Dealing with Frustration: A Grounded Theory Study of CVE Practitioners
Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots...
Ausführliche Beschreibung
Autor*in: |
Orla Lehane [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2019 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: International Journal of Conflict and Violence - University of Bielefeld, 2007, 12(2019), 0 |
---|---|
Übergeordnetes Werk: |
volume:12 ; year:2019 ; number:0 |
Links: |
---|
DOI / URN: |
10.4119/UNIBI/ijcv.641 |
---|
Katalog-ID: |
DOAJ024277355 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ024277355 | ||
003 | DE-627 | ||
005 | 20230503002539.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230226s2019 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.4119/UNIBI/ijcv.641 |2 doi | |
035 | |a (DE-627)DOAJ024277355 | ||
035 | |a (DE-599)DOAJ8e6df97d321849b588e34d6648405df3 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a JA1-92 | |
100 | 0 | |a Orla Lehane |e verfasserin |4 aut | |
245 | 1 | 0 | |a Dealing with Frustration: A Grounded Theory Study of CVE Practitioners |
264 | 1 | |c 2019 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role. | ||
650 | 4 | |a CVE | |
650 | 4 | |a grounded theory | |
650 | 4 | |a frontline practitioners | |
650 | 4 | |a CVE funding | |
650 | 4 | |a CVE policy | |
653 | 0 | |a Political science (General) | |
653 | 0 | |a Social Sciences | |
653 | 0 | |a H | |
773 | 0 | 8 | |i In |t International Journal of Conflict and Violence |d University of Bielefeld, 2007 |g 12(2019), 0 |w (DE-627)517814579 |w (DE-600)2251191-X |x 18641385 |7 nnns |
773 | 1 | 8 | |g volume:12 |g year:2019 |g number:0 |
856 | 4 | 0 | |u https://doi.org/10.4119/UNIBI/ijcv.641 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/8e6df97d321849b588e34d6648405df3 |z kostenfrei |
856 | 4 | 0 | |u http://www.ijcv.org/index.php/ijcv/article/view/641 |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/1864-1385 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a SSG-OLC-PHA | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_101 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_138 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_152 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_187 | ||
912 | |a GBV_ILN_206 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_250 | ||
912 | |a GBV_ILN_267 | ||
912 | |a GBV_ILN_281 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_635 | ||
912 | |a GBV_ILN_647 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2086 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 12 |j 2019 |e 0 |
author_variant |
o l ol |
---|---|
matchkey_str |
article:18641385:2019----::elnwtfutaingonetersuyf |
hierarchy_sort_str |
2019 |
callnumber-subject-code |
JA |
publishDate |
2019 |
allfields |
10.4119/UNIBI/ijcv.641 doi (DE-627)DOAJ024277355 (DE-599)DOAJ8e6df97d321849b588e34d6648405df3 DE-627 ger DE-627 rakwb eng JA1-92 Orla Lehane verfasserin aut Dealing with Frustration: A Grounded Theory Study of CVE Practitioners 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role. CVE grounded theory frontline practitioners CVE funding CVE policy Political science (General) Social Sciences H In International Journal of Conflict and Violence University of Bielefeld, 2007 12(2019), 0 (DE-627)517814579 (DE-600)2251191-X 18641385 nnns volume:12 year:2019 number:0 https://doi.org/10.4119/UNIBI/ijcv.641 kostenfrei https://doaj.org/article/8e6df97d321849b588e34d6648405df3 kostenfrei http://www.ijcv.org/index.php/ijcv/article/view/641 kostenfrei https://doaj.org/toc/1864-1385 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_110 GBV_ILN_138 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_250 GBV_ILN_267 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_635 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2014 GBV_ILN_2086 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2019 0 |
spelling |
10.4119/UNIBI/ijcv.641 doi (DE-627)DOAJ024277355 (DE-599)DOAJ8e6df97d321849b588e34d6648405df3 DE-627 ger DE-627 rakwb eng JA1-92 Orla Lehane verfasserin aut Dealing with Frustration: A Grounded Theory Study of CVE Practitioners 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role. CVE grounded theory frontline practitioners CVE funding CVE policy Political science (General) Social Sciences H In International Journal of Conflict and Violence University of Bielefeld, 2007 12(2019), 0 (DE-627)517814579 (DE-600)2251191-X 18641385 nnns volume:12 year:2019 number:0 https://doi.org/10.4119/UNIBI/ijcv.641 kostenfrei https://doaj.org/article/8e6df97d321849b588e34d6648405df3 kostenfrei http://www.ijcv.org/index.php/ijcv/article/view/641 kostenfrei https://doaj.org/toc/1864-1385 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_110 GBV_ILN_138 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_250 GBV_ILN_267 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_635 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2014 GBV_ILN_2086 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2019 0 |
allfields_unstemmed |
10.4119/UNIBI/ijcv.641 doi (DE-627)DOAJ024277355 (DE-599)DOAJ8e6df97d321849b588e34d6648405df3 DE-627 ger DE-627 rakwb eng JA1-92 Orla Lehane verfasserin aut Dealing with Frustration: A Grounded Theory Study of CVE Practitioners 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role. CVE grounded theory frontline practitioners CVE funding CVE policy Political science (General) Social Sciences H In International Journal of Conflict and Violence University of Bielefeld, 2007 12(2019), 0 (DE-627)517814579 (DE-600)2251191-X 18641385 nnns volume:12 year:2019 number:0 https://doi.org/10.4119/UNIBI/ijcv.641 kostenfrei https://doaj.org/article/8e6df97d321849b588e34d6648405df3 kostenfrei http://www.ijcv.org/index.php/ijcv/article/view/641 kostenfrei https://doaj.org/toc/1864-1385 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_110 GBV_ILN_138 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_250 GBV_ILN_267 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_635 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2014 GBV_ILN_2086 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2019 0 |
allfieldsGer |
