à travers les analyses quantitatives et qualitatives de la cartographie du web ouïghour 2010 et 2016, l’apport et des limites des TIC dans le processus de construction de la diaspora. Cette analyse croisée a permis dans la troisième partie de comprendre et d’interpréter les formes d’identités qui se construisent : identité ethno-nationale ou ethno-culturelle ou ethno- religieuse, et les compromis sociaux qui tentent de se déterminer par des processus de négociation dans l’espace virtuel et au sein des institutions. Ce travail de recherche dévoile les différentes finalités recherchées par les acteurs tant officiels que lambda et de voir dans quelle mesure de nouvelles formes de régulations sont susceptibles d’aboutir à un nouveau compromis entre les acteurs. Mais pour l’instant, il n’existe ni de stratégie commune, en particulier vis-à-vis des politiques à tenir face à la Chine, ni une identité commune, mais des identités de la migration ouïghoure.
This thesis focuses on the constitutive role of Information and Communication Technologies (ICT) in the Uyghur diaspora. The sociological approach adopted in this thesis not only examines the aspects of politics and communication of this issue, but also allows a historical and geographical study which also takes into account the ideological, social, institutional and organizational points of view, as Uyghur communities abroad start to be visible and create formal organizations representing their cause. The first section of the thesis highlights, through ICT, a complex network of institutionalized Uyghur communities that interact with each other and their countries of origin, and demonstrates that the World Uyghur Congress is the most dominant of these associations. The second section shows, through quantitative and qualitative analysis of the mapping of the Uyghur web in 2010 and in 2016, the contributions and limitations of ICT in the diaspora construction process. This cross analysis sheds light in the third section on the forms of identities that are constructed, such as ethno-national, ethno-cultural or ethno-religious identity, and the social compromises tentatively formed through the negotiation process in virtual space and in the institutions. This study reveals the different purposes sought by both official and…
Advisors/Committee Members: Tapia, Stéphane de (thesis director).
Subjects/Keywords: Diaspora ouïghoure; TIC et diaspora; Diaspora numérique; Censures et cyber-espionnage chinois; Identité ethno-nationale; Identité ethno-culturelle; Identité ethno-religieuse; Uyghur diaspora; ICT and diaspora; Digital diaspora; Chinese censorship; Chinese cyber spying; Ethno-national identiy; Ethno-cultural identity; Ethno-religious identity; 304.8; 305.906
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Reyhan, D. (2017). Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure : The role of the ICT in the construction of new diasporas : the Uyghur case. (Doctoral Dissertation). Université de Strasbourg. Retrieved from http://www.theses.fr/2017STRAG003
Chicago Manual of Style (16th Edition):
Reyhan, Dilnur. “Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure : The role of the ICT in the construction of new diasporas : the Uyghur case.” 2017. Doctoral Dissertation, Université de Strasbourg. Accessed April 13, 2021.
http://www.theses.fr/2017STRAG003.
MLA Handbook (7th Edition):
Reyhan, Dilnur. “Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure : The role of the ICT in the construction of new diasporas : the Uyghur case.” 2017. Web. 13 Apr 2021.
Vancouver:
Reyhan D. Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure : The role of the ICT in the construction of new diasporas : the Uyghur case. [Internet] [Doctoral dissertation]. Université de Strasbourg; 2017. [cited 2021 Apr 13].
Available from: http://www.theses.fr/2017STRAG003.
Council of Science Editors:
Reyhan D. Le rôle des technologies d'information et de communication (TIC) dans la contruction des nouvelles diasporas : le cas de la diaspora Ouïghoure : The role of the ICT in the construction of new diasporas : the Uyghur case. [Doctoral Dissertation]. Université de Strasbourg; 2017. Available from: http://www.theses.fr/2017STRAG003
8.
Inks, Christopher Scott.
Domestic Surveillance and Government's Loss of Legitimacy.
