Abstract

Bosnia. Sri Lanka. Rwanda. Northern Ireland. In the late twentieth century, and particularly in the nascent post-Cold War era, places have become metaphors for violent communal'1 or conflict. As Donald Horowitz has observed, such conflicts have fought and bled and burned [their] way into public and scholarly con sciousness. Yet, at the same time, we find ourselves ill equipped intellec tually and institutionally to face the complex challenges posed by identity based violence in a new, and very different, world. While the collapse of the Communist bloc and accelerating globalization have fundamentally al tered the structure of geopolitics, our conceptual frameworks and menu of policy prescriptions are indelibly infused with a Cold War political logic. This paper develops a twofold argument. First, the search for an ef fective response to identity-based conflicts requires more than the current mainstream (read: realist) efforts to fit them into the existing approaches to security. Such conflicts push us to rethink not only the way we deal with security challenges but the way we define and understand security is sues, as well. Correspondingly, identity-based conflicts push us to rethink our understanding of collective identity?its formation, mobilization, politicization and, most importantly, its connection to violent conflict. Through the process of rethinking security and identity, we argue that there is a need both to build on and to go beyond well-traveled realist paths. While we recognize that a sophisticated version of realism offers some insight into the dynamics of identity-based conflict, we argue that there is a need to go further in our thinking about, and our responses to, such conflict because even in this version, identity is still cast as being fixed, coherent, and self-contained. Thus, the second part of our argument is that a relational, historical, and dynamic understanding of identity is crucial not only for coming to terms with the connections between security and (ethnic) identity but also for constructing effective strategies for the management or resolution of conflict.1 This argument is developed in four main sections. In the first two sec tions, we deal theoretically with the questions of security and identity. In

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.