Christianity's stamp: Of hybrids, traitors, false peace, massacres and other horrors

نویسندگان

چکیده

The contribution focuses on the ways in which medieval Catholic religion influenced warfare, not terms of causality but conditions possibility. After having looked at (1) way crusades, particular, opened up possibility to transfer attributes from monastic asceticism (the monks were spiritual ‘warriors God’) warriors (fighting as God’), article examines two examples. (2) Theology provided Western European culture war figure ‘false brother’, which, translated, yielded a script for internal enemy, political traitor and adversary civil wars. Around this enormous fantasies crystallized themselves, arguably without equivalent non-monotheistic cultures. One sees late French wars semi-secularized mobilization figure, with execution violent purge. (3) ascetic values activated warfare First Crusade meant that while reality (as one would expect) sexual did transgressions occur, rape by one’s own side was hardly ever admitted, also inhibited.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Horrors of Sanitation

WE are so accustomed to regard the sanitary engineer as a bulwark against infectious diseases that we are apt to be shocked when he is portrayed as an insufferable nuisance. In a lecture recently delivered in Denmark, Dr. M. Hindhede, the distinguished vegetarian, gave an entertaining account of visits he had lately paid to garden cities in England and Germany. The villain of the piece in Engla...

متن کامل

Everything you know is wrong: The amazing time traveling CPU, and other horrors of concurrency

In this paper, we shall explore weak memory models, their insidious effects, and how it could happen to you! It shall explained how and why both compilers and CPUs rewrite your program to make it faster, the inevitable fallout of this, and what you can do to protect your code. We shall craft a lock, building from a naïve and broken implementation up to a safe and correct form, and study the und...

متن کامل

Tracing Traitors

We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are...

متن کامل

Trials of Traced Traitors

Traitor tracing schemes as introduced by Chor, Fiat, and Naor at Crypto ’94 are intended for tracing people who abuse a broadcast encryption scheme by allowing additional, illegitimate users to decrypt the data. The schemes should also provide legal evidence for such treachery. We discuss and improve the quality of such evidence, i.e., the security of trials that would be held about supposedly ...

متن کامل

The museum of errors/horrors in Scopus

Recent studies have shown that the Scopus bibliometric database is probably less accurate than one thinks. As a further evidence of this fact, this paper presents a structured collection of several weird typologies of database errors, which can therefore be classified as horrors. Some of them concern the incorrect indexing of so-called Online-First paper, duplicate publications, and the missing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: History and Anthropology

سال: 2022

ISSN: ['1477-2612', '0275-7206']

DOI: https://doi.org/10.1080/02757206.2022.2060216