Rodfei Shalom, Metavkhei Shalom, Pashranim, and Nikhbadim

Author(s):  
Daniel Roth

This chapter examines historical accounts and stories of non-rabbinic Jewish lay leaders who served as third-party peacemakers within their communities as found in medieval and early modern rabbinic literature. As opposed to the rabbis of whom the identities of almost all were known, lay leaders who served as third-party peacemakers are almost entirely anonymous. They were, however, often referred to with quasi-titles to signify their role as third-party peacemakers. The chapter is therefore divided into four primary sections based on these various titles used to refer to lay peacemakers. The chapter also includes a discussion on the imperative in Jewish law and tradition of lay people to serve as third-party peacemakers or mediators.

Author(s):  
Daniel Roth

This chapter presents eight historical accounts and stories of rabbis or a group of rabbis who served as third-party peacemakers in medieval and early-modern rabbinic literature. The chapter is divided into three subsections based on the status and degree of success of the third party. The first section focuses on successful third-party rabbinic peacemakers with high social status, the second on unsuccessful rabbinic peacemakers who possessed less social status, and the third explores exceptions to this assertion. The chapter also includes a discussion about the responsibility of the rabbi to serve as a peacemaker or mediator in Jewish law and tradition.


Author(s):  
Daniel Roth

This introductory chapter defines the key terms and methodology through which the book will be analyzed. It begins with defining “third-party peacemaking and Jewish “rabbinic literature.” Then lays out the flow and structure of the various chapters of the book. The chapter then defines the various types of case studies to be examined in the book, consisting of “legends,” “historical accounts,” and ‘stories.” Finally, the chapter concludes with defining the three-layered methodology through which each case study will be analyzed: “text,” “theory,” and ‘practice.”


Author(s):  
Daniel Roth

Third-Party Peacemakers in Judaism presents thirty-six case studies featuring third-party peacemakers found within Jewish rabbinic literature. Each case study is explored through three layers of analysis: text, theory, and practice. The textual analysis consists of close literary and historical readings of legends and historical accounts as found within classical, medieval, and early-modern rabbinic literature, many of which are critically analyzed here for the first time. The theoretical analysis consists of analyzing the models of third-party peacemaking embedded within the various cases studies by comparing them with other cultural and religious models of third-party peacemaking and conflict resolution, in particular the Arab-Islamic sulha and contemporary Interactive Problem-Solving Workshops. The final layer of analysis, based upon the author’s personal experiences in years of doing conflict resolution education, trainings, and actual third-party religious peacemaking in the context of the Middle East, relates to the potential practical implications of these case studies to serve as indigenous models and sources of inspiration for third-party mediation and peacemaking in both interpersonal and intergroup conflicts today.


ICSID Reports ◽  
2021 ◽  
Vol 19 ◽  
pp. 630-648

630Procedure — Addition of a party — Conditional application — UNCITRAL Rules, Article 22 — UNCITRAL Rules, Article 17 — Whether the UNCITRAL Rules or lex loci arbitri allowed for applications to be made conditional on a tribunal’s future decision — Whether the application was consistent with the State’s procedural rights — Whether the amendment to a claim under Article 22 of the UNCITRAL Rules allowed for the addition of a third party as claimantJurisdiction — Investment — Shares — Whether an investor’s shares and rights derived from those shares were protected investments under the BITJurisdiction — Investment — Assets of subsidiary — Whether profits, goodwill or know-how of a local subsidiary constituted investments of the investor protected by the BITJurisdiction — Consent — Cooling-off period — Premature claims — Whether the investor had communicated its own claims rather than those of its local subsidiary — Whether the investor’s failure to comply with a waiting period of six months under the BIT required a tribunal to deny jurisdiction or admissibility — Whether the negotiation of a local subsidiary’s dispute in good faith was relevant to jurisdiction over a foreign investor’s claimsInterpretation — Cooling-off period — VCLT, Article 31 — Object and purpose — Whether the object and purpose of the BIT required a tribunal not to adopt a strict or formalistic interpretation of the waiting period of six monthsRemedies — Declaratory award — Interpretation — Just compensation — Whether the tribunal had jurisdiction under the BIT to make a declaratory award on the interpretation and application of the term “just compensation”Jurisdiction — Dispute — Whether the tribunal had jurisdiction under the BIT to advise the parties of an imminent disputeExpropriation — Direct deprivation — Shares — Rights derived from shares — Whether the State directly deprived the investor of its rights as a shareholder in its local subsidiaryExpropriation — Indirect deprivation — Shares — Rights derived from shares — Whether the shares had lost all or almost all significant commercial value — Whether the measures were adopted in the public interest — Whether due process had been followed — Whether there were any undertakings by the StateExpropriation — Interpretation — “Just compensation” — Whether there was any difference between the terms of the BIT and general international law — Whether the meaning of just compensation could be determined in the abstract631Fair and equitable treatment — Whether the impending expropriation constituted a breach of the standard of fair and equitable treatment — Whether the claim concerned the investor’s rights derived from sharesFull protection and security — Whether the State failed to protect an investment from expropriation by local authorities — Whether the claim concerned the investor’s rights derived from sharesUmbrella clause — Whether there was any assurance directed at the investor that created any legal obligations — Whether the claim concerned the investor’s rights derived from sharesCosts — Arbitration costs — Variation by agreement — UNCITRAL Rules — Whether the terms of the BIT varied the default rules for the allocation of arbitration costs


2018 ◽  
Vol 34 (3) ◽  
pp. 676-695
Author(s):  
Maayan Zhitomirsky-Geffet ◽  
Gila Prebor

Abstract In this research we devised and implemented a semi-automatic approach for building a SageBook–a cross-generational social network of the Jewish sages from the Rabbinic literature. The proposed methodology is based on a shallow argumentation analysis leading to detection of lexical–syntactic patterns which represent different relationships between the sages in the text. The method was successfully applied and evaluated on the corpus of the Mishna, the first written work of the Rabbinic Literature which provides the foundation to the Jewish law development. The constructed prosopographical database and the network generated from its data enable a large-scale quantitative analysis of the sages and their related data, and therefore might contribute to the research of the Talmudic literature and evolution of the Jewish thought throughout the two last millennia.


