Search Results

You are looking at 1 - 10 of 54 items for :

  • "recapitulation" x
Clear All
Author:

This final chapter provides a recapitulated overview of the book, drawing on all the chapters. It re-emphasizes the significance of activism in improving the lives of North Korean women. It also reinforces the salient contribution of Altruistic Political Imagination in unpacking human rights activism, in conjunction with its potentially wider application to the analyses of other movements and activism. Additionally, it examines what has been achieved so far through the activism of North Korean women abroad, as well as other international endeavours to improve the situations of North Korean women. This chapter further discusses some limitations of the study and makes recommendations for future research.

Restricted access
Authors: and

normativity,” begins with a recapitulation of the existing literature on moral norms. The concept of “emergent normativity” is then brought forth for situating care “as a standard or guide for ethical action” (p 47), followed by a discussion on “seeking the good versus seeking the right” (p 47), care as a responsive process, and the notion of self-care. Maurice Hamington marks a clear distinction between care and commitment in Chapter Three and contends that despite being treated as synonymous, care and commitment are not equivalent; commitment is just a vital objective

Restricted access

Figure 13: A retro-fit framework for whole systems development Ten core values Five contextual dilemmas of policy making The Five Keys of whole systems development Context Process Outcomes Change architecture Holding frameworks Communities of practice Networks etc The new organising 184 Leading change of this process are the substantive and specific outcomes of the particular task and the holding framework of the change architecture. A brief recapitulation of these elements serves as a summary of our argument. Ten core values of whole systems development Over time, we

Restricted access
Author:

with DoE employees they have expressed the opinion that the Examination is intended to explore new information, new arguments and new points of view. However, this Examination seemed to meet neither of these objectives. Most of the 352 Policy and Politics time was taken up by restatement of original representations and pre-examination submissions by participants. Occasionally, the panel showed exasperation at the more extended and monotonous exposition of familiar arguments but for the most part such recapitulation was accepted. Indeed, the panel added to an

Restricted access
Author:

of ourselves, the world and others ( Richardson, 2000 ) – to ‘find something out … [and] learn [what we] did not know before [we] wrote it’ ( Richardson, 2001 : 35). Indeed, we write with curiosity to respond to an existential crisis ( Bochner, 2013 ), and with urgency ‘from a place of personal-political-pedagogical-philosophical crisis where writing about [our] crisis bec[omes] critical’ ( Mackinlay, 2019 : 203).” I let the impassioned words about autoethnography slowly sink in, knowing with each mental recapitulation that this had to be the turning point in

Restricted access
Author:

141 SIX implications for understanding global social policy change Recapitulation and explanation At the outset of the book it was suggested that the decision by the ILO to agree a Recommendation on SPFs required explanation. There were indeed several aspects of the development of the policy on SPFs that demanded an explanation. An earlier attempt by the UK’s Gordon Brown in 2000 to get the UN to agree to a set of universal social policy principles was unacceptable to much of the Global South. What shifted in the global political context between 2000 and

Restricted access

influential in that ritual aroused deep memories; those surges of remembrance are not merely accurate and extensive, but bring with them the essences and textures of their original context, transcending time and even dementia. Re-enacting rituals that were part of one’s early childhood is not a matter of delving into the past through a cognitive operation. Rituals carry a potent emotion and cultural rootedness that is embodied. ‘The past returns with the ritual movements, gestures and recapitulations’ (Myerhoff, 2000, p 435), all evoked through the senses, linking

Restricted access
Author:

promising alternative direction for knowledge production in criminology. First, though, let us briefly look back, and summarize how we have got to where we are. A science of otherness: summary and recapitulation In developing a theory of knowledge based on the concept of otherness, this book has extended David Matza and David Garland’s depiction of positivist criminology as constructed from ideas of difference and pathology ( Matza, 1964 ) and as a ‘criminology of the other’ ( Garland, 1996 , 1999 , 2001 ). The ideology of otherness asserts a discourse of

Restricted access

normative cross-fertilization a couple of questions serve as a means of recapitulation. These are followed RETHINKING PEACE MEDIATION 64 by a different set of questions about the long-term implications of the cross-fertilization between the three layers – deontological, constitutional, international legal – which converge to determine norm germination on the occasion of peace processes and transitional governance, now increasingly seen as twin processes. First, is there a link between practitioners’ and deontological guidelines, the reproduction of practices and

Restricted access
Authors: and

making while acknowledging that, 'Extrarational processes play a 154 Policy and Politics significant role in optimal policy making on complex issues'. 3 S Essentially his alternative consists of a recapitulation of some of the aspects of rational planning but with heavy caveats of the form, 'some clarification of values' or 'preliminary estimation of pay-offs' or 'explicit arrangements to stimulate creativity'. Lindblom has criticised Dror for offering no more than a series of discrete statements which do not connect and cannot be said to constitute a 'model' for

Restricted access