10.4119/UNIBI/ijcv.641 doi (DE-627)DOAJ024277355 (DE-599)DOAJ8e6df97d321849b588e34d6648405df3 DE-627 ger DE-627 rakwb eng JA1-92 Orla Lehane verfasserin aut Dealing with Frustration: A Grounded Theory Study of CVE Practitioners 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role. CVE grounded theory frontline practitioners CVE funding CVE policy Political science (General) Social Sciences H In International Journal of Conflict and Violence University of Bielefeld, 2007 12(2019), 0 (DE-627)517814579 (DE-600)2251191-X 18641385 nnns volume:12 year:2019 number:0 https://doi.org/10.4119/UNIBI/ijcv.641 kostenfrei https://doaj.org/article/8e6df97d321849b588e34d6648405df3 kostenfrei http://www.ijcv.org/index.php/ijcv/article/view/641 kostenfrei https://doaj.org/toc/1864-1385 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_110 GBV_ILN_138 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_250 GBV_ILN_267 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_635 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2014 GBV_ILN_2086 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2019 0 |
allfieldsSound |
10.4119/UNIBI/ijcv.641 doi (DE-627)DOAJ024277355 (DE-599)DOAJ8e6df97d321849b588e34d6648405df3 DE-627 ger DE-627 rakwb eng JA1-92 Orla Lehane verfasserin aut Dealing with Frustration: A Grounded Theory Study of CVE Practitioners 2019 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role. CVE grounded theory frontline practitioners CVE funding CVE policy Political science (General) Social Sciences H In International Journal of Conflict and Violence University of Bielefeld, 2007 12(2019), 0 (DE-627)517814579 (DE-600)2251191-X 18641385 nnns volume:12 year:2019 number:0 https://doi.org/10.4119/UNIBI/ijcv.641 kostenfrei https://doaj.org/article/8e6df97d321849b588e34d6648405df3 kostenfrei http://www.ijcv.org/index.php/ijcv/article/view/641 kostenfrei https://doaj.org/toc/1864-1385 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_110 GBV_ILN_138 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_250 GBV_ILN_267 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_635 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2014 GBV_ILN_2086 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 12 2019 0 |
language |
English |
source |
In International Journal of Conflict and Violence 12(2019), 0 volume:12 year:2019 number:0 |
sourceStr |
In International Journal of Conflict and Violence 12(2019), 0 volume:12 year:2019 number:0 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
CVE grounded theory frontline practitioners CVE funding CVE policy Political science (General) Social Sciences H |
isfreeaccess_bool |
true |
container_title |
International Journal of Conflict and Violence |
authorswithroles_txt_mv |
Orla Lehane @@aut@@ |
publishDateDaySort_date |
2019-01-01T00:00:00Z |
hierarchy_top_id |
517814579 |
id |
DOAJ024277355 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ024277355</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503002539.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230226s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4119/UNIBI/ijcv.641</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ024277355</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ8e6df97d321849b588e34d6648405df3</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">JA1-92</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Orla Lehane</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dealing with Frustration: A Grounded Theory Study of CVE Practitioners</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CVE</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">grounded theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">frontline practitioners</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CVE funding</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CVE policy</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Political science (General)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Social Sciences</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">H</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">International Journal of Conflict and Violence</subfield><subfield code="d">University of Bielefeld, 2007</subfield><subfield code="g">12(2019), 0</subfield><subfield code="w">(DE-627)517814579</subfield><subfield code="w">(DE-600)2251191-X</subfield><subfield code="x">18641385</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:12</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4119/UNIBI/ijcv.641</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/8e6df97d321849b588e34d6648405df3</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.ijcv.org/index.php/ijcv/article/view/641</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1864-1385</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_206</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_267</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_635</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_647</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">12</subfield><subfield code="j">2019</subfield><subfield code="e">0</subfield></datafield></record></collection>
|
callnumber-first |
J - Political Science |
author |
Orla Lehane |
spellingShingle |
Orla Lehane misc JA1-92 misc CVE misc grounded theory misc frontline practitioners misc CVE funding misc CVE policy misc Political science (General) misc Social Sciences misc H Dealing with Frustration: A Grounded Theory Study of CVE Practitioners |
authorStr |
Orla Lehane |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)517814579 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
JA1-92 |
illustrated |
Not Illustrated |
issn |
18641385 |
topic_title |
JA1-92 Dealing with Frustration: A Grounded Theory Study of CVE Practitioners CVE grounded theory frontline practitioners CVE funding CVE policy |
topic |
misc JA1-92 misc CVE misc grounded theory misc frontline practitioners misc CVE funding misc CVE policy misc Political science (General) misc Social Sciences misc H |
topic_unstemmed |
misc JA1-92 misc CVE misc grounded theory misc frontline practitioners misc CVE funding misc CVE policy misc Political science (General) misc Social Sciences misc H |
topic_browse |
