Display options:

2013 - Volume 7, Issue 2

Research Articles

Alpine meadow, Bukowina, Romania
  • Cosmina Paul
ABSTRACT: This work contributes to the understanding of how the institutionalisation of geography as a science and discipline empowered the Romanian elites’ nationalist discourse before World War Two. Far from being an objective, neutral and value-free science, geography invented new worlds and served...
Download article
A silhouette of a group of Tuareg on their camels in the desert
  • Paul Pryce
ABSTRACT: With a humanitarian crisis mounting in the West African state of Mali, the Council of the EU has called on the Economic Community of West African States to deploy a stabilisation force to the northern regions of the country. But such a military intervention would have to contend with a plethora...
Download article
Flag of Turkey against blue sky
  • Serdar Ş. Güner
ABSTRACT: This work proposes a simple two-period interaction model to study EU-Turkey accession negotiations. Turkey perceives the EU as composed of two distinct groups with respect to its accession: traditional supporters and objectors. Supporters opt for either cooperation or defection in period one...
Download article
Multicultural young business team
  • Özgür ÜNAL ERİŞ
ABSTRACT: The European Neighbourhood Policy (ENP) is among the most important external policies of the EU. Unfortunately, it has not substantially influenced EU member states as was intended. This led to other regional EU initiatives that have similar aims but took a more differentiated and country-specific...
Download article
Magnifying Glass with Icon of Profile of Head with Cogwheel Gear Mechanism on Old Paper with Red Vertical Line Background.
  • Naeem Meer
ABSTRACT: Drawing on Razzaque’s seminal book, From Human Being to Human Bomb which identifies patterns of extremist thought processes amongst young British Muslims, this study is the very first attempt at empirically testing such a concept and establishes a precedent for the study of the links between...
Download article
Security concept: Lock on digital screen, contrast, 3d render
  • Miron Lakomy
ABSTRACT: The phenomenon of cyber terrorism, cyber espionage, or even the first examples of using cyberspace to conduct military operations has convinced decision-makers that new solutions to security challenges need to be implemented. Cyber attacks in Estonia and Georgia, multiple incidents in the United...
Download article