scholarly journals Consuming history in a political context: Motivations of Turkish visitors of the Gallipoli Battlefields

2020 ◽  
Vol 5 (2) ◽  
pp. 103-119
Author(s):  
Ulvi Cenap Topçu

Certain unconventional tourism activities such as visiting battlefields, old prisons, or crash sites encompass dark tourism and have become the focus of scholarly pursuit. The term was established in relation to the Gallipoli Battlefields; which has been examined mostly in the context of its importance to Australian and New Zealander national identities. As represented by numerous memorials and well-established historical narration, the Battle in Gallipoli is credited as one of the most important representations of Turkish nationality. This research aims to investigate the motivations of Turkish visitors to Gallipoli in terms of consumption experiences and to clarify empirically motivations of Turkish visitors to Gallipoli. An explorative questionnaire was directed to respondents via e-mail, and analyses were conducted with 236 valid forms. Data supports that rather than personal motivation, visiting Gallipoli reflects politically constructed meanings for Turkish visitors. Gallipoli narration is therefore eligibly expounded as national rhetoric and motivations for visiting the site are compatible with group consumption behavior.

Author(s):  
Nathan Oyori Ogechi ◽  
Emily Bosire-Ogechi

This chapter discusses the use of short text messages on cell phones and e-mail conversations among social networks to negotiate identities in Kenya. It shows that these New Communication Technologies have revolutionised the way of doing things in Kenya, including politics. It comes out that Old Communication Technologies are being complemented by the new technologies which are now taking over and which can be used to negotiate both narrow ethnic-blocks and national identities. The chapter shows that the new technology is not always used to portray and perpetuate narrow ethnic identities; rather, instances exist when the users want to project professional and national identities. Supported with data that focus on the pre- and post-2007 elections, the chapter argues that inasmuch as the New Communication Technologies are good, great caution should be exercised when using them since unchecked use might bring untold suffering to society.


Author(s):  
Maja Smotlak

Border places are of particular interest when it comes to identifying the way in which groups of different nationalities perceive the neighbour, the Other. One of these areas is also Friuli Venezia Giulia, where other nationalities, among which also the Slovenes, have coexisted near their Italian majority for centuries. Since the end of the 19th century until today, the Slovenes of this region have frequently addressed their national minority position through literature. Through it they formed a specific image of themselves and of the neighbouring populations in every period. Taking into consideration some contemporary Slovenian novels written in Italy in the last twenty-six years, the paper aims to investigate their representation of the Other seen as different and external to the community. The questions therefore are: do Slovenes living in Italy perceive as the Other mostly Italians or the members of other nationalities? What are the main reasons for the identification of a subject as different from them? What sort of hierarchy is being established between the various national identities within the examined literary texts? With the help of the imagological method, this article will offer some tentative answers to the questions raised, by considering also the socio-political context.


Temida ◽  
2002 ◽  
Vol 5 (4) ◽  
pp. 59-61
Author(s):  
Biljana Bijelic

The Second World War is not relevant only in historical and political context. Its unsolved character is usually mentioned as one of the causes of the 1990 war. The after war policy of identity is especially relevant for today?s difficulties in consideration of collective responsibility and achieving reconciliation between communities which were in conflict. Croatian example of war crimes against Serbs in the Second World War is especially illustrative. However, that is only one of many Yugoslavs? examples, where ethnic violence in after war period was overshadowed by general suffering from foreign occupants and local traitors in the Second World War. Instead of reassessment of existing ethnic and national identities, the process of reconciliation between Croatian and Serbian community after the Second World War was exhilarated with radical changes of collective identities.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2005 ◽  
Vol 36 (1) ◽  
pp. 34
Author(s):  
SHARON WORCESTER
Keyword(s):  

2006 ◽  
Vol 37 (8) ◽  
pp. 56-57
Author(s):  
JOSEPH S. EASTERN
Keyword(s):  

2005 ◽  
Vol 38 (3) ◽  
pp. 94
Author(s):  
Sherry Boschert
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document