Centrist wins run-off Election for Serbian Presidency

The BBC reports that centrist candidate Boris Tadić has won more than 50% of the vote in the second round of the Serbian presidential elections held on Sunday. Turnout was high and the Serbian electorate has, with a slight majority, signaled its intention of looking towards the future and the West, rather than returning to the nationalist rhetoric and policies of Serbia’s recent past.

Serbian President Boris Tadic, 3 February 2008

Mr Tadic wants to push forward his European integration agenda

Serbia’s pro-Western president, Boris Tadic, has won a second round election run-off against nationalist challenger Tomislav Nikolic, who conceded defeat. Mr Tadic was re-elected by more than 50% of voters in a contest that saw a high voter turnout.

Car horns could be heard around Belgrade as Tadic supporters took to the streets of the Serbian capital to celebrate the victory.

The election was seen as a referendum on Serbia’s relations with Europe.

“Serbia has shown its great democratic potential,” said Mr Tadic said in his victory speech, in which he lauded Mr Nikolic for his performance in the knife-edge contest, and said the country still had hard work ahead.

President Bush’s Speech Announcing Start of Military Operations in Iraq

Here is President Bush’s address to the nation announcing the beginning of military operations in Iraq in 2003.  How can we use the framework of the “levels-of-analysis” to understand the Bush administration decision to take military action against the Saddam Hussein regime?

Using Powerpoint-type Presentations in Class

latex.jpg

The rise in the ubiquity of use of Powerpoint-type (and I use the phrase Powerpoint-type since Powerpoint is but one–although the most popular–type of software used for electronic lecture presentations; I use the Beamer package add-on for the type-setting software LaTeX) presentations has led to a spirited debate in the field of academia. Some argue that the presentations are self-defeating and do not advance any sane pedagogical objective, while others swear by the benefits.

I see both advantages and disadvantages to their use but believe that ultimately, like with most tools, there is no inherent value in the tool itself, but that the value of the tool (for better or worse) comes in its application. Thus, I think that Powerpoint-type lectures can be used to enhance the educational experience and one’s pedagogical objectives. The issue, then, revolves around determining just what the best use of Powerpoint is.

Thankfully, there has been some research on the subject. From the blog “Thinking about College Teaching“, here is a snippet from a post explaining the best use of Powerpoint in classs:

I found a research study that compared student learning for four ways of combining PowerPoint presentations with distribution to students. (I no longer have a citation for that study.) One group of students did not receive any handouts, a second group received complete handouts prior to discussion, a third group received complete handouts after discussion, and a fourth group received skeletal handouts prior to the discussion and complete handouts after the discussion. Learning was greatest in the last group, and that was the model I followed…

…I went through that file and deleted most content except for slide headings. I made that file available to students on the Blackboard site for my course prior to class, and those who wanted it could download it and bring a printed copy to class. After I completed the class discussion, I made the [complete] file available. The most enterprising students brought the outline version to class, took notes on it, and later compared their notes to my complete version. In any case, I did not spend the school’s money to duplicate materials that only some students wanted. Students were satsified with that arrangement when I explained that they would learn the most that way.

This is what I will do for the remainder of the semester. When I am using Powerpoints, which will be about every second or third session, I’ll post the Powerpoint lecture outlines on Blackboard, the post the complete version there after I have completed the lecture. If it takes more than one session to finish a lecture, the completed version will be posted after the lecture has been completed in full.

War and the Process of State-making

As we discussed in class on Thursday, there is a close relationship between the war, the state, and state-making.  Thus, violence is at the root of the idea of the modern state, as Weber’s famous definition of the state aptly demonstrates.  Norbert Elias suggested that the state-formation process in Europe was “an elimination contest.”  In addition, Charles Tilly famously wrote* “war made the state and the state made war.”  In a much-read paper** on the topic, Tilly wrote:

What distinguished the violence produced by states from the violence delivered by anyone else? In the long run, enough to make the division between “legitimate” and “illegitimate” force credible. Eventually, the personnel of states purveyed violence on a larger scale, more effectively, more efficiently, with wider assent from their subject populations, and with readier collaboration from neighboring authorities than did the personnel of other organizations.  But it took a long time for that series of distinctions to become established. Early in the state-making process, many parties shared the right to use violence, the practice of using it routinely to accomplish their ends, or both at once. The continuum ran from bandits and pirates to kings via tax collectors, regional power holders, and professional soldiers.

