Cookies Policy
X

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.

I accept this policy

Find out more here

Rethinking Approaches to Prevention under the Responsibility to Protect

No metrics data to plot.
The attempt to load metrics for this article has failed.
The attempt to plot a graph for these metrics has failed.
The full text of this article is not currently available.

Brill’s MyBook program is exclusively available on BrillOnline Books and Journals. Students and scholars affiliated with an institution that has purchased a Brill E-Book on the BrillOnline platform automatically have access to the MyBook option for the title(s) acquired by the Library. Brill MyBook is a print-on-demand paperback copy which is sold at a favorably uniform low price.

Access this article

+ Tax (if applicable)
Add to Favorites
You must be logged in to use this functionality

Agency and Empowerment within Vulnerable Populations

image of Global Responsibility to Protect

Within the responsibility to protect (R2P) principle, there is an assumption that is rarely questioned. Beneath the statement that states and the international community are charged with the responsibility to protect populations from genocide, war crimes, crimes against humanity and ethnic cleansing, lies the implication that vulnerable populations cannot protect themselves. In periods of crisis, when the international community might consider mobilising a response under pillar three, this is often the case. Yet outside of such crises, when pillar one – the enduring responsibility of the state to protect its own populations – and pillar two – assistance from the international community to meet this responsibility – might be invoked in a preventive capacity, vulnerable populations may not be wholly reliant upon protection from external actors. In these circumstances, persecuted groups may actively seek to protect themselves, and may be successfully able to do so. In this paper, I challenge the current understanding of prevention within R2P as an externally imposed process, by considering how persecuted groups have themselves acted in ways that mitigate their vulnerability to mass atrocities. The paper considers a number of historical case studies in which targeted groups were able to leverage their own agency, often with assistance from others, to reduce this vulnerability. These include cases that culminated in genocide, namely the experiences of German and Austrian Jews under Nazi rule, and negative cases studies in which a demonstrable risk of mass atrocities was not realised, such as the experiences of Yemenite Jews in the first half of the twentieth century and those of the Bahá’í community in Iran since the 1979 Iranian revolution. These cases suggest that assisting persecuted populations to empower themselves can be an effective way to promote resilience to mass atrocities. In the final section of the paper, I explore why this approach is often overlooked, despite its capacity for some success. I consider the potential benefits and costs of a greater focus on utilising the agency of vulnerable groups in endeavours to prevent mass atrocities.

Affiliations: 1: University of Wollongong, mayersen@uow.edu.au

10.1163/1875984X-00604007
/content/journals/10.1163/1875984x-00604007
dcterms_title,pub_keyword,dcterms_description,pub_author
10
5
Loading
Loading

Full text loading...

/content/journals/10.1163/1875984x-00604007
Loading

Data & Media loading...

http://brill.metastore.ingenta.com/content/journals/10.1163/1875984x-00604007
Loading

Article metrics loading...

/content/journals/10.1163/1875984x-00604007
2014-11-27
2018-04-24

Sign-in

Can't access your account?
  • Tools

  • Add to Favorites
  • Printable version
  • Email this page
  • Subscribe to ToC alert
  • Get permissions
  • Recommend to your library

    You must fill out fields marked with: *

    Librarian details
    Your details
    Why are you recommending this title?
    Select reason:
     
    Global Responsibility to Protect — Recommend this title to your library
  • Export citations
  • Key

  • Full access
  • Open Access
  • Partial/No accessInformation