Thomas Kirk

ORCID: 0000-0002-6283-9755
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Library Science and Information Literacy
  • Peacebuilding and International Security
  • Web and Library Services
  • Library Science and Administration
  • International Development and Aid
  • Political Conflict and Governance
  • Global Peace and Security Dynamics
  • Global Security and Public Health
  • Library Collection Development and Digital Resources
  • Politics and Conflicts in Afghanistan, Pakistan, and Middle East
  • Semantic Web and Ontologies
  • Advanced Database Systems and Queries
  • Historical Studies on Spain
  • Philippine History and Culture
  • Colonialism, slavery, and trade
  • Historical Influence and Diplomacy
  • Online and Blended Learning
  • Italy: Economic History and Contemporary Issues
  • Religion, Society, and Development
  • Historical Economic and Social Studies
  • Reformation and Early Modern Christianity
  • Data Quality and Management
  • Cambodian History and Society
  • Human Rights and Development
  • Political Philosophy and Ethics

London School of Economics and Political Science
2013-2025

University of Johannesburg
2024

La Trobe University
2023

Berea College
1984-2020

University of Central Oklahoma
2011-2017

Colorado State University
2017

Hartford Financial Services (United States)
2016

Connecticut Department of Mental Health and Addiction Services
2016

New York University
2005-2010

Earlham College
1984-2007

10.1007/bf00962627 article EN Journal of Intelligent Information Systems 1995-09-01

Abstract Protection is not simply something done or delivered to people by states, humanitarian organisations and armed peacekeepers. Instead, a growing literature has begun examine the self‐protection strategies of communities in protracted violent crises. Its authors suggest that nuanced understandings how retain measure agency face violence an important first step for those seeking reduce their levels threat vulnerability. We use interview data from Bor Ler, South Sudan, long affected...

10.1111/1758-5899.13364 article EN cc-by Global Policy 2024-05-08

Abstract Many contemporary humanitarian organisations derive their legitimacy from claims to protect civilians. Yet, what these do in its name includes a diverse and contested range of activities that are often far global publics affected populations understand as constituting protection. As others have argued, this detracts honest discussions about when how humanitarians well placed keep civilians safe violence threats. To begin address gap, we review three well‐known publicly say they done...

10.1111/1758-5899.13378 article EN cc-by Global Policy 2024-05-15

ABSTRACT Recent wars have brutally shown that civilians are not safe. This is despite high‐level global commitments and multi‐billion‐dollar humanitarian spending to keep civilian strangers protected. The high death tolls in recent armed conflicts prompting new questions about how if we can protect times of war, what the real politics such protection is. In this special section its introduction, argue it essential pay attention civilians' actual experiences their own strategies for staying...

10.1111/1758-5899.13499 article EN cc-by Global Policy 2025-02-01

Corporate databases increasingly are being viewed as potentially rich sources of new and valuable knowledge. Various approaches to “discovering” or “mining” such knowledge have been proposed. Here we identify an important previously ignored discovery task, which call data archaeology. Data archaeology is a skilled human in the sought depends on goals analyst, cannot be specified advance, emerges only through iterative process segmentation analysis. We describe system that supports...

10.1142/s0218215793000083 article EN International Journal of Cooperative Information Systems 1993-06-01

This paper reframes the security and development debate through fresh theoretical lenses, which view as highly contested both in realm of politics ideas.[i] For some analysts concerns political power, including use organised force to establish maintain social orders protect them from external internal threats. others it is about how individuals communities are protected (or themselves) violence, abuse power other existential risks. We integrate approaches whilst placing our focus on deep...

10.5334/sta.cf article EN cc-by Stability International Journal of Security and Development 2013-09-02

1University of Newcastle-upon-Tyne The Jews Vienna and the First World War David Rechter London/Portland, OR Littman Library Jewish Civilization 2000 218 £ 29.95

10.1093/ehr/119.481.560 article EN The English Historical Review 2004-04-01

In this article we propose two alternative yet interrelated definitions of security, which jointly encapsulate its dual and contested nature. These were constructed to guide a literatur...

10.1080/14678802.2013.811053 article EN Conflict Security and Development 2013-07-01

Novel gene-editing (GE) technologies provide promising opportunities to increase livestock productivity and tackle several global production sustainability food security challenges. However, these technologies, as with previous genetic modification in production, are very likely generate social controversy opposition toward their use the meat industry. Here, we explored public attitudes consumption predisposition gene-edited products potential added benefits farming. Our results show that...