The uncertain, elastic line between “legitimate” and “illegitimate” violence appeared in the upper reaches of power. Early in the state-making process, many parties shared the right to use violence, its actual employment, or both at once. The long love-hate affair between aspiring state makers and pirates or bandits illustrates the division. “Behind piracy on the seas acted cities and city-states,” writes Fernand Braudel of the sixteenth century. “Behind banditry, that terrestrial piracy, appeared the continual aid of lords.”‘ In times of war, indeed, the managers of full-fledged states often commissioned privateers, hired sometime bandits to raid their enemies, and encouraged their regular troops to take booty. In royal service, soldiers and sailors were often expected to provide for themselves by preying on the civilian population: commandeering, raping, looting, taking prizes. When demobilized, they commonly continued the same practices, but without the same royal protection; demobilized ships became pirate vessels, demobilized troops bandits.

It also worked the other way: A king’s best source of armed supporters was sometimes the world of outlaws. Robin Hood’s conversion to royal archer may be a myth, but the myth records a practice. The distinctions between “legitimate” and “illegitimate” users of violence came clear only very slowly, in the process during which the state’s armed forces became relatively unified and permanent.

The process of legitimation of state violence came, as Tilly argues above, slowly.  What, according to Weber, are the different types of legitimacy that attended to this process?

*Charles Tilly, “Reflections on the History of European State-Making,” in Charles Tilly, ed.,  The Formation of National States in Western Europe (Princeton, N.J.: Princeton Univ. Press, 1975), p. 42.

**Tilly, Charles. “War Making and State Making as Organized Crime, ” in Evans, Rueschemeyer and Skocpol, ed., Brining the State Back in (Cambridge: Cambridge University Press, 1985), p.172-173.

***Elias, Norbert. The Civilizing Process  (Oxford: Blackwell), 1993.

India’s Role in the Illegal Trafficking of Body Parts

This worrisome story in the New York Times sheds light on an increasingly brazen network of doctors and bandits who have organized an international trafficking ring in human body parts, such as kidneys.  While increasing numbers of Indians, and residents of other less-developed countries willingly sell their kidneys many, like the gentleman in the story, are the victims of deception and fraud.

GURGAON, India — As the anesthetic wore off, Naseem Mohammed said, he felt an acute pain in the lower left side of his abdomen. Fighting drowsiness, he fumbled beneath the unfamiliar folds of a green medical gown and traced his fingers over a bandage attached with surgical tape. An armed guard by the door told him that his kidney had been removed.

Mr. Mohammed was the last of about 500 Indians whose kidneys were removed by a team of doctors running an illegal transplant operation, supplying kidneys to rich Indians and foreigners, police officials said. A few hours after his operation last Thursday, the police raided the clinic and moved him to a government hospital.

Many of the donors were day laborers, like Mr. Mohammed, picked up from the streets with the offer of work, driven to a well-equipped private clinic, and duped or forced at gunpoint to undergo operations. Others were bicycle rickshaw drivers and impoverished farmers who were persuaded to sell their organs, which is illegal in India.

Although several kidney rings have been exposed in India in recent years, the police said the scale of this one was unprecedented. Four doctors, five nurses, 20 paramedics, three private hospitals, 10 pathology clinics and five diagnostic centers were involved, Mohinder Lal, the police officer in charge of the investigation, said.

