scholarly journals Containment beyond detention: The hotspot system and disrupted migration movements across Europe

2018 ◽  
Vol 38 (6) ◽  
pp. 1009-1027 ◽  
Author(s):  
Martina Tazzioli ◽  
Glenda Garelli

This article deals with the ways in which migrants are controlled, contained and selected after landing in Italy and in Greece, drawing attention to strategies of containment aimed at disciplining mobility and showing how they are not narrowed to detention infrastructures. The article starts by tracing a genealogy of the use of the term ‘hotspot’ in policy documents and suggests that the multiplication of hotspots-like spaces is related to a reconceptualisation of the border as a critical site that requires prompt enforcement intervention. The article moves on by investigating the mechanisms of partitioning, identification and preventive illegalisation that are at stake in the hotspots of Lampedusa and Lesbos. Hotspots are not analysed here as sites of detention per se: rather, the essay turns the attention to the channels of forced mobility that are connected to the Hotspot System, focusing in particular on the forced transfers of migrants from the Italian cities of Ventimiglia and Como to the hotspot of Taranto. The article concludes by analysing channels of forced mobility in the light of the fight against ‘secondary movements’ that is at the core of the current European Union’s political agenda, suggesting that further academic research could engage in a genealogy of practices of migration containment.

2016 ◽  
Vol 12 (2) ◽  
pp. 160-165 ◽  
Author(s):  
Antonio Herbert Lancha ◽  
Gary A. Sforzo ◽  
Luciana Oquendo Pereira-Lancha

Thousands of dollars are spent today with policies encouraging physical activity and healthy eating, but nutritional consultation per se has continuously failed to yield consistent and lasting results. The aim of this case report is to detail and evaluate nutritional coaching (employing health coaching techniques) in promoting lifestyle changes, enabling improvement of nutritional and body composition associated parameters. The patient in this study had previously engaged in a series of different diet regimens, all of which failed in achieving the proposed aim. After 12 nutritional coaching sessions (one per week) with the strategy presented herein, reductions in body fat mass and in total body weight were attained. Nutritional habits also improved, as the patient showed decreased total energy intake, decreased fat intake, and increased fiber ingestion. Daily physical activity and energy expenditure were enhanced. The coaching program was able to induce immediate health benefits using a strategy with the patient at the core of promoting his own lifestyle changes. In conclusion, the nutritional coaching strategy detailed was effective at helping our patient develop new eating patterns and improve related health parameters.


EU Law ◽  
2020 ◽  
pp. 1126-1162
Author(s):  
Paul Craig ◽  
Gráinne de Búrca

All books in this flagship series contain carefully selected substantial extracts from key cases, legislation, and academic debate, providing students with a stand-alone resource. This chapter focuses on another principal provision concerned with competition policy: Article 102 TFEU. The essence of Article 102 is the control of market power, whether by a single firm or, subject to certain conditions, a number of firms. Monopoly power can lead to higher prices and lower output than would prevail under more normal competitive conditions, and this is the core rationale for legal regulation in this area. Article 102 does not, however, prohibit market power per se. It proscribes the abuse of market power. Firms are encouraged to compete, with the most efficient players being successful. The UK version contains a further section analysing issues concerning EU competition law and the UK post-Brexit. EU law


Author(s):  
Kasper Lippert-Rasmussen

This chapter argues that there simply is no cogent objection to affirmative action based on the fact that, by its very nature, it is a form of unjust discrimination. The core of the chapter’s argument can be stated in the form of a dilemma: Either affirmative action amounts to discrimination in a generic sense, or it amounts to discrimination in some more specific sense, e.g., unjust differential treatment of people because of their membership of different socially salient groups. If the former, then it is true that affirmative action involves discrimination, but discrimination in a generic sense is not morally objectionable. If the latter, it is not the case that all forms of affirmative action involve discrimination in this sense. Thus, affirmative action is not unjust discrimination—so-called reverse discrimination—per se.


Author(s):  
Gregory Stump

Paradigm Function Morphology (PFM) is an evolving approach to modeling morphological systems in a precise and enlightening way. The fundamental insight of PFM is that words have both content and form and that in the context of an appropriately organized lexicon, a language’s morphology deduces a complex word’s form from its content. PFM is therefore a realizational theory: a language’s grammar and lexicon are assumed to provide a precise characterization of a word’s content, from which the language’s morphology then projects the corresponding form. Morphemes per se have no role in this theory; by contrast, paradigms have the essential role of defining the content that is realized by a language’s morphology. At the core of PFM is the notion of a paradigm function, a formal representation of the relation between a word’s content and its form; the definition of a language’s paradigm function is therefore the definition of its inflectional morphology. Recent elaborations of this idea assume a distinction between content paradigms and form paradigms, which makes it possible to account for a fact that is otherwise irreconcilable with current morphological theory—the fact that the set of morphosyntactic properties that determines a word’s syntax and semantics often differs from the set of properties (some of them morphomic) that determines a word’s inflectional form. Another recent innovation is the assumption that affixes and rules of morphology may be complex in the sense that they may be factored into smaller affixes and rules; the evidence favoring this assumption is manifold.


2012 ◽  
Vol 210 ◽  
pp. 456-481 ◽  
Author(s):  
Luca Zan ◽  
Sara Bonini Baraldi

AbstractThis article investigates change processes regarding the managerial aspects of organizing cultural heritage activities in China. The focus is not on the historical and artistic meanings of archaeological discoveries in themselves; nor on the technical, scientific and methodological repercussions of conservation and restoration; nor on the evolution of museology per se. Rather, the core of the analysis is on new managerial problems along the “archaeological chain” (archaeological discoveries, restoration, museum definition and public access to cultural heritage) posed by new professional discourse and the overall evolution of the economic and political context. The article is based on field research carried out in Luoyang, Henan province. The micro view adopted (managing practices more than policies), and the unusual access to data (including financial figures on individual entities) represent a unique opportunity for a sort of “journey” inside the Chinese public sector.