10.3389/fnut.2022.856491 article EN cc-by Frontiers in Nutrition 2022-04-05

Abstract This article examines how former Protection of Civilian site (PoCs) residents are staying safe and protecting themselves after the United Nations Mission in South Sudan's (UNMISS) handing over PoCs to Revitalised‐Transitional Government National Unity (R‐TGoNU). Using key informant interviews, questionnaires, observations, we establish that those still residing do so with less humanitarian assistance, increased insecurity, few authorities they can rely upon or turn for protection....

10.1111/1758-5899.13206 article EN cc-by Global Policy 2023-04-04

Journal Article Report on a Botanical Visit to Lord Auckland, Campbell, Antipodes, and other Antarctic Islands, in Letter from Thomas Kirk, F.L.S., Chief Conservator of State Forests, New Zealand, Sir Joseph D. Hooker, K.C.S.I., F.R.S., F.L.S. (Communicated by the latter.) Get access Kirk Search for works this author on: Oxford Academic Google Scholar Linnean Society, Volume 28, Issue 194, August 1891, Pages 327–330, https://doi.org/10.1111/j.1095-8339.1891.tb01463.x Published: 05 January...

10.1111/j.1095-8339.1891.tb01463.x article EN Journal of the Linnean Society of London Botany 1891-08-01

For many observers, state-building in Timor-Leste has overlooked and undermined local norms governance practices, resulting a potentially destabilising distance between citizens the state. The emerging state justice system been singled out for imposing inaccessible alien institutions onto population that historically fought to retain its identity. Nonetheless, viewing access as central development peace, international organisations continue work aid equitable swift resolution of disputes....

10.1163/15718115-02203007 article EN cc-by-nc International Journal on Minority and Group Rights 2015-07-17

Abstract Using ethnographic research from Pakistan, this paper argues that social accountability programmes overlook the role of intermediaries in clientelistic states risk undermining wider democratising projects they seek to support. It proposes a theory ‘isomorphic activism’ describes how these public authorities appropriate others' opportunities participate politics and, process, undermine democratic norms. Isomorphic activism is shown be more likely when are based on ideals civil...

10.1111/1758-5899.13218 article EN cc-by-nc-nd Global Policy 2023-05-23

Discussions on African responses to Covid-19 have focused the state and its international backers. Far less is known about a wider range of public authorities, including chiefs, humanitarians, criminal gangs, armed groups. This paper investigates how pandemic provided opportunities for claims contests over power in Uganda, Democratic Republic Congo, South Sudan. Ethnographic research used contend that local forms authority can be akin miniature sovereigns, able interpret dictates, policies,...

10.1111/disa.12513 article EN cc-by Disasters 2021-09-23

10.5860/crl_55_01_7 article EN cc-by-nc College & Research Libraries 1994-01-01

During the thirteenth and fourteenth centuries, while Genoa was at height of its colonial expansion, Livorno little more than a fishing village. The Genoese had assembled territorial state in Liguria, taken island Corsica and, as early 1277, were sending ships directly to England Flanders. All merely malaria‐infested appendix Porto Pisano. Over course sixteenth century, however, grew by leaps bounds end century concerns over Tuscan city's growing importance commercial port become...

10.1111/1468-229x.00174 article EN History 2001-01-01

Advanced Metering Infrastructure (AMI) has been deployed at over 70% of rural electric cooperatives, and this new data source offers opportunities for valuable applications beyond billing. The National Rural Electric Cooperative Association (NRECA) developed open computer software to perform anomaly detection dynamic power flow analysis with AMI the cooperatives (consumer-owned, not-for-profit utilities). We describe software, discuss challenges collecting working data, further potential...

10.1109/isgt.2017.8085988 article EN 2017-04-01

September 28, 2016, marked the 50th anniversary of Connecticut Mental Health Center, a state-owned and state-operated joint venture between state Yale University built sustained with federal, state, university funds. Collaboration across these entities has produced wide array clinical, educational, research initiatives, few which are described in this column. The missions clinical care, research, education remain foundation for an organization that serves 5,000 individuals each year who poor...

10.1176/appi.ps.201600373 article EN Psychiatric Services 2016-10-03
Coming Soon ...