Christianity's stamp: Of hybrids, traitors, false peace, massacres and other horrors
نویسندگان
چکیده
The contribution focuses on the ways in which medieval Catholic religion influenced warfare, not terms of causality but conditions possibility. After having looked at (1) way crusades, particular, opened up possibility to transfer attributes from monastic asceticism (the monks were spiritual ‘warriors God’) warriors (fighting as God’), article examines two examples. (2) Theology provided Western European culture war figure ‘false brother’, which, translated, yielded a script for internal enemy, political traitor and adversary civil wars. Around this enormous fantasies crystallized themselves, arguably without equivalent non-monotheistic cultures. One sees late French wars semi-secularized mobilization figure, with execution violent purge. (3) ascetic values activated warfare First Crusade meant that while reality (as one would expect) sexual did transgressions occur, rape by one’s own side was hardly ever admitted, also inhibited.
منابع مشابه
The Horrors of Sanitation
WE are so accustomed to regard the sanitary engineer as a bulwark against infectious diseases that we are apt to be shocked when he is portrayed as an insufferable nuisance. In a lecture recently delivered in Denmark, Dr. M. Hindhede, the distinguished vegetarian, gave an entertaining account of visits he had lately paid to garden cities in England and Germany. The villain of the piece in Engla...
متن کاملEverything you know is wrong: The amazing time traveling CPU, and other horrors of concurrency
In this paper, we shall explore weak memory models, their insidious effects, and how it could happen to you! It shall explained how and why both compilers and CPUs rewrite your program to make it faster, the inevitable fallout of this, and what you can do to protect your code. We shall craft a lock, building from a naïve and broken implementation up to a safe and correct form, and study the und...
متن کاملTracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are...
متن کاملTrials of Traced Traitors
Traitor tracing schemes as introduced by Chor, Fiat, and Naor at Crypto ’94 are intended for tracing people who abuse a broadcast encryption scheme by allowing additional, illegitimate users to decrypt the data. The schemes should also provide legal evidence for such treachery. We discuss and improve the quality of such evidence, i.e., the security of trials that would be held about supposedly ...
متن کاملThe museum of errors/horrors in Scopus
Recent studies have shown that the Scopus bibliometric database is probably less accurate than one thinks. As a further evidence of this fact, this paper presents a structured collection of several weird typologies of database errors, which can therefore be classified as horrors. Some of them concern the incorrect indexing of so-called Online-First paper, duplicate publications, and the missing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: History and Anthropology
سال: 2022
ISSN: ['1477-2612', '0275-7206']
DOI: https://doi.org/10.1080/02757206.2022.2060216