Human Security Resources

A general trend has developed, amongst governments, academics, and (especially) activists working in IGOs and NGOs worldwide that has moved the focus of security away from traditional concepts–such as protecting borders from external threat–to a new approach that focuses specifically on human security. What is “human security?” Well, the Human Security Report Project, at Vancouver, Canada’s Simon Fraser University, defines human security in this way:

Unlike traditional concepts of security, which focus on defending borders from external military threats, human security is concerned with the security of individuals…

For some proponents of human security, the key threat is violence; for others the threat agenda is much broader, embracing hunger, disease and natural disasters. Largely for pragmatic reasons, the Human Security Report Project has adopted the narrower concept of human security that focuses on protecting individuals and communities from violence.

Traditional security policy emphasizes military means for reducing the risks of war and for prevailing if deterrence fails. Human security’s proponents, while not eschewing the use of force, have focused to a much greater degree on non-coercive approaches. These range from preventive diplomacy, conflict management and post–conflict peacebuilding, to addressing the root causes of conflict by building state capacity and promoting equitable economic development.

The website has an informative and very useful set of links to various organizations, governmental institutions, research institutes, etc., that focus on issues of human security.

Another excellent source for information related to human security is the Human Security Gateway. Below is a thumbnails which will take you to a screen shot of their home page. (Notice the RSS feed icons in the left sidebar.)

human_security_gateway_homepage1.jpg

The History of Warfare since World War II–via Foods Fighting

We spent much of last Friday’s session understanding various realist approaches to international relations and the importance therein of concepts like anarchy, survival, power and war. Here’s a clear–and highly original–attempt to demonstrate the history of world warfare since WWII. For a menu of the foods and which countries they are meant to represent, click here. Before doing so, which foods do you think represent Great Britain, Germany, France, China, and the United States, respectively?  You can view the film here.

Another Foreign Policy List: How to Steal an Election Without Breaking a Sweat

Foreign Policy magazine frequently publishes “lists” that are meant to illuminate, in a sometimes ironic manner, political phenomena that are receiving much discussion.  In a recent issue, the focus turns to elections.   From their introduction:

From Abuja to Islamabad, autocratic regimes have become adept at manipulating “free and fair elections” to stay in power. Here’s how they do it—and how to stop them.

Here is their list, with some real-world examples of each:

  1. Control the processKenya’s constitution invests an enormous amount of power in the executive branch. This allowed President Mwai Kibaki to create a vast system of patronage throughout the government based largely on tribal ties. The head of the Electoral Commission of Kenya, Samuel Kivuitu, has recently admitted that he was pressured by the president’s office to announce results before he could verify their authenticity.
  2. Manipulate the mediaIn the months leading up to the recent presidential election in Georgia, President Mikheil Saakashvili’s government shut down Imedi TV, an opposition-friendly television station founded by one of the president’s rivals and managed by Rupert Murdoch’s News Corporation.
  3. Keep out the observersDuring the 2005 Egyptian parliamentary elections, judges at individual polling stations made seemingly arbitrary decisions about whether to allow outside monitoring. The result? Some stations were monitored and some were not. Monitors were beaten by police in one southern city, and eight were arrested and released elsewhere.
  4. Misreport resultsNadia Diuk, senior director for Europe and Eurasia at the National Endowment for Democracy (NED), relays a tale from Azerbaijan’s 2000 elections: “The light went out in the room where the counting was to take place, and the flashlights of the observers just caught sight of a bundle of ballots sailing through the air to land on the counting table.” [This is my favorite! :)]
  5. Foster incompetence and chaosNigeria’s 2007 national and state elections take the chaos prize. Ballots arrived late to polling stations, if at all, or were printed with missing or incorrect information. Polling places and procedures were changed at the last minute. With security lax, reports were rampant of militants harassing voters and youth gangs breaking into polling places and making off with ballot boxes.
  6. Resort to the crude stuff A favorite tactic in Egypt is to deploy riot police in strategic polling locations to keep out voters for the opposition Muslim Brotherhood—while state employees arrive in buses and are ushered in en masse. In 2005, a bloody showdown in the streets of Alexandria between government-backed thugs wielding machetes and Brotherhood supporters seeking to cast their votes became international news, embarrassing the regime.
Design a site like this with WordPress.com
Get started