13 August 2011

Criminal Enclaves in Licit Economies: Exploring the Criminal Consequences of Shuttle Trade

CALL FOR PAPERS for the panel “Transnational Crime: Difficulties of Responding to the Evasive Beast” to be presented at 2012 International BISA-ISA conference in Edinburgh 2012. Deadline for the submission of abstracts is August 27, 2011. Abstracts should be sent to: yuliya.zabyelina@sis.unitn.it

Transnational Crime: Difficulties of Responding to the Evasive Beast.

The ways in which transnational crime and its countermeasures confront the traditional borders of crime control, national security, national politics and international relations have challenge the disciplinary boundaries of orthodox criminology, which has traditionally focused on matters internal to nation-states. This panel invites proposals that investigate challenges of responding to transnational criminal activities:

- THEORETICAL: alternative theoretical approach to understanding both the phenomena currently labeled transnational crime and state responses to them; orthodox and critical ways of labeling and responding to transnational activities. State institutional challenges of responding to transnational crime; world risk society.

- SECURITY: merging national security and police threats; national and “a-national” sites of law enforcement; transnational policing; balancing the paradoxical intersection of neo-liberal globalization and “tough” security policies; a “panopticon” state against crime; evaluating the private security market.

- SOCIAL: strategies of border management in terms of fighting illicit cross-border movements; border politics and border reconstruction; crime and social injuries: the problem of “illegalized” migrants and “criminalized” victims of human trafficking; established social divisions based on race, class, and gender by maintaining and extending countermeasures; “gated” communities.

- TECHNOLOGICAL: new technologies for better surveillance; criminal technological empowerment and methodological sophistication; responses to cyber crime.

No comments: