Securitization of Islam

Titel: Securitization of Islam : a vicious circle : counter-terrorism and freedom of religion in Central Asia / Kathrin Lenz-Raymann
Verfasser:
Veröffentlicht: Bielefeld, Germany : Transcript, 2014
Umfang: 1 Online-Ressource (325 Seiten) : Illustrationen
Format: E-Book
Sprache: Englisch
RVK-Notation:
Schlagworte:
ISBN: 383762904X ; 3839429048 ; 9783837629040 ; 9783839429044
  • Thanks
  • p. 13
  • Summary
  • p. 15
  • 1
  • Introduction
  • p. 17
  • 1.1
  • Research Interest
  • p. 17
  • 1.2
  • Theoretical Background
  • p. 27
  • 1.3
  • Methods
  • p. 30
  • 1.4
  • Databases, Country Reports and Country Profiles
  • p. 38
  • Part I
  • Revival of Islam: Case Studies of Islamic Groups
  • 2
  • Features of Central Asian Folk Islam
  • p. 45
  • 2.1
  • General Remarks on Islam
  • p. 45
  • 2.2
  • Sunni Hanafi Madhab
  • p. 49
  • 2.3
  • Sufism
  • p. 54
  • 2.4
  • Folk Islam: Saints Culture and Mazar Worshipping
  • p. 61
  • 3
  • Salafi Islam: Social Transformation and Political Islam
  • p. 69
  • 3.1
  • Catchwords, Misconceptions and Important Terms
  • p. 70
  • 3.2
  • Political Islam and Salafism
  • p. 76
  • 3.3
  • Jihadists: Armed Warriors for the Caliphate
  • p. 83
  • 3.4
  • Islamists: Political Parties
  • p. 89
  • 3.5
  • Modernists and Neo-Fundamentalists: Social Transformation
  • p. 97
  • 4
  • Typology of Islamic Groups
  • p. 109
  • 4.1
  • Folk-Islamic Groups
  • p. 109
  • 4.2
  • Non-Traditional Islamic Groups
  • p. 110
  • Part II
  • Politics and Islam: Case Studies of Political Regimes
  • 5
  • History of Politics and Islam in Central Asia
  • p. 117
  • 5.1
  • Early Empires and Islamization of Central Asia
  • p. 117
  • 5.2
  • The Communist State and Islam in Central Asia
  • p. 129
  • 6
  • General Comparison of Contemporary Regimes
  • p. 139
  • 6.1
  • Demographic Siaiation
  • p. 142
  • 6.2
  • Socio-economic Situation
  • p. 147
  • 6.3
  • Political System and Government Bodies
  • p. 158
  • 7
  • Comparison of the Contemporary Role of Religion in Politics
  • p. 177
  • 7.1
  • Freedom of Religion and The Concept of Recognition
  • p. 178
  • 7.2
  • Secularity in the Constitution
  • p. 179
  • 7.3
  • Content of Religious Laws
  • p. 185
  • 7.4
  • Institutions Involved with Religion
  • p. 196
  • 7.5
  • Procedures Concerning Religion
  • p. 202
  • 8
  • Comparison of Law Enforcement
  • p. 209
  • 8.1
  • Security Strategies and Counter-Terrorism Laws
  • p. 210
  • 8.2
  • Security Forces
  • p. 214
  • 8.3
  • International Cooperation in the Security Sector
  • p. 221
  • 8.4
  • Comparison of the Judiciary; Trials and Torture
  • p. 227
  • 9
  • Typology of Religious and Counter-Terrorism Politics
  • p. 233
  • 9.1
  • Typology of State Regulation of Folk Islam
  • p. 233
  • 9.2
  • Typology of State Regulation of Non-Traditional Groups
  • p. 236
  • Part III
  • Securitization: Theory and Simulation Model
  • 10
  • Securitization Theory: Legitimacy in Security Politics
  • p. 243
  • 10.1
  • Legitimacy in Securitization Theory
  • p. 243
  • 10.2
  • Vocabulary and Units of Analysis
  • p. 246
  • 10.3
  • Securitization of Islam in Central Asia
  • p. 252
  • 11
  • Model Description
  • p. 257
  • 11.1
  • Overview and ODD-Protocol
  • p. 257
  • 11.2
  • Simulation Setup
  • p. 264
  • 11.3
  • Simulation Results: Revival of Islam
  • p. 271
  • 11.4
  • Threatened Reference Objects
  • p. 273
  • 11.5
  • Securitizing Moves
  • p. 276
  • 12
  • Model Verification and Validation
  • p. 279
  • 12.1
  • Sensitivity Analysis
  • p. 279
  • 12.2
  • Verification: Mutual Reinforcement of Securitization
  • p. 280
  • 12.3
  • Validation: Simulation Results and Empirical Data
  • p. 282
  • 13
  • Conclusions
  • p. 289
  • 13.1
  • Conclusions from Computer Simulation
  • p. 289
  • 13.2
  • General Concluding Remarks
  • p. 290
  • Literature
  • p. 293
  • Appendix
  • Appendix A
  • Official Documents and Websites
  • p. 319
  • Appendix B
  • NetLogo Code for Simulation
  • p. 321
  • Appendix C
  • Initial Values and Parameters for Simulation
  • p. 324