Inner Asia ◽  
2011 ◽  
Vol 13 (1) ◽  
pp. 73-96 ◽  

AbstractThis article analyses the handling of the Ürümchi riots of 2009, and of the Shaoguan incident which provoked them, from the perspective of ethnic inequality and discrimination. The core argument posits that, in the eyes of the state and many of its Han subjects, pre-1997 dreams of Xinjiang independence represented a precocious attempt to break away from the state patron. As articulated in the PRC constitution and policy documents, the provision of nationality equality in contemporary China is contingent upon the duty to defend the nation-state; with this duty once abandoned, those rights are forfeited. I show how riot targets reflected Uyghur perceptions of increased socio-economic marginalisation since the 1997 Ghulja disturbances, a period characterised by state crackdowns and reduced civil rights. Finally, the article explores the ways in which Chinese leaders have begun, since late 2010, to address the socioeconomic and linguistic-cultural roots of the conflict. In conclusion, I note that long-term peace in the region depends upon effective implementation of existing policies and the authentic devolution of policy-making power to local Uyghur (and other minority nationality) officials and scholars.


2020 ◽  
Vol 6 ◽  
Author(s):  
Marko-Tapio Hyvärinen ◽  
Risto Väinölä ◽  
Henry Väre ◽  
Gunilla Ståhls-Mäkelä ◽  
Pasi Sihvonen ◽  
...  

As part of its quality management and goal-driven strategic development, the Finnish Museum of Natural History Luomus drafts policy documents to guide its operational sectors. The purpose of such policies is to define the content and procedures of the Museum’s activities. They answer the questions “what”, “why”, “who” and “for whom” about the activities they discuss, which is to say that they define and delimit the scope of the operational sector, provide the operations with a purpose and determine their content, describe the allocation of responsibilities in the sector under the Luomus organisation and identify the target groups. The policies provide general objectives and thus form the basis for target programmes and any action plans which in turn answer the question “How can we reach the designated goals?”. Policies are not tied to a schedule, unlike target programmes, even though they must be dynamic and updated periodically to better serve the organisation. The core activities at Luomus are: (1) maintenance of the scientific collections, (2) research and (3) expert services. The General Collections Policy sets guidelines for the maintenance of the scientific collections based on the mission of the University of Helsinki and Luomus.


Let’s talk about security at a private access place taking into account the amount of effort one wants to keep it as such only listed personnel to enter, but intrusions are found, and raising security and scanning alone doesn’t bring down one such issue.These days we find that most of the research has a much higher usage of servers which is termed expensive as to run the processing of the software. Few places would not be able to afford such costs. The objective of this project is to provide a surveillance and a self-monitoring intrusion system that ensures regular checking, from the current surveillance of a security personnel. This software aims to classify the people entering and leaving a particular place with a whitelist. This will also help exercise caution that can be implemented in places that require inspection. This system is programmed to alert real-time intrusion to the owner and/or security via MMS. We want to make sure to build a prototype that can sustain such parameters and be market-ready. The core theme of the project is to have another set of surveillance integration to warn/alert the respected person about an intrusion per se someone who’s not in the whitelist mentioned.


2021 ◽  
Vol 3 ◽  
Author(s):  
Natalie Welfens ◽  
Yasemin Bekyol

Resettlement and humanitarian admission programs claim to target ‘particularly vulnerable’, or ‘the most vulnerable’ refugees. If the limited spots of such programs are indeed foreseen for particularly vulnerable groups and individuals, as resettlement actors claim, how is vulnerability defined in policies and put into practice at the frontline? Taking European states’ recent admission programs under the EU-Turkey statement as an example, and focusing on Germany as an admission country, this research note sheds light on this question. Drawing on document analysis, and original fieldwork insights, we show that on paper and in practice vulnerability as a policy category designates some social groups as per se more vulnerable than others, rather than accounting for contingent reasons of vulnerability. In policy documents, the operational definition of vulnerability and its relation to other criteria remain largely undefined. In selection practices, additional criteria curtail a purely vulnerability-based selection, exacerbate existing or create new vulnerabilities in their own right. We conclude that, in the absence of clear definitions, resettlement and humanitarian admission programs’ declared focus on the most vulnerable remains a discretionary promise, with limited possibilities of political and legal scrutiny.


2020 ◽  
Vol 35 (4) ◽  
pp. 361-375
Author(s):  
Antony Bryant ◽  
Frank Land

The ‘conversation’ offers an important contribution to the archaeology of information systems, both in practice as an academic domain or discipline, and a focus on the genealogy of the field, including some of the accidents and deviations that marked later developments. It is derived from a series of conversations and later exchanges that I arranged with Frank Land. The substantive aspects date from the late 2017 and were then developed in a series of exchanges in 2018; although in effect he and I have been developing this conversation over many years, during which he has been continually challenging, expansive and forthcoming. Comments forthcoming from readers of earlier drafts indicated some perplexity regarding the genre and the objectives of our contribution, so it is important to note that the term ‘conversation’ is something of a conceit. It is not an interview per se, nor is it a biographical account. The core of what follows developed from our verbatim exchanges both face-to-face, and later via email. Some sections, however, have been reworked and enhanced to clarify and augment the issues raised. In addition, we have sought to provide a good deal of background and narrative to guide readers through the text, offering pointers to further resources. The overall contribution is intended to provide an informed and, we hope, informative contribution to people’s understanding of key social and technical issues of our time.


Sign in / Sign up

Export Citation Format

Share Document