Degree: MS, Homeland Security, 2014, Angelo State University
URL: http://hdl.handle.net/2346.1/30143
► The terrorist attacks against the United States on the morning of September 11, 2001 created an environment ripe for the abuse of power. With a…
(more)
▼ The terrorist attacks against the United States on the morning of September 11, 2001 created an environment ripe for the abuse of power. With a fearful nation clamoring for greater protection against future attacks, the National Security Administration (NSA) took the opportunity to create and implement a secret domestic
spying and data mining program, the size of which had never before been imagined. Because information is the ultimate form of power in today’s world, unmitigated access to so much personal data has the potential to aggregate power into this one agency, leaving the rest of government and the populace unable to defend themselves against those who would use it to advance their own agendas. Once obtained, there is no way to check this power. Since government is only as legitimate as the populace believes it to be, such aggregations of power are likely to increase dissent among the citizenry and ultimately result in a belief that it has become illegitimate. Such a government is ineffective and puts the entirety of the populace in harm’s way, not only from terrorists outside its borders, but from potential domestic abuses of this power. In the rush to protect the country against terrorism, one must be careful the actions he or she takes do not inadvertently create a homeland security threat from within.
Advisors/Committee Members: Phelps, James R (advisor), Phelps, James R (committee member).
Subjects/Keywords: National Security Administration; NSA; domestic spying; terrorism; data mining; big data; power; homeland security; government
…domestic spying program. However, such discontent by the people does not mean that elected… …Update: Polls continue to show majority of Americans against NSA spying.
Electronic Frontier… …americans-against-nsa-spying
Joh, E. E. (2013). Privacy protests: Surveillance evasion…
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Inks, C. S. (2014). Domestic Surveillance and Government's Loss of Legitimacy. (Masters Thesis). Angelo State University. Retrieved from http://hdl.handle.net/2346.1/30143
Chicago Manual of Style (16th Edition):
Inks, Christopher Scott. “Domestic Surveillance and Government's Loss of Legitimacy.” 2014. Masters Thesis, Angelo State University. Accessed April 13, 2021.
http://hdl.handle.net/2346.1/30143.
MLA Handbook (7th Edition):
Inks, Christopher Scott. “Domestic Surveillance and Government's Loss of Legitimacy.” 2014. Web. 13 Apr 2021.
Vancouver:
Inks CS. Domestic Surveillance and Government's Loss of Legitimacy. [Internet] [Masters thesis]. Angelo State University; 2014. [cited 2021 Apr 13].
Available from: http://hdl.handle.net/2346.1/30143.
Council of Science Editors:
Inks CS. Domestic Surveillance and Government's Loss of Legitimacy. [Masters Thesis]. Angelo State University; 2014. Available from: http://hdl.handle.net/2346.1/30143

University of Illinois – Chicago
9.
Zotova, Yelena.
Envy as an Object of Artistic Representation in Russian Modernist Prose.
Degree: 2014, University of Illinois – Chicago
URL: http://hdl.handle.net/10027/18914
► The present study explores envy as an object of artistic representation in the works of three Russian Modernist authors – Iurii Olesha (1899-1960), Konstantin Vaginov…
(more)
▼ The present study explores envy as an object of artistic representation in the works of three Russian Modernist authors – Iurii Olesha (1899-1960), Konstantin Vaginov (1899-1934), and Aleksandr Grin (1880-1932) – through the prism of Mikhail Bakhtin’s aesthetic and philosophical theory of authorship developed in “The Author and the Hero in the Aesthetic Activity” (1924?). Based on Bakhtin’s idea that a word and a thought are ethical deeds, Envy as an Object of Artistic Representation argues for a possibility to extend the aesthetic notion of authorship to the realm of ethics, by drawing a parallel between conscience as an ethical phenomenon and taste as an aesthetic one. Writing at the time of the radical social, political and cultural change in the newly forming egalitarian society, the Russian Modernist authors repeatedly employ the notion of bad taste as a means to portray conscience corrupt by envy.
