Under what conditions do rebel organizations control territory during civil war? How do civilians influence the distribution of territorial control? Why do rebels invest in governance, and why do they target civilians with violence, in some locations but not others? This dissertation advances a political accountability theory to explain how civilians influence the distribution of territorial control and governance during civil war. Existing research explaining variation in rebel territorial control and behavior have emphasized structural and organizational factors, identity politics, economic conditions, and geography. However, the classic insurgency literature and recent counterinsurgency doctrine emphasize the importance of securing civilian support and protecting the population to achieving military objectives in civil war. If true, civilians retain at least some power over rebel personnel. The accountability theory of rebel conduct provides a unified framework linking inter-related conflict processes associated with rebel groups’ territorial control, governance, and strategic use of violence during civil war. It argues that community collective action capacity, the ease with which communities facilitate collective action to pursue common interests, influences the distribution territorial control and belligerent conduct during civil war. The empirical strategy draws upon complementary quantitative and qualitative methods to test the accountability against plausible alternatives using village-level data from the communist insurgency in the Philippines. The results provide robust support for the accountability theory over plausible alternatives, and yield policy implications for peace-building and economic development in conflict-affected states.
more »
« less
Mapping and the politics of informality in Jakarta
Recent research has argued that, rather than viewing the “informality” of settlements as an empirically stable phenomenon that can be readily defined and measured based on legal and institutional criteria, informality should instead be viewed as a sociopolitical construct produced by the state in the interests of territorial control. This paper examines the implications of the increasing accessibility of geospatial data and technology for state framings of informality. We specifically ask how state actors have sought to define the “legitimacy” and “formality” of settlement types in mapping, how these mapping efforts have related to change and continuity in discourses and debates within the state about the idea of informality, and how the political dynamics that inform the production of informality have shifted through interactions with communities. We focus on the case of Jakarta, examining recent efforts to map “irregular” settlements, “slums” and “kampung” through an analysis of spatial data, interviews with bureaucrats, and a review of literature on community-based countermapping. We find that mapping efforts apply diverse definitions of informality, based variously on legal/regulatory, developmental, or morphological criteria. These efforts are shaped by the path-dependent interests of varied state agencies in legitimizing and enabling state territorial control.
more »
« less
- Award ID(s):
- 1759596
- PAR ID:
- 10383449
- Date Published:
- Journal Name:
- Urban Geography
- ISSN:
- 0272-3638
- Page Range / eLocation ID:
- 1 to 25
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Between 2018 and 2020, dramatic changes in US-Mexico policy transformed experiences of asylum on the border. Quotas on applications at ports of entry (known as metering), the “Remain in Mexico” policy, and the deployment of the pandemic era “lockdown” through Title 42, each severely limited asylum opportunities. In response, a host of informal waiting lists emerged, developed and were utilized by a binational network of non-governmental and government agencies, shelters, cartels, and individuals. In this article we use a feminist geographic lens to examine the intimate geopolitics of esperar created by these lists. Via in-depth oral histories with Mexican asylum-seekers, shelter staff, legal advocates, and the wider border bureaucracy, we examine their formation, everyday management, the slow violences and immediate threats they posed, and their work as an informal technology of state control. Our analysis demonstrates how the lists operated as informal tactics of diversion and delay, producing a false sense of certainty while using indefinite waiting times as soft and surreptitious mechanisms to block displaced people’s legal claims for asylum. This imposed distinctly gendered burdens on women and youth. However, we also identify how the lists, where appropriated by migrants themselves, became tools to resist the hierarchies of the US nation-state and its territorial impositions. Our work extends established political geographic analyses of migration by attending to the interscalar, quotidian, and embodied realities of border practice – manifest amidst today’s lockdown by the slow violences of waiting.more » « less
-
Data too sensitive to be "open" for analysis and re-purposing typically remains "closed" as proprietary information. This dichotomy undermines efforts to make algorithmic systems more fair, transparent, and accountable. Access to proprietary data in particular is needed by government agencies to enforce policy, researchers to evaluate methods, and the public to hold agencies accountable; all of these needs must be met while preserving individual privacy and firm competitiveness. In this paper, we describe an integrated legal-technical approach provided by a third-party public-private data trust designed to balance these competing interests. Basic membership allows firms and agencies to enable low-risk access to data for compliance reporting and core methods research, while modular data sharing agreements support a wide array of projects and use cases. Unless specifically stated otherwise in an agreement, all data access is initially provided to end users through customized synthetic datasets that offer a) strong privacy guarantees, b) removal of signals that could expose competitive advantage, and c) removal of biases that could reinforce discriminatory policies, all while maintaining fidelity to the original data. We find that using synthetic data in conjunction with strong legal protections over raw data strikes a balance between transparency, proprietorship, privacy, and research objectives. This legal-technical framework can form the basis for data trusts in a variety of contexts.more » « less
-
Recent efforts to dismantle felon disenfranchisement regimes have the potential to substantially expand electoral eligibility among people with criminal records; however, even among those with criminal legal histories who are eligible to vote, voting rates are often extremely low. Analyzing interview, focus group, and text message conversations among a multi-state sample around the November 2022 election, we identify and describe how administrative barriers to voting—including a lack of understanding about the voting process, confusion about legal eligibility, and perceived risks of rearrest of voting while ineligible—pose an access to justice issue among system-impacted people. These barriers are amplified by government mistrust, specifically the perception that barriers are intentionally constructed to suppress voting, and they are potentially mitigated by outreach by community organizations that are viewed as credible. The findings emphasize that legislative reforms repealing disenfranchisement laws must be accompanied by on-the-ground efforts to address administrative burdens to broaden access to the franchise.more » « less
-
The increasing prevalence of Internet of Things (IoT) devices has introduced significant challenges in digital forensic investigations, requiring new strategies for effective evidence prioritization and analysis. Traditional forensic methods struggle with data heterogeneity, volatility, and legal constraints, making IoT evidence collection complex and time-sensitive. This paper presents a weighted prioritization model (WPM) that ranks IoT devices based on six forensic criteria, enabling investigators to focus on highpriority evidence first, reducing data loss and optimizing forensic workflows. Through case studies in arson, homicide, and missing person investigations, we demonstrate how WPM enhances investigative decisionmaking and resource allocation in real-world forensic scenarios. The proposed framework offers a structured, scalable, and adaptable approach to IoT forensic investigations, improving efficiency, reliability, and legal compliance in digital evidence collection.more » « less
An official website of the United States government

