Abstract For the majority of its history, the Just War Tradition (JWT) has attempted to limit the occurrence of violence in the violent world it found itself. Today, out of noble causes, the same...Show moreAbstract For the majority of its history, the Just War Tradition (JWT) has attempted to limit the occurrence of violence in the violent world it found itself. Today, out of noble causes, the same tradition is becoming more interventionist by incentivizing the market for force in which Private Military and Security Companies have carved out a role for themselves. In this thesis the origin of the normalization of private violence in JWT will be accounted for and how it allows for more violence, rather than limiting it. These so-called PMSCs will be analyzed in two ways. The theological origin of arguments permitting their usage will be accounted for before analyzing the risks that comes with this. The latter part will be the main focus and is done by following the principles laid out by Aquino: 1) legitimate authority, 2) just cause, and 3) right intention. By looking at the state of the art of PMSC ethics, the debates in contemporary JWT will be accused of being disagreements in details, and not concerned with the theological foundations of their convictions. Namely, by accounting for the privatized turn JWT took, I will show how a cosmopolitan politics is causing this relaxing of norms and is at risk of being permissible to increases of violence. This originated in Pelagian theology who argued for the possibility of human perfection through social and moral progress. Kantian liberalism, the modern equivalent of this belief, has prioritized just cause over other principles and moves the JWT away from one of its core functions; namely, limiting the destructiveness of war. The other core function is to limit injustices, which has devolved into the attempt to eradicate all injustices and overturns ethical positions on private violence.Show less
This study seeks to explore the linkages between organised crime and environmental change in the Amazon region, specifically zooming in on the Brazilian Amazonas. This study focuses on two aspects...Show moreThis study seeks to explore the linkages between organised crime and environmental change in the Amazon region, specifically zooming in on the Brazilian Amazonas. This study focuses on two aspects of this relationship. First, the relationship between state-making and crime, in particular the Brazilian state and crime, to show how ‘organised crime’ emerges as an important constituent of state-making rather than as an anomaly to it. To understand how organized crime and environmental change tie together, the analysis of state-making and governance in the Amazon region is needed. Thereafter, a systematic approach will be adopted to answer this question of the relationship between organised crime and environmental change, breaking the findings down into four categories of, Type, Method, Location, and Consequence. In the thesis, I examine how each of these shapes the relationship between organised crime and environmental change in the Amazon.Show less
This thesis uses explaining-outcome process tracing to analyse why the Islamic Republic of Iran failed to build a long-standing proxy ally among the Shiite and Hazara groups of Afghanistan as it...Show moreThis thesis uses explaining-outcome process tracing to analyse why the Islamic Republic of Iran failed to build a long-standing proxy ally among the Shiite and Hazara groups of Afghanistan as it did in other countries during the 1980s and 1990s.Show less
With approximately 19.8 million copies sold, Call of Duty: WWII is the most popular WWII first-person shooter video game of all time. Given its popularity, the way the developers portray WWII is...Show moreWith approximately 19.8 million copies sold, Call of Duty: WWII is the most popular WWII first-person shooter video game of all time. Given its popularity, the way the developers portray WWII is crucial to consider as studies have shown that information in fictional messages has the ability to alter people's perspectives. This is especially true when it comes to narratives provided within single player experiences. Therefore, this thesis provides a qualitative content analysis of the single player campaign mode in Call of Duty: WWII and focuses on narrative elements including conflict/theater of war, locations, player character, friendly non-playable characters, enemy characters and interactable objects. The analysis concludes that the game presents a narrow and US centric view of WWII. However, weapons, equipment, vehicles and locations were found to be represented historically accurately with a substantial amount of detail. Furthermore, it was discovered that the primary cast had been heroized, which can result in a romanticized interpretation of the conflictShow less
Disruptions to the routine operations of ICTs in conflict situations have made cybersecurity come to ascend a prominent position in the legal and political decision-makeing of the EU....Show moreDisruptions to the routine operations of ICTs in conflict situations have made cybersecurity come to ascend a prominent position in the legal and political decision-makeing of the EU. Europeanization has been used to describe the processes by which EU decision-makeing manifests itself in the logic of, for example, national policy outcomes of those processes (see Radaelli, 2012, p. 1 as cited by Fererro & Ackrill, 2016, p.880). The literature has pointed to the significant amount of soft law which the EU has issued to regulate cybersecurity. However, per definition EU member states are not legally obliged to implement soft law. Accordingly, by utilizing Europeanization as a conceptual frame, this thesis has sought to answer the question: To what extent has non-legally binding EU soft law on cybersecurity influenced the making of the national cybersecurity policies of its MS over time? To address the research, question the thesis has taken a small-scale empirical mixed-method approach by analyzing the extent to which specifically, Germany's and Slovakia's national cybersecurity strategies have harmonized over time toward the 2020 EU cybersecurity strategy (EUCSS) as a consequence of using the soft law document in their stagey-making. The analysis suggest that the EU cybersecurity strategy did influence the national strategy-making, but that the degree of harmonization depended on the extent to which the EUCSS aligned with national ambitions and priorities. To this end, the member states actively strived to 'Europeanize' their national cybersecurity strategies.Show less