The dual nature of authorship, reflected in Bakhtin’s ideas of “live-entering [vzhivanie]” and “outsidedness [vnenakhodimost’]” as of two complementary processes required of the author in the aesthetic act, corresponds to the marked ambiguity inherent in the phenomenon of envy, which paradoxically combines one’s existential desire to assume the identity of the Other with the diametrically opposite impulse to “narrate” the Other, to become, as it were, the Other’s author. The study reveals Bakhtin’s idea of the author’s responsibility, or “answerability [otvetstvennost’],” towards the hero as the key factor distinguishing successful authorship from envy. The current work treats the latter as a form of “incompetent,” or “inept [neumeloe]” authorship.
Thus, rather than creating a binary opposition between envy and authorship, this study offers an innovative view on envy as on authorship in embryo and measures the success of authorship on a sliding scale. To the extent envy is strong, authorship is weak, and vice versa: strong authorship absorbs one’s envy as a raw material and converts it into art or an ethical deed. Although it is difficult to establish the threshold, beyond which authorship prevails and envy gives in, conscience and taste may serve as indicators: the former on the ethical, and the latter, on the aesthetic plane.
Advisors/Committee Members: Vaingurt, Julia (advisor), McQuillen, Colleen (committee member), Markowski, Michal P. (committee member), Gardiner, Judith (committee member), Huntington, John (committee member).
Subjects/Keywords: abject; aesthetics; answerability; anxiety of influence; art; artist; author; Author and Hero; authorship; autobiography; Bakhtin; Bateson; biography; creativity; Crimson Sails; conscience; Covering Cherub; crowd; double-bind; denunciation; donos; egalitarian; egalitarianism; empathy; emulation; envy; Envy; ethics; Fandango; feminine; face; Florenskii; Florensky; Freud; Girard; Gumilev; generativity; gender; Germany; gratitude; Grin; hero; Hesiod; hierarchy of values; imitation; Jessie and Morgiana; Klein; life-creation; life-creationism; live-entering; Luknitskii; Luknitsky; mediated desire; Melanie Klein; distortion; mediator; mob; Modernism; Modernist; Mozart; Mozart and Salieri; NEP; NEPman; New Economic Policy; New Man; Nietzsche; noble; nobility; Oedipal; OGPU; Ofelia; Olesha; October Revolution; outsidedness; philistine; Pushkin; Raboty i Dni; Ressentiment; Russia; Russia and the West; Russian; Sachs; Salieri; Scarlet Sails; Scheler; secret police; Schoeck; Soviet; Soviet regime; Soviet Union; spy; spying; Symbolism; Symbolist; responsibility; reverse perspective; Revolution; taste; Taylor; Taylorism; Tower; Underground Man; Vaginov; value; value system; Works and Days; Works and Days of Svistonov; voyeurism; vnenakhodimost’; vzhivanie; zhiznetvorchestvo
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zotova, Y. (2014). Envy as an Object of Artistic Representation in Russian Modernist Prose. (Thesis). University of Illinois – Chicago. Retrieved from http://hdl.handle.net/10027/18914
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Zotova, Yelena. “Envy as an Object of Artistic Representation in Russian Modernist Prose.” 2014. Thesis, University of Illinois – Chicago. Accessed April 13, 2021.
http://hdl.handle.net/10027/18914.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Zotova, Yelena. “Envy as an Object of Artistic Representation in Russian Modernist Prose.” 2014. Web. 13 Apr 2021.
Vancouver:
Zotova Y. Envy as an Object of Artistic Representation in Russian Modernist Prose. [Internet] [Thesis]. University of Illinois – Chicago; 2014. [cited 2021 Apr 13].
Available from: http://hdl.handle.net/10027/18914.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Zotova Y. Envy as an Object of Artistic Representation in Russian Modernist Prose. [Thesis]. University of Illinois – Chicago; 2014. Available from: http://hdl.handle.net/10027/18914
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
.