misc JA1-92 misc CVE misc grounded theory misc frontline practitioners misc CVE funding misc CVE policy misc Political science (General) misc Social Sciences misc H |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
International Journal of Conflict and Violence |
hierarchy_parent_id |
517814579 |
hierarchy_top_title |
International Journal of Conflict and Violence |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)517814579 (DE-600)2251191-X |
title |
Dealing with Frustration: A Grounded Theory Study of CVE Practitioners |
ctrlnum |
(DE-627)DOAJ024277355 (DE-599)DOAJ8e6df97d321849b588e34d6648405df3 |
title_full |
Dealing with Frustration: A Grounded Theory Study of CVE Practitioners |
author_sort |
Orla Lehane |
journal |
International Journal of Conflict and Violence |
journalStr |
International Journal of Conflict and Violence |
callnumber-first-code |
J |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2019 |
contenttype_str_mv |
txt |
author_browse |
Orla Lehane |
container_volume |
12 |
class |
JA1-92 |
format_se |
Elektronische Aufsätze |
author-letter |
Orla Lehane |
doi_str_mv |
10.4119/UNIBI/ijcv.641 |
title_sort |
dealing with frustration: a grounded theory study of cve practitioners |
callnumber |
JA1-92 |
title_auth |
Dealing with Frustration: A Grounded Theory Study of CVE Practitioners |
abstract |
Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role. |
abstractGer |
Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role. |
abstract_unstemmed |
Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ SSG-OLC-PHA GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_101 GBV_ILN_110 GBV_ILN_138 GBV_ILN_151 GBV_ILN_152 GBV_ILN_161 GBV_ILN_187 GBV_ILN_206 GBV_ILN_213 GBV_ILN_230 GBV_ILN_250 GBV_ILN_267 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_635 GBV_ILN_647 GBV_ILN_702 GBV_ILN_2014 GBV_ILN_2086 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
0 |
title_short |
Dealing with Frustration: A Grounded Theory Study of CVE Practitioners |
url |
https://doi.org/10.4119/UNIBI/ijcv.641 https://doaj.org/article/8e6df97d321849b588e34d6648405df3 http://www.ijcv.org/index.php/ijcv/article/view/641 https://doaj.org/toc/1864-1385 |
remote_bool |
true |
ppnlink |
517814579 |
callnumber-subject |
JA - Political Science |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.4119/UNIBI/ijcv.641 |
callnumber-a |
JA1-92 |
up_date |
2024-07-03T22:09:12.138Z |
_version_ |
1803597436306849792 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ024277355</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230503002539.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230226s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4119/UNIBI/ijcv.641</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ024277355</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ8e6df97d321849b588e34d6648405df3</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">JA1-92</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Orla Lehane</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Dealing with Frustration: A Grounded Theory Study of CVE Practitioners</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2019</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Understanding how best to proceed in the prevention of violent extremism is a significant concern for researchers and practitioners. This paper draws on interviews with thirty ‘countering violent extremism’ (CVE) practitioners, using a grounded theory approach focusing on those working at grassroots level, to highlight the way in which these individuals are mining their own personal experiences in their approaches to this work. Driven by a sense of frustration with the ‘accepted wisdom’, this involves drawing on personal skills and experiences to establish themselves as credible actors, thereby carving a space for themselves within a growing CVE industry. Moving beyond anecdotal evidence using grounded theory, this paper offers a systematic analysis of the experiences of these frontline practitioners. In considering what it is that practitioners are doing, and the context that pushes them to adopt this approach, this research offers significant insights into what is actually happening in the area of practice, contributing to understandings of the prevention landscape as a whole. This paper highlights the tensions between actors operating at different levels within the CVE sphere, with discrepancies in resources and power playing a central role.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CVE</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">grounded theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">frontline practitioners</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CVE funding</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">CVE policy</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Political science (General)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Social Sciences</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">H</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">International Journal of Conflict and Violence</subfield><subfield code="d">University of Bielefeld, 2007</subfield><subfield code="g">12(2019), 0</subfield><subfield code="w">(DE-627)517814579</subfield><subfield code="w">(DE-600)2251191-X</subfield><subfield code="x">18641385</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:12</subfield><subfield code="g">year:2019</subfield><subfield code="g">number:0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4119/UNIBI/ijcv.641</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/8e6df97d321849b588e34d6648405df3</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.ijcv.org/index.php/ijcv/article/view/641</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1864-1385</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SSG-OLC-PHA</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_101</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_206</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_267</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_635</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_647</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">12</subfield><subfield code="j">2019</subfield><subfield code="e">0</subfield></datafield></record></collection>
|
score |
7.400511 |