Securitization of Islam
Titel: | Securitization of Islam : a vicious circle : counter-terrorism and freedom of religion in Central Asia / Kathrin Lenz-Raymann |
---|---|
Verfasser: | |
Veröffentlicht: | Bielefeld, Germany : Transcript, 2014 |
Umfang: | 1 Online-Ressource (325 Seiten) : Illustrationen |
Format: | E-Book |
Sprache: | Englisch |
RVK-Notation: |
·
·
|
ISBN: | 383762904X ; 3839429048 ; 9783837629040 ; 9783839429044 |
- Thanks
- p. 13
- Summary
- p. 15
- 1
- Introduction
- p. 17
- 1.1
- Research Interest
- p. 17
- 1.2
- Theoretical Background
- p. 27
- 1.3
- Methods
- p. 30
- 1.4
- Databases, Country Reports and Country Profiles
- p. 38
- Part I
- Revival of Islam: Case Studies of Islamic Groups
- 2
- Features of Central Asian Folk Islam
- p. 45
- 2.1
- General Remarks on Islam
- p. 45
- 2.2
- Sunni Hanafi Madhab
- p. 49
- 2.3
- Sufism
- p. 54
- 2.4
- Folk Islam: Saints Culture and Mazar Worshipping
- p. 61
- 3
- Salafi Islam: Social Transformation and Political Islam
- p. 69
- 3.1
- Catchwords, Misconceptions and Important Terms
- p. 70
- 3.2
- Political Islam and Salafism
- p. 76
- 3.3
- Jihadists: Armed Warriors for the Caliphate
- p. 83
- 3.4
- Islamists: Political Parties
- p. 89
- 3.5
- Modernists and Neo-Fundamentalists: Social Transformation
- p. 97
- 4
- Typology of Islamic Groups
- p. 109
- 4.1
- Folk-Islamic Groups
- p. 109
- 4.2
- Non-Traditional Islamic Groups
- p. 110
- Part II
- Politics and Islam: Case Studies of Political Regimes
- 5
- History of Politics and Islam in Central Asia
- p. 117
- 5.1
- Early Empires and Islamization of Central Asia
- p. 117
- 5.2
- The Communist State and Islam in Central Asia
- p. 129
- 6
- General Comparison of Contemporary Regimes
- p. 139
- 6.1
- Demographic Siaiation
- p. 142
- 6.2
- Socio-economic Situation
- p. 147
- 6.3
- Political System and Government Bodies
- p. 158
- 7
- Comparison of the Contemporary Role of Religion in Politics
- p. 177
- 7.1
- Freedom of Religion and The Concept of Recognition
- p. 178
- 7.2
- Secularity in the Constitution
- p. 179
- 7.3
- Content of Religious Laws
- p. 185
- 7.4
- Institutions Involved with Religion
- p. 196
- 7.5
- Procedures Concerning Religion
- p. 202
- 8
- Comparison of Law Enforcement
- p. 209
- 8.1
- Security Strategies and Counter-Terrorism Laws
- p. 210
- 8.2
- Security Forces
- p. 214
- 8.3
- International Cooperation in the Security Sector
- p. 221
- 8.4
- Comparison of the Judiciary; Trials and Torture
- p. 227
- 9
- Typology of Religious and Counter-Terrorism Politics
- p. 233
- 9.1
- Typology of State Regulation of Folk Islam
- p. 233
- 9.2
- Typology of State Regulation of Non-Traditional Groups
- p. 236
- Part III
- Securitization: Theory and Simulation Model
- 10
- Securitization Theory: Legitimacy in Security Politics
- p. 243
- 10.1
- Legitimacy in Securitization Theory
- p. 243
- 10.2
- Vocabulary and Units of Analysis
- p. 246
- 10.3
- Securitization of Islam in Central Asia
- p. 252
- 11
- Model Description
- p. 257
- 11.1
- Overview and ODD-Protocol
- p. 257
- 11.2
- Simulation Setup
- p. 264
- 11.3
- Simulation Results: Revival of Islam
- p. 271
- 11.4
- Threatened Reference Objects
- p. 273
- 11.5
- Securitizing Moves
- p. 276
- 12
- Model Verification and Validation
- p. 279
- 12.1
- Sensitivity Analysis
- p. 279
- 12.2
- Verification: Mutual Reinforcement of Securitization
- p. 280
- 12.3
- Validation: Simulation Results and Empirical Data
- p. 282
- 13
- Conclusions
- p. 289
- 13.1
- Conclusions from Computer Simulation
- p. 289
- 13.2
- General Concluding Remarks
- p. 290
- Literature
- p. 293
- Appendix
- Appendix A
- Official Documents and Websites
- p. 319
- Appendix B
- NetLogo Code for Simulation
- p. 321
- Appendix C
- Initial Values and Parameters for Simulation
- p. 324