1998 ◽  
Vol 25 ◽  
pp. 93-110 ◽  
Author(s):  
Quentin Gausset

Traditional accounts of the nineteenth-century Fulbe conquest in northern Cameroon tell roughly the same story: following the example of Usman Dan Fodio in Nigeria, the Fulbe of Cameroon organized in the beginning of the nineteenth century a “jihad” or a “holy war” against the local pagan populations to convert them to Islam and create an Islamic state. The divisions among the local populations and the military superiority of the Fulbe allowed them to conquer almost all northern Cameroon. They forced those who submitted to give an annual tribute of goods and servants, and they raided the other groups. In these traditional accounts the Fulbe are presented as unchallenged masters, while the local populations are depicted as slaves who were powerless over their fate; their role in the conquest of the region and in the administration of the new political order is supposed to have been insignificant.I will show that, on the contrary, in the area of Banyo the Wawa and Bute played a crucial role in the conquest of the sultanate and in its administration. I will then re-examine the cliche that all members of the local populations were the slaves of the Fulbe by distinguishing the fate of the Wawa and Bute on one side from that of the Kwanja and Mambila on the other, and by showing the importance of the Fulbe's identity in shaping the definition of slavery. Finally I will argue that, if the historical accounts found in the scientific literature invariably insist on Fulbe hegemony and minimize the role played by the local populations, it is because those accounts are often based on Fulbe traditions, and because these traditions are remodeled by the Fulbe in order to correspond to their discourse on identity.


Afkaruna ◽  
2021 ◽  
Vol 17 (1) ◽  
Author(s):  
Muhammad Wildan ◽  
Fatimah Husein

In the last two decades, the Muslim population in Western Europe has grown in unprecedented ways. At the broader regional level, there are approximately 25 million Muslims living in European Union member states as of 2016, which is estimated to increase to 35 million by 2050. The arrival of Muslims from various countries in the Middle East, Africa, and the Balkans has brought about significant changes and issues socially, economically, as well as politically. Undeniably, some phenomena of discrimination and Islamophobia arise in almost all EU countries in various aspects of public life such as hijâb clothing, building mosques, and housing. Using a qualitative approach and field research, this article explores not only the historical accounts of the presence of Islam in several EU countries, but also the relations between Islam and the state. This research presents several cases of discrimination and Islamophobia and the internal dynamics within the Muslim communities as to the challenges of living in completely different atmosphere. Three countries, namely Austria, Belgium, and Germany are chosen to represent European Union countries. This study contributes to the discourse on the integration of Muslims in European culture and to the way EU countries could involve Muslims in constructing European Islam.


2021 ◽  
Vol 8 (1) ◽  
pp. 31-58
Author(s):  
Karin Myhre

Abstract Reading Sui Jingchen's song suite “Gaozu Returns to His Home Village” against early sources, this article explores how Sui's work selects and inverts the elements that ground definitive historical accounts of rulership to refashion a familiar narrative in a theatrical mode. The sanqu's use of performance tropes expands the scope of criticism in this humorous piece past concerns about Yuan rulership, or even the imperial institution, to broader questions of representational instability and uncertainty. These shifts implicate readers in a social and political critique and engage issues often associated with early modern fiction and drama, including authenticity, imposture, and interpolations of author, character, player, reader, and audience.


2021 ◽  
pp. 27-59
Author(s):  
Kirsten Macfarlane

In the late 1580s, a controversy erupted that would devastate Broughton’s career and haunt him for the rest of his days. The source of this agitation was a short chronological pamphlet, A Concent of Scripture, which was published by Broughton in 1589 and attacked in the lectures of the Oxford theologian John Rainolds. This chapter explores how this seemingly unassuming work could provoke such intense conflict, locating the roots of the dispute in the overlap between the dynamic but difficult world of biblical chronology and the combative arena of academic theology. Influenced by the damning verdicts passed by Broughton’s antagonists, modern historians have dismissed Broughton’s Concent as motivated solely by zealous biblicism, a reaction against the daringly innovative work of the chronologer Joseph Scaliger, whose methods were upheld by Rainolds. In contrast, this chapter details the rich tradition of reformed Hebraism in which Broughton’s chronological work was situated, and outlines the manifold disciplines, from the study of rabbinic literature to biblical translation, to which it contributed. It argues that at the heart of this controversy lay not technical questions about chronological method, but larger questions about biblical exegesis and hermeneutics. It also begins to illustrate some of the dangers that faced the early modern scholar who attempted to traverse the perilous terrain of biblical history, by showing how Rainolds’ lectures and the controversy they propagated made dangerous associations between Broughton’s work and crypto-Catholicism.


2015 ◽  
Vol 23 (3) ◽  
pp. 333-346 ◽  
Author(s):  
Swapan Purkait

Purpose – This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet. Design/methodology/approach – The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet. Findings – The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally. Originality/value – This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.


Sign in / Sign up

Export Citation